Try our new research platform with insights from 80,000+ expert users

Netskope vs Threat Stack Cloud Security Platform comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

iboss
Sponsored
Average Rating
8.6
Reviews Sentiment
7.1
Number of Reviews
14
Ranking in other categories
Secure Web Gateways (SWG) (12th), Internet Security (4th), Web Content Filtering (4th), Cloud Access Security Brokers (CASB) (8th), ZTNA as a Service (12th), Secure Access Service Edge (SASE) (10th)
Netskope
Average Rating
8.4
Reviews Sentiment
7.2
Number of Reviews
41
Ranking in other categories
Cloud Access Security Brokers (CASB) (5th), Secure Access Service Edge (SASE) (4th)
Threat Stack Cloud Security...
Average Rating
8.2
Reviews Sentiment
7.1
Number of Reviews
8
Ranking in other categories
Intrusion Detection and Prevention Software (IDPS) (24th), Container Security (38th), Cloud Workload Protection Platforms (CWPP) (29th), Cloud Security Posture Management (CSPM) (34th)
 

Mindshare comparison

Cloud Access Security Brokers (CASB)
Cloud Workload Protection Platforms (CWPP)
 

Featured Reviews

Matt Crockford - PeerSpot reviewer
It's easy to roll out, and their understanding of our business made it seamless
One aspect we value about iboss is its simplicity. Their customer service is brilliant, and they are super responsive and knowledgeable. It's easy to roll out, and their understanding of our business made it seamless. We were impressed by the solution's mental health function, which can detect if someone needs help. It scans what users are browsing and flags warning signs so we can check to see if they are okay. We've had to use it a couple of times. The user interface is highly intuitive. Our IT team picked it up with minimal training. It's arranged so that it's easy to find where things are. Another advantage is the single pane of glass console, which gives you visibility into what's happening. We're not fully there yet because we haven't implemented zero trust, but we're excited about the possibilities from the demos we've seen. We launched a POC of iboss' ChatGPT Risk Protection feature two weeks ago. AI is a great tool, but you need to be careful what you put into it. My biggest fear is employees inputting sensitive corporate information or customer PII data into one of these chatbots. I was impressed by our trial of the feature. It's exactly what we wanted. Now, when a user goes to ChatGPT, there's a banner warning them not to share information, and we can block conversations containing customer data like bank details and email addresses. I don't want to stop people from using it, but we need visibility. We've only tried it on a test group of 15 people. You can configure it to look for specific keywords or integrate it with your DLP policy if you have that configured
Valan Arasu - PeerSpot reviewer
Provides good visibility, integrates well with other components, and enables organizations to protect their data
Netskope’s CASB provides good visibility of the applications being used. We can use Shadow IT based on the traffic. DLP and CASB are valuable features. The tool provides extensive DLP features. We can create any level of policies and protect our data on-premise or cloud. The tool integrates with all the components very well.
SC
SecOps program for us, as a smaller company, is amazing; they know what to look for
They could give a few more insights into security groups and recommendations on how to be more effective. That's getting more into the AWS environment, specifically. I'm not sure if that's Threat Stack's plan or not, but I would like them to help us be efficient about how we're setting up security groups. They could recommend separation of VPCs and the like - really dig into our architecture. I haven't seen a whole lot of that and I think that's something that, right off the bat, could have made us smarter. Even as part of the SecOps Program, that could be helpful; a quick analysis. They're analyzing our whole infrastructure and saying, "You have one VPC and that doesn't make a lot of sense, that should be multiple VPCs and here's why." The architecture of the servers in whatever cloud-hosting provider you're on could be helpful. Other than that, they should continue to expand on their notifications and on what's a vulnerability. They do a great job of that and we want them to continue to do that. It would be cool, since the agent is already deployed and they know about the server, they know the IP address, and they know what vulnerability is there, for them to test the vulnerability and see if they can actually exploit it. Or, once we patch it, they could double-check that it can't be. I don't know how hard that would be to build. Thinking on it off the top off my head, it could be a little challenging but it could also be highly interesting. It would also be great if we could test a couple of other features like hammering a server with 100 login attempts and see what happens. Real test scenarios could be really helpful. That is probably more something close to what they do with the SOC 2 audit or the report. But more visualization of that, being able to test things out on our infrastructure to make sure we can or can't hit this box could be interesting.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Iboss is a solution that prevents advanced persistent threats, and has a zero tolerance for attacks."
"iboss is pretty scalable. They provide good support. The case managers you work with to coordinate what you need are pretty good."
"The security aspect of the solution, particularly the malware behind it, is excellent. That's something that really helped us out. It's not just a simple proxy that just blocks the insights of potential threats that come on behind it. They do malware detection and that helps us a lot."
"Content filtering is the most useful feature of iboss."
"Its initial setup was straightforward."
"Valuable features: Within the filter: Controls (Web categories, applications, and Allow/Block list) and Network (local Subnets). Within the reporter: Logs (Event Log) and Reports."
"Technical support is pretty sharp and very responsive."
"It was a very easy product to install. It can be deployed very fast."
"The initial setup is straightforward"
"Their technical support is very good."
"The most valuable feature of Netskope is protection."
"A feature that was valuable was the built-in website classification or safety ratings. Different websites would be rated according to analyses that the Netskope team had done, and we built policies on some of those scores. If the website scored less than a certain percentage, then we would have a different user experience around how the site would interact with the clients."
"The detection capability is very nice and lightweight."
"Technical support is good. They are very helpful and quick to resolve any issues we have."
"We use Cisco VPN for remote access. Additionally, we have started implementing Netskope with a strong focus on security. Our primary goal is to protect users from accessing malicious sites. We also plan to implement DLP based on our data, as data security is our main concern."
"It's one of the top-ranking solutions in the market, and it's very responsive. We are using Netskope, and Netskope provides a load of features for SQL, STP, and traffic control."
"Technical support is very helpful."
"We like the ability of the host security module to monitor the processes running on our servers to help us monitor activity."
"Threat Stack has connectivity."
"There has been a measurable decrease in the meantime to remediation... because we have so many different tech verticals already collated in one place, our ability to respond is drastically different than it used to be."
"An important feature of this solution is monitoring. Specifically, container monitoring."
"Every other security tool we've looked is good at containers, or at Kubernetes, is good at AWS, or at instance monitoring. But nobody is good at tying all of those things together, and that's really where Threat Stack shines."
"We're using it on container to see when activity involving executables happens, and that's great."
"It has been quite helpful to have the daily alerts coming to my email, as well as the Sev 1 Alerts... We just went through a SOX audit and those were pivotal."
 

