Skip to main content

Check out Interactive Visual Stories to gain hands-on experience with the SSE product features. Click here.

Skyhigh Security

Available Search Terms

The Omnibar is a flexible search tool that allows you to find the information you need about your cloud services quickly. The following search terms are supported.

The left column organizes the terms into categories and the right column displays each option for the category. You can either enter the category into the Omnibar and select the search term or terms you wish to use, or type the search term directly. In cases where the same search term exists in multiple categories, you can select which term to use before initiating your filter.

Search Category

Search Term

Service Type

 

 

Backup and Archiving

 

Botnets and Malware

 

Business Intelligence

 

Cloud Infrastructure

 

Cloud Storage

 

Collaboration

 

Content Sharing

 

CRM

 

Development

 

e-Commerce

 

Education

 

ERP

 

Finance

 

Health Care

 

HR

 

IaaS Admin Console

 

IaaS Services

 

IT Services

 

Legal

 

Logistics

 

Marketing

 

Media

 

Networking

 

Procurement

 

Project Management

 

Security

 

Service Desk and Support

 

Service Proxy

 

Social media

 

Tracking

 

Virtual Data Rooms

 

Web Application API

Risk Type

 

 

Low Risk

 

Medium Risk

 

High Risk

Anomaly Type 

 

 

403 Denied Count

 

Content Inspection

 

Data Transfer

 

Data Transfer Usage Behavior

 

MIME Type (Application)

 

MIME Type (Audio)

 

MIME Type (Binary)

 

MIME Type (Image)

 

MIME Type (Message)

 

MIME Type (Model)

 

MIME Type (Multipart)

 

MIME Type (Text)

 

MIME Type (Video)

 

Multiple IP addr Anomaly

 

Multiple User Anomaly

 

Periodicity Anomaly

 

Repeat Offender

 

Repeat Offender Combined

 

Report

 

Report Number of Fields

 

Service Access Count

 

Service Action Byte Count

 

Service Action Count

 

Service Category Based Data Transfer

 

Unmatched Data Transfer Anomaly

 

Unsupported Device

User Type

 

 

IP Address

Device Type

 

 

Desktop

 

Mobile

 

Application

 

Unknown

Permission type

 

 

Allowed

 

Denied

Protocol type

 

 

http

 

https

 

ftp

Tag type

 

 

User defined

 

User defined attributes 1 thru 5

 

User defined

Risk Score

 

 

1

 

2

 

3

 

4

 

5

 

6

 

7

 

8

 

9

Calendar Type

 

 

Last 24 hours

 

Last 7 days

 

Last month

 

Last 3 months

 

Last year

 

All data

Upload Data

 

 

Only include data transfers above : Bytes, KB, MB, GB, TB

Inbound Data

 

 

Only include data transfers above : Bytes, KB, MB, GB, TB

Outbound Data

 

 

Only include data transfers above : Bytes, KB, MB, GB, TB

Total Data

 

 

Only include data transfers above : Bytes, KB, MB, GB, TB

Service Attributes

You can use Omnibar to search for services based on their Service Attributes from the Global Registry. You can either search by the service attribute name and select the attribute value or values, or search by a specific value by typing it directly into the Omnibar. In cases where the same values exist for multiple service attributes, you will be given the opportunity to select which attribute you wish to use before initiating the search.

Services are assessed for how vulnerable they are to outside attack. To do so, Skyhigh CASB evaluates parameters such as IP filtering, malicious misuse, and preventive measures taken against cross-site request forgery (CSRF), cross-site scripting (XSS) attacks, and other common security threats.

Service Risk Attributes

The Service Risk score is calculated out of the following categories, attributes, and values defined by Skyhigh CASB. 

Category Attribute Description Possible Value
Development Practices Penetration Testing for Service Does the vendor perform penetration testing regularly to evaluate the security of an IT infrastructure by safely trying to exploit vulnerabilities? 10 - Clean reputable recent
20 - Routine
30 - Recent
40 - Reputable recent with issue
70 - Not publicly known
80 - None
Authentication IP Filtering Support Does the cloud service provider support IP allow list blocks to restrict access to the enterprise tenant from unauthorized IP address spaces? 10 - Yes
30 - Not publicly known
60 - No
Threat & Vulnerability Management Known Malicious Misuse of Service Has the cloud service provider had a public disclosure of malware hosted on its site or been labeled as a known dropzone for malicious code within the given time frame? 10 - Not publicly known
20 - Greater than 1 year
50 - Less than 1 year
70 - Less than 3 months
80 - Less than 1 month
Security Breach Identified for Service Has the cloud service provider had a public disclosure of breach for its service within the given time frame? 10 - Not publicly known
20 - Greater than 1 year
50 - Less than 1 year
70 - Less than 3 months
80 - Less than 1 month
Security Published CVE Vulnerability

Does the service have a known and published Common Vulnerabilities and Exposures (CVE) vulnerability?

Yes displays the CVE ID number. 

10 - No
30 - Possible
80 - Yes
Security Security Incident Notification Does the service incorporate timely notification of a security incident, malicious events or breach to all customers and stakeholders when such events are identified?

10 - Less than 1 day
30 - 1 day to 1 week
40 - Yes - duration not specified
50 - Not publicly known
80 - No

Web Application Security Application Security Vulnerability Protection Does the cloud service supports Web Application Firewall (WAF) to protect organization internet property from common vulnerabilities like SQL injection attacks, cross-site scripting, and cross-site forgery requests with no changes to the existing infrastructure? 10 - Yes
40 - Not publicly known
70 - No
Web Application Security WAF Detection Mode What are the WAF detection modes being used by the provider? 

10 - Blocking
10 - Patching
20 - Monitoring
80 - Not publicly known

 

HTTP Header Security  Content Security Policy Content Security Policy (CSP) is a computer security standard that provides an added layer of protection against Cross-Site Scripting (XSS), clickjacking, and other code injection attacks that rely on executing malicious content in the context of a trusted web page.

