No more typing reviews! Try our Samantha, our new voice AI agent.

Skyhigh Security vs Zscaler Zero Trust Exchange Platform comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Feb 8, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

iboss
Sponsored
Ranking in Cloud Access Security Brokers (CASB)
7th
Ranking in ZTNA as a Service
8th
Ranking in Secure Access Service Edge (SASE)
8th
Average Rating
8.4
Reviews Sentiment
6.9
Number of Reviews
20
Ranking in other categories
Secure Web Gateways (SWG) (5th), Internet Security (3rd), Web Content Filtering (1st)
Skyhigh Security
Ranking in Cloud Access Security Brokers (CASB)
12th
Ranking in ZTNA as a Service
18th
Ranking in Secure Access Service Edge (SASE)
15th
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
57
Ranking in other categories
Secure Web Gateways (SWG) (14th), Data Loss Prevention (DLP) (30th)
Zscaler Zero Trust Exchange...
Ranking in Cloud Access Security Brokers (CASB)
8th
Ranking in ZTNA as a Service
1st
Ranking in Secure Access Service Edge (SASE)
2nd
Average Rating
8.4
Reviews Sentiment
6.9
Number of Reviews
67
Ranking in other categories
Data Loss Prevention (DLP) (6th), Application Control (5th), Remote Browser Isolation (RBI) (1st)
 

Mindshare comparison

As of April 2026, in the Secure Access Service Edge (SASE) category, the mindshare of iboss is 2.5%, up from 1.7% compared to the previous year. The mindshare of Skyhigh Security is 2.2%, up from 2.0% compared to the previous year. The mindshare of Zscaler Zero Trust Exchange Platform is 9.1%, down from 11.5% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Secure Access Service Edge (SASE) Mindshare Distribution
ProductMindshare (%)
Zscaler Zero Trust Exchange Platform9.1%
iboss2.5%
Skyhigh Security2.2%
Other86.2%
Secure Access Service Edge (SASE)
 

Featured Reviews

reviewer2701851 - PeerSpot reviewer
Managing Director
Enhances web security with a single pane of glass and flexible deployment
I don't see any need for improvement; one of the really good things about iboss as a company is that they listen to customer feedback. I have suggested enhancements, and they are responsive, making changes for the better, and they do a lot of testing. To improve iboss, although we haven't used it, we considered the VPN solution that comes with the highest tier licensing, which includes DLP and various other add-ons. We prefer using another product which automatically logs you back onto your network when turning on your PC. With iboss, the connection is manual, which doesn't meet our needs. Additionally, sizing can be tricky because, although the initial recommendations may seem adequate, actual usage may require more gateways than anticipated.
KS
Technical Associate Network Security at Valuepoint Systems
Proxy integration has strengthened email security and centralized monitoring for all branches
We have nearly 900 plus branches here, where we have rerouted our traffic through proxy like Trellix Skyhigh Security. We operate in a major financial sector in India, and that is why we use Skyhigh Security to reroute all our traffic via proxy for our security. Only then will it reach our gateway. We monitor all the URLs and the plant IPs in our proxy. We are tracing those IPs to see whether they have a valid code or not. We also check with Trellix Sandbox to determine whether the URL is malicious or not. Additionally, we have included our Cisco Umbrella with our proxy, so the DNS resolution happens on our Umbrella side. We continuously monitor the traffic on our proxy side. The threat protection feature is a major useful thing because for our 900 branches we monitor with this proxy only. If any issue or any URL does not reach, it is quite helpful to check whether the issue is in the proxy side or in the actual end-user side. It is quite easy to monitor. We do not get all those things from the firewall end, and it is quite easy to gather that information from the proxy, which is a major benefit here. It also majorly helps to hide our actual IPs, as we have directed all the IPs from the proxy, making it very helpful to hide our internal servers.
Vibin Thomas - PeerSpot reviewer
Team Lead, Technical Content Security at Valuepoint Systems
Zero trust access has transformed remote connectivity and now simplifies secure app usage
Zscaler Zero Trust Exchange Platform, especially Zscaler Private Access, is very strong, though there are a few areas where improvements can be made. One challenge observed is around initial troubleshooting and visibility. While Zscaler Private Access provides logs, it can sometimes take time to pinpoint the exact cause of access issues, especially in complex environments with multiple policies and identity integration. Another area is the dependency on identity and connector health. Since Zscaler Private Access is heavily reliant on app connectors and identity providers, any issues with these components can impact user access, making proper monitoring critical. During the initial setup, policy configuration and application onboarding require careful planning, especially for larger environments with many applications. These challenges are manageable with proper design and monitoring. Overall, the platform delivers strong security and user experience. I would recommend a few improvements, especially around user interface, reporting, and troubleshooting experience. From a user interface perspective, while the platform is powerful, the policy configuration and navigation can feel complex, especially for new users. A more simplified and intuitive layout for policy mapping and application access would help reduce the learning curve. In terms of reporting, Zscaler Private Access provides logs, but having more built-in customizable dashboards and analytics would be very helpful. Better visibility into user access patterns, application performance, and real-time troubleshooting insights would improve operational efficiency. From a support and troubleshooting standpoint, it would be beneficial to have more granular centralized visibility, allowing for quick end-to-end tracing of a user request from authentication to application access without switching between multiple views. These improvements would make the platform even more efficient, especially for large-scale enterprise environments.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"iboss has significantly lowered the number of security incidents. It is crazy how much it blocks and how much it is aware of the outside danger."
"iboss is definitely very good in terms of service."
"First of all, the security policies are essential. I do not have to rely solely on Active Directory for our users."
"I would definitely recommend iboss for web filtering purposes to other organizations or individuals."
"It was a very easy product to install. It can be deployed very fast."
"Our primary use case for this product is DLP,"
"Technical support is pretty sharp and very responsive."
"iboss is pretty scalable. They provide good support. The case managers you work with to coordinate what you need are pretty good."
"The ability to identify shadow IT within our environment through proxy log analysis based on risk assessments provided by Skyhigh Registry have been invaluable in helping us reduce our overall data risk."
"The solution is very easy to use, easy to navigate, very stable, scalable, quite flexible, and overall the performance is good."
"As a cloud solution, it's easily scalable."
"Overall, the performance is good."
"It has given us visibility into our employees activities and access to cloud apps."
"I like the encrypted disk feature and the endpoint protection."
"Having full control of infrastructure."
"Data loss prevention and user behavior analysis are two valuable features."
"Overall, Zscaler Zero Trust Exchange Platform, especially Zscaler Private Access, has been a strong and reliable solution for enabling secure access without any need for traditional VPNs."
"From a cost perspective, I would say fair market value, and then from an efficiency perspective, I notice a very good user experience, which is easy to use with Zscaler Zero Trust Exchange Platform."
"What I find most valuable in Zscaler Private Access is that it's a VPN. Its connectivity as a VPN is its most valuable feature."
"The ZPA is a unique feature which offers VPN along with all the additional security needed."
"The solution offers a simplified network infrastructure and security functions and it enables secure remote access for the users"
"Zscaler SASE is probably the number one cloud-based proxy security solution."
"Users get direct secure access to applications over the internet."
"It is easy to use."
 

