User analytics.
IT Security Analyst at a tech services company
The user activity identification in my organization improved
Pros and Cons
- "User analytics."
- "The services take some time to load. It would be helpful if the loading time was reduced."
What is most valuable?
How has it helped my organization?
The user activity identification improved.
What needs improvement?
The services take some time to load. It would be helpful if the loading time was reduced.
For how long have I used the solution?
I have been using it for the past few months.
Buyer's Guide
Skyhigh Security
November 2024
Learn what your peers think about Skyhigh Security. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
824,067 professionals have used our research since 2012.
What was my experience with deployment of the solution?
No issues.
What do I think about the stability of the solution?
No issues.
What do I think about the scalability of the solution?
No issues.
How are customer service and support?
I have not used the support as of now.
Which solution did I use previously and why did I switch?
No.
How was the initial setup?
I was not a part of the initial setup.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Information Security Analyst at a tech services company
The anomalies are key players to identify the intruders in an organization
Pros and Cons
- "DLP policies and anomalies."
- "The Skyhigh for Google Drive interface and policy engine is a bit confusing and limited when compared against other Google Drive CASB capabilities."
What is most valuable?
- Skyhigh's Shadow IT capability
- Cloud Risk Registry
- DLP policies and anomalies
How has it helped my organization?
We are able to see what cloud services are being used with more clarity than with our proxies. More importantly, we can identify that we are using many cloud services in which we were not aware that they were even cloud services, especially collaboration services. The cloud risk registry has been great for getting a quicker and clearer understanding of the risk of proposed services that we are looking at allowing. Previously, we were paying for expensive industry reports.
Finally, anomalies are key players to identify the intruders in an organization.
What needs improvement?
- The Skyhigh for Google Drive interface and policy engine is a bit confusing and limited when compared against other Google Drive CASB capabilities.
- The de-tokenization process
- Data anomalies
For how long have I used the solution?
More than two years.
What was my experience with deployment of the solution?
Yeah, a little bit.
What do I think about the stability of the solution?
Sometimes.
What do I think about the scalability of the solution?
No.
How are customer service and technical support?
Customer Service:
Excellent.
Technical Support:Excellent.
Which solution did I use previously and why did I switch?
No, we haven't
How was the initial setup?
The vendor team was excellent.
What about the implementation team?
Good.
What was our ROI?
Not applicable.
What's my experience with pricing, setup cost, and licensing?
Skyhigh provided a FedRAMP solution, tokenization, a better shadow IT capability, and lower cost.
Which other solutions did I evaluate?
Netskope.
What other advice do I have?
Needs stability and additional new features.
Disclosure: My company has a business relationship with this vendor other than being a customer:
Buyer's Guide
Skyhigh Security
November 2024
Learn what your peers think about Skyhigh Security. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
824,067 professionals have used our research since 2012.
INNOVATOR,ENGINEER,DREAMER! at a tech company with 51-200 employees
For a reasonable price, it enforces data loss prevention
What is most valuable?
- Prevents unauthorized data being shared from external sources.
- Enforces data loss prevention.
- DLP reporting and deep integration.
How has it helped my organization?
- Malware and spam mails
- Attacks from hackers
- Data privacy
What needs improvement?
Detecting threats.
For how long have I used the solution?
One year.
What was my experience with deployment of the solution?
No.
What do I think about the stability of the solution?
No.
What do I think about the scalability of the solution?
No.
How are customer service and technical support?
Customer Service:
A 10 out of 10.
Technical Support:A 10 out of 10.
Which solution did I use previously and why did I switch?
No.
How was the initial setup?
The initial setup was straightforward.
What about the implementation team?
We implemented in-house.
What was our ROI?
Our ROI is 150%.
What's my experience with pricing, setup cost, and licensing?
The pricing is reasonable.
Which other solutions did I evaluate?
No.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Student at Marri Educational Society's Marri Laxman Reddy Institute of Technology and Management at a tech company with 51-200 employees
Provides a perfect level of customer service
Pros and Cons
- "Tokenization."
- "De-tokenization."
What is most valuable?
Tokenization.
How has it helped my organization?
