No more typing reviews! Try our Samantha, our new voice AI agent.

Skyhigh Security vs Zscaler Zero Trust Exchange Platform comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Feb 8, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

iboss
Sponsored
Ranking in Cloud Access Security Brokers (CASB)
7th
Ranking in ZTNA as a Service
8th
Ranking in Secure Access Service Edge (SASE)
8th
Average Rating
8.4
Reviews Sentiment
6.9
Number of Reviews
20
Ranking in other categories
Secure Web Gateways (SWG) (5th), Internet Security (3rd), Web Content Filtering (1st)
Skyhigh Security
Ranking in Cloud Access Security Brokers (CASB)
12th
Ranking in ZTNA as a Service
18th
Ranking in Secure Access Service Edge (SASE)
15th
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
57
Ranking in other categories
Secure Web Gateways (SWG) (14th), Data Loss Prevention (DLP) (30th)
Zscaler Zero Trust Exchange...
Ranking in Cloud Access Security Brokers (CASB)
8th
Ranking in ZTNA as a Service
1st
Ranking in Secure Access Service Edge (SASE)
2nd
Average Rating
8.4
Reviews Sentiment
6.9
Number of Reviews
67
Ranking in other categories
Data Loss Prevention (DLP) (6th), Application Control (5th), Remote Browser Isolation (RBI) (1st)
 

Mindshare comparison

As of April 2026, in the Secure Access Service Edge (SASE) category, the mindshare of iboss is 2.5%, up from 1.7% compared to the previous year. The mindshare of Skyhigh Security is 2.2%, up from 2.0% compared to the previous year. The mindshare of Zscaler Zero Trust Exchange Platform is 9.1%, down from 11.5% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Secure Access Service Edge (SASE) Mindshare Distribution
ProductMindshare (%)
Zscaler Zero Trust Exchange Platform9.1%
iboss2.5%
Skyhigh Security2.2%
Other86.2%
Secure Access Service Edge (SASE)
 