10 - Strong
50 - Average
70 - Weak
80 - No

HTTP Header Security  Strict Transport Policy This attribute informs that the website should be always loaded with HTTPS only. 10 - Sub-Domains/Preload
20 - Yes
80 - No
HTTP Header Security  X-Content Type Options This response header for Service prevents "mime" based attacks. 10 - Yes
80 - No
HTTP Header Security  X-XSS-Protection This response header is a feature of Internet Explorer, Chrome and Safari that stops pages from loading when they detect reflected cross-site scripting (XSS) attacks. 10 - Yes (Block Mode /Report User)
30 - Yes
80 - No
HTTP Header Security  X-Frame Options This response header provides clickjacking protection. 10 - Deny
30 - Same Origin
80 - No
HTTP Header Security  X-Permitted-Cross-Domain-Policies A cross-domain policy file is an XML document that grants a web client, such as Adobe Flash Player or Adobe Acrobat (though not necessarily limited to these), permission to handle data across domains. 10 - None
50 - By Type
30 - Primary Only
80 - No
70 - All
 
Encryption Server Wildcard Certificate Does the service support wildcard certificates? 

40 - Not publicly known
70 - No
10 - Yes

Encryption Server Certificate Validation Method What is the validation method used for an SSL certificate?  60 - Not publicly known
30 - Extended Validation
40 - Organization Validation
50 - Domain Validation
Encryption  OCSP Validation Result What is the Revocation status of the service certificate?  40 - Not publicly known
70 - Revoked
10 - Good
Encryption SSL Session Reuse Does the service support SSL session reuse?  40 -Not publicly known
70 - No
10 - Yes
Encryption Negotiated Ciphers Does the service negotiate with any Insecure/Weak Ciphers during communication?  40 -Not publicly known
70 - No
10 - Yes

Deprecated Attributes

The attribute Source of Leak for Darknet has been deprecated by the third-party service that created it. Skyhigh CASB has distributed the corresponding weight of the former attribute among the following attributes:

  • Known Malicious Misuse of Service
  • Breach Identified for Service
  • Application Security Vulnerability Protection

Service Categories

The following table lists a brief description of categories identified by Skyhigh CASB for Shadow IT. A few well-known services are listed to serve as a point of reference, but is not a comprehensive list of all services in the category.

Main Service Categories

 

Category Name

Category Description

Examples of Services

Artificial Intelligence

Artificial Intelligence, sometimes called machine intelligence, is intelligence demonstrated by machines, in contrast to the natural intelligence displayed by humans.

Microsoft Azure - Cognitive Search, AiChat, Home Guardian, Brevity AI

Backup and Archiving

Services specifically providing backup solutions.

Code42 CrashPlan, Acronis - Backup to Cloud, Druva inSync

Botnets and Malware

Domains identified as hosting malware or are botnet affected. These services are automatically added.

Malware domains, Phishing domains, WannaCry Ransomware, COVID Campaign

Business Intelligence

Business insights, analytics, or intelligence solutions.

Teradata, A9, Netvibes

Cloud Infrastructure

Dedicated hosting infrastructure, web and application hosting, or managed servers.

Amazon Web Services,
Nubifer, CA

Cloud Storage

Online storage, file sharing, or backup.

Box, Norton Online
Backup, Google Drive

Collaboration

Conferencing, web mail, messaging or any other applications used for collaboration between employees and teams.

Gmail, Skype, ProofHQ

Content Sharing

Services for storing and sharing photos, videos, or images.

YouTube, Pinterest,
SoundCloud

CRM

Customer relationship management (CRM) or business contact data services.

Salesforce.com, NetSuite,
Clicktools

Development

Environment to develop enterprise applications or build integration.

WordPress, GitHub,
SourceForge

e-Commerce

Platform or solutions that help retailers sell goods on the internet.

Ariba, MetaPack, Bigcommerce

Education

Enterprise level learning management system, interactive tutorials, or platform for educational content.

Edmodo, RioLearn,
GlobalEnglish

ERP

Enterprise Resource Planning (ERP), enterprise resource management, or business process management solution.

Oracle ERP, Fieldglass,
NetSuite ERP

Finance

Financial, payroll, payment, invoicing, or accounting solutions.

PayPal, Mint, Concur

Healthcare

Health benefit, medical management, or healthcare risk management solutions.

ASCO, NextGen, Simplee

HR

Employment management, hiring, screening, or benefits administration.

ADP, Wageworks,
ClickTime

IaaS Admin Console Admin consoles for IaaS cloud infrastructure providers.  AWS, Microsoft Azure, CSC, Century Link

IaaS Services

Automatically added domains hosted on specific cloud infrastructure providers.

 

Identity Federation Federated identity management solutions allow users to use the same identification data to obtain access to the networks of all enterprises in the group. Okta, Simeio, IBM

IT Services

IT support and application services.

ServiceNow,
NewRelic, AppDynamics

Legal

Legal insurance, document management, electronic signatory, or shared practice management solutions.

Adobe EchoSign,
LegalZoom, Docusign

Logistics

Supply chain, transport management, and logistics solution.

FedEx, Pitney Bowes, UPS

Marketing

Marketing solutions, marketing research, campaign management, and brand development.

Optimizely, AdRoll,
SiteScout

Media

Streaming video, audio, music, or gaming solutions.

LiveStream, Pandora,
Netflix

Networking

Enterprise networking service or networking management solutions.

BitGravity, CloudFlare,
Boingo

Procurement

Vendor management, procurement tool, or supplier quality management.

Capgemini IBX
Procurement, Ariba
Procurement, Bizbuysell

Project Management

Online project, program, or requirements management solutions, or software suites for
managers and business owners.

Daptiv, Trello, YouTrack-
JetBrains

Security

Identity and access management, information security, or fraud prevention solutions.

Broadcom, Voltage
SecureMail, OpenDNS

Service Desk and Support

Facility management, field service management, and service delivery solutions.

