


Skyhigh Security and Check Point Harmony Browse are notable competitors in the cybersecurity sector, with Skyhigh specializing in cloud security solutions and Check Point focusing on browser security. In comparing features, Check Point Harmony Browse has a slight advantage due to its specialized features like Nano Agent and real-time phishing protection which are well-integrated for secure web usage.
Features:Skyhigh Security offers capabilities such as shadow IT identification, cloud risk registry, and advanced DLP policies which enhance cloud service protection. Additionally, it provides comprehensive user analytics and detailed risk assessments through diverse log sources. Check Point Harmony Browse highlights its prowess in browser security, using features like the Nano Agent for efficient threat extraction and real-time phishing protection, all managed centrally through the Infinity Portal.
Room for Improvement:Skyhigh Security could enhance UI responsiveness, performance efficiency, and better integration for unsanctioned applications and API components. Users also note the need for improvements in customizing global registry and report functionalities. Check Point Harmony Browse could benefit from faster technical support, improved documentation, and more transparent pricing. Performance could be optimized by reducing false positives and refining user interface capabilities.
Ease of Deployment and Customer Service:Skyhigh Security facilitates deployment across hybrid and on-premise environments, receiving mixed reviews on technical support consistency. Check Point Harmony Browse reports higher responsiveness and effectiveness in customer service, with a focus on intuitive administration and centralized management, enhancing user experiences.
Pricing and ROI:Skyhigh Security's pricing tends to be on the higher side, justified by comprehensive features and insights beneficial to large enterprises for compliance and risk mitigation. Check Point Harmony Browse offers competitive pricing with satisfactory ROI, appreciated for accessible licensing and affordability, appealing to businesses seeking cost-effective security solutions.
With iboss, whenever you turn on your laptop, the iboss agent automatically connects to the iboss cloud, enforcing all security policies. So with respect to the security side, it strengthens measures.
I have seen some cost effectiveness from iboss; it has reduced certain support requirements, making it a more hands-off solution.
Our company successfully blocked a targeted phishing attack that could have compromised employee credentials and led to a costly data breach.
We have seen a return on investment with Check Point Harmony Browse, reporting a strong return where users have highlighted that the solution's security features, such as blocking phishing attacks and preventing malware downloads, have significantly reduced the number of security incidents, leading to a decrease in IT support costs and less downtime.
They are very fast, responsive, and knowledgeable.
The quality of the support is fantastic.
We had promising discussions about resolving these issues, but no real action followed.
The phone and email support provide efficient results with direct reachability to support engineers.
Typically, I do not need to reach out to Check Point support because the solutions work well after installation.
The responses were timely, professional, and knowledgeable.
We can know the case severity such as P1, P2, or P3, allowing easy interaction from the customer support side.
They are also able to meet on-demand requirements based on your contract with them, and can easily provide adequate resources and scalability.
I would rate it a nine out of ten for scalability.
If I start seeing sluggishness or anything like that, I just reach out to my rep, and they connect with their dev team, typically resolving it the same day.
Supporting thousands of endpoints without compromising performance.
It is scalable as we monitor and manage endpoints and overall users across the system.
Check Point Harmony Browse is virtually infinite in terms of scalability, and I've seen install bases of up to 5,000 users.
Scalability is very good, and I can give a rating up to nine out of ten for scalability.
It's been pretty solid; I've never had an outage with them, and if I ever had, it's only been once out of the seven years.
We've experienced zero downtime.
Our biggest problem with their service was it did not recognize the device despite our ClearPass sending information to the iboss box.
In terms of stability, our experience with Check Point Harmony Browse has been positive with no major downtime so far, and the browser runs smoothly with regular updates.
Check Point Harmony Browse is very stable with no communication or other issues encountered on my end.
We did not face any downtime on that site, so it is quite reliable.
It has many gaps, so I think some customers take three months and up to six months for the deployment of Skyhigh Security.
It is not as intuitive as the rest of the platform.
We also had a problem with a transition when we upgraded from one appliance of theirs to another, but their engineer lost a good deal of our data.
Our iboss subscription access should be more secure with an OTP or VPN etc.
The user interface can be better, and selecting the action for monitored or watch-listed IOCs can be more refined.
Another area of improvement is extension compatibility since it currently works best with Chrome and Edge, but having wider browser support for Firefox and Safari would be beneficial for mixed environments.
Integrating with Fortinet, Palo Alto, or third-party SIEM products such as Splunk would be a seamless advantage.
Skyhigh Security is quite simple, but if there is any improvement in the GUI, it will be quite easy for us because it looks a legacy interface.
The solution has room for improvement in its DDoS protection.
The UI is another area where there is room for improvement in the product.
It offers the same features you would get from a vendor that charges 250,000 British pounds for a fraction of the price.
The following year, the cost of just licensing was similar to what was paid the previous year for a new appliance along with the implementation and licensing costs.
Regarding pricing, setup costs, and licensing, iboss is not cheap, and that's my only concern.
Smaller projects tend to be more expensive due to fewer licenses, while larger projects of 500 to 2,000 users benefit from better pricing and discounts.