Featured Reviews

reviewer2701851 - PeerSpot reviewer
Managing Director
Enhances web security with a single pane of glass and flexible deployment
I don't see any need for improvement; one of the really good things about iboss as a company is that they listen to customer feedback. I have suggested enhancements, and they are responsive, making changes for the better, and they do a lot of testing. To improve iboss, although we haven't used it, we considered the VPN solution that comes with the highest tier licensing, which includes DLP and various other add-ons. We prefer using another product which automatically logs you back onto your network when turning on your PC. With iboss, the connection is manual, which doesn't meet our needs. Additionally, sizing can be tricky because, although the initial recommendations may seem adequate, actual usage may require more gateways than anticipated.
KS
Technical Associate Network Security at Valuepoint Systems
Proxy integration has strengthened email security and centralized monitoring for all branches
We have nearly 900 plus branches here, where we have rerouted our traffic through proxy like Trellix Skyhigh Security. We operate in a major financial sector in India, and that is why we use Skyhigh Security to reroute all our traffic via proxy for our security. Only then will it reach our gateway. We monitor all the URLs and the plant IPs in our proxy. We are tracing those IPs to see whether they have a valid code or not. We also check with Trellix Sandbox to determine whether the URL is malicious or not. Additionally, we have included our Cisco Umbrella with our proxy, so the DNS resolution happens on our Umbrella side. We continuously monitor the traffic on our proxy side. The threat protection feature is a major useful thing because for our 900 branches we monitor with this proxy only. If any issue or any URL does not reach, it is quite helpful to check whether the issue is in the proxy side or in the actual end-user side. It is quite easy to monitor. We do not get all those things from the firewall end, and it is quite easy to gather that information from the proxy, which is a major benefit here. It also majorly helps to hide our actual IPs, as we have directed all the IPs from the proxy, making it very helpful to hide our internal servers.
Vibin Thomas - PeerSpot reviewer
Team Lead, Technical Content Security at Valuepoint Systems
Zero trust access has transformed remote connectivity and now simplifies secure app usage
Zscaler Zero Trust Exchange Platform, especially Zscaler Private Access, is very strong, though there are a few areas where improvements can be made. One challenge observed is around initial troubleshooting and visibility. While Zscaler Private Access provides logs, it can sometimes take time to pinpoint the exact cause of access issues, especially in complex environments with multiple policies and identity integration. Another area is the dependency on identity and connector health. Since Zscaler Private Access is heavily reliant on app connectors and identity providers, any issues with these components can impact user access, making proper monitoring critical. During the initial setup, policy configuration and application onboarding require careful planning, especially for larger environments with many applications. These challenges are manageable with proper design and monitoring. Overall, the platform delivers strong security and user experience. I would recommend a few improvements, especially around user interface, reporting, and troubleshooting experience. From a user interface perspective, while the platform is powerful, the policy configuration and navigation can feel complex, especially for new users. A more simplified and intuitive layout for policy mapping and application access would help reduce the learning curve. In terms of reporting, Zscaler Private Access provides logs, but having more built-in customizable dashboards and analytics would be very helpful. Better visibility into user access patterns, application performance, and real-time troubleshooting insights would improve operational efficiency. From a support and troubleshooting standpoint, it would be beneficial to have more granular centralized visibility, allowing for quick end-to-end tracing of a user request from authentication to application access without switching between multiple views. These improvements would make the platform even more efficient, especially for large-scale enterprise environments.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"iboss has significantly lowered the number of security incidents. It is crazy how much it blocks and how much it is aware of the outside danger."
"The solution has massively improved our security posture, giving us full visibility into what our staff does online."
"Technical support is pretty sharp and very responsive."
"The iboss system is highly reliable. The false positive rates are small compared to some other systems we've experienced through other partner agencies who use competing solutions."
"I would definitely recommend iboss for web filtering purposes to other organizations or individuals."
"Because of iboss, I did not have to assign web filtering tasks to my techs on a daily basis."
"We chose iboss for both zero trust and proxy (SWG) because their SWG was superior."
"Granular setup, which was able to set different levels of filters using the OUs in the AD."
"The solution performs well."
"The solution is very easy to use, easy to navigate, very stable, scalable, quite flexible, and overall the performance is good."
"We use this solution for controlling web content that the users are accessing, and you can control your employees when they are in the office and out of the office, without using a VPN in the same fashion."
"Skyhigh performs well, and we can choose from virtual and hardware plans. We can deploy the ISO on as many virtual machines as possible and easily set up high availability on the web proxy. The location doesn't matter. The user at a site will always access the web proxy for that location. It's suitable for an organization distributed across multiple regions."
"Provides quite a bit of visibility into cloud services being utilized in our environment."
"The cloud security features are the most valuable."
"The most valuable features of MVISION Cloud are the automatic reports and modification incidents."
"I personally don't have any issues with the performance or the stability of the solution."
"Yes, it is very stable. I have never seen it go down, not once."
"I like its ease of use; it has a single pane of glass for the ZIA and ZPA pieces, is very manageable, is very easy to deploy for secure access, and gives half-decent coverage for visibility in terms of what the users use and what data is being proxied through the access gateway."
"The most valuable features of this solution are the CASB solutions, which is protecting their Office 365."
"The most valuable features are the File Type Control and SSL bypass policies. We"
"It's one of the easier products on the market as far as set-ups and deployments, and even across their whole product suite, they've made it pretty simple."
"The tool's scalability is good."
"The solution is the best for storage."
"The most valuable feature of Zscaler Private Access is we do not have to connect to a VPN, it is seamless. It is more convenient for us because we use one agent to cover the internet and VPN access."
 

