- Shadow IT monitoring
- Sanctioned Cloud App Security
Supervisor, IT Security at a healthcare company with 10,001+ employees
It gives us visibility into our employees activities and access to cloud apps
Pros and Cons
- "Shadow IT reporting capabilities."
- "Support for securing more cloud apps."
What is our primary use case?
What is most valuable?
- Shadow IT reporting capabilities
- DLP integration
- Encryption
How has it helped my organization?
It has given us visibility into our employees activities and access to cloud apps.
What needs improvement?
Support for securing more cloud apps.
Buyer's Guide
Skyhigh Security
October 2024
Learn what your peers think about Skyhigh Security. Get advice and tips from experienced pros sharing their opinions. Updated: October 2024.
816,406 professionals have used our research since 2012.
For how long have I used the solution?
Two and a half years.
What was my experience with deployment of the solution?
Some issues, but many had to do with the complexity of our deployment and they all have been worked through.
What do I think about the stability of the solution?
The Shadow IT portion would sometimes stop processing our proxy logs, but these issues seem to have been fixed.
What do I think about the scalability of the solution?
No.
How are customer service and support?
It is excellent and top-notch.
Which solution did I use previously and why did I switch?
No previous solution was used.
How was the initial setup?
For Shadow IT, it was straightforward.
For Sanctioned App Security deployment, it was a bit more complex. This was primarily due to the amount of integrations we decided to do with the existing technologies we owned, like DLP, SSO, etc., and because of the size of our cloud application.
What about the implementation team?
An in-house team.
What was our ROI?
Very good.
What's my experience with pricing, setup cost, and licensing?
I don't deal with pricing. Thus, I cannot answer this.
Which other solutions did I evaluate?
What other advice do I have?
Make sure you plan your deployment carefully. Break the project into phases. This makes for more wins sooner, which you can report to your upper management. Develop a good rapport with the team who owns the cloud application, so you can get full cooperation from them.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Manager Infrastructure Security Engineering at a pharma/biotech company with 1,001-5,000 employees
Once we identified high risk services, we worked with our users to migrate their data to IT sanctioned services, then blocked all high risk services.
Valuable Features:
The ability to identify shadow IT within our environment through proxy log analysis based on risk assessments provided by Skyhigh Registry have been invaluable in helping us reduce our overall data risk
Improvements to My Organization:
Once implemented we were able to identify 100+ high risk cloud services used by our users. Once identified we worked with our users to migrate their data to IT sanctioned services, then blocked all high risk services.
Room for Improvement:
Sometimes the console performance is slow and updating custom attributes can be cumbersome as you have to do each attribute for a cloud service individually, the click the popup box to continue.
The console performance is sometime slow, meaning that switch screens or generating reports can sometime feel sluggish. Data and graphics takes time to load in the browser, and also performance can depend on which browser you are using.
There is a customizable part of the SkyHigh global registry called custom attributes. We use these attributes to identity and record details of our own interactions with the cloud service to show which we are reviewed, which services are approved, blocked, sanctioned, etc.. Entering information into these custom fields requires you to confirm changes for each field individually, a UI improvement could be to add a save or update button to the site instead of doing each field individually.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Skyhigh Security
October 2024
Learn what your peers think about Skyhigh Security. Get advice and tips from experienced pros sharing their opinions. Updated: October 2024.
816,406 professionals have used our research since 2012.
Senior Product Consultant at M.Tech
Protects sensitive information; valuable API
Pros and Cons
- "The feature I found most valuable is the API."
- "I think that the User Interface could be improved."
What is our primary use case?
We are currently using Skyhigh Security with Office 365. We are, however, looking for another similar tool to be able to compare capacities with Skyhigh Security.
Our primary use case is the protection of sensitive information.
What is most valuable?
The feature I found most valuable is the API.
What needs improvement?
I think that the User Interface could be improved.
In the next release, I would like to see some seeking functions so we can see origination.
For how long have I used the solution?
I have been using this solution for about two years.
What do I think about the stability of the solution?
My impression is that the stability of this solution is good.