High-risk services.
What needs improvement?
De-tokenization.
For how long have I used the solution?
One year.
What was my experience with deployment of the solution?
No.
What do I think about the stability of the solution?
No.
What do I think about the scalability of the solution?
No.
How are customer service and technical support?
Customer Service:
A 10 out of 10.
Technical Support:An eight out of 10.
Which solution did I use previously and why did I switch?
No.
What about the implementation team?
We implemented in-house.
Disclosure: My company has a business relationship with this vendor other than being a customer:
Attended JNTUH College of Engineering Hyderabad at a tech company with 51-200 employees
It makes our organization's work easier
What is most valuable?
Skyhigh Box
How has it helped my organization?
It makes our work easier.
What needs improvement?
Cloud computing.
For how long have I used the solution?
Almost a year.
What was my experience with deployment of the solution?
No.
What do I think about the stability of the solution?
No.
What do I think about the scalability of the solution?
No.
How are customer service and technical support?
Customer Service:
It is a nine out of 10.
Technical Support:It is a nine out of 10.
Which solution did I use previously and why did I switch?
No.
How was the initial setup?
The initial setup was straightforward.
What about the implementation team?
Implemented in-house.
What was our ROI?
It is confidential.
What's my experience with pricing, setup cost, and licensing?
It is very easy.
Which other solutions did I evaluate?
No.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
-- at a tech company with 51-200 employees
We utilize it to analyse our cloud traffic
What is most valuable?
Sanctioned IT.
How has it helped my organization?
To analyse cloud traffic.
What needs improvement?
Reports.
For how long have I used the solution?
One year.
What was my experience with deployment of the solution?
No.
What do I think about the stability of the solution?
No.
What do I think about the scalability of the solution?
No.
How are customer service and technical support?
Customer Service:
An eight out of 10.
Technical Support:A seven out of 10.
Which solution did I use previously and why did I switch?
No.
What about the implementation team?
Implemented through a vendor team. Their expertise was advanced.
What was our ROI?
Positive.
What's my experience with pricing, setup cost, and licensing?
Go with the licensing.
Which other solutions did I evaluate?
Nope.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Student at a tech company with 51-200 employees
The Shadow IT and Sanctioned IT are the most valuable features
What is most valuable?
- Shadow IT
- Sanctioned IT
How has it helped my organization?
High-risk services
What needs improvement?
De-tokenization.
For how long have I used the solution?
One year.
What was my experience with deployment of the solution?
Yes.
What do I think about the stability of the solution?
No.
What do I think about the scalability of the solution?
Yes.
How are customer service and technical support?
Customer Service:
A six out of 10.
Technical Support:A six out of 10.
Which solution did I use previously and why did I switch?
No.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Download our free Skyhigh Security Report and get advice and tips from experienced pros
sharing their opinions.
Updated: November 2024
Product Categories
Secure Access Service Edge (SASE) Secure Web Gateways (SWG) Cloud Access Security Brokers (CASB) ZTNA as a Service Cloud Security Posture Management (CSPM) Cloud-Native Application Protection Platforms (CNAPP)Popular Comparisons
Cisco Umbrella
Prisma Access by Palo Alto Networks
Zscaler Zero Trust Exchange Platform
Lookout
Netskope
Cloudflare One
Cato SASE Cloud Platform
VMware VeloCloud SD-WAN
Check Point Harmony SASE (formerly Perimeter 81)
Appgate SDP
FortiSASE
Forcepoint ONE
Buyer's Guide
Download our free Skyhigh Security Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Evaluating CASBs. Looking for community feedback on some vendors.
- What is the difference between point solutions (SD-WAN, NGFW, SWG, VPN) and SASE?
- What questions do you need to ask when choosing a Secure Access Service Edge (SASE) solution?
- When evaluating Secure Access Service Edge (SASE), what aspect do you think is the most important to look for?
- Has anyone ever heard of secureaccess.com?
- What is the difference between SASE and SD-WAN?
- What is the difference between SASE and CASB?
- What SASE solution does your company use?
- Why is SASE (Secure Access Service Edge) important?
- What SASE solution do you recommend?