Cons

"I'd like to see them accelerate development on the security side, particularly around data loss prevention."
"I have heard they are doing DDoS filtering, but I am not certain if they are implementing it correctly."
"Sometimes, obviously, there are bugs."
"Its pricing could be better."
"The reporting feature needs improvement."
"Their on-premise hardware's network interface is capped at one gigabit, which is sort of a problem. If you stand a filter up where all traffic flows through that, according to them, in order to go above a gigabit, you have to have multiple devices, which in today's IT seems a little bit silly. They could easily put in an SFP port into their device that could accommodate 10 gigs or at least offer a box."
"SSL decryption: We had issues with learners using apps instead of using web browsers. This type of encryption is tough for any appliance in a BYOD environment."
"Fold that in with the risk intelligence they're getting from all of the different subscriptions they are a part of. Now, these security companies subscribe to things like emerging threats, databases, etc. You can fold all this intelligence to decide what's happening on an endpoint. I would love to see them start moving into that space. That would compete directly with Microsoft. Maybe that's why they haven't. Having that ability native within the solution would be great. The other area in which I would love to see improvement is more detailed descriptions of why they block websites."
"The only thing we have faced is that sometimes, randomly, the portal becomes too slow."
"McAfee Web Gateway could improve the reporting. We have the reporting on a separate server and sometimes the database becomes full. These aspects could improve."
"The solution is hard to configure, our team does not have specific training requirements for McAfee making it difficult."
"The cloud capability needs to be improved in terms of scalability. More generally, both scalability and performance on the cloud need to be improved."
"Even if you narrow down the scope of the report so that there is not too much data, when a report is generating, sometimes it will get hung; thus you have to delete it and run it again."
"The performance of the tool can be improved to provide faster report generation."
"I'm rating the technical support for Skyhigh Security a zero."
"They only have English support, so I would like for them to add some Spanish support."
"User management can be improved."
"I can't speak to any missing features."
"From a user interface perspective, while the platform is powerful, the policy configuration and navigation can feel complex, especially for new users."
"Zscaler Private Access needs to improve its collaboration with applications without compromising security."
"The scalability is a weak point right now. Its scaling capabilities are lacking, and we'd like to see that improve in the future."
"The only issue with Zscaler Cloud DLP is that it only gives you DLP protection from web traffic, which is flowing out, while a full-blown DLP solution such as Forcepoint or Symantec gives you DLP coverage for multiple channels. Zscaler Cloud DLP doesn't give you coverage for email, fax, and USB channels, and this is the only challenge or room for improvement in the solution. It's just an extension on top of what you're buying on the proxy, so it's just an added layer, and it doesn't cover DLP on a very broad level. I'm unsure if Zcaler is in the business of competing with a full-blown DLP solution, and if there's a plan to expand the features of Zscaler Cloud DLP beyond the web channel because you'll have to deploy a full-blown agent for it. I'm unsure if this is on the cards because the solution is just an added layer that you get with your proxy. I've asked the Zcaler team whether there's a plan to go full DLP in the future, but I didn't get a positive response. There isn't any feature I'd like added to Zscaler Cloud DLP currently, because anything you could think of that should be in cloud or SaaS solutions is already there, except for machine learning, as it's the only functionality that seems to be lacking in the solution. Machine learning is an additional policy available in other DLP solutions in the market, but my team didn't find it in Zscaler Cloud DLP."
"We have issues with the tool's maintenance and networking. It should be able to work in offline mode as well."
"It has a limitation, if you are creating a rule or something for a web application or something, you could only add five users, not more than that. Five or four users are only included in a rule. If you want to create a rule for more than five or four users, you have to go through other methods, not particularly with the application. Working within the application with this method would be quite easy as compared to listing a URL or a normal IP address."
 