What do I think about the scalability of the solution?
My impression is that it's easy to scale this solution. In my opinion, this solution is most suitable for medium-sized businesses.
Which solution did I use previously and why did I switch?
We have compared solutions and in our opinion, Skyhigh has a good spot on the market as it's a good solution.
How was the initial setup?
My impression is that the initial setup process is both straightforward and complex.
What other advice do I have?
I would rate this solution as a whole an eight, on a scale from one to 10, with one being the worst and 10 being the best. I would recommend this solution to other people.
Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
Solutions Architect at Credocom A/S
Reports show cloud service usage on our network and give a risk assessment for each cloud service.
What is most valuable?
The most valuable feature of Skyhigh networks is the capability of giving an overview of all active cloud services on our network. Skyhigh analyzes syslog data from our firewall, and returns a report of the cloud service usage on our network. In other words, this takes the 'shadow' out of Shadow IT. It sheds some light on the current situation.
The report returned by Skyhigh not only shows which cloud services are in use, but also gives each individual cloud service a risk assessment in terms of risks associated with the service. The categories are Data Risk, User Risk, Legal Risk and Business Risk. With this overview of the associated risk for cloud services on our network, we can make some very conscious decisions about how we want to shape which services are used on the network. We can make sure that we offer safe alternatives to the services already in use. We want all our users to use cloud services, so that we can stay agile and flexible, but we also want to make sure we don't take any unnecessary risk.
Skyhigh furthers the protection of our sanctioned cloud services. Once we make a decision on which services we feel are a good match for our company, we can add extra protection to those services in the form of monitoring and threat prevention. Skyhigh can make sure that all data we put in our sanctioned cloud service is compliant with our company policy as well, as industry regulations. In other words, if one of our users accidentally puts data in the cloud that isn't compliant, we can remove this data before it causes problems. This is a win for our users and the company as a whole.
Skyhigh also monitors the usage of our sanctioned cloud services. They can spot any abnormal activity, such as users logging in from several different countries in a short period of time, or other suspicious activity.
How has it helped my organization?
We now have a good conscious about using Cloud services. Without an overview, you can only imagine what is going on. With monitoring, analysis and threat prevention, we know exactly what is going on and can prevent activity that we deem unacceptable or creates unnecessary risk. We have a much better overview of where our data is, both in terms of which service, but also in terms of geographical location.
What needs improvement?
The Web UI is still not quite as responsive as we would like. However, in praise of Skyhigh, they have taken this feedback into account. This is their biggest focus area for next major release.
For how long have I used the solution?
I have been using it for one year.
What do I think about the stability of the solution?
In version 2.7, we had a few issues. However, none of these were major, and they were usually fixable within a very short period of time.
What do I think about the scalability of the solution?
We have been able to provide Skyhigh solutions for customers of single office companies, as well as larger global companies, without any issues.
How is customer service and technical support?
Technical support was very good. Our partnership with Skyhigh is extremely close, and their incident response is sublime.
How was the initial setup?
The initial setup is quite easy. You must provide a log sample to Skyhigh, who then make sure their log parser is specifically suited to the customer. Once you have received a tenant, and the parser has been created by Skyhigh, the setup takes approximately one hour.
What's my experience with pricing, setup cost, and licensing?
The Skyhigh licensing model is based on the number of subscriptions of administrative users on the network. There are two separate licenses: Discovery and Secure.
Discovery gives the overview of which Cloud services and on your network. Secure protects your sanctioned Cloud services. We have chosen both, but there is nothing limiting you from running either of the two licenses separately.
If you are currently using a sanctioned Cloud service, then we recommend getting both licenses (Secure and Discover). However, if your company doesn't have an official Cloud service in use, then we recommend only purchasing the Discover license. You can always purchase the Secure license at a later time, if your situation happens to change.
Which other solutions did I evaluate?
We are a consultancy company that wants to get into the CASB area. We did very thorough research on the products that were on the market. We have done this on an ongoing basis to check on the competition. We researched Netskope, Aperture and Elastica thoroughly, before concluding that Skyhigh is the most mature and feature-rich product.
