


Tenable Security Center and Skyhigh Security compete in the cybersecurity solutions category. Tenable Security Center seems to have the upper hand due to its comprehensive vulnerability scanning and customizable policies, which make it a robust choice for enterprises focusing on security threats.
Features: Tenable Security Center offers advanced vulnerability scanning and reporting features like the Assurance Report Card and customizable scanning policies. Its Vulnerability Priority Rating helps in prioritizing risks efficiently. Skyhigh Security excels in providing comprehensive cloud service visibility and risk assessments. Its key features include tools for Shadow IT management and data compliance, offering users insight into both sanctioned and unsanctioned cloud service usage.
Room for Improvement: Tenable Security Center can enhance reporting flexibility and integration with other tools. Its web application scanning and compliance audit modifications need improvement. Skyhigh Security's interface and integration with unsanctioned applications could be improved, along with more comprehensive reporting capabilities and support for custom apps in cloud environments.
Ease of Deployment and Customer Service: Tenable Security Center is typically deployed on-premises, catering to enterprises preferring in-house solutions. While technical support is responsive, delays can occur. Skyhigh Security provides hybrid and cloud deployments, offering flexibility for various environments. Although customer service is good, technical support responsiveness and integration guidance require improvement.
Pricing and ROI: Tenable Security Center is priced higher compared to some competitors like Rapid7, with licensing based on assets potentially becoming costly for large organizations. Its ROI comes from reduced vulnerabilities and streamlined operations. Skyhigh Security offers competitive pricing, particularly with multi-year agreements, and provides options based on user counts or subscription models. Its ROI is justified by enhanced data protection and compliance management.
| Product | Market Share (%) |
|---|---|
| Skyhigh Security | 2.0% |
| Prisma Access by Palo Alto Networks | 12.3% |
| Cato SASE Cloud Platform | 10.2% |
| Other | 75.5% |
| Product | Market Share (%) |
|---|---|
| Tenable Security Center | 9.0% |
| Qualys VMDR | 12.5% |
| Rapid7 InsightVM | 10.8% |
| Other | 67.7% |

| Company Size | Count |
|---|---|
| Small Business | 6 |
| Midsize Enterprise | 6 |
| Large Enterprise | 5 |
| Company Size | Count |
|---|---|
| Small Business | 30 |
| Midsize Enterprise | 4 |
| Large Enterprise | 37 |
| Company Size | Count |
|---|---|
| Small Business | 22 |
| Midsize Enterprise | 10 |
| Large Enterprise | 27 |
Iboss offers a comprehensive cloud-based security platform valued for its scalability and autonomous features, ensuring robust security with easy deployment and management capabilities.
Renowned for its robust security architecture, Iboss integrates seamlessly within diverse networks, delivering efficient granular filtering and advanced content categorization. Its single pane of glass console provides ease of management, allowing rapid scalability suitable for rapidly deploying environments. Operates in BYOD setups due to inline filtering without device installation. Integration with cloud-based applications enhances user control, and features like SASE, SSL inspection, and ChatGPT risk protection stand as highlights. Despite its strengths, users have pointed out areas for enhancement like direct navigation in reports, SSL decryption, and better cloud integration while having room to improve data loss prevention.
What are the most important features of Iboss?The usage of Iboss spans educational institutions, specifically K-12, to enforce internet policies, protect data, and support remote work environments. It provides web filtering and security frameworks to ensure safe browsing. Its platform-as-a-service model offers flexibility for both cloud-based and on-premises requirements, integrating seamlessly to deliver enhanced security features suitable for various deployment needs including zero trust, CASB, and network security for work-from-home setups.
Skyhigh Security protects organizations with cloud-based Zero Trust security solutions that are both data-aware and simple to use. Skyhigh’s Security Service Edge portfolio goes beyond data access and focuses on data use, allowing organizations to collaborate from any device and from anywhere without sacrificing security, while providing the visibility and control required to monitor and mitigate security risks.
The Skyhigh Security Service Edge portfolio includes Skyhigh Secure Web Gateway, Skyhigh Cloud Access Security Broker, Skyhigh Private Access, and Skyhigh Cloud Native Application Protection Platform. All solutions form a fully converged, consolidated platform, and are managed from the same single console.
Skyhigh Security Benefits
Skyhigh Security Features
Get a risk-based view of your IT, security and compliance posture so you can quickly identify, investigate and prioritize your most critical assets and vulnerabilities.
Managed on-premises and powered by Nessus technology, the Tenable Security Center (formerly Tenable.sc) suite of products provides the industry’s most comprehensive vulnerability coverage with real-time continuous assessment of your network. It’s your complete end-to-end vulnerability management solution.
We monitor all Secure Access Service Edge (SASE) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.