The user analytics.
Information Security Lead Analyst at a healthcare company with 1,001-5,000 employees
We have been able to analyse our user activity, which has helped us to identify the associated risks
Pros and Cons
- "We were able to analyse our user activity, which helped us to identify the associated risks."
- "Improve the user interface (UI) of the tool and make it user-friendly."
What is most valuable?
How has it helped my organization?
We were able to analyse our user activity, which helped us to identify the associated risks.
What needs improvement?
Improve the user interface (UI) of the tool and make it user-friendly.
For how long have I used the solution?
Three years.
Buyer's Guide
Skyhigh Security
February 2026
Learn what your peers think about Skyhigh Security. Get advice and tips from experienced pros sharing their opinions. Updated: February 2026.
884,873 professionals have used our research since 2012.
What was my experience with deployment of the solution?
Yes.
What do I think about the stability of the solution?
Yes.
What do I think about the scalability of the solution?
Yes.
How are customer service and support?
Customer Service:
A six out of 10.
Technical Support:A seven out of 10.
Which solution did I use previously and why did I switch?
No.
How was the initial setup?
I was not part of the setup.
What about the implementation team?
A vendor team did the implementation. I would give them a seven out of 10 on their expertise.
What was our ROI?
I have no idea of what it is.
Which other solutions did I evaluate?
No.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Attended JNTUH College of Engineering Hyderabad at a tech company with 51-200 employees
It makes our organization's work easier
Pros and Cons
- "It makes our work easier."
What is most valuable?
Skyhigh Box
How has it helped my organization?
It makes our work easier.
What needs improvement?
Cloud computing.
For how long have I used the solution?
Almost a year.
What was my experience with deployment of the solution?
No.
What do I think about the stability of the solution?
No.
What do I think about the scalability of the solution?
No.
How are customer service and technical support?
Customer Service:
It is a nine out of 10.
Technical Support:It is a nine out of 10.
Which solution did I use previously and why did I switch?
No.
How was the initial setup?
The initial setup was straightforward.
What about the implementation team?
Implemented in-house.
What was our ROI?
It is confidential.
What's my experience with pricing, setup cost, and licensing?
It is very easy.
Which other solutions did I evaluate?
No.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Skyhigh Security
February 2026
Learn what your peers think about Skyhigh Security. Get advice and tips from experienced pros sharing their opinions. Updated: February 2026.
884,873 professionals have used our research since 2012.
-- at a tech company with 51-200 employees
We utilize it to analyse our cloud traffic
Pros and Cons
- "The return on investment has been positive."
- "Reports."
What is most valuable?
Sanctioned IT.
How has it helped my organization?
To analyse cloud traffic.
What needs improvement?
Reports.
For how long have I used the solution?
One year.
What was my experience with deployment of the solution?
No.
What do I think about the stability of the solution?
No.
What do I think about the scalability of the solution?
No.
How are customer service and technical support?
Customer Service:
An eight out of 10.
Technical Support:A seven out of 10.
Which solution did I use previously and why did I switch?
No.
What about the implementation team?
Implemented through a vendor team. Their expertise was advanced.
What was our ROI?
Positive.
What's my experience with pricing, setup cost, and licensing?
Go with the licensing.
Which other solutions did I evaluate?
Nope.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Information Security Analyst at a security firm with 1,001-5,000 employees
It has improve my organization through identification of user activity and login activity
Pros and Cons
- "It is affordable."
- "De-tokenization."
What is most valuable?
- Tokenization
- User analytics
How has it helped my organization?
- Identification of user activity
- Login information
What needs improvement?
De-tokenization.
For how long have I used the solution?
More than one year.
What was my experience with deployment of the solution?
Not for now.
What do I think about the stability of the solution?
No.
What do I think about the scalability of the solution?
No.
How are customer service and technical support?
Customer Service:
Good.
Technical Support:Good.
Which solution did I use previously and why did I switch?
No.
How was the initial setup?
Straightforward.
What about the implementation team?
We used a vendor team.
What was our ROI?
I do not know.
What's my experience with pricing, setup cost, and licensing?