One of the biggest factors in choosing Skyhigh was that Skyhigh integrates with your current infrastructure, rather than adding another agent or needing to send all traffic through a proxy. This simplifies setup, as well as ensuring that the product does not cause bottlenecks. It just adds value to your already existing security infrastructure.
What other advice do I have?
Be prepared to involve management and your HR department. The data presented by Skyhigh, will most likely warrant change, both in terms of company culture, as well as adding restrictions to company policy. Once you have discussed policies and compliance, create some automation flows or workflows to ensure that all unwanted services or risk attributes are added to the block list on a regular basis.
Disclosure: My company has a business relationship with this vendor other than being a customer: We are partners with Skyhigh Networks.
Information Security Leader at Alcaldía de Medellín
Beneficial anti-malware but reporting could improve
Pros and Cons
- "The most valuable features of McAfee Web Gateway are anti-malware, reports, and powerful categorization of web pages."
- "McAfee Web Gateway could improve the reporting. We have the reporting on a separate server and sometimes the database becomes full. These aspects could improve."
What is our primary use case?
McAfee Web Gateway is used as a proxy gateway in our company.
What is most valuable?
The most valuable features of McAfee Web Gateway are anti-malware, reports, and powerful categorization of web pages.
What needs improvement?
McAfee Web Gateway could improve the reporting. We have the reporting on a separate server and sometimes the database becomes full. These aspects could improve.
For how long have I used the solution?
I have been using McAfee Web Gateway for approximately five years.
What do I think about the scalability of the solution?
We have approximately 7,000 users using this solution in my organization.
What about the implementation team?
We implemented McAfee Web Gateway with a partner.
What's my experience with pricing, setup cost, and licensing?
There is an annual licensing cost to use McAfee Web Gateway. The purchasing of licensing can be difficult for the government sector.
There should be a hybrid form of a license model. For example, if I have a user working remotely and another one on-premise, it would be wonderful to have control in the cloud and on-premise.
What other advice do I have?
I rate McAfee Web Gateway a seven out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Network Security Engineer at a consultancy with 11-50 employees
Easy to manage and configure, and useful for web filtering
Pros and Cons
- "The stability is the most valuable feature. We haven't had any issues with the product."
- "They could be integrated with CASB. I think normally McAfee has this solution in the cloud, but for us the best is on-premise."
What is our primary use case?
We use this solution for web filtering.
I integrate and manage the solution. It's deployed on-premises.
What is most valuable?
The stability is the most valuable feature. We haven't had any issues with the product.
It's easy to configure. It's not hard to manage day to day.
What needs improvement?
They could be integrated with CASB. I think normally McAfee has this solution in the cloud, but for us the best is on-premise.
Perhaps in this year's configuration, something that could be added is the SSL inspection.
For how long have I used the solution?
I have been working with this solution for eight years.
What do I think about the scalability of the solution?
The scalability is fine. We work with Fortinet too and Fortinet doesn't work like McAfee. McAfee does more than Fortinet.
How are customer service and support?
Technical support is really great. I would rate them 4 out of 5.
How was the initial setup?
Setup is a little bit complex but I think the environment is complex. We needed help from McAfee and another integrator.
I would rate the complexity of setup 4 out of 5.
What other advice do I have?
I would rate this solution 8 out of 10.
My advice is to discuss your goals before you install the solution because you can do a lot with McAfee Web Gateway.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Vice President - Risk Management, Chief Information Security Officer at a computer software company with 10,001+ employees
Powerful user activity monitoring that includes SSL decryption
Pros and Cons
- "The initial setup is fairly straightforward and easy to perform."
- "The cloud needs improvement with respect to DLP."
What is our primary use case?
We use this solution to protect us against online threats, as well as for user activity monitoring.
What is most valuable?
The most valuable feature is the SSL decryption.
What needs improvement?
The cloud capability needs to be improved in terms of scalability. More generally, both scalability and performance on the cloud need to be improved.
The cloud needs improvement with respect to DLP.
We would like to have integration with Shadow IT analytics.
