I like the encrypted disk feature and the endpoint protection.
Consultor de Soluções at a tech services company with 10,001+ employees
Is stable and has an encrypted disk feature
Pros and Cons
- "I like the encrypted disk feature and the endpoint protection."
- "The encrypted disk implementation could be improved. I currently use it from a dongle or USB key with two-factor authentication to access my computer."
What is most valuable?
What needs improvement?
The encrypted disk implementation could be improved. I currently use it from a dongle or USB key with two-factor authentication to access my computer.
For how long have I used the solution?
I've been using MVISION Cloud for seven months.
What do I think about the stability of the solution?
It is a very stable solution.
Buyer's Guide
Skyhigh Security
April 2025

Learn what your peers think about Skyhigh Security. Get advice and tips from experienced pros sharing their opinions. Updated: April 2025.
851,823 professionals have used our research since 2012.
What do I think about the scalability of the solution?
We've had problems with scalability. We have 2000 users.
How are customer service and support?
Technical support has been fast.
How was the initial setup?
The initial setup was very complex from a rules point of view. There were problems with integration to the cloud and connecting to EIM solutions.
What other advice do I have?
There are three other good products: Carbon Black, CrowdStrike, and SentinelOne. I think Carbon Black is the best, and I would rate MVISION Cloud at nine on a scale from one to ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.

Security Engineer at a tech services company with 201-500 employees
Very sophisticated with great anti-virus filtering, URL categorization, and reporting capabilities
Pros and Cons
- "Good anti-virus filtering, URL categorization, and reporting capabilities."
- "User interface could be more intuitive."
What is our primary use case?
This is a web security product, it controls the usage of web for employees. There is an integral anti-virus and web URL filtering solution. I've used the solution in multiple companies that I worked in, and for the last six months I have a new company and I sell the solution along with other security products. I'm a security engineer.
What is most valuable?
I like the anti-virus filtering, URL categorization, and reporting capabilities. I also like the ability to control what kinds of files or content can be downloaded. So you can restrict executables and potential harmful files. It's a very sophisticated and mature solution.
What needs improvement?
I think it's a very good product although the user interface is not very intuitive and could be improved. Because of its sophistication, it's not so easy to manage and you have to learn to use it well. The solution can't really be simplified because then it would not be so customizable. You have to know what you're doing. If you don't know about filtering, you won't be able to use it well. I also think that the URL filter model and the web application filter model should be more tightly coupled but it's a lot of effort to get them to work together, not an easy problem. It's two different models - URL filtering and web application filtering.
For how long have I used the solution?
I've been using this solution for nine years.
What do I think about the scalability of the solution?
Scalability is no problem. It is cluster able so I can use many devices. We have small companies in Hungary, usually some 1000 users, but we have one simple appliance. It can deal with many users. I assume even 50,000 users would not be a problem for this product.
How are customer service and technical support?
I've used technical support rarely but when we've had an issue they respond relatively quickly and they know what to do. I like them.
Which solution did I use previously and why did I switch?
I have seen other products like Websense, which is Forcepoint now, and McAfee Web Gateway which is better than Websense, I think. The features are generally the same, but McAfee is easier to manage and maintain, easier to overview. It also has better debugging capabilities and better logging.
How was the initial setup?
The initial setup is very, very straightforward. I think it's one of the best.
What other advice do I have?
I would definitely recommend this solution and would rate it a 10 out of 10.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Skyhigh Security
April 2025

Learn what your peers think about Skyhigh Security. Get advice and tips from experienced pros sharing their opinions. Updated: April 2025.
851,823 professionals have used our research since 2012.
Information Security Analyst at a security firm with 1,001-5,000 employees
It has improve my organization through identification of user activity and login activity
What is most valuable?
- Tokenization
- User analytics
How has it helped my organization?
- Identification of user activity
- Login information
What needs improvement?
De-tokenization.
For how long have I used the solution?
More than one year.
What was my experience with deployment of the solution?
Not for now.
What do I think about the stability of the solution?
No.
What do I think about the scalability of the solution?
No.
How are customer service and technical support?
Customer Service:
Good.
Technical Support:Good.
Which solution did I use previously and why did I switch?
No.
How was the initial setup?
Straightforward.
What about the implementation team?
We used a vendor team.
What was our ROI?
I do not know.
What's my experience with pricing, setup cost, and licensing?
It is affordable. Skyhigh has some good features.
Which other solutions did I evaluate?
No.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Delivery Engineer at a tech services company with 11-50 employees
Reasonably priced with helpful support and good security
Pros and Cons
- "The management is very good."
- "The secure gateway could be improved."