InContact, Zendesk

Service Proxy

URL redirection, shortening, or forwarding services.

Bitly, TinyURL

Social media

Social networking, blogging, or services that drive engagement through social media.

Facebook, Twitter, LinkedIn

Tracking

Tools for web analytics and tracking, site metrics, monitoring, comparisons, or benchmarking.

AddThis, Chartbeat,
Google Analytics

Uncategorized

Other cloud services that cannot be categorized with the list in this document.

 

Virtual Data Rooms

Offers storage capability for due diligence and financial transactions.

Imprima iRooms, Sterling Data Rooms

Web Application API

APIs for building and integrating services, creating graphs, forms, or surveys.

Google APIs, Disqus,
Typekit

 

 

Service Sub-Categories

Categories have one or more sub-categories for better classification. Sub-catagories appear in the Cloud Registry entry for a service and can be used as a filter in the Omnibar. Currently, sub-categories do not appear in reports and cannot be used to manually filter the Active Service or Cloud Registry page. Subcategories cannot currently be used to filter Service Groups.

Sub-Category List

Category Name

Sub-Category Name

Sub-Category Description

Artificial Intelligence AI

Artificial Intelligence, sometimes called machine intelligence, is intelligence demonstrated by machines, in contrast to the natural intelligence displayed by humans.

Artificial Intelligence Artificial Intelligence

Artificial Intelligence, sometimes called machine intelligence, is intelligence demonstrated by machines, in contrast to the natural intelligence displayed by humans.

Artificial Intelligence AI Editing Tool (Document/Image/Audio/Video)  Tools that helps to automate and improve the editing process for documents, images, audio, and video.
Artificial Intelligence Analysis/Recognition (Image/Video/Speech/Data)  Analyze, understand, and interpret the information from image, video, speech, and data.
Artificial Intelligence Autonomous Systems/Robotics/Industrial automation  The autonomous systems that perform tasks without human interventions such as self-driving cars, drones, robots, and industrial automation (manufacturing, supply chain management, and other industrial applications) by optimizing resources and other industrial applications.
Artificial Intelligence Avatar Animation  Graphical representation of a user or animated characters that represent users or personas in digital environments. 
Artificial Intelligence Content Generation/Curation/Detection Tool  Tools thar are involved in creating original and informative content, sharing the high quality content from reliable sources, and analyzing the content against the predefined criteria.
Artificial Intelligence Content/SEO Optimization  Optimize the content with keywords and links to get higher search engine ranking. 
Artificial Intelligence Conversion/Translation Tool  Tools that are used to convert documents, images and audio/video files from one format to another.
Artificial Intelligence Financial Trading  Services used for stock market analysis, algorithmic trading, credit scoring, and risk assessment in various financial sectors.
Artificial Intelligence Fraud Detection  Detect patterns and anomalies in financial transactions, helping in fraud detection and prevention.
Artificial Intelligence Generative AI (Image/Audio/Video) Ability to generate new images, audio, and videos from scratch or from the existing information.
Artificial Intelligence Healthcare and Medical Diagnosis  Services used for medical image analysis, disease diagnosis, personalized treatment plans, drug discovery, virtual nursing assistants, and patient monitoring.
Artificial Intelligence HR/Job Assistant  Automates and enhances several HR functions, such as recruitment, performance reviews, employee onboarding, and administrative tasks.
Artificial Intelligence Learning Management Automate and enhance the management and delivery of educational content and learning experiences by providing personalized learning pathways and tracking the learners' progress.
Artificial Intelligence Machine Learning  Ability to learn from a vast volume of data, perform specific tasks, and improve over time without explicit instructions.
Artificial Intelligence Natural Language Processing/Chatbot/Virtual Assistants Enable machines to understand human language, interact via speech and text, and assist users with virtual assistance such as scheduling appointments, managing calendars, etc.
Artificial Intelligence Predictive Analytics/Automation Tool Tools that predict future behavior or events and automate tasks using analytic techniques.
Artificial Intelligence Writing/Coding/Drawing/Sketch Tool  Tools that are designed to assist the user wth a variety of tasks such as writing, coding, drawing, and sketching.

Backup and Archiving

Data Archiving Service

Tools for online archive solutions, file import, customization, and backup.

Backup and Archiving

Data Backup Workflow Management

Providers offering backup service management to make sure clients can access backups quickly to get up and running after any type of disaster.

Backup and Archiving File Versioning Tools To protect against unforeseen damage to files, and using archives for maintaining versions of the files.
Backup and Archiving Risk Management Refers to the practice of identifying potential risks in advance, analyzing them and taking precautionary steps to reduce/curb the risk.

Botnets and Malware

Botnets and Malware

Domains identified to host malware or botnet affected, and are automatically added.

Botnets and Malware Cryptojacking

Cryptojacking is defined as the secret use of your computing device to mine cryptocurrency. It is used to be confined to the victim unknowingly installing a program that secretly mines cryptocurrency.

Botnets and Malware Ransomware Part of malware in which the data on the victim's computer is locked and blocked access unless a ransom is paid.

Business Intelligence

Business/Data Analytics

Use of statistical analysis, including explanatory and predictive modeling, and fact-based management to drive decision making.

Business Intelligence

Business/Data Management

The development and execution of architectures, policies, practices, and procedures to manage the information lifecycle needs of an enterprise effectively.

Business Intelligence

 Data Warehousing

Central repositories of integrated data from one or more sources. They store current and historical data and are used for creating analytical reports.

Cloud Infrastructure

 Cloud Infrastructure

The services that provide hosting infrastructure and managed servers.

Cloud Storage

 Data Storage

A service in which data is maintained, managed, and made available to users over a network (typically the internet).

Cloud Storage

Document Storage and Sharing

Enables the storage and management of data and data sharing over the network.

Cloud Storage

Network Attached Storage (NAS)/Data Management

A file-level computer data storage server connected to a computer network providing data access to a heterogeneous group of clients.

Collaboration

Address Book/Contact Management

Enables users to easily store, migrate, import and find contact information, such as names, addresses, and telephone numbers.