For how long have I used the solution?
I have been working with the McAfee Web Gateway for five years.
What do I think about the stability of the solution?
This is a stable solution. It is constantly running across the entire enterprise.
What do I think about the scalability of the solution?
Scalability on the cloud is something that needs improvement.
Our company has about 50,000 employees.
How are customer service and technical support?
McAfee's technical support is fairly good.
Which solution did I use previously and why did I switch?
Prior to McAfee, we were using Blue Coat. Two of the important things that Blue Coat was lacking are the SSL description capability and the in-line antivirus. I'm not sure if they have the capability now, but that is the reason that we switched to McAfee.
How was the initial setup?
The initial setup is fairly straightforward and easy to perform.
What about the implementation team?
Our in-house team implemented this solution. The architectural design and implementation were completed with the support and assistance of the McAfee team.
What other advice do I have?
My advice for anybody who is implementing this solution is to use a hybrid model, rather than just something for a specific use case. Otherwise, you won't have a full 360-degree view. Integration with Active Directory is critical, as is the log integration with your SIEM solution. These are key factors that you need to consider.
If I were rating the on-premises and cloud-based features separately, I would give it a nine out of ten on-premises and a seven out of ten for the cloud.
Overall, I would rate this solution an eight out of ten.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Deputy Specialist/Assistant Manager at a tech services company with 10,001+ employees
Prevents you from moving your data outside of the corporate system
Pros and Cons
- "It also prevents you from writing data to your Gmail and does not allow you to move your data outside of the corporate system. That is the most important feature for me."
- "I would like to see more power being given to the admin. In the sense that in case an employee is facing an issue and they want to configure a service, like attaching an email in Gmail, for example, they should be given the option to make the service request and get that configured on the go."
What is our primary use case?
The primary use case is to prevent employees from extracting the data out of their corporate system and getting them outside through Gmail and things like that.
What is most valuable?
Predominantly, there are two valuable features: One is the data loss and the other one is network loss.
It also prevents you from writing data to your Gmail and does not allow you to move your data outside of the corporate system. That is the most important feature for me.
What needs improvement?
I would like to see more power being given to the admin. In the sense that in case an employee is facing an issue and they want to configure a service, like attaching an email in Gmail, for example, they should be given the option to make the service request and get that configured on the go.
What do I think about the stability of the solution?
Stability has been good so far.
What do I think about the scalability of the solution?
We have 14,000 users using this solution, all of the employees in the company. Everybody has it installed on their laptops or their desktops.
What other advice do I have?
I would advise someone considering this solution to configure it the way the OEM advises you. You should have a list of customization.
I would rate it a seven and a half out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Download our free Skyhigh Security Report and get advice and tips from experienced pros
sharing their opinions.
Updated: October 2024
Product Categories
Secure Access Service Edge (SASE) Secure Web Gateways (SWG) Cloud Access Security Brokers (CASB) ZTNA as a Service Cloud Security Posture Management (CSPM) Cloud-Native Application Protection Platforms (CNAPP)Popular Comparisons
Cisco Umbrella
Prisma Access by Palo Alto Networks
Zscaler Zero Trust Exchange Platform
Lookout
Netskope
Cloudflare SASE & SSE Platform
Cato SASE Cloud Platform
VMware VeloCloud SD-WAN
Check Point Harmony SASE (formerly Perimeter 81)
Appgate SDP
FortiSASE
Forcepoint ONE
Buyer's Guide
Download our free Skyhigh Security Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Evaluating CASBs. Looking for community feedback on some vendors.
- What is the difference between point solutions (SD-WAN, NGFW, SWG, VPN) and SASE?
- What questions do you need to ask when choosing a Secure Access Service Edge (SASE) solution?
- When evaluating Secure Access Service Edge (SASE), what aspect do you think is the most important to look for?
- Has anyone ever heard of secureaccess.com?
- What is the difference between SASE and SD-WAN?
- What is the difference between SASE and CASB?
- What SASE solution does your company use?
- Why is SASE (Secure Access Service Edge) important?
- What SASE solution do you recommend?