It is affordable. Skyhigh has some good features.
Which other solutions did I evaluate?
No.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
INNOVATOR,ENGINEER,DREAMER! at a tech company with 51-200 employees
Initial setup is straightforward as their guidelines and instructions are very easy to follow
Pros and Cons
- "Box API features with DLP capabilities."
- "Now, the stability and speed are greatly improved."
- "SkyHigh has the ability to place users or groups on a ‘Watchlist’; which allows you to see certain views with these Watchlists users/groups in them. This is great when you are looking at live data but if I wanted to generate a report on "only" the watchlists."
- "SkyHigh has the ability to place users or groups on a ‘Watchlist’; which allows you to see certain views with these Watchlists users/groups in them, but if I wanted to generate a report on only the Watchlists, it is not possible."
What is most valuable?
- Box API features with DLP capabilities
- Shadow IT
How has it helped my organization?
Our organization is moving much of its non-sensitive data to Box. We needed the ability to have full visibility into what was occurring within the Box infrastructure, from Skyhigh to Box API integration.
What needs improvement?
SkyHigh has the ability to place users or groups on a ‘Watchlist’; which allows you to see certain views with these Watchlists users/groups in them. This is great when you are looking at live data but if I wanted to generate a report on "only" the watchlists.
For how long have I used the solution?
Two and a half years.
What was my experience with deployment of the solution?
No.
What do I think about the stability of the solution?
Skyhigh has been improving their product and releasing upgrades on a consistent basis. Now, the stability and speed are greatly improved. Looking forward to their next major release.
What do I think about the scalability of the solution?
No, since I am able to use my blue coat logs.
How are customer service and technical support?
Customer Service:
A 10 out of 10
Technical Support:A nine out of 10.
Which solution did I use previously and why did I switch?
No.
How was the initial setup?
Straightforward. Guidelines and instructions are very easy to follow.
What about the implementation team?
Our implementation was in-house. Since the deployment of this cloud access security broker (CASB) was rather simple, there was no need to bring in a third-party vendor.
What's my experience with pricing, setup cost, and licensing?
The biggest thing to watch for is the difference in price per monitored user for the different API integrations. We currently only use the Box API, but we thought about using the Salesforce one. However, it was drastically more expensive per user. We are starting to look at the 365 monitoring since we may migrate there soon, but I have not looked at the pricing for it yet.
Which other solutions did I evaluate?
No.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Student at a tech company with 51-200 employees
The Shadow IT and Sanctioned IT are the most valuable features
Pros and Cons
- "Shadow IT Sanctioned IT."
- "Customer Service: A six out of 10. Technical Support: A six out of 10."
What is most valuable?
- Shadow IT
- Sanctioned IT
How has it helped my organization?
High-risk services
What needs improvement?
De-tokenization.
For how long have I used the solution?
One year.
What was my experience with deployment of the solution?
Yes.
What do I think about the stability of the solution?
No.
What do I think about the scalability of the solution?
Yes.
How are customer service and technical support?
Customer Service:
A six out of 10.
Technical Support:A six out of 10.
Which solution did I use previously and why did I switch?
No.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Information Security Analyst at a tech services company
The anomalies are key players to identify the intruders in an organization
Pros and Cons
- "DLP policies and anomalies."
- "We are able to see what cloud services are being used with more clarity than with our proxies."
- "The Skyhigh for Google Drive interface and policy engine is a bit confusing and limited when compared against other Google Drive CASB capabilities."
- "The Skyhigh for Google Drive interface and policy engine is a bit confusing and limited when compared against other Google Drive CASB capabilities."
What is most valuable?
- Skyhigh's Shadow IT capability
- Cloud Risk Registry
- DLP policies and anomalies
How has it helped my organization?
We are able to see what cloud services are being used with more clarity than with our proxies. More importantly, we can identify that we are using many cloud services in which we were not aware that they were even cloud services, especially collaboration services. The cloud risk registry has been great for getting a quicker and clearer understanding of the risk of proposed services that we are looking at allowing. Previously, we were paying for expensive industry reports.
Finally, anomalies are key players to identify the intruders in an organization.