Collaboration

Application Management

Application Management are the sites and applications that are managed by the user to which you’ve granted permission to access your Account.

Collaboration

Context Aware Software Tool

Collects and analyzes data about a device's surroundings to present relevant, actionable information to the user.

Collaboration

Diagramming Tool

Used to model, represent, and visualize information.

Collaboration

Document Conversion

Conversion of documents to variety of formats.

Collaboration

Document Editing Tool

Enables creating and editing text files.

Collaboration

Document Management System

Allows users to store, manage, and track documents, and keeps a record of versions modified by different users.

Collaboration

Document Sharing

The ability to store and share documents over the cloud.

Collaboration

ePrinting/Print Management

ePrint Printing Solution is a secure, manageable, server-based mobile printing solution for enterprise networks, private networks and print or fax any document, directly from any devices.

Collaboration

Geographical Information System

Provide mapping, GIS, location, and navigational tools.

Collaboration Learning Management A software application for the administration, documentation, tracking, reporting, and delivery of electronic educational technology (also called e-learning) courses or training programs.

Collaboration

Industrial management

Provides management and collaborative tools for several industrial disciplines.

Collaboration

Instant Messengers/Chat/Video Chat/Voice Chat

A type of software that supports online chat with real-time text transmission over the internet.

Collaboration

Knowledge Base

A centralized repository for information: a public library, a database of related information about a particular subject.

Collaboration

Media Editing Tool (Image/Video/Audio Editing)

Tools that are used to edit files such as Image, Video, or Audio.

Collaboration

Mind Mapping

A graphical way to represent ideas and information.

Collaboration

Monitoring/Simulation tool

Monitoring/Simulation tool

Collaboration

Mouse & Keyboard Recorder

A tool that can record all mouse and keyboard actions, and then repeat all actions accurately.

Collaboration

Offline Reading

Enables email, newsgroup posts, or web page downloads, making them available when the computer is offline or without Wi-Fi or cellular connection.

Collaboration

Online Discussion Boards (Forum/Blog)

An online discussion site where people can hold conversations in the form of posted messages.

Collaboration

Online Meeting Tool

Browser/Cloud based Platform/Tools for Meetings.

Collaboration

Organization Showcase

Showcases investment strategies, investment portfolios, marketing report updates, and market performance.

Collaboration

Productive/Task Organizing Tool

Tools that help user manage tasks.

Collaboration

Questionnaire website/Tool

Questionnaire website allows user to build there own digital questionnaire or templates.

Collaboration

Scheduling Tool

Simplifies the process of scheduling meetings, appointments, or events.

Collaboration

Sports/Online Games

Sports and Online Games

Collaboration

Synchronization Tools

The services that help in syncing files between two or more locations.

Collaboration

Translators

Online translation services between different languages.

Collaboration

Travel App/Tool

App that has the ability to guide, influence, connect and inspire travelers. It enables user to track how their travel tools are being used and leverage

Collaboration

Vehicular Management/ Fleet management

Vehicular Management/ Fleet management

Collaboration

Web Mail/Calendar

Email available for use online and stored in an internet server mailbox.

Content Sharing

Media Storage and Sharing

Storing of photos/videos/audio files and their sharing over the internet.

Content Sharing

 Torrent

 Torrent sites that use distributed file upload and downloading to share files.

CRM

 CRM

All aspects of interaction that a company has with its customers.

Development

Compilation / Debugging Tools

Identify coding errors at several development stages.

Development Content Management System

A web application that makes content authoring and content delivery easy. It allows non-technical users to efficiently build a website, streamline the web publishing procedure, and quickly deploy content, creating a content-rich website.

Development

Desktop Application Development

The creation of application programs that could run on single systems only after the installation.

Development

 Game Development

A service for creating a video game.

Development

Mobile Application Development

How application software is developed for handheld devices, such as personal digital assistants, enterprise digital assistants, or mobile phones.

Development

Web Application Development

The creation of application programs that reside on remote servers and are delivered to the user's device over the internet.

Development

 Website Builder

 Tools to build web pages.

e-Commerce

 B2B

The exchange of products, services, or information between businesses.

e-Commerce

 B2C

A commerce transaction in which businesses sell products or services to consumers.

e-Commerce

 C2C

The transaction of products or services between customers.

e-Commerce

 Store Builder

Enables users to design and create an e-commerce store and integrate payments and provide support needed for the business.

e-Commerce Business Suite Set of business software functions enabling core business processes. A suite that includes all modules such as ERP, PLM, Logistics, EDI, and more.

Education

Learning Management System

A software application for the administration, documentation, tracking, reporting, and delivery of electronic educational technology (also called e-learning) courses or training programs.

Education

 Online Testing

A service where tests are delivered via a computer connected to a network.

Education Education Management Information System Unlike LMS, this category defines school/college/institutional day-to-day management.

ERP

 ERP

The services which provide Enterprise Resource Management/ business process management solution.

Finance

 Finance Management

The planning, directing, monitoring, organizing, and controlling of the monetary resources of an organization. It includes services such as budgeting, invoicing, billing, treasury management, and wealth management.

Finance

 Payroll Management

The administration of the financial record of employees' salaries, wages, bonuses, net pay, and deductions.

Finance

 Payment Gateway

An e-commerce application service provider service that authorizes credit card payments for e-businesses, online retailers, bricks and clicks, or traditional brick and mortar.

Finance

Stock / Currency Trading Platforms

The trade involving shares/stock in share market and currency/ forex in foreign exchange.

Finance

 Tax Services

Services dealing with tax management.

Finance

 Money Transfer

Services dealing with cashless form of money transfer like Electronic funds transfer, Bank to bank funds transfer and wire transfer.

Finance

 Commodity Trading

Services dealing with the trade of commodities like agricultural produce or precious metals.

Finance

 Insurance

Services that provide a form of risk management primarily used to hedge against the risk of a contingent, uncertain loss.

