June 16, 2021 7:24 am
-Advertisement-

McAfee completes Skyhigh Networks acquisition, aims to lead CASB market segment

McAfee has announced the completion of acquisition of Skyhigh Networks. With the close of this deal, now Skyhigh Networks becomes part of the McAfee Cloud Security Business Unit.

Must Read

McAfee has announced the completion of acquisition of Skyhigh Networks. With the close of this deal, now Skyhigh Networks becomes part of the McAfee Cloud Security Business Unit. Skyhigh Networks has strong presence in the cloud access security broker (CASB) market segment that analysts describe as one of the fastest growing areas of information security investments of the last five years. Now, McAfee can offer a cloud portfolio that addresses the three primary challenges of managing multi-cloud environments—visibility into networks, workloads and data, advanced threat protection and pervasive data protection.

“With two industry leaders coming together under one company, we will make cybersecurity an enabler to the transformative power of our digital age. We are focused on securing customers from their devices to the cloud, giving customers access to market-leading capabilities in the architectural control points that matter most,” stated Chris Young, chief executive officer, McAfee.

McAfee cloud security solutions help organizations identify where their critical resources reside in the cloud. Skyhigh identifies sensitive information using keywords, data patterns, fingerprints, metadata, and file types – and analyzes behavior across all cloud services, users, and devices. McAfee CWS allows administrators to apply security controls across multiple cloud infrastructure environments, to discover and monitor potentially thousands of cloud workloads and virtual networks.

“McAfee’s acquisition of Skyhigh Networks brings two security leaders together,” said Ivaylo Uzunov, manager of Information Security at Carlson Wagonlit Travel. “The integration of their security offerings will provide a holistic data visibility and control for cloud applications, while preserving policy enforcement and compliance.”

ALSO READ

Subscribe to receive the day's headlines from Tech Observer straight in your inbox

- Advertisement -

DISCUSSION

LEAVE A REPLY

Please enter your comment!
Please enter your name here

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisement -

Latest in TECH

RELATED ARTICLES

- Advertisement -