No more typing reviews! Try our Samantha, our new voice AI agent.

Skyhigh Security vs Zscaler Zero Trust Exchange Platform comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Feb 8, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

iboss
Sponsored
Ranking in Cloud Access Security Brokers (CASB)
7th
Ranking in ZTNA as a Service
8th
Ranking in Secure Access Service Edge (SASE)
8th
Average Rating
8.4
Reviews Sentiment
6.9
Number of Reviews
20
Ranking in other categories
Secure Web Gateways (SWG) (5th), Internet Security (3rd), Web Content Filtering (1st)
Skyhigh Security
Ranking in Cloud Access Security Brokers (CASB)
12th
Ranking in ZTNA as a Service
18th
Ranking in Secure Access Service Edge (SASE)
15th
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
57
Ranking in other categories
Secure Web Gateways (SWG) (14th), Data Loss Prevention (DLP) (30th)
Zscaler Zero Trust Exchange...
Ranking in Cloud Access Security Brokers (CASB)
8th
Ranking in ZTNA as a Service
1st
Ranking in Secure Access Service Edge (SASE)
2nd
Average Rating
8.4
Reviews Sentiment
6.9
Number of Reviews
67
Ranking in other categories
Data Loss Prevention (DLP) (6th), Application Control (5th), Remote Browser Isolation (RBI) (1st)
 

Mindshare comparison

As of April 2026, in the Secure Access Service Edge (SASE) category, the mindshare of iboss is 2.5%, up from 1.7% compared to the previous year. The mindshare of Skyhigh Security is 2.2%, up from 2.0% compared to the previous year. The mindshare of Zscaler Zero Trust Exchange Platform is 9.1%, down from 11.5% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Secure Access Service Edge (SASE) Mindshare Distribution
ProductMindshare (%)
Zscaler Zero Trust Exchange Platform9.1%
iboss2.5%
Skyhigh Security2.2%
Other86.2%
Secure Access Service Edge (SASE)
 

Featured Reviews

reviewer2701851 - PeerSpot reviewer
Managing Director
Enhances web security with a single pane of glass and flexible deployment
I don't see any need for improvement; one of the really good things about iboss as a company is that they listen to customer feedback. I have suggested enhancements, and they are responsive, making changes for the better, and they do a lot of testing. To improve iboss, although we haven't used it, we considered the VPN solution that comes with the highest tier licensing, which includes DLP and various other add-ons. We prefer using another product which automatically logs you back onto your network when turning on your PC. With iboss, the connection is manual, which doesn't meet our needs. Additionally, sizing can be tricky because, although the initial recommendations may seem adequate, actual usage may require more gateways than anticipated.
KS
Technical Associate Network Security at Valuepoint Systems
Proxy integration has strengthened email security and centralized monitoring for all branches
We have nearly 900 plus branches here, where we have rerouted our traffic through proxy like Trellix Skyhigh Security. We operate in a major financial sector in India, and that is why we use Skyhigh Security to reroute all our traffic via proxy for our security. Only then will it reach our gateway. We monitor all the URLs and the plant IPs in our proxy. We are tracing those IPs to see whether they have a valid code or not. We also check with Trellix Sandbox to determine whether the URL is malicious or not. Additionally, we have included our Cisco Umbrella with our proxy, so the DNS resolution happens on our Umbrella side. We continuously monitor the traffic on our proxy side. The threat protection feature is a major useful thing because for our 900 branches we monitor with this proxy only. If any issue or any URL does not reach, it is quite helpful to check whether the issue is in the proxy side or in the actual end-user side. It is quite easy to monitor. We do not get all those things from the firewall end, and it is quite easy to gather that information from the proxy, which is a major benefit here. It also majorly helps to hide our actual IPs, as we have directed all the IPs from the proxy, making it very helpful to hide our internal servers.
Vibin Thomas - PeerSpot reviewer
Team Lead, Technical Content Security at Valuepoint Systems
Zero trust access has transformed remote connectivity and now simplifies secure app usage
Zscaler Zero Trust Exchange Platform, especially Zscaler Private Access, is very strong, though there are a few areas where improvements can be made. One challenge observed is around initial troubleshooting and visibility. While Zscaler Private Access provides logs, it can sometimes take time to pinpoint the exact cause of access issues, especially in complex environments with multiple policies and identity integration. Another area is the dependency on identity and connector health. Since Zscaler Private Access is heavily reliant on app connectors and identity providers, any issues with these components can impact user access, making proper monitoring critical. During the initial setup, policy configuration and application onboarding require careful planning, especially for larger environments with many applications. These challenges are manageable with proper design and monitoring. Overall, the platform delivers strong security and user experience. I would recommend a few improvements, especially around user interface, reporting, and troubleshooting experience. From a user interface perspective, while the platform is powerful, the policy configuration and navigation can feel complex, especially for new users. A more simplified and intuitive layout for policy mapping and application access would help reduce the learning curve. In terms of reporting, Zscaler Private Access provides logs, but having more built-in customizable dashboards and analytics would be very helpful. Better visibility into user access patterns, application performance, and real-time troubleshooting insights would improve operational efficiency. From a support and troubleshooting standpoint, it would be beneficial to have more granular centralized visibility, allowing for quick end-to-end tracing of a user request from authentication to application access without switching between multiple views. These improvements would make the platform even more efficient, especially for large-scale enterprise environments.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"This product is solid, fairly easy to use, and reliable."
"Technical support is pretty sharp and very responsive."
"Because of iboss, I did not have to assign web filtering tasks to my techs on a daily basis."
"Its initial setup was straightforward."
"The iboss solution gives me the ability to scan the traffic through all the ports, through all the 131,000 PCP and UDP ports, and with this ability, we have the granularity also for consults over social media and applications on mobile, and this is an advantage that the customers are looking for right now."
"Our primary use case for this product is DLP,"
"Iboss is a solution that prevents advanced persistent threats, and has a zero tolerance for attacks."
"Technical support is pretty sharp and very responsive."
"Having full control of infrastructure."
"This is a stable solution, constantly running across the entire enterprise."
"Tokenization."
"The cloud risk registry has been great for getting a quick and clearer understanding of the risk of proposed services that we are looking at allowing."
"They were very, very aggressive in the market to get a new market share or to take over market share while other companies were being broken up."
"It is easy to configure rules."
"All the information available on each service, including its risk assessment."
"We use this solution for controlling web content that the users are accessing, and you can control your employees when they are in the office and out of the office, without using a VPN in the same fashion."
"The only advantage I see is no more connection is required by the users."
"What I find most valuable in Zscaler Private Access is that it's a VPN, and its connectivity as a VPN is its most valuable feature."
"The most valuable features of Zscaler CASB are API integration and DLP."
"The most valuable features of Zscaler Private Access are its ability to integrate with multiple IDPs and application segmentation."
"I find all Zscaler Private Access features valuable because each replaces flawed technologies, such as EPAs being replacements for VPN and PR as a replacement for PAM, so I can't mention only one valuable feature. Overall, Zscaler Private Access is a good solution."
"Overall, the solution does a pretty good job at web filtering."
"The ZPA is a unique feature which offers VPN along with all the additional security needed."
"It is straightforward to set up."
 