Finance

 Wallet

An online prepaid account where one can stock money, to be used when needed.

Finance

 Pension Management

The services that manage pensions of beneficiaries.

Healthcare

Clinical Information Systems

A computer-based system that is designed for collecting, storing, manipulating, and making available clinical information important to the healthcare delivery process.

Healthcare

Clinical Project Management

The management of clinical trials or clinical research and ensures compliance with protocols and overall clinical objectives.

Healthcare

Health Related Web Applications

Services that provide applications such as dietary information, drug information, physician directory, and wellness management.

Healthcare

Clinical Workflow Management Systems

The delivery of clinical services involving a series of tasks in an order.

Healthcare

Patient Engagement Systems

The ongoing communication between patients and healthcare professionals.

Healthcare

Health Care Financing Portal

A branch of finance that helps patients and health care beneficiaries pay for medical expenses in the short and long terms and also deal with claims management.

Healthcare Healthcare Learning Management System Transforms learning by giving users complete control over planning, delivering, and tracking education across a whole health system, meaning easier compliance with education staff development.
Healthcare Regulatory Affairs Protects public health by controlling the safety and efficacy of products by procedures and compliance. Key duties include: studying scientific and legal documents, gathering, evaluating, organizing, managing, and collating information in many formats.

HR

Workforce Management

An umbrella term for desktop and mobile programs that help a business manage staff scheduling.

HR

Resource Data Management Tool

The data of employment histories which include, but are not limited to employment-related actions such as recruitment and selection, promotion, classification, compensation, performance, discipline, and training.

HR

 Employment Portal

A tool that helps applicants find jobs and aids employers in their quest to locate ideal candidates.

HR

Human Resource Information System

An information system or managed service that provides a single, centralized view of the data that a human resource management or human capital management (HCM) group requires for completing human resource (HR) processes. Such processes include recruiting, applicant-tracking, payroll, time and attendance, performance appraisals, and benefits administration.

HR

Organization Modeling Tool

A tool that defines how activities such as task allocation, coordination, and supervision are directed toward the achievement of organizational aims.

HR

 Retirement Benefits

The benefits received by the benefactor after retirement.

HR

 Time and Attendance

The services that track employee working hours, attendance, and leave.

HR

Performance Management System

Performance Management systems enable you to track and monitor the performance of individual employees, departments, and the organization overall.

HR

Retirement Planning and Management

Services for the design, provision, and management of retirement plans.

HR

 Employee Benefits

Programs such as commuter benefit plans, flexible spending accounts, health savings account, health reimbursement accounts, calculation tools, and quick access to account balance.

IaaS Admin Console

 IaaS Admin Console

Admin console accesses to large cloud infra providers.

IaaS Services

IaaS Services

Automatically added domains hosted on specific cloud infrastructure providers.

Identity Federation Identity Federation Federated identity management solutions allow users to use the same identification data to obtain access to the networks of all enterprises in the group. 

IT Services

Incident Management Tool

A tool that stores information about the incidents, prioritizes them, assigns them to the right support teams and shows the status of the same.

IT Services

Network / Desktop Resource Monitoring Tool

A tool that monitors desktop resources such as CPU usage, physical memory consumption, and disk usage. It also monitors network resources such as activity, usage, and TCP connections.

IT Services

Application / Performance Testing Platform

The process of determining the speed or effectiveness of a computer, network, software program, or an application. This process can involve quantitative tests done in a lab, such as measuring the response time.

IT Services

Virtualization Technology

The creation of a virtual (rather than actual) version of something, such as an operating system, a server, a storage device, or network resources.

IT Services

Mobility Management Portal

A web application that allows users to quickly access essential information, mobile support services, and applications that the company provides to its employees.

IT Services

Asset Management and Inventory Tracking

Systems that help manage the complete lifecycle of particular assets, track their location to make sure assets are not missing or stolen.

IT Services

Database / Application Support Tool

A comprehensive set of tools intended to fix application and database issues, or incidents as they are known, that disrupt the service they depend on.

IT Services

Event Reporting / Review Tool (Logs Management)

Used to streamline reporting, automate log collection, develop real-time event correlation, log analysis and enable real-time monitoring for incident reporting.

IT Services

Application Deployment Tool

Enables the applications to be deployed in different environments.

IT Services

Software Integration Service

The practice of combining individually tested software components into an integrated whole. (Such as cloud integration, app integration, and integration services.)

IT Services

 IT Security

The protection of information assets by using technology, processes, and training.

IT Services

Data Backup Management Tools

Applications that automate backups to the cloud, desktop and Windows Server backups, backup scheduling, local and block level backup, network locations backup, and backup plan statistics.

IT Services

Authentication Services

A security service that verifies an identity claimed by or for a system entity using username/password validation.

IT Services Data Mining and Reports Searches large stores of data to discover patterns and trends that go beyond simple analysis. It uses sophisticated mathematical algorithms to segment the data and evaluate the probability of future events.

IT Services

VoIP services

Phone service over the internet.

IT Services

PBX servers

A PBX (Private Branch Exchange) server connects telephone extensions to the Public Switched Telephone Network and provides internal communication for a business.

IT Services

IT Services Management

The services that offer a suite of activities to plan, deliver, operate, and control IT services offered to customers.

IT Services

IoT Platform

The network of physical objects or "things" embedded with electronics, software, sensors, and network connectivity, which enables these objects to collect and exchange data.

IT Services

Compliance Management

Services that ensure an organization is following a given set of rules or compliance.

Legal

e-Signing Tool

Services which offer signature tools on legally binding documents electronically.

Legal

Intellectual Property Management

Services that deal with the management of intellectual property rights such as copyrights, patents, industrial design rights, trademarks, and related rights.

Legal Investigation Management Streamlines the process of managing an investigation from start to finish.

Legal

Legal Workflow Management

A service designed specifically to handle the unique requirements of the legal profession, encompassing legal document management systems and case management.

