Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Application Security

SSE Company Skyhigh Security Emerges From McAfee Enterprise

Private equity giant Symphony Technology Group (STG) on Tuesday announced the launch of a new security service edge (SSE) company named Skyhigh Security.

Private equity giant Symphony Technology Group (STG) on Tuesday announced the launch of a new security service edge (SSE) company named Skyhigh Security.

STG in January announced the launch of Trellix, an extended detection and response (XDR) solutions provider created following the merger of McAfee Enterprise and FireEye. At the time, STG noted that McAfee Enterprise would be split into two organizations: one of them is Trellix and the second company is Skyhigh Security.Skyhigh Security

Skyhigh Security combines resources from McAfee Enterprise with technologies acquired in the past from Skyhigh Networks, Light Point Security, NanoSec and Secure Computing.​

Skyhigh Security’s SSE portfolio includes Secure Web Gateway (SWG), Cloud Access Security Broker (CASB), Zero Trust Access Network (ZTNA), Cloud Data Loss Prevention (DLP), Remote Browser Isolation, Cloud Firewall, and Cloud Native Application Protection Platform (CNAPP) solutions.

STG said the new company was created to “satisfy the growing cloud security requirements for large and small organizations.”

Gee Rittenhouse, who previously led Cisco’s cybersecurity business, will serve as Skyhigh Security’s CEO.

“Skyhigh Security has created a comprehensive security platform to secure both data access and data use via unified policies and data awareness,” Rittenhouse said. “Organizations can now have complete visibility and control and seamlessly monitor and mitigate security risks—achieving lower associated costs, driving greater efficiencies and keeping pace with the speed of innovation.”

Related: FireEye, Mandiant Split Apart in $1.2B Private Equity Deal

Related: McAfee Sheds Enterprise Business in $4 Billion Deal

Advertisement. Scroll to continue reading.

Related: High-Severity Vulnerabilities Patched in McAfee Enterprise Product

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Shay Mowlem named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

Shaun Khalfan has joined payments giant PayPal as SVP, CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.