We performed a comparison between CrowdStrike Falcon Cloud Security and Skyhigh Security based on real PeerSpot user reviews.
Find out in this report how the two Cloud Security Posture Management (CSPM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."Support has been very helpful and provides regular feedback and help whenever needed. They've been very useful."
"PingSafe's graph explorer is a valuable tool that lets us visualize all connected services."
"We've seen a reduction in resources devoted to vulnerability monitoring. Before PingSafe we spent a lot of time monitoring and fixing these issues. PingSafe enabled us to divert more resources to the production environment."
"The management console is highly intuitive to comprehend and operate."
"It saves time, makes your environment more secure, and improves compliance. PingSafe helps with audits, ensuring that you are following best practices for cloud security. You don't need to be an expert to use it and improve your security."
"The multi-cloud support is valuable. They are expanding to different clouds. It is not restricted to only AWS. It allows us to have different clouds on one platform."
"The ease of use of the platform is very nice."
"The real-time detection and response capabilities overall are great."
"There is a lot that it can do, but endpoint protection is the main thing about it. The fact that it uses machine learning and artificial intelligence to monitor and remediate the issues in real-time is probably the bread and butter of the product."
"The immediate mitigation of potential threats and instant alerts are valuable."
"Cloud security posture management (CSPM) is most valuable."
"Technical support is helpful."
"The most valuable feature of Falcon Cloud Security is its comprehensive threat-hunting ability."
"CrowdStrike utilizes signatureless technology, eliminating the need for regular signature updates on endpoint systems."
"It is fully cloud-based, so we don't need to invest in third-party agents repeatedly."
"Cloud security is one valuable feature. Spotlight is the other one. There is also vulnerability management and a couple of more features."
"The most valuable features of McAfee Web Gateway are anti-malware, reports, and powerful categorization of web pages."
"A stable solution with good support."
"It also prevents you from writing data to your Gmail and does not allow you to move your data outside of the corporate system. That is the most important feature for me."
"I like the encrypted disk feature and the endpoint protection."
"Good anti-virus filtering, URL categorization, and reporting capabilities."
"The other products that I have evaluated do not have the scalability options that McAfee has."
"Skyhigh has given us categorization and rating of websites separate from what the web proxy places on the logs."
"Without Skyhigh, we had zero visibility, but now we are aware of so much more."
"The could improve their mean time to detect."
"In terms of ease of use, initially, it is a bit confusing to navigate around, but once you get used to it, it becomes easier."
"While it is good, I think the solution's console could be improved."
"Some of the navigation and some aspects of the portal may be a little bit confusing."
"In some cases, the rules are strictly enforced but do not align with real-world use cases."
"PingSafe can be improved by developing a comprehensive set of features that allow for automated workflows."
"The integration with Oracle has room for improvement."
"PingSafe's current documentation could be improved to better assist customers during the cluster onboarding process."
"The only suggestion for improvement would be the pricing."
"It would be more convenient if there was an easier way to install CrowdStrike, perhaps through better integration with Active Directory."
"One area for improvement in Falcon Cloud Security is the support portal."
"Incorporating threat intelligence into the system would be a valuable addition."
"The only challenge lies in token verification."
"There should be cloud storage scanning. We would like to have cloud storage vulnerability and threat management on any cloud storage."
"The threat intelligence and user behavioral analysis could be more comprehensive."
"It gets the work done, but the main problem with the solution is that if you remediate anything, it takes 45 days for you to get any of the features displayed on the dashboard. This is the real weakness of CrowdStrike. Their customer support is also not ready to help with it. If you remediate any cloud vulnerability that they are giving you, such as removing a host from your organization, it takes around 45 days for them to remove it from their console."
"The pricing of the solution could be adjusted to make it more reasonable."
"An area for improvement in Skyhigh Security is its UI. It needs to be enhanced and made more user-friendly. Right now, the UI of Skyhigh Security is sometimes confusing. For example, my company is deploying Skyhigh Security for a client and integrating it on the cloud, from an on-premises deployment to a hybrid deployment. Though the experience isn't bad, there needs to be more enhancements. Another room for improvement in Skyhigh Security is the limited training resources, especially when you compare it with Cisco, which has many study materials in the market, even free training resources. You'll get limited resources if you search for Skyhigh Security tutorials on Google and YouTube. Because of high-security requirements and the training material for Skyhigh Security not being available, most engineers and architects avoid the product because there'd be a lack of knowledge in configuring and achieving the goals you'd want to reach via the use of Skyhigh Security. The NOC team deploying the product is having difficulty getting training resources for Skyhigh Security. You'll be charged an enormous amount if you search the market for training because of the limited resources available. Skyhigh Security needs to work on marketing and awareness as an improvement to the product."
"The virtual solution requires improvement."
"The only thing we have faced is that sometimes, randomly, the portal becomes too slow."
"The Skyhigh for Google Drive interface and policy engine is a bit confusing and limited when compared against other Google Drive CASB capabilities."
"It would be nice to be able to get more advanced search functions to filter out data and quickly obtain the data that we need."
"They only have English support, so I would like for them to add some Spanish support."
"I think that the User Interface could be improved."
More SentinelOne Singularity Cloud Security Pricing and Cost Advice →
More CrowdStrike Falcon Cloud Security Pricing and Cost Advice →
CrowdStrike Falcon Cloud Security is ranked 8th in Cloud Security Posture Management (CSPM) with 13 reviews while Skyhigh Security is ranked 17th in Cloud Security Posture Management (CSPM) with 51 reviews. CrowdStrike Falcon Cloud Security is rated 8.8, while Skyhigh Security is rated 8.4. The top reviewer of CrowdStrike Falcon Cloud Security writes "Enhances the overall safety of our company's environment from cyber threats". On the other hand, the top reviewer of Skyhigh Security writes "Good scalability, but the technical support service needs improvement". CrowdStrike Falcon Cloud Security is most compared with Prisma Cloud by Palo Alto Networks, AWS GuardDuty, Wiz, Qualys VMDR and Sysdig Falco, whereas Skyhigh Security is most compared with Zscaler Internet Access, Netskope , Microsoft Defender for Cloud Apps, Symantec Proxy and Prisma Cloud by Palo Alto Networks. See our CrowdStrike Falcon Cloud Security vs. Skyhigh Security report.
See our list of best Cloud Security Posture Management (CSPM) vendors and best Cloud-Native Application Protection Platforms (CNAPP) vendors.
We monitor all Cloud Security Posture Management (CSPM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.