Cons

"To scale up, a new iboss Node Blade Chassis must be purchased."
"SSL decryption: We had issues with learners using apps instead of using web browsers. This type of encryption is tough for any appliance in a BYOD environment."
"The reporting feature needs improvement."
"File integrity monitoring would be very advantageous as an additional feature."
"Fold that in with the risk intelligence they're getting from all of the different subscriptions they are a part of. Now, these security companies subscribe to things like emerging threats, databases, etc. You can fold all this intelligence to decide what's happening on an endpoint. I would love to see them start moving into that space. That would compete directly with Microsoft. Maybe that's why they haven't. Having that ability native within the solution would be great. The other area in which I would love to see improvement is more detailed descriptions of why they block websites."
"The dashboards for local use could be better."
"Their on-premise hardware's network interface is capped at one gigabit, which is sort of a problem. If you stand a filter up where all traffic flows through that, according to them, in order to go above a gigabit, you have to have multiple devices, which in today's IT seems a little bit silly. They could easily put in an SFP port into their device that could accommodate 10 gigs or at least offer a box."
"I am currently doing a PoC of the zero trust aspect of it. Compared to other similar solutions, it is hard to get around each feature. It takes a while to get used to it."
"Deployment and policy tweaking were two areas where improvement needs to be made."
"Accuracy could be improved."
"I would like to have an identity theft protection function."
"Compatibility with other proxy polars would be helpful."
"The configuration in the cloud model could be improved upon."
"There could be better integration with other solutions."
"The product's high price is an area of concern where improvements are required."
"Technical support and the user interface could be improved."
"I would like further support of Windows endpoint agents or the introduction of support for Windows endpoint agents."
"The user interface can be a little bit clunky at times... There's a lot of information that needs to be waded through, and the UI just isn't great."
"The solution’s ability to consume alerts and data in third-party tools (via APIs and export into S3 buckets) is moderate. They have some work to do in that area... The API does not mimic the features of the UI as far as reporting and pulling data out go. There's a big discrepancy there."
"The reports aren't very good. We've automated the report generation via the API and replaced almost all the reports that they generate for us using API calls instead."
"The API - which has grown quite a bit, so we're still learning it and I can't say whether it still needs improvement - was an area that had been needing it."
"The one thing that we know they're working on, but we don't have through the tool, is the application layer. As we move to a serverless environment, with AWS Fargate or direct Lambda, that's where Threat Stack does not have the capacity to provide feed. Those are areas that it's blind to now..."
"The compliance and governance need improvement."
"It shoots back a lot of alerts."
 