Cons

"The solution could be stronger on the integration side and offer more cloud applications like G Suite or Oracle."
"Their on-premise hardware's network interface is capped at one gigabit, which is sort of a problem. If you stand a filter up where all traffic flows through that, according to them, in order to go above a gigabit, you have to have multiple devices, which in today's IT seems a little bit silly. They could easily put in an SFP port into their device that could accommodate 10 gigs or at least offer a box."
"The area I would like to see improvement in is the ability within the reporter to navigate directly to the content the user is traversing."
"I am currently doing a PoC of the zero trust aspect of it. Compared to other similar solutions, it is hard to get around each feature. It takes a while to get used to it."
"The dashboards for local use could be better."
"SSL decryption: We had issues with learners using apps instead of using web browsers."
"Sometimes when you call in support, you get someone who is just following a sheet. It feels like a runaround. You feel that you are running into that support wall."
"For zero trust implementation, we encountered complexity issues, especially with a large infrastructure company ExxonMobil."
"The encrypted disk implementation could be improved. I currently use it from a dongle or USB key with two-factor authentication to access my computer."
"Needs integration with other technology ecosystems."
"Though the Skyhigh Dashboard is processing large amounts of data, the speed of the Dashboard could be improved."
"SkyHigh has the ability to place users or groups on a ‘Watchlist’; which allows you to see certain views with these Watchlists users/groups in them, but if I wanted to generate a report on only the Watchlists, it is not possible."
"The tool could improve flexibility with the creation of reports/querying data."
"User interface could be more intuitive."
"They could be integrated with CASB."
"De-tokenization."
"We would like to extend the SASE applications for Zscaler."
"Sometimes, support takes time since the solution has some bugs that need fixing."
"They should work on a replica account. There could be alerts and replica files sent to the DLP team during data collection."
"In the next release, I would like to see RE2 Regex supported."
"The interface needs a bit of work."
"The solution needs to improve a lot of aspects."
"Setup is a bit complex because there are many steps that need to be taken before onboarding and activating the solution."
"There could be more DLP-related features. Additionally, there needs to be flexibility for integrating ISP features."
 