What is our primary use case?
I have been implementing this solution for protection as an ERP solution. I've been using it to protect and implement private apps.
What is most valuable?
The broader solution is quite useful. They provide service management for a variety of environments, including Office 365, Google, AWS, and Azure.
It offers very good protection overall.
The management is very good.
We're able to provide the customer with best practices for coding.
It is a stable product.
Technical support is helpful.
The pricing is reasonable.
What needs improvement?
The secure gateway could be improved. If they worked on that they would be more competitive.
They should offer more learning opportunities. If they could provide tools to help users interested in learning more about the technology, that would be ideal.
For how long have I used the solution?
I'd rate the solution for around one year or maybe a bit less.
What do I think about the stability of the solution?
We have been facing some stability issues. However, via the support team, we're doing okay. It provides accurate warnings if there are some maintenance windows or service upgrades. It helps prevent unexpected disruption.
What do I think about the scalability of the solution?
I haven't really attempted to scale the solution.
How are customer service and support?
Technical support is excellent. They are very helpful and responsive. I have no complaints about their level of service.
How was the initial setup?
The initial setup is very straightforward and simple. I'd rate the ease of implementation nine out of ten. It's not overly complex.
What's my experience with pricing, setup cost, and licensing?
The pricing is good and the licensing is straightforward. I'd rate the affordability nine out of ten.
What other advice do I have?
I'd rate the solution eight out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Information Assurance Manager at a transportation company with 10,001+ employees
An innovative, dynamic tool which helps block high risk services
Pros and Cons
- "It help us monitor high risk services, blocking them, and also feeding them to our egress points."
- "Needs integration with other technology ecosystems."
What is our primary use case?
We use it to discover, protect, and permit.
Skyhigh for Shadow IT provides us visibility into the Shadow IT. It helps us in blocking high risk services and also in containing the data exfiltration to these high risk services.
How has it helped my organization?
It help us monitor high risk services, blocking them, and also feeding them to our egress points.
What is most valuable?
The risk management feature.
What needs improvement?
Integration with other technology ecosystems.
For how long have I used the solution?
Three to five years.
What do I think about the stability of the solution?
Initially, there were stability issues, but now it is perfect.
What do I think about the scalability of the solution?
No scalability issues.
How are customer service and technical support?
The support team is very good.
Which solution did I use previously and why did I switch?
We did not previously use a different solution.
How was the initial setup?
The initial setup was okay.
What about the implementation team?
The implementation team was proficient.
What's my experience with pricing, setup cost, and licensing?
Have a risk-based approach towards pricing.
Which other solutions did I evaluate?
There were none to evaluate at that time.
What other advice do I have?
It is an innovative, dynamic tool.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Cyber Security Analyst at a tech services company
Skyhigh's shadow IT capability and cloud risk registry are the two most helpful tools for our organization.
What is most valuable?
Skyhigh's shadow IT capability and cloud risk registry are the two most helpful tools for our organization.
How has it helped my organization?
We are able to see what cloud services are being used with much more clarity than with our proxies and more importantly identify that we are using many cloud services we were not aware were even cloud services. Especially collaboration services. The cloud risk registry has been great for getting a quick and clearer understanding of the risk of proposed services that we are looking at allowing. Previously we were paying for expensive industry reports.
What needs improvement?
The Skyhigh for Google Drive interface and policy engine is a bit confusing and limited when compared against other Google Drive CASB capabilities.
What was my experience with deployment of the solution?
We deployed the FedRAMP GovCloud version, which was not quite up to date with the mainstream version and still had some bugs to work out. Some other features are still in the works. We also found that it is important to ensure your inputs to the system are all uniform as it would have made for a more rapid deployment.
How are customer service and technical support?
Customer Service:
Excellent.
Technical Support:Excellent.
Which solution did I use previously and why did I switch?
Skyhigh provided a FedRAMP solution, tokenization, a better shadow IT capability, and lower cost.
What about the implementation team?
The vendor team was excellent.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
INNOVATOR,ENGINEER,DREAMER! at a tech company with 51-200 employees
Initial setup is straightforward as their guidelines and instructions are very easy to follow
Pros and Cons
- "Box API features with DLP capabilities."
- "SkyHigh has the ability to place users or groups on a ‘Watchlist’; which allows you to see certain views with these Watchlists users/groups in them. This is great when you are looking at live data but if I wanted to generate a report on "only" the watchlists."
What is most valuable?
- Box API features with DLP capabilities
- Shadow IT
How has it helped my organization?
Our organization is moving much of its non-sensitive data to Box. We needed the ability to have full visibility into what was occurring within the Box infrastructure, from Skyhigh to Box API integration.