Logistics

Inventory Management

Services that oversee and control ordering, storing, and using components that a company uses to produce the items it sells. They also oversee and control quantities of finished products for sale.

Logistics

Supply Chain Management

The control of the supply chain as a process from supplier to manufacturer to wholesaler to retailer to consumer.

Logistics

Courier Service / Shipment Tracking

Deals with the shipping and tracking mail and packages.

Logistics Quality Assurance / Inspection Application Workflow of Quality Check in production and maintaining standards of manufactured products by testing the output against the specification.

Marketing

Product Branding

Product branding is developing and communicating what the company does and how well it does it, and providing a way to bring that information to mind in an instant to the audience.

Marketing

Business Development

Services that identify, maintain, and, encourage relationship building within a firm, building rapport with both suppliers and customers. They help inform management as to how the market is moving and provide insights into new developments of technology.

Marketing

Video Advertising

Online display advertisements in TV and internet.

Marketing

Social Marketing

The process of gaining website traffic or attention through social media sites.

Marketing

Affiliate Marketing

A type of performance-based marketing in which a business rewards one or more affiliates for each visitor or customer brought by the affiliate's own marketing efforts.

Marketing

Survey Tool

A tool to create, publish, and develop free online surveys.

Marketing

Email Marketing

Directly marketing a commercial message to a group of people using email.

Marketing

Event Management

Companies create promotional events to help them communicate with clients and potential clients.

Marketing

Advertising

A form of marketing communication used to promote or sell something, usually a business's product or service.

Marketing

Media Management

Covers planning, organization, and, control of creating and distributing information or entertainment content in media enterprises.

Marketing

Ticket Management

Helps event professionals create, promote, and sell tickets online.

Marketing

SEO

Considers how search engines work, what people search for, the actual search terms or keywords used, and the preferred search engines of their targeted audience.

Marketing

Property Management

The operation, control, and oversight of real estate as used in its most broad terms.

Marketing

Digital Publishing

Any type of publishing that involves disseminating information or entertainment by digital means.

Marketing

Donation Management

A donation platform to raise funds.

Marketing

CRM Marketing

Platforms for customer engagement, multi-channel engagement, and campaign targeting; real-time and historical data mining, management, and reporting.

Marketing

Point of Sale System

A retail point-of-sale system, which typically includes a cash register, including a computer, monitor, cash drawer, receipt printer, customer display, and a barcode scanner. The majority of retail POS systems also include a debit and credit card reader.

Marketing

Loyalty Program

Services offering rewards program to customers who frequently make purchases.

Marketing

Mobile Marketing

Marketing on or with a mobile device providing customers with time and location sensitive, personalized information that promotes goods, services, and ideas.

Marketing

Marketing Automation Platform

Software platforms designed to effectively market on multiple channels online and automate repetitive tasks.

Marketing

Market Research

Services that gather information about target markets or customers.

Marketing LiveChat A customer service with live support, Help Desk, and web analytics capabilities. It is used to provide immediate customer support and information to clients and customers.

Media

Audio / Voice Content Manager

An audio platform enabling the creation, broadcast, and consumption of audio across multiple global media outlets.

Media

Video Content Management Solution

A platform enabling the creation, streaming of rich video content across multiple global media outlets.

Media

Electronic Publication

The digital publication of e-books, digital magazines, and the development of digital libraries and catalogs.

Media

Media Management Application

The services that provide audio, video, and digital books as content to the consumers.

Networking

File Server Management

Allows administrators to understand, control, and manage the quantity and type of data that is stored on their servers.

Networking

Domain Naming Services

A hierarchical distributed naming system for computers, services, or any resource connected to the internet or a private network. It translates domain names to numeric IP address.

Networking

 SMTP

A TCP/IP protocol used in sending and receiving email.

Networking

 FTP

A standard network protocol used to transfer computer files from one host to another host over a TCP-based network, such as the internet.

Networking

Network Analytics

Combines network analysis techniques with an analysis environment, allowing analysts to gain new insights into interaction networks and make decisions.

Networking

Domain Registration

The process of registering a domain name, which identifies one or more IP addresses with a name that is easier to remember and use in URLs to identify particular web pages.

Networking

 CDN

A system of distributed servers that deliver webpages and other Web content to a user based on the geographic locations of the user, the origin of the webpage and a content delivery server.

Networking

Internet Services

The services which provide Broadband and Wi-Fi services.

Networking

 VPN

A network technology that creates a secure network connection over a public network such as the internet.

Networking Remote Access Control Access to a computer or a network from a remote distance that a user can access or manipulate.

Procurement

 Procurement

Services which deal with vendor management/ procurement tool/ supplier quality management.

Procurement VMS  Allows users to manage workforce/non-employee labor and services procurement. Acts as a mechanism for business to manage and procure staffing services – temporary, and, sometimes, permanent placement services – as well as outside contract or contingent labor.

Project Management

 Workflow Management

A service which provides status of each task pertaining to the project and its timescale.

Project Management

Project Lifecycle Management

A service which deals with the entire lifecycle of project i.e Initiation, Planning, Execution, and Evaluation.

Security

Identity / Access management

Identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to resources within that system by associating user rights and restrictions with the established identity.

Security

 Cybersecurity

The protection of systems, networks, and data in cyberspace.

Security

IT Risk Management

The application of the principles of risk management to an IT organization to manage the risks associated with the field.

Security

Desktop Security

The protection of standalone computers from virus, malware attacks.

Security

Network Security

The policies and procedures implemented by a network administrator to avoid and track unauthorized access, exploitation, change, or denial of the network and network resources.

Security

Application Security

Services that take measures throughout the code lifecycle to prevent gaps in the security policy of an application or the underlying system through flaws in the design, development, deployment, upgrade, or application maintenance.

Security

 Mobile Security

The protection of smartphones, tablets, laptops and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated with wireless computing.

Security

 Data Encryption

The act of changing electronic information into an unreadable state by using algorithms or ciphers.

Security

 Cloud Security

Refers to a broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing.