Pricing and Cost Advice

"We have not priced the solution recently, but they were competitive with other vendors in the past."
"The overall pricing for iboss is very competitive and transparent."
"It is not expensive, and it is also not cheap. iboss is priced right in the sweet spot for the number of features it offers."
"It is expensive compared to one of its competitors."
"We had the cost of purchasing a new appliance along with the implementation and licensing costs. However, the following year, the cost of just licensing was similar to what was paid the previous year for a new appliance along with the implementation and licensing costs."
"It is probably in line with other solutions, but I do not deal with the financial side."
"Pricing for Skyhigh Security is fine."
"Commercially, I find Skyhigh Security a little costlier, compared to other products such as SentinelOne or Cybereason which are really novelty products. I'm not comparing Skyhigh Security with Trend Micro, but with other products, in particular the new, next-generation products. The price for Skyhigh Security is high in terms of value and ROI. I would rate the product price combined with product efficacy a six out of ten."
"The solution's hardware is expensive."
"Have a risk-based approach towards pricing."
"They definitely charge a huge amount. All the security service providers charge a huge amount."
"It's an expensive solution."
"This is an expensive product, but you have to compare that with other solutions that are on the market."
"The tool is not expensive."
"Zscaler Private Access is extremely expensive."
"It has been relatively reasonable for what it does. Some of the additional license costs based on the advanced next-generation firewall functions are quite high, and they should have certain features ready and available as a baseline rather than having to purchase additional licenses for it. Overall, the cost seems reasonable."
"It is an auto-renewal subscription service."
"The product is a bit expensive."
"Zscaler CASB is an expensive solution."
"It's an affordable solution"
"The cost is expensive. It depends on the number of users."
"Pricing for Zscaler Private Access is moderate. It's acceptable, though I can't give you the exact price currently. It's not too expensive, and on a scale of one to five, I would rate it a four out of five in terms of pricing."
report
Use our free recommendation engine to learn which Secure Access Service Edge (SASE) solutions are best for your needs.
886,174 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
11%
Computer Software Company
9%
Manufacturing Company
9%
Construction Company
7%
Financial Services Firm
14%
Government
11%
Manufacturing Company
9%
Computer Software Company
6%
Financial Services Firm
13%
Manufacturing Company
9%
Computer Software Company
9%
Insurance Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business6
Midsize Enterprise7
Large Enterprise6
By reviewers
Company SizeCount
Small Business30
Midsize Enterprise4
Large Enterprise38
By reviewers
Company SizeCount
Small Business16
Midsize Enterprise12
Large Enterprise44
 

Questions from the Community

What needs improvement with iboss?
For zero trust implementation, we encountered complexity issues, especially with a large infrastructure company Exxon...
What is your primary use case for iboss?
Previously when I used iboss, we did the POC for iboss for ExxonMobil. Four or five people wanted to move from our ol...
What is your experience regarding pricing and costs for iboss?
Regarding pricing, setup costs, and licensing, iboss is not cheap, and that's my only concern. There are cheaper alte...
What needs improvement with McAfee Web Gateway?
When compared to other technologies, Skyhigh Security is quite simple, but if there is any improvement in the GUI, it...
What is your primary use case for McAfee Web Gateway?
I am currently working on Cisco Email Security Gateway, ESA, and I am also exploring Trellix Skyhigh proxy. I have be...
What advice do you have for others considering McAfee Web Gateway?
For IAM, we are using other tools, as we are a financial institution, so we do not go with a single vendor platform. ...
What is the better solution - Prisma Access or Zscaler Private Access?
We looked into Prisma Access before choosing Zscaler Private Access (ZPA). Palo Alto’s Prisma Access is a secure ac...
What needs improvement with Zscaler SASE?
The solution needs to improve a lot of aspects.
What is your primary use case for Zscaler SASE?
We are using Zscaler Zero Trust Exchange for its Zscaler Internet Access service. It provides web security, DLP, data...
 

Also Known As

iBoss Cloud Platform
McAfee MVISION Cloud, McAfee MVISION Unified Cloud Edge, McAfee Web Gateway, McAfee MVISION CNAPP, and Skyhigh Networks, McAfee Web Gateway
Zscaler SASE, Zscaler DLP, Zscaler CASB, Zscaler CSPM, Zscaler Browser Isolation, Zscaler Posture Control
 

Interactive Demo

Demo not available
Demo not available
 

Overview

 

Sample Customers

More than 4,000 global enterprises trust the iboss Cloud Platform to support their modern workforces, including a large number of Fortune 50 companies.
Western Union.Aetna.DirecTV.Adventist.Equinix.Perrigo.Goodyear.HP.Cargill.Sony.Bank of the West.Prudential.
Siemens, AutoNation, GE, NOV
Find out what your peers are saying about Skyhigh Security vs. Zscaler Zero Trust Exchange Platform and other solutions. Updated: March 2026.
886,174 professionals have used our research since 2012.