What needs improvement?
SkyHigh has the ability to place users or groups on a ‘Watchlist’; which allows you to see certain views with these Watchlists users/groups in them. This is great when you are looking at live data but if I wanted to generate a report on "only" the watchlists.
For how long have I used the solution?
Two and a half years.
What was my experience with deployment of the solution?
No.
What do I think about the stability of the solution?
Skyhigh has been improving their product and releasing upgrades on a consistent basis. Now, the stability and speed are greatly improved. Looking forward to their next major release.
What do I think about the scalability of the solution?
No, since I am able to use my blue coat logs.
How are customer service and technical support?
Customer Service:
A 10 out of 10
Technical Support:A nine out of 10.
Which solution did I use previously and why did I switch?
No.
How was the initial setup?
Straightforward. Guidelines and instructions are very easy to follow.
What about the implementation team?
Our implementation was in-house. Since the deployment of this cloud access security broker (CASB) was rather simple, there was no need to bring in a third-party vendor.
What's my experience with pricing, setup cost, and licensing?
The biggest thing to watch for is the difference in price per monitored user for the different API integrations. We currently only use the Box API, but we thought about using the Salesforce one. However, it was drastically more expensive per user. We are starting to look at the 365 monitoring since we may migrate there soon, but I have not looked at the pricing for it yet.
Which other solutions did I evaluate?
No.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Information Security Analyst at a tech services company
The anomalies are key players to identify the intruders in an organization
Pros and Cons
- "DLP policies and anomalies."
- "The Skyhigh for Google Drive interface and policy engine is a bit confusing and limited when compared against other Google Drive CASB capabilities."
What is most valuable?
- Skyhigh's Shadow IT capability
- Cloud Risk Registry
- DLP policies and anomalies
How has it helped my organization?
We are able to see what cloud services are being used with more clarity than with our proxies. More importantly, we can identify that we are using many cloud services in which we were not aware that they were even cloud services, especially collaboration services. The cloud risk registry has been great for getting a quicker and clearer understanding of the risk of proposed services that we are looking at allowing. Previously, we were paying for expensive industry reports.
Finally, anomalies are key players to identify the intruders in an organization.
What needs improvement?
- The Skyhigh for Google Drive interface and policy engine is a bit confusing and limited when compared against other Google Drive CASB capabilities.
- The de-tokenization process
- Data anomalies
For how long have I used the solution?
More than two years.
What was my experience with deployment of the solution?
Yeah, a little bit.
What do I think about the stability of the solution?
Sometimes.
What do I think about the scalability of the solution?
No.
How are customer service and technical support?
Customer Service:
Excellent.
Technical Support:Excellent.
Which solution did I use previously and why did I switch?
No, we haven't
How was the initial setup?
The vendor team was excellent.
What about the implementation team?
Good.
What was our ROI?
Not applicable.
What's my experience with pricing, setup cost, and licensing?
Skyhigh provided a FedRAMP solution, tokenization, a better shadow IT capability, and lower cost.
Which other solutions did I evaluate?
Netskope.
What other advice do I have?
Needs stability and additional new features.
Disclosure: My company has a business relationship with this vendor other than being a customer:

Buyer's Guide
Download our free Skyhigh Security Report and get advice and tips from experienced pros
sharing their opinions.
Updated: April 2025
Product Categories
Secure Access Service Edge (SASE) Secure Web Gateways (SWG) Data Loss Prevention (DLP) Cloud Access Security Brokers (CASB) ZTNA as a ServicePopular Comparisons
Cisco Umbrella
Prisma Access by Palo Alto Networks
Zscaler Internet Access
Zscaler Zero Trust Exchange Platform
Lookout
Microsoft Defender for Cloud Apps
Cloudflare One
Netskope
Cato SASE Cloud Platform
Check Point Harmony SASE (formerly Perimeter 81)
FortiSASE
VMware VeloCloud SD-WAN
Appgate SDP
Fortinet FortiGate SWG
Buyer's Guide
Download our free Skyhigh Security Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Evaluating CASBs. Looking for community feedback on some vendors.
- What is the difference between point solutions (SD-WAN, NGFW, SWG, VPN) and SASE?
- What questions do you need to ask when choosing a Secure Access Service Edge (SASE) solution?
- When evaluating Secure Access Service Edge (SASE), what aspect do you think is the most important to look for?
- Has anyone ever heard of secureaccess.com?
- What is the difference between SASE and SD-WAN?
- What is the difference between SASE and CASB?
- What SASE solution does your company use?
- Why is SASE (Secure Access Service Edge) important?
- What SASE solution do you recommend?