Cloud

11/27/2017
04:16 PM
50%
50%

McAfee Looks to Cloud with Skyhigh Acquisition

McAfee agrees to buy CASB provider Skyhigh Networks, demonstrating a strong focus on cloud security.

McAfee plans to acquire cloud access security broker (CASB) provider Skyhigh Networks, the company announced today. The move is intended to expand McAfee's portfolio and strengthen its focus on cloud security as more businesses move their data to the cloud.

It has been less than eight months since McAfee spun off from Intel and reestablished itself as a stand-alone company. By teaming up with Skyhigh, it plans to grow and advance its security architecture to span both endpoint and cloud control points, connected by the security operations center.

Skyhigh's system monitors activity across SaaS, PaaS, and IaaS environments. The company also offers threat detection, automation of cloud-based policy violations, and data protection for data that persists inside and outside the cloud. While McAfee will benefit from Skyhigh's technology, the CASB company will broaden its reach through McAfee's global base and deep product portfolio.

The existing organizational structure of Skyhigh will generally stay the same. CEO Rajiv Gupta will join McAfee CEO Chris Young, and his leadership team, to run McAfee's new cloud business unit.

Terms of the agreement were not disclosed. Read more details here.

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Election Websites, Back-End Systems Most at Risk of Cyberattack in Midterms
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/14/2018
White Hat to Black Hat: What Motivates the Switch to Cybercrime
Kelly Sheridan, Staff Editor, Dark Reading,  8/8/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-13106
PUBLISHED: 2018-08-15
Cheetahmobile CM Launcher 3D - Theme, wallpaper, Secure, Efficient, 5.0.3, 2017-09-19, Android application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.
CVE-2017-13107
PUBLISHED: 2018-08-15
Live.me - live stream video chat, 3.7.20, 2017-11-06, Android application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.
CVE-2017-13108
PUBLISHED: 2018-08-15
DFNDR Security Antivirus, Anti-hacking & Cleaner, 5.0.9, 2017-11-01, Android application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.
CVE-2017-13100
PUBLISHED: 2018-08-15
DistinctDev, Inc., The Moron Test, 6.3.1, 2017-05-04, iOS application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.
CVE-2017-13101
PUBLISHED: 2018-08-15
Musical.ly Inc., musical.ly - your video social network, 6.1.6, 2017-10-03, iOS application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.