Cons

"Sometimes the agent stops working in iboss, and we have to reinstall the agent."
"The area I would like to see improvement in is the ability within the reporter to navigate directly to the content the user is traversing."
"The reporting feature needs improvement. It doesn't give you the expected results. It is quite difficult to get the specific reports needed, and it is not as intuitive as the rest of the platform."
"To scale up, a new iboss Node Blade Chassis must be purchased."
"SSL decryption: We had issues with learners using apps instead of using web browsers."
"SSL decryption: We had issues with learners using apps instead of using web browsers. This type of encryption is tough for any appliance in a BYOD environment."
"The dashboards for local use could be better."
"Our iboss subscription access should be more secure with an OTP or VPN etc. It is easy to gain access if, for example, hackers obtain my username and password."
"The cloud needs improvement with respect to DLP."
"The documentation could be improved."
"An area for improvement in Skyhigh Security is its UI. It needs to be enhanced and made more user-friendly. Right now, the UI of Skyhigh Security is sometimes confusing. For example, my company is deploying Skyhigh Security for a client and integrating it on the cloud, from an on-premises deployment to a hybrid deployment. Though the experience isn't bad, there needs to be more enhancements. Another room for improvement in Skyhigh Security is the limited training resources, especially when you compare it with Cisco, which has many study materials in the market, even free training resources. You'll get limited resources if you search for Skyhigh Security tutorials on Google and YouTube. Because of high-security requirements and the training material for Skyhigh Security not being available, most engineers and architects avoid the product because there'd be a lack of knowledge in configuring and achieving the goals you'd want to reach via the use of Skyhigh Security. The NOC team deploying the product is having difficulty getting training resources for Skyhigh Security. You'll be charged an enormous amount if you search the market for training because of the limited resources available. Skyhigh Security needs to work on marketing and awareness as an improvement to the product."
"The virtual solution requires improvement."
"I think it's a very good product although the user interface is not very intuitive and could be improved."
"I would like to see more power being given to the admin."
"The solution has room for improvement in its DDoS protection."
"The encrypted disk implementation could be improved. I currently use it from a dongle or USB key with two-factor authentication to access my computer."
"The granularity in blocking is not sufficient, as new domains are automatically blocked for 30 days without further information."
"Another area of improvement is implementation through non-client connectors. The solution can be implemented in two ways. One uses the back file; the other one uses client connectors. So the client connector is pretty fast, but when it comes to non-client connectors and procedures, it's kind of delayed and slow."
"There could be more DLP-related features. Additionally, there needs to be flexibility for integrating ISP features."
"It needs to offer SSO, single sign-on, and items of that nature."
"More on-prem infrastructure is required when Zscaler Private Access is to be implemented as a single point of entry."
"There are latency issues with the solution. They are small, however, they are there when you compare it to other vendors."
"Sometimes applications crash on some machines, and we’d like Zscaler to give us some information as to why that may have happened."
"There is some issue while accessing the portal. It takes too long."
 

