Skip to main content

Check out Interactive Visual Stories to gain hands-on experience with the SSE product features. Click here.

Skyhigh Security

Deployment Model Best Practices

Figure 5 depicts guidance on which deployment models are aligned to managed and unmanaged devices:

  • Managed Devices to Sanctioned SaaS – Since corporate data is permitted to exist on both the sanctioned SaaS and the managed endpoint, there is no need to intercept communications between them. Skyhigh CASB protects data while it is in the cloud while the endpoint security protects the device. Once authenticated to the cloud service, the Reverse Proxy will redirect the client to connect to the SaaS directly.
  • Managed Devices to Unsanctioned SaaS – Here, corporate data is allowed on the managed devices, but not in the unsanctioned SaaS. To prevent exfiltration, controls must be put in place to prevent the transfer of data to the unsanctioned SaaS. Augmented by Skyhigh CASB’s Shadow IT registry and service groups, existing forward proxies and Secure Web Gateways are well equipped for this task.
  • Unmanaged Devices to Sanctioned SaaS – In this case, corporate data can be in the sanctioned SaaS but not necessarily on the unmanaged device. Without an endpoint agent, there is no way to protect data that might be downloaded to this device. The reverse proxy is the best approach to ensuring that data is not placed at risk on these devices.
  • Unmanaged Devices to Unsanctioned SaaS – Since neither the endpoint nor the cloud service provider is owned by the company, this combination should generally be considered out of scope. Placing protections here would be tantamount to spying on employees’ personal activities on personal devices, particularly when on private Internet connections.

deployment_models_best_practices.png

Figure 5 – Guidance on CASB Deployment Modes

 

  • Was this article helpful?