Security

Certificate Issuer

Services that provide TLS and SSL certifications to the websites held by organizations.

Security Password Generator Creates random or customized passwords for users. It helps users to create stronger passwords that provide greater security for a given type of access.

Service Desk and Support

 IT

A service providing information and support on IT services.

Service Desk and Support

 Other

A service providing general information and support.

Service Desk and Support

Interactive Voice Response (IVR)

An automated telephony system that interacts with callers, gathers information and routes calls to the appropriate recipient.

Service Proxy

Redirection Service

A technique for making a web page available under more than one URL address. When a web browser tries to open a URL that has been redirected, a page with a different URL is opened.

Service Proxy

 URL Shortening

An online application that converts a regular URL into its condensed format but still opens the same site.

Service Proxy

 Anonymous

A service designed to allow users to connect to sites through the service, concealing their location or identity.

Social media Audio Sharing Social Network for sharing audio or music. 

Social media

 Image Sharing

Social Network for sharing images.

Social media

 Video Sharing

Social Network for sharing videos.

Social media

Multimedia Sharing

Social Network for sharing Multimedia content (Images/Videos).

Social media

Enterprise Social Networking Platform

An organization's use of social media, internally to connect individuals who share similar business interests or activities.

Social media

Professional Social Networking Platform

Social Networking platform to connect professionals of many organizations.

Tracking

 Tracking

The tools that provide metrics on many activities.

Uncategorized

 Uncategorized

Other cloud services that cannot be categorized with the list in this document.

Virtual Data Rooms

 Virtual Data Rooms

An online repository of information that is used for the storing and distribution of documents.

Web Application API

Web Hosting API

Services that provide APIs for web hosting.

Web Application API

Website Builder API

Services that provide APIs for Website building.

Web Application API

Website Monitoring (IT Services)

The process of testing and verifying to ensure website uptime, performance, and function is as expected.

Web Application API

 Search Engines

Services that are designed to search for information about the World Wide Web.

Web Application API

Website Data Analytics

The measurement, collection, analysis, and reporting of web data for purposes of understanding and optimizing web usage.

Web Application API

 SEO Tools

A service that provides tools for SEO such as content checker, content rewriter, and keyword positioning.

Web Application API

 API manager

The process of publishing, promoting, and overseeing Application Programming Interfaces (APIs) in a secure, scalable environment.

Web Application API

 Queue Management

The ability to manage and streamline queues to improve customer waiting periods.

DLP Incidents

The following Omnibar facets are used exclusively in on the DLP Incidents page.

Search Term Description Available Options
File Name The name of the file matching the DLP policy rule. You can use this Omnibar facet to locate policy violations centering on a specific file. All detected files can be used in this search filter.
File Size

The detected file size of the file matching the DLP policy rule. You can use this Omnibar facet to filter results around the size of the file. Transfers of unusually large files may indicate potential data exfiltration events. Excessive transfers of unusually small files may indicate attempts to test security measures in preparation of a data theft incident.

Filter on file size based on KB, MB or GB. The filter can compare files against the user-entered value based on the following criteria:

  • Equal To
  • Greater Than
  • Less Than
  • Between
File Type The format of the file matching the DLP policy rule. You can use this Omnibar facet to filter results around a specific file format in order to better tune policies that control which formats can be shared. For example, if you have a policy that only allows PDFs to be shared, you could use the File Type filter to confirm that .DOC or .XLS files are triggering policy violations.

One or more formats can be selected from any of the Skyhigh CASB CASB supported formats.

Incident ID This Omnibar facet is reserved for internal functionality. N/A
Match Count The number of policy rule matches were found in the document that triggered the policy violation. You can use this Omnibar facet to filter results to investigate files that violate a policy in many places (as those indicate the highest risk violations) or to review files that have a small number of matches as those may indicate false positives or accidental violations. Enter any integer to filter to the number of policy matches.
Policy The name of the violated policy. You can use this Omnibar facet to review all policy violations from a specific policy. Select from any of your existing DLP policies.
Remediator

The remediator is the CASB user who has been assigned to investigate the policy violation. You can use this Omnibar facet to view the workflow of your remediators.

Select from any CASB user with the Policy Manager role to view any policy violations where that user is assigned as a remediator.
Response

The response action taken as a result of the policy violation. You can use this Omnibar facet to review policy responses and see how many policy violations are responded to in a certain way.

Select from Skyhigh CASB's DLP response actions.
Scan Name The name of the On-Demand Scan that detected the policy violation. You can use this Omnibar facet to review your On-Demand Scans; if an On-Demand Scan consistently runs without triggering any policy violations it may not be configured correctly. Conversely, if an On-Demand Scan produces excessive false positives you may need to adjust the scan criteria. Select from your active On-Demand Scans.
Severity The recorded severity level of the policy violation. Severity level is defined by the user during DLP policy creation. You can use this Omnibar facet to manage your remediation workflow; filtering based on severity level allows your remediators to focus on the highest priority violations first.
  • High
  • Medium
  • Low
Sharing If the content is included in a shared folder or external link within the CSP. Some companies view policy violations for files shared outside of the company more harshly than files that remain internal. You can use this Omnibar facet to provide better insight on how your users are interacting with the cloud and better determine the significance of the policy violation.
  • Content Shared Externally
  • Content Not Shared Externally
Status The current state of the policy violation. Status is set by the user in the policy violation platform. You can use this Omnibar facet to manage your remediation workflow; remediators can filter to only New policies to tackle the incoming violations or filter out any violations that have been marked as False Positive.
  • New
  • Open
  • False Positive
  • Resolved
  • Archived
User The user who triggered the policy violation. You can use this Omnibar facet to investigate specific users. If a single user is generating excessive policy violations, they may need to be investigated.  Select between all users who have triggered a DLP policy violation.

Threat Protection & Activity Monitoring

The following Omnibar facets can be used on either the Threat Protection or Activity Monitoring pages.

