We use this solution for web filtering.
I integrate and manage the solution. It's deployed on-premises.
We use this solution for web filtering.
I integrate and manage the solution. It's deployed on-premises.
The stability is the most valuable feature. We haven't had any issues with the product.
It's easy to configure. It's not hard to manage day to day.
They could be integrated with CASB. I think normally McAfee has this solution in the cloud, but for us the best is on-premise.
Perhaps in this year's configuration, something that could be added is the SSL inspection.
I have been working with this solution for eight years.
The scalability is fine. We work with Fortinet too and Fortinet doesn't work like McAfee. McAfee does more than Fortinet.
Technical support is really great. I would rate them 4 out of 5.
Setup is a little bit complex but I think the environment is complex. We needed help from McAfee and another integrator.
I would rate the complexity of setup 4 out of 5.
I would rate this solution 8 out of 10.
My advice is to discuss your goals before you install the solution because you can do a lot with McAfee Web Gateway.
McAfee Web Gateway is used as a proxy gateway in our company.
The most valuable features of McAfee Web Gateway are anti-malware, reports, and powerful categorization of web pages.
McAfee Web Gateway could improve the reporting. We have the reporting on a separate server and sometimes the database becomes full. These aspects could improve.
I have been using McAfee Web Gateway for approximately five years.
We have approximately 7,000 users using this solution in my organization.
We implemented McAfee Web Gateway with a partner.
There is an annual licensing cost to use McAfee Web Gateway. The purchasing of licensing can be difficult for the government sector.
There should be a hybrid form of a license model. For example, if I have a user working remotely and another one on-premise, it would be wonderful to have control in the cloud and on-premise.
I rate McAfee Web Gateway a seven out of ten.
We are currently using Skyhigh Security with Office 365. We are, however, looking for another similar tool to be able to compare capacities with Skyhigh Security.
Our primary use case is the protection of sensitive information.
The feature I found most valuable is the API.
I think that the User Interface could be improved.
In the next release, I would like to see some seeking functions so we can see origination.
I have been using this solution for about two years.
My impression is that the stability of this solution is good.
My impression is that it's easy to scale this solution. In my opinion, this solution is most suitable for medium-sized businesses.
We have compared solutions and in our opinion, Skyhigh has a good spot on the market as it's a good solution.
My impression is that the initial setup process is both straightforward and complex.
I would rate this solution as a whole an eight, on a scale from one to 10, with one being the worst and 10 being the best. I would recommend this solution to other people.
It has given us visibility into our employees activities and access to cloud apps.
Support for securing more cloud apps.
Two and a half years.
Some issues, but many had to do with the complexity of our deployment and they all have been worked through.
The Shadow IT portion would sometimes stop processing our proxy logs, but these issues seem to have been fixed.
No.
It is excellent and top-notch.
No previous solution was used.
For Shadow IT, it was straightforward.
For Sanctioned App Security deployment, it was a bit more complex. This was primarily due to the amount of integrations we decided to do with the existing technologies we owned, like DLP, SSO, etc., and because of the size of our cloud application.
An in-house team.
Very good.
I don't deal with pricing. Thus, I cannot answer this.
Make sure you plan your deployment carefully. Break the project into phases. This makes for more wins sooner, which you can report to your upper management. Develop a good rapport with the team who owns the cloud application, so you can get full cooperation from them.
The most valuable feature of Skyhigh networks is the capability of giving an overview of all active cloud services on our network. Skyhigh analyzes syslog data from our firewall, and returns a report of the cloud service usage on our network. In other words, this takes the 'shadow' out of Shadow IT. It sheds some light on the current situation.
The report returned by Skyhigh not only shows which cloud services are in use, but also gives each individual cloud service a risk assessment in terms of risks associated with the service. The categories are Data Risk, User Risk, Legal Risk and Business Risk. With this overview of the associated risk for cloud services on our network, we can make some very conscious decisions about how we want to shape which services are used on the network. We can make sure that we offer safe alternatives to the services already in use. We want all our users to use cloud services, so that we can stay agile and flexible, but we also want to make sure we don't take any unnecessary risk.
Skyhigh furthers the protection of our sanctioned cloud services. Once we make a decision on which services we feel are a good match for our company, we can add extra protection to those services in the form of monitoring and threat prevention. Skyhigh can make sure that all data we put in our sanctioned cloud service is compliant with our company policy as well, as industry regulations. In other words, if one of our users accidentally puts data in the cloud that isn't compliant, we can remove this data before it causes problems. This is a win for our users and the company as a whole.
Skyhigh also monitors the usage of our sanctioned cloud services. They can spot any abnormal activity, such as users logging in from several different countries in a short period of time, or other suspicious activity.
We now have a good conscious about using Cloud services. Without an overview, you can only imagine what is going on. With monitoring, analysis and threat prevention, we know exactly what is going on and can prevent activity that we deem unacceptable or creates unnecessary risk. We have a much better overview of where our data is, both in terms of which service, but also in terms of geographical location.
The Web UI is still not quite as responsive as we would like. However, in praise of Skyhigh, they have taken this feedback into account. This is their biggest focus area for next major release.
I have been using it for one year.
