


Skyhigh Security and Symantec CloudSOC CASB are competing cloud access security brokers. Symantec CloudSOC CASB has an upper hand in integrated security features, whereas Skyhigh Security is appreciated for its pricing and customer support.
Features: Skyhigh Security offers robust access control, data protection, and analytics capabilities. Symantec CloudSOC CASB provides advanced threat protection, comprehensive data security, and seamless integration with other Symantec products.
Room for Improvement: Skyhigh Security could enhance its SD-WAN capabilities and scalability options. Users also mention a need for more on-premises storage support and sophisticated threat analysis tools. Symantec CloudSOC CASB might benefit from simplifying its integration process, reducing setup costs, and streamlining documentation to aid deployment.
Ease of Deployment and Customer Service: Symantec CloudSOC CASB offers a streamlined deployment model but requires additional configuration expertise. Its support is well-regarded yet could be complex. Skyhigh Security provides simpler deployment options and proactive customer service, suitable for varying IT infrastructure levels.
Pricing and ROI: Skyhigh Security is noted for its cost-effectiveness, with transparent pricing leading to faster ROI. Symantec CloudSOC CASB has higher setup costs but offers extensive security features, promising long-term value for comprehensive protection.
| Product | Mindshare (%) |
|---|---|
| iboss | 4.0% |
| Skyhigh Security | 3.9% |
| Symantec CloudSOC CASB | 1.0% |
| Other | 91.1% |

| Company Size | Count |
|---|---|
| Small Business | 6 |
| Midsize Enterprise | 7 |
| Large Enterprise | 8 |
| Company Size | Count |
|---|---|
| Small Business | 28 |
| Midsize Enterprise | 6 |
| Large Enterprise | 38 |
Iboss offers a comprehensive cloud-based security platform valued for its scalability and autonomous features, ensuring robust security with easy deployment and management capabilities.
Renowned for its robust security architecture, Iboss integrates seamlessly within diverse networks, delivering efficient granular filtering and advanced content categorization. Its single pane of glass console provides ease of management, allowing rapid scalability suitable for rapidly deploying environments. Operates in BYOD setups due to inline filtering without device installation. Integration with cloud-based applications enhances user control, and features like SASE, SSL inspection, and ChatGPT risk protection stand as highlights. Despite its strengths, users have pointed out areas for enhancement like direct navigation in reports, SSL decryption, and better cloud integration while having room to improve data loss prevention.
What are the most important features of Iboss?The usage of Iboss spans educational institutions, specifically K-12, to enforce internet policies, protect data, and support remote work environments. It provides web filtering and security frameworks to ensure safe browsing. Its platform-as-a-service model offers flexibility for both cloud-based and on-premises requirements, integrating seamlessly to deliver enhanced security features suitable for various deployment needs including zero trust, CASB, and network security for work-from-home setups.
Skyhigh Security provides comprehensive protection with features like user behavior analytics, shadow IT identification, and data loss prevention. Its integration with IT infrastructure offers robust security insights and helps maintain compliance.
Skyhigh Security offers a user-friendly interface that simplifies navigation while delivering substantial threat protection. It enhances existing IT infrastructure integration, such as DLP and Active Directory, to strengthen security. Yet, there is room for improvement in report generation speed, interface intuitiveness, and integration with other products. Organizations utilize Skyhigh Security to audit internet behavior, secure cloud environments and control web content. It effectively manages data movement and ensures compliance, while preventing unauthorized access and bandwidth misuse.
What are the key features of Skyhigh Security?In sectors like finance, healthcare, and technology, companies implement Skyhigh Security for its comprehensive monitoring capabilities. It helps secure access to SaaS applications and protects against threats, ensuring adherence to regulatory requirements and preventing data breaches while optimizing performance in cloud environments.
Symantec CloudSOC CASB is a cloud security platform that delivers robust monitoring and threat detection capabilities. It integrates seamlessly with on-premises DLP for consistent policy application across hybrid environments, providing effective management of cloud-based resources and ensuring security compliance.
Designed for enterprises transitioning to cloud environments, Symantec CloudSOC CASB offers powerful tools for monitoring and controlling sensitive data. It effectively integrates with active directory for streamlined user management, enabling secure access control. Enterprises leverage its capabilities to block unauthorized activities and protect sensitive information as they adapt to cloud services, benefiting from reliable logging and hybrid policy management. While scalability and integration with existing systems are strong suits, there's potential for enhanced data security, endpoint solution integration, and improved Azure AD connectivity.
What are the key features of Symantec CloudSOC CASB?Organizations in industries such as finance, healthcare, and technology implement Symantec CloudSOC CASB to manage cloud migrations securely. They utilize its modules like Securelet and Gatelet to prevent data leakage, control shadow IT, and regulate access to cloud collaboration tools like Office 365. By establishing keyword-based policies, they monitor uploads, effectively addressing shadow data concerns and reinforcing data security during cloud adoption.
We monitor all Cloud Access Security Brokers (CASB) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.