Search Term Description Available Options
Threat Protection
Service Name

The CSP where the anomaly occurred. You can use this Omnibar facet to learn more about the activities occurring in a specific service in order to better design DLP policies for this service. 

Only the currently selected service can be used in this facet. However, Skyhigh CASB for O365 customers can use this facet to separate SharePoint, AzureAD or OneDrive results.
Severity The severity of the anomaly, as determined by how much the anomaly exceeds its threshold. You can use this Omnibar facet to manage your investigation workflow; filtering based on severity level allows your investigators to focus on the highest priority anomalies or threats first.
  • High
  • Medium
  • Low
Threat Category The organizational categories used to sort detected threats. You can use this Omnibar facet to investigate all threats that are sorted into one of the three categories. Filtering by category can help with threat resolution; if you deal with one category at a time the list may be easier to manage. 
Threat ID The unique identification number of the threat.  
Threat Type The type of threat depends on the threat category.  
Threat Status The status of the threat.
  • Opened. A threat is marked opened when it is resolved and found again as a threat to Skyhigh CASB.
  • Resolve 
  • False Positive
User Name The name of the user who triggered the threat. Knowing which user is connected to the anomaly will assist your investigation in order to find out the circumstances of the anomalous behavior directly.  
Activity Monitoring
Action Name The name of the detected activity. You can use this Omnibar facet to filter on specific activities that you wish to investigate. You may need to learn more about how many users are engaging in a specific activity or investigate threats that are calculated based on your selected activity. Select one or more available activities.
Anomaly Category

The organizational categories used to sort detected anomalies. You can use this Omnibar facet to investigate all anomalies that are sorted into one of the three categories. Filtering by category can help with anomaly resolution; if you deal with one category at a time the list may be more easy to manage. 

Anomaly Duration The length of time that the anomaly took place. You can use this Omnibar facet to filter your anomaly list based on the longest-running anomalies. Anomalies that have been measured over longer timelines are more likely to indicate valid threats.
  • Hourly
  • Daily
  • Weekly
  • Monthly
Anomaly Name

The name of the specific anomaly. You can use this Omnibar facet to filter on a particular anomaly in order to investigate security events; if you have an account breach you can check into any unusual file transfers that occurred during the breach.

Only anomalies that have been detected for the active CSP will be available for selection.

At this time, users can only filter results by name for Superhuman, Brute Force Login, and Large Report Download anomalies. If you wish to filter based on anomalies in the Data Anomalies category, you should use the Anomaly Category filter instead. 

Anomaly Threshold This Omnibar facet is reserved for internal functionality. N/A
Category The category of the detected activity. You can use this Omnibar facet to filter on specific activity types. Filtering by category can help with activity monitoring; if you deal with one category at a time the list may be more easy to manage. 

<This appears to be the same list as activity name. What's the difference?>

Valli- e.g download category refers to several download activity names like - Download File, DOwnload Folder, so here you are searching at a category level . 

Client Browser The web browser used to create the activity or anomaly. You can use this Omnibar facet to gain additional insight into how your users are interacting with your cloud services and learn about potential anomaly patterns that may influence your device management rules. For example, if the majority of your access anomalies are occurring through an insecure browser, you may wish to block users from connecting to the cloud service using that browser. Select one or more detected browsers.
Client OS The computer operating system used to create the activity or anomaly. You can use this Omnibar facet to gain additional insight into how your users are interacting with your cloud services and learn about potential anomaly patterns that may influence your device management rules. For example, if the majority of your access anomalies are occurring through an insecure OS, you may wish to block users from connecting to the cloud service using that OS. Select one or more detected operating systems.
Collaboration Group The domain of the user's email address. For example, if you detect activity  from users with email address ending in samplecompany.com, competetorcompany.com and freeemail.com, there will be three detected collaboration groups. You can use this Omnibar facet on the Collaboration View to filter collaborations to specific domains. Select one or more of the detected collaboration groups for the CSP.
Country The country where the activity or anomaly occurred. You can use this Omnibar facet to understand anomaly and threat patterns occurring in different countries. If excessive anomalies occur in a specific country you can adjust your access and DLP policies surrounding access in that country. Select one or more detected countries. <Is there an abbreviation to country list I can use?>
Device The device used to trigger the activity or anomaly. You can use this Omnibar facet to gain additional insight into how your users are interacting with your cloud services and learn about potential anomaly patterns that may influence your device management rules. For example, if the majority of your access anomalies are occurring through an insecure device, you may wish to block users from connecting to the cloud service using that device.

Select one or more of the detected devices.

Logical Operators Use these operators to create compound Omnibar searches. You can use this Omnibar facet link multiple facets together in a single search string. For example, you can search for all anomalies in the Data Anomalies group made to Box from China.
  • And
  • Or
  • (
  • )
Notes This Omnibar facet is reserved for future functionality. N/A
Profile The profile of the user who triggered the activity or anomaly. Profile information is provided through your Salesforce or Active Directory integration. You can use this Omnibar facet to discover more about the activities of specific types of users. For example, if you've established the profile of "Sales Team" you can filter your results based on that profile.

Select one or more detected profiles.

Role The role of the user who triggered the activity or anomaly. Role information is provided through your Salesforce or Active Directory integration. You can use this Omnibar facet to discover more about the activities of specific types of users. For example, if you've established the role of "Accounting" you can filter your results based on that role.

Select one or more detected role.

Service Name

The CSP where the activity or anomaly occurred. You can use this Omnibar facet to learn more about the activities occurring in a specific service in order to better design DLP policies for this service. 

Only the currently selected service can be used in this facet. However, Skyhigh CASB for O365 customers can use this facet to separate SharePoint, AzureAD or OneDrive results.
Severity The severity of the anomaly, as determined by how much the anomaly exceeds its threshold. You can use this Omnibar facet to manage your investigation workflow; filtering based on severity level allows your investigators to focus on the highest priority anomalies or threats first.
  • High
  • Medium
  • Low
Status

This Omnibar facet is reserved for internal functionality.

N/A