In version 2.7, we had a few issues. However, none of these were major, and they were usually fixable within a very short period of time.
We have been able to provide Skyhigh solutions for customers of single office companies, as well as larger global companies, without any issues.
Technical support was very good. Our partnership with Skyhigh is extremely close, and their incident response is sublime.
The initial setup is quite easy. You must provide a log sample to Skyhigh, who then make sure their log parser is specifically suited to the customer. Once you have received a tenant, and the parser has been created by Skyhigh, the setup takes approximately one hour.
The Skyhigh licensing model is based on the number of subscriptions of administrative users on the network. There are two separate licenses: Discovery and Secure.
Discovery gives the overview of which Cloud services and on your network. Secure protects your sanctioned Cloud services. We have chosen both, but there is nothing limiting you from running either of the two licenses separately.
If you are currently using a sanctioned Cloud service, then we recommend getting both licenses (Secure and Discover). However, if your company doesn't have an official Cloud service in use, then we recommend only purchasing the Discover license. You can always purchase the Secure license at a later time, if your situation happens to change.
We are a consultancy company that wants to get into the CASB area. We did very thorough research on the products that were on the market. We have done this on an ongoing basis to check on the competition. We researched Netskope, Aperture and Elastica thoroughly, before concluding that Skyhigh is the most mature and feature-rich product.
One of the biggest factors in choosing Skyhigh was that Skyhigh integrates with your current infrastructure, rather than adding another agent or needing to send all traffic through a proxy. This simplifies setup, as well as ensuring that the product does not cause bottlenecks. It just adds value to your already existing security infrastructure.
Be prepared to involve management and your HR department. The data presented by Skyhigh, will most likely warrant change, both in terms of company culture, as well as adding restrictions to company policy. Once you have discussed policies and compliance, create some automation flows or workflows to ensure that all unwanted services or risk attributes are added to the block list on a regular basis.
The ability to identify shadow IT within our environment through proxy log analysis based on risk assessments provided by Skyhigh Registry have been invaluable in helping us reduce our overall data risk
Once implemented we were able to identify 100+ high risk cloud services used by our users. Once identified we worked with our users to migrate their data to IT sanctioned services, then blocked all high risk services.
Sometimes the console performance is slow and updating custom attributes can be cumbersome as you have to do each attribute for a cloud service individually, the click the popup box to continue.
The console performance is sometime slow, meaning that switch screens or generating reports can sometime feel sluggish. Data and graphics takes time to load in the browser, and also performance can depend on which browser you are using.
There is a customizable part of the SkyHigh global registry called custom attributes. We use these attributes to identity and record details of our own interactions with the cloud service to show which we are reviewed, which services are approved, blocked, sanctioned, etc.. Entering information into these custom fields requires you to confirm changes for each field individually, a UI improvement could be to add a save or update button to the site instead of doing each field individually.
We use this solution to protect us against online threats, as well as for user activity monitoring.
The most valuable feature is the SSL decryption.
The cloud capability needs to be improved in terms of scalability. More generally, both scalability and performance on the cloud need to be improved.
The cloud needs improvement with respect to DLP.
We would like to have integration with Shadow IT analytics.
I have been working with the McAfee Web Gateway for five years.
This is a stable solution. It is constantly running across the entire enterprise.
Scalability on the cloud is something that needs improvement.
Our company has about 50,000 employees.
McAfee's technical support is fairly good.
Prior to McAfee, we were using Blue Coat. Two of the important things that Blue Coat was lacking are the SSL description capability and the in-line antivirus. I'm not sure if they have the capability now, but that is the reason that we switched to McAfee.
The initial setup is fairly straightforward and easy to perform.
Our in-house team implemented this solution. The architectural design and implementation were completed with the support and assistance of the McAfee team.
My advice for anybody who is implementing this solution is to use a hybrid model, rather than just something for a specific use case. Otherwise, you won't have a full 360-degree view. Integration with Active Directory is critical, as is the log integration with your SIEM solution. These are key factors that you need to consider.
If I were rating the on-premises and cloud-based features separately, I would give it a nine out of ten on-premises and a seven out of ten for the cloud.
Overall, I would rate this solution an eight out of ten.
We have 2 customers using McAfee Web Gateway. It is very useful as a complement to endpoint security. It is used to monitor incoming and outgoing traffic, as well as production.
McAfee has a very strong URL spam filtering feature.
McAfee Web Gateway has two kinds of solutions, one is for on-premises and the other is virtual. Their virtual solution is not as strong as their on-premises solution.
I am a reseller and partner of McAfee. I have been using McAfee Web Gateway for about 5 or 6 years.
It is a very stable solution.
McAfee offers good support.
The initial setup is not straightforward. You must know technology and networking. It would also be helpful if you have some expertise with McAfee products. If you have one person who is certified on McAfee products you can do the setup yourself.
It took approximately 3 days to deploy and implement 2 boxes on-premises. It then takes 5 to 10 days to fine-tune it. In total it takes about two weeks to set up.
Compared to other solutions and their prices, it is a bit on the costly side. However, it is not out of reach. Our customers pay a yearly license.
Although it is costly, I would recommend this solution to anyone. I would rate it a 9 out of 10.