Pricing and Cost Advice

"It is not expensive, and it is also not cheap. iboss is priced right in the sweet spot for the number of features it offers."
"The overall pricing for iboss is very competitive and transparent."
"It is expensive compared to one of its competitors."
"We have not priced the solution recently, but they were competitive with other vendors in the past."
"It is probably in line with other solutions, but I do not deal with the financial side."
"I wasn't involved in the initial discussions about its cost. However, within the next year, by around June, I'll need to review the vendors' quotes. Typically, our procurement team handles the process by issuing an RFP to vendors to get quotes. From there, we evaluate based on pricing and may conduct a proof of concept to assess value."
"I rate the product's price a six on a scale of one to ten, where one is expensive, and ten is low price."
"Netskope is a premium service, and its pricing ranges from medium to expensive."
"There is a license required for this solution and there are many licensing models available. For example, what applications are covered as part of the license."
"The tool's pricing is not too cheap or expensive. However, it can be costly for a small business."
"The product's price is average."
"The pricing is competitive."
"I recall that the price was considerably cheaper than that of Zscaler. It was around 60,000 AUD for 1,000 users per year and included some training and some premier support offerings. If we wanted to take advantage of the CASB capabilities, then there was an additional subscription fee, for which we didn't have the budget. On price, I would give Netskope a three or four out of five because it's quite expensive, but it offers a lot of value."
"I'm happy with the amount that we spend for the product that we get and the overall service that we get. It's not cheap, but I'm still happy with the spend."
"Pricing seems to be in line with the market structure. It's fine."
"It is a cost-effective choice versus other solutions on the market."
"What we're paying now is somewhere around $15 to $20 per agent per month, if I recall correctly. The other cost we have is SecOps."
"It came in cheaper than Trend Micro when we purchased it a few years ago."
"It is very expensive compared to some other products. The pricing is definitely high."
"We find the licensing and pricing very easy to understand and a good value for the services provided."
report
Use our free recommendation engine to learn which Cloud Access Security Brokers (CASB) solutions are best for your needs.
831,020 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
13%
Financial Services Firm
12%
Manufacturing Company
9%
Government
6%
Computer Software Company
17%
Financial Services Firm
14%
Manufacturing Company
9%
Insurance Company
5%
Computer Software Company
21%
Financial Services Firm
12%
Real Estate/Law Firm
10%
Manufacturing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about iboss?
Content filtering is the most useful feature of iboss.
What needs improvement with iboss?
I have the same complaint about them that I have about other software companies. Sometimes when you call in support, ...
What is your primary use case for iboss?
We are a PreK-12 public school district, and we use iboss to filter internet content for our students at home and sta...
Which is better, Zscaler internet access or Netsckope CASB?
We researched Netskope but ultimately chose Zscaler. Netskope is a cloud access security broker that helps identify ...
What do you like most about Netskope CASB?
The product's analytics part is pretty fine.
What is your experience regarding pricing and costs for Netskope CASB?
The cost is comparable to other vendors, and it depends on the customer's needs.
Ask a question
Earn 20 points
 

Also Known As

iBoss Cloud Platform
Netskope CASB
Threat Stack, CSP,
 

Learn More

Video not available
 

Overview

 

Sample Customers

More than 4,000 global enterprises trust the iboss Cloud Platform to support their modern workforces, including a large number of Fortune 50 companies.
NetApp, Genomic Health, Caterpillar, Apollo, Pandora, Continental Resources, Fractal, infinera, Tesla
StatusPage.io, Walkbase, Spanning, DNAnexus, Jobcase, Nextcapital, Smartling, Veracode, 6sense
Find out what your peers are saying about Palo Alto Networks, Cisco, Zscaler and others in Cloud Access Security Brokers (CASB). Updated: December 2024.
831,020 professionals have used our research since 2012.