Technical Architect at a retailer with 1,001-5,000 employees
Real User
Top 10
2023-01-25T14:51:56Z
Jan 25, 2023
So we are using Skyhigh for SWG and CASB. Those are the two primary use cases. We also use it as a web proxy to allow users to access the internet securely. The product includes content filtering and reporting. In addition, we use McAfee EPO to manage McAfee antivirus and proxy agents.
Our primary use case for Skyhigh Security is ICAP. We're also using it for web proxy and filtering purposes for all internal company websites and user sites such as Microsoft Team filtering.
Sr. Sales Engineer at a tech services company with 11-50 employees
MSP
2022-05-18T08:34:15Z
May 18, 2022
You can connect to SaaS applications, like Workday, Office 365, or Dropbox. There are hundreds of SaaS applications. A remote user can connect to some kind of gateway or be assisted by a gateway connection from his home, and he would then connect through that gateway to a broker, a broker with basically the CASB as a broker, and the broker would then put that layer of security too.
Senior IT Security Consultant at Universal Network Solutions, Inc (UNS)
Consultant
2022-05-03T06:57:06Z
May 3, 2022
MVISION Cloud can be deployed on the cloud and on-premise. I am using MVISION Cloud to have visibility for some CLP rules of the access to Office 365 applications.
If you don't need an on-premises console for central management, this solution works very well. That's its main benefit. It's useful for companies that have a workforce that is dispersed as opposed to in a central location.
Technical Presales Consultant/ Engineer at Ingram Micro
MSP
Top 5
2021-05-08T09:20:41Z
May 8, 2021
The solution is basically it's a cloud access security broker. It's basically the leading cloud access security broker in the market. If you are talking about getting controlling access to AWS, Azure or Google cloud, or most of the major cloud providers, they can integrate that to help protect an organization from data loss, breaches, or from unauthorized access in general.
Lead - Information Security at a tech services company with 10,001+ employees
Real User
2021-02-16T12:21:55Z
Feb 16, 2021
My experience with this product is from an evaluation standpoint. Since everybody is adopting cloud technologies such as SaaS, PaaS, and IaaS, they want to ensure that their data is secure. This product can be used to help people access our cloud applications securely, control users, and manage data movement over the cloud with respect to our data classification policies. We have conducted a PoC but have not used it in our production environment.
Director, GRC Applications and Systems Delivery at Chain-Sys Corporation
Vendor
2019-05-27T16:12:00Z
May 27, 2019
We use this solution as a CASB, a Cloud Access Security Broker, to gain insight into our cloud environment. We integrate this solution for our clients as a companion service to our main cloud product.
Deputy Specialist/Assistant Manager at a tech services company with 10,001+ employees
Real User
2019-02-03T08:26:00Z
Feb 3, 2019
The primary use case is to prevent employees from extracting the data out of their corporate system and getting them outside through Gmail and things like that.
Information Assurance Manager at a transportation company with 10,001+ employees
Real User
2017-11-19T09:51:00Z
Nov 19, 2017
We use it to discover, protect, and permit. Skyhigh for Shadow IT provides us visibility into the Shadow IT. It helps us in blocking high risk services and also in containing the data exfiltration to these high risk services.
Skyhigh Security protects organizations with cloud-based Zero Trust security solutions that are both data-aware and simple to use. Skyhigh’s Security Service Edge portfolio goes beyond data access and focuses on data use, allowing organizations to collaborate from any device and from anywhere without sacrificing security, while providing the visibility and control required to monitor and mitigate security risks.
The Skyhigh Security Service Edge portfolio includes Skyhigh...
I have been implementing this solution for protection as an ERP solution. I've been using it to protect and implement private apps.
So we are using Skyhigh for SWG and CASB. Those are the two primary use cases. We also use it as a web proxy to allow users to access the internet securely. The product includes content filtering and reporting. In addition, we use McAfee EPO to manage McAfee antivirus and proxy agents.
Our primary use case for Skyhigh Security is ICAP. We're also using it for web proxy and filtering purposes for all internal company websites and user sites such as Microsoft Team filtering.
You can connect to SaaS applications, like Workday, Office 365, or Dropbox. There are hundreds of SaaS applications. A remote user can connect to some kind of gateway or be assisted by a gateway connection from his home, and he would then connect through that gateway to a broker, a broker with basically the CASB as a broker, and the broker would then put that layer of security too.
We use it to block malicious IP addresses and check for security leaks.
MVISION Cloud can be deployed on the cloud and on-premise. I am using MVISION Cloud to have visibility for some CLP rules of the access to Office 365 applications.
If you don't need an on-premises console for central management, this solution works very well. That's its main benefit. It's useful for companies that have a workforce that is dispersed as opposed to in a central location.
The solution is basically it's a cloud access security broker. It's basically the leading cloud access security broker in the market. If you are talking about getting controlling access to AWS, Azure or Google cloud, or most of the major cloud providers, they can integrate that to help protect an organization from data loss, breaches, or from unauthorized access in general.
We use the solution for endpoint security.
My experience with this product is from an evaluation standpoint. Since everybody is adopting cloud technologies such as SaaS, PaaS, and IaaS, they want to ensure that their data is secure. This product can be used to help people access our cloud applications securely, control users, and manage data movement over the cloud with respect to our data classification policies. We have conducted a PoC but have not used it in our production environment.
We use this product for enterprise cloud security. My role is in strategy and security.
We use this solution as a CASB, a Cloud Access Security Broker, to gain insight into our cloud environment. We integrate this solution for our clients as a companion service to our main cloud product.
The primary use case is to prevent employees from extracting the data out of their corporate system and getting them outside through Gmail and things like that.
We use it for cloud risk services.
We use it to discover, protect, and permit. Skyhigh for Shadow IT provides us visibility into the Shadow IT. It helps us in blocking high risk services and also in containing the data exfiltration to these high risk services.