Pricing and Cost Advice

"We had the cost of purchasing a new appliance along with the implementation and licensing costs. However, the following year, the cost of just licensing was similar to what was paid the previous year for a new appliance along with the implementation and licensing costs."
"The overall pricing for iboss is very competitive and transparent."
"We have not priced the solution recently, but they were competitive with other vendors in the past."
"It is probably in line with other solutions, but I do not deal with the financial side."
"It is expensive compared to one of its competitors."
"It is not expensive, and it is also not cheap. iboss is priced right in the sweet spot for the number of features it offers."
"The biggest thing to watch for is the difference in price per monitored user for the different API integrations."
"Have a risk-based approach towards pricing."
"The price of the solution is good and we pay an annual license."
"Some of our clients have a perpetual license and pay additional support yearly."
"This is an expensive product, although it is made for larger enterprises and not for small organizations."
"Pricing is not out of reach."
"This is an expensive product, but you have to compare that with other solutions that are on the market."
"There is a license required to use this solution and it is paid annually. The price is reasonable."
"Zscaler CASB is an expensive solution."
"The cost is expensive. It depends on the number of users."
"The product is a bit expensive."
"The technical support is good."
"Zscaler DLP solution is expensive, with a fixed pricing structure that is billed annually and monthly. There are no additional costs for licenses."
"The solution has increased prices this year."
"There is definitely an ROI."
"The price is competitive."
report
Use our free recommendation engine to learn which Secure Access Service Edge (SASE) solutions are best for your needs.
886,426 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
11%
Computer Software Company
9%
Manufacturing Company
9%
Construction Company
7%
Financial Services Firm
14%
Government
10%
Manufacturing Company
9%
Computer Software Company
6%
Financial Services Firm
13%
Manufacturing Company
10%
Computer Software Company
9%
Insurance Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business6
Midsize Enterprise7
Large Enterprise6
By reviewers
Company SizeCount
Small Business30
Midsize Enterprise4
Large Enterprise38
By reviewers
Company SizeCount
Small Business16
Midsize Enterprise12
Large Enterprise44
 

Questions from the Community

What needs improvement with iboss?
For zero trust implementation, we encountered complexity issues, especially with a large infrastructure company Exxon...
What is your primary use case for iboss?
Previously when I used iboss, we did the POC for iboss for ExxonMobil. Four or five people wanted to move from our ol...
What is your experience regarding pricing and costs for iboss?
Regarding pricing, setup costs, and licensing, iboss is not cheap, and that's my only concern. There are cheaper alte...
What needs improvement with McAfee Web Gateway?
When compared to other technologies, Skyhigh Security is quite simple, but if there is any improvement in the GUI, it...
What is your primary use case for McAfee Web Gateway?
I am currently working on Cisco Email Security Gateway, ESA, and I am also exploring Trellix Skyhigh proxy. I have be...
What advice do you have for others considering McAfee Web Gateway?
For IAM, we are using other tools, as we are a financial institution, so we do not go with a single vendor platform. ...
What is the better solution - Prisma Access or Zscaler Private Access?
We looked into Prisma Access before choosing Zscaler Private Access (ZPA). Palo Alto’s Prisma Access is a secure ac...
What needs improvement with Zscaler SASE?
The solution needs to improve a lot of aspects.
What is your primary use case for Zscaler SASE?
We are using Zscaler Zero Trust Exchange for its Zscaler Internet Access service. It provides web security, DLP, data...
 

Also Known As

iBoss Cloud Platform
McAfee MVISION Cloud, McAfee MVISION Unified Cloud Edge, McAfee Web Gateway, McAfee MVISION CNAPP, and Skyhigh Networks, McAfee Web Gateway
Zscaler SASE, Zscaler DLP, Zscaler CASB, Zscaler CSPM, Zscaler Browser Isolation, Zscaler Posture Control
 

Interactive Demo

Demo not available
Demo not available
 

Overview

 

Sample Customers

More than 4,000 global enterprises trust the iboss Cloud Platform to support their modern workforces, including a large number of Fortune 50 companies.
Western Union.Aetna.DirecTV.Adventist.Equinix.Perrigo.Goodyear.HP.Cargill.Sony.Bank of the West.Prudential.
Siemens, AutoNation, GE, NOV
Find out what your peers are saying about Skyhigh Security vs. Zscaler Zero Trust Exchange Platform and other solutions. Updated: March 2026.
886,426 professionals have used our research since 2012.