There were no significant upfront hardware or infrastructure costs since it's delivered as a native cloud service.
It is not too high compared to what we expected, but it is not too cheap either, which is why I rate it five.
The solution's mental health function can detect if someone needs help.
It's given us a lot more visibility into our computer assets that may be infected with viruses and also shows us people who have unusually large uploads or might be engaging in high-risk activities, such as searches or going to sites not categorized by their web crawler.
iboss was the best solution for us because, no matter what domain you were in, everything is under a single pane of glass, which is exactly what we wanted.
Everything is handled directly within the browser using a lightweight extension, delivering real-time threat prevention, including protection against zero-day phishing and malicious downloads without impacting user productivity.
The isolated environment in Check Point Harmony Browse is the best feature we provide, giving a separate, isolated environment for the production applications and company applications, which is really valuable.
The real-time Threat Intelligence feature powered by Check Point's ThreatCloud is impressive because ThreatCloud integrates and correlates all malicious data from Check Point installations globally, collecting and analyzing this data with AI and machine learning to help prevent zero-day attacks effectively.
The cloud security features are the most valuable.
It is actually very flexible, so I think that is the opportunity since it is not resource-intensive.
We operate in a major financial sector in India, and that is why we use Skyhigh Security to reroute all our traffic via proxy for our security.
| Product | Mindshare (%) |
|---|---|
| iboss | 2.8% |
| Check Point Harmony Browse | 0.8% |
| Skyhigh Security | 3.0% |
| Other | 93.4% |


| Company Size | Count |
|---|---|
| Small Business | 7 |
| Midsize Enterprise | 7 |
| Large Enterprise | 8 |
| Company Size | Count |
|---|---|
| Small Business | 19 |
| Midsize Enterprise | 16 |
| Large Enterprise | 6 |
| Company Size | Count |
|---|---|
| Small Business | 28 |
| Midsize Enterprise | 6 |
| Large Enterprise | 38 |
Iboss offers a comprehensive cloud-based security platform valued for its scalability and autonomous features, ensuring robust security with easy deployment and management capabilities.
Renowned for its robust security architecture, Iboss integrates seamlessly within diverse networks, delivering efficient granular filtering and advanced content categorization. Its single pane of glass console provides ease of management, allowing rapid scalability suitable for rapidly deploying environments. Operates in BYOD setups due to inline filtering without device installation. Integration with cloud-based applications enhances user control, and features like SASE, SSL inspection, and ChatGPT risk protection stand as highlights. Despite its strengths, users have pointed out areas for enhancement like direct navigation in reports, SSL decryption, and better cloud integration while having room to improve data loss prevention.
What are the most important features of Iboss?The usage of Iboss spans educational institutions, specifically K-12, to enforce internet policies, protect data, and support remote work environments. It provides web filtering and security frameworks to ensure safe browsing. Its platform-as-a-service model offers flexibility for both cloud-based and on-premises requirements, integrating seamlessly to deliver enhanced security features suitable for various deployment needs including zero trust, CASB, and network security for work-from-home setups.
Check Point Harmony Browse enhances web browsing security by offering zero-day malware protection, phishing defense, and data loss prevention. It secures user credentials and blocks risky content in real-time through lightweight deployment.
Designed to protect against web-based threats like malware and ransomware, Check Point Harmony Browse filters web content, providing real-time threat analysis and browser isolation. It allows for secure browsing for remote employees without complex setups or the need for VPNs. While it effectively maintains data integrity and reduces downtime, it can enhance its offerings with detailed alerts, quicker updates, and improved integrations with iOS, Android, and third-party applications. Enhancing performance, reporting, language support, and pricing transparency can further benefit user experience.
What features define Check Point Harmony Browse?In industries handling sensitive data or utilizing remote workforce models, Check Point Harmony Browse deployment strengthens online security strategies. Healthcare professionals ensure confidentiality while accessing patient data. Financial institutions prevent unauthorized access to client information. Educational entities use it to safeguard proprietary research and personal data of students and staff. These implementations tailor browser security to meet the intensive requirements of their fields, minimizing threats while optimizing performance.
Skyhigh Security provides comprehensive protection with features like user behavior analytics, shadow IT identification, and data loss prevention. Its integration with IT infrastructure offers robust security insights and helps maintain compliance.
Skyhigh Security offers a user-friendly interface that simplifies navigation while delivering substantial threat protection. It enhances existing IT infrastructure integration, such as DLP and Active Directory, to strengthen security. Yet, there is room for improvement in report generation speed, interface intuitiveness, and integration with other products. Organizations utilize Skyhigh Security to audit internet behavior, secure cloud environments and control web content. It effectively manages data movement and ensures compliance, while preventing unauthorized access and bandwidth misuse.
What are the key features of Skyhigh Security?In sectors like finance, healthcare, and technology, companies implement Skyhigh Security for its comprehensive monitoring capabilities. It helps secure access to SaaS applications and protects against threats, ensuring adherence to regulatory requirements and preventing data breaches while optimizing performance in cloud environments.
We monitor all Secure Web Gateways (SWG) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.