What needs improvement?
- The Skyhigh for Google Drive interface and policy engine is a bit confusing and limited when compared against other Google Drive CASB capabilities.
- The de-tokenization process
- Data anomalies
For how long have I used the solution?
More than two years.
What was my experience with deployment of the solution?
Yeah, a little bit.
What do I think about the stability of the solution?
Sometimes.
What do I think about the scalability of the solution?
No.
How are customer service and technical support?
Customer Service:
Excellent.
Technical Support:Excellent.
Which solution did I use previously and why did I switch?
No, we haven't
How was the initial setup?
The vendor team was excellent.
What about the implementation team?
Good.
What was our ROI?
Not applicable.
What's my experience with pricing, setup cost, and licensing?
Skyhigh provided a FedRAMP solution, tokenization, a better shadow IT capability, and lower cost.
Which other solutions did I evaluate?
Netskope.
What other advice do I have?
Needs stability and additional new features.
Disclosure: My company has a business relationship with this vendor other than being a customer.
IT Security Support Analyst with 5,001-10,000 employees
Provides quite a bit of visibility into cloud services being utilized in our environment
Pros and Cons
- "All the information available on each service, including its risk assessment."
- "Provides quite a bit of visibility into cloud services being utilized in our environment."
- "Iron out the few bugs that I've seen."
- "Iron out the few bugs that I've seen."
What is most valuable?
All the information available on each service, including its risk assessment. Service groups, automatic assignment of services based on designated conditions, and the ability to utilize multiple log sources for the data.
How has it helped my organization?
Provides quite a bit of visibility into cloud services being utilized in our environment. I've been able to take the data available in Skyhigh and create discussions about whether we should be allowing or blocking certain services. This has also allowed us to start developing policies/procedures around new services which get introduced into our environment.
What needs improvement?
Iron out the few bugs that I've seen.
For how long have I used the solution?
Less than one year.
What was my experience with deployment of the solution?
None that I'm aware of.
What do I think about the stability of the solution?
No issues with stability.
What do I think about the scalability of the solution?
No issues with scalability.
How are customer service and technical support?
Customer Service:
A 10 out of 10.
Technical Support:A 10 out of 10.
Which solution did I use previously and why did I switch?
We did not previously use a different solution.
How was the initial setup?
Unknown, as I was not involved in the setup process.
What about the implementation team?
Unknown, as I was not involved in the procurement process.
What was our ROI?
Unfortunately, I don't have this information.
Which other solutions did I evaluate?
Not applicable, as I was not involved in the decision to go with this product.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free Skyhigh Security Report and get advice and tips from experienced pros
sharing their opinions.
Updated: February 2026
Product Categories
Secure Access Service Edge (SASE) Secure Web Gateways (SWG) Data Loss Prevention (DLP) Cloud Access Security Brokers (CASB) ZTNA as a ServicePopular Comparisons
Fortinet FortiGate
Cisco Umbrella
Prisma Access by Palo Alto Networks
Cloudflare One
Zscaler Zero Trust Exchange Platform
Zscaler Internet Access
Cato SASE Cloud Platform
Netskope
Microsoft Purview Data Loss Prevention
Check Point Harmony SASE (formerly Perimeter 81)
Microsoft Defender for Cloud Apps
FortiSASE
Cisco Secure Client (including AnyConnect)
VMware VeloCloud SD-WAN
Buyer's Guide
Download our free Skyhigh Security Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Evaluating CASBs. Looking for community feedback on some vendors.
- What is the difference between point solutions (SD-WAN, NGFW, SWG, VPN) and SASE?
- What questions do you need to ask when choosing a Secure Access Service Edge (SASE) solution?
- When evaluating Secure Access Service Edge (SASE), what aspect do you think is the most important to look for?
- Has anyone ever heard of secureaccess.com?
- What is the difference between SASE and SD-WAN?
- What is the difference between SASE and CASB?
- What SASE solution does your company use?
- Why is SASE (Secure Access Service Edge) important?
- What SASE solution do you recommend?













tool is useful