Pricing and Cost Advice

"We have not priced the solution recently, but they were competitive with other vendors in the past."
"We had the cost of purchasing a new appliance along with the implementation and licensing costs. However, the following year, the cost of just licensing was similar to what was paid the previous year for a new appliance along with the implementation and licensing costs."
"It is probably in line with other solutions, but I do not deal with the financial side."
"It is not expensive, and it is also not cheap. iboss is priced right in the sweet spot for the number of features it offers."
"It is expensive compared to one of its competitors."
"The overall pricing for iboss is very competitive and transparent."
"The tool is not expensive."
"This is an expensive product, although it is made for larger enterprises and not for small organizations."
"Commercially, I find Skyhigh Security a little costlier, compared to other products such as SentinelOne or Cybereason which are really novelty products. I'm not comparing Skyhigh Security with Trend Micro, but with other products, in particular the new, next-generation products. The price for Skyhigh Security is high in terms of value and ROI. I would rate the product price combined with product efficacy a six out of ten."
"This is an expensive product, but you have to compare that with other solutions that are on the market."
"The price of the solution is good and we pay an annual license."
"It's an expensive solution."
"The licensing fees are based on what environments you are monitoring."
"They definitely charge a huge amount. All the security service providers charge a huge amount."
"It's expensive currently. But when purchasing for a large number of users, there's room to negotiate. It's really up to the procurement team."
"The technical support is good."
"The product is a bit expensive."
"In the long run, cloud services are not inherently costly."
"Pricing for Zscaler Private Access is moderate. It's acceptable, though I can't give you the exact price currently. It's not too expensive, and on a scale of one to five, I would rate it a four out of five in terms of pricing."
"The cost is expensive. It depends on the number of users."
"The solution is expensive."
"Zscaler DLP solution is expensive, with a fixed pricing structure that is billed annually and monthly. There are no additional costs for licenses."
report
Use our free recommendation engine to learn which Secure Access Service Edge (SASE) solutions are best for your needs.
886,858 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
11%
Computer Software Company
9%
Manufacturing Company
9%
Construction Company
7%
Financial Services Firm
14%
Government
10%
Manufacturing Company
9%
Computer Software Company
6%
Financial Services Firm
13%
Manufacturing Company
9%
Computer Software Company
9%
Insurance Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business7
Midsize Enterprise7
Large Enterprise7
By reviewers
Company SizeCount
Small Business28
Midsize Enterprise6
Large Enterprise38
By reviewers
Company SizeCount
Small Business16
Midsize Enterprise12
Large Enterprise44
 

Questions from the Community

What needs improvement with iboss?
iboss can increase security in cyberspace. I have heard they are doing DDoS filtering, but I am not certain if they a...
What is your primary use case for iboss?
I use iboss for corporate VPN and all the corporate VRF, with basically all user traffic proxying to the internet.
What is your experience regarding pricing and costs for iboss?
Regarding pricing, setup costs, and licensing, iboss is not cheap, and that's my only concern. There are cheaper alte...
What needs improvement with McAfee Web Gateway?
When compared to other technologies, Skyhigh Security is quite simple, but if there is any improvement in the GUI, it...
What is your primary use case for McAfee Web Gateway?
I am currently working on Cisco Email Security Gateway, ESA, and I am also exploring Trellix Skyhigh proxy. I have be...
What advice do you have for others considering McAfee Web Gateway?
For IAM, we are using other tools, as we are a financial institution, so we do not go with a single vendor platform. ...
What is the better solution - Prisma Access or Zscaler Private Access?
We looked into Prisma Access before choosing Zscaler Private Access (ZPA). Palo Alto’s Prisma Access is a secure ac...
What needs improvement with Zscaler SASE?
The solution needs to improve a lot of aspects.
What is your primary use case for Zscaler SASE?
We are using Zscaler Zero Trust Exchange for its Zscaler Internet Access service. It provides web security, DLP, data...
 

Also Known As

iBoss Cloud Platform
McAfee MVISION Cloud, McAfee MVISION Unified Cloud Edge, McAfee Web Gateway, McAfee MVISION CNAPP, and Skyhigh Networks, McAfee Web Gateway
Zscaler SASE, Zscaler DLP, Zscaler CASB, Zscaler CSPM, Zscaler Browser Isolation, Zscaler Posture Control
 

Interactive Demo

Demo not available
Demo not available
 

Overview

 

Sample Customers

More than 4,000 global enterprises trust the iboss Cloud Platform to support their modern workforces, including a large number of Fortune 50 companies.
Western Union.Aetna.DirecTV.Adventist.Equinix.Perrigo.Goodyear.HP.Cargill.Sony.Bank of the West.Prudential.
Siemens, AutoNation, GE, NOV
Find out what your peers are saying about Skyhigh Security vs. Zscaler Zero Trust Exchange Platform and other solutions. Updated: March 2026.
886,858 professionals have used our research since 2012.