Save to My Lists

Skyhigh Cloud Access Security Broker Reviews & Product Details

NM
Technical Engineer
Information Technology and Services
Small-Business(50 or fewer emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Skyhigh Cloud Access Security Broker?

The strong point of Skyhigh Cloud Access Security Broker is the high capacity for discovery and visibility, for the identification and subsequent classification of cloud services used by users of the organization, adding to the access control it provides, offers capacity robust data protection Review collected by and hosted on G2.com.

What do you dislike about Skyhigh Cloud Access Security Broker?

Perhaps the point that I did not like, more than the service, would be the speed at which threats evolve in the cloud world

This makes it necessary to constantly update the service in order to be up to date with the latest threats. Review collected by and hosted on G2.com.

What problems is Skyhigh Cloud Access Security Broker solving and how is that benefiting you?

It is of great help in the face of problems related to compliance with the normal security of the company, in relation to the cloud, and decreases the response time to new cybersecurity threats and of course provides the necessary security for the protection of confidential information. Review collected by and hosted on G2.com.

Skyhigh Cloud Access Security Broker Overview

What is Skyhigh Cloud Access Security Broker?

Skyhigh Cloud Access Security Broker protects data and stops threats in the cloud across SaaS, and PaaS, and IaaS environments from a single, cloud-native enforcement point. It enables organizations to accelerate their business by giving them visibility and control over their data in the cloud and protection from threats with a frictionless deployment model. Skyhigh CASB is consolidated into a fully converged platform and managed from the same single console as the rest of the Skyhigh SSE services.

Skyhigh Cloud Access Security Broker Details
Show LessShow More
Product Description

Skyhigh Cloud Access Security Broker protects data and stops threats in the cloud across SaaS, and PaaS, and IaaS environments from a single, cloud-native enforcement point. It enables organizations to accelerate their business by giving them visibility and control over their data in the cloud and protection from threats with a frictionless deployment model. Skyhigh CASB is consolidated into a fully converged platform and managed from the same single console as the rest of the Skyhigh SSE services.


Seller Details
HQ Location
San Jose, CA
Twitter
@skyhighsecurity
17,984 Twitter followers
LinkedIn® Page
www.linkedin.com
611 employees on LinkedIn®
Description

Skyhigh Security protects organizations with cloud-native security solutions that are both data-aware and simple to use. Its market-leading Security Service Edge (SSE) Portfolio goes beyond data access and focuses on data use, allowing organizations to collaborate from any device and from anywhere without sacrificing security. Organizations can now have complete visibility and control and seamlessly monitor and mitigate security risks—achieving lower associated costs, driving greater efficiencies, and keeping pace with the speed of innovation.


CJ
Overview Provided by:

Recent Skyhigh Cloud Access Security Broker Reviews

Verified User
A
Verified UserEnterprise (> 1000 emp.)
5.0 out of 5
"Excellent tool to control Office 365 data usage"
The UX of the product is very intuitive and simple, so even for new users the learning curve on the plataform is very fast. The granularity of c...
NM
Nicolás M.Small-Business (50 or fewer emp.)
4.5 out of 5
"Secure access to cloud applications"
The strong point of Skyhigh Cloud Access Security Broker is the high capacity for discovery and visibility, for the identification and subsequent c...

Skyhigh Cloud Access Security Broker Media

Answer a few questions to help the Skyhigh Cloud Access Security Broker community
Have you used Skyhigh Cloud Access Security Broker before?
Yes

2 Skyhigh Cloud Access Security Broker Reviews

4.8 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.

Skyhigh Cloud Access Security Broker Pros and Cons

How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cons
G2 reviews are authentic and verified.
Verified User in Higher Education
AH
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: Organic Review from User Profile
What do you like best about Skyhigh Cloud Access Security Broker?

The UX of the product is very intuitive and simple, so even for new users the learning curve on the plataform is very fast.

The granularity of controls you can implement into DLP policies was a big differential to us.

The support documentation provided by the vendor are very extensive, complete and ease to use, its a powerfull tool in the daily routine operating the tool.

The implementation was very fast and simple, with their team giving all the instructions. It took a few days to have it completed configured. Review collected by and hosted on G2.com.

What do you dislike about Skyhigh Cloud Access Security Broker?

Their staff in Brazil is small, so we do not have full customer support in our native language. Even the implementation was conducted by an international team, so if the admin(s) of the tool do not speak English, it may be a problem. Review collected by and hosted on G2.com.

What problems is Skyhigh Cloud Access Security Broker solving and how is that benefiting you?

The Skyhigh's CASB are helping us mainly with Data Protection. As our main colaborative tool is Office 365, is very important to us to have visibility and control over how the company data is being used and being able to aply controls preventing misuse and leakage of sensitive data. Also, together with the SWG capabilities, it provides a important visibility over Shadow IT usage, enabling us to categorize and control the Services that are being used and divide them into sanctioned and not sanctioned, preventing users to access services that are not validated by the company. Review collected by and hosted on G2.com.

There are not enough reviews of Skyhigh Cloud Access Security Broker for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Symantec Web Security Service Logo
Symantec Web Security Service
4.4
(125)
Symantec Web Security is a cloud based software that helps protect organization from compromised websites and malicious downloads and allows user to control, monitor and enforce Acceptable Use Policies for organizations users, whether on-premises or away from the office.
2
Check Point Harmony SASE Logo
Check Point Harmony SASE
4.7
(118)
Check Point Harmony SASE is a converged networking and network security platform which connects all users, in the office or remote, to all resources, located on-prem, cloud, SaaS or web. It delivers secure Zerto Trust Network Access (ZTNA) connectivity along web protection capabilities including Internet access control, malware protection, data loss prevention(DLP), and sandboxing, as well as a firewall as a service. The solution employs a hybrid architecture, combining on-device and cloud-based protections, which delivers market leading security and performance.
3
Forcepoint ONE Logo
Forcepoint ONE
4.2
(99)
"Forcepoint ONE is a unified cloud security platform that enables Zero Trust access to the web, SaaS and private applications with best-in-class data security and malware protection while delivering a great user experience. Gain the full visibility and control over web and application usage to mitigate digital risks and give your organization more freedom and flexibility. Key product capabilities include: • Visibility into web, SaaS and private application use • Distributed enforcement – endpoint enforcement, cloud enforcement via in-line proxy & API, and on-prem enforcement • Industry-leading data and threat protection capabilities to secure data everywhere, for people working anywhere • Seamless user experience from any location and any device "
4
Cloudflare SSE & SASE Platform Logo
Cloudflare SSE & SASE Platform
4.6
(92)
Cloudflare Area 1 Security identifies and prevents advanced socially engineered attacks before they impact your enterprise.
5
Harmony Email & Collaboration Logo
Harmony Email & Collaboration
4.5
(78)
Check Point Harmony Email & Office, protects enterprise data by preventing targeted attacks on SaaS applications and cloud-based email.
6
Cato SASE Cloud Logo
Cato SASE Cloud
4.4
(73)
Cato SASE Cloud delivers a global SD-WAN with built-in network security stack for all enterprise locations, cloud resources and mobile users
7
Citrix Secure Workspace Access Logo
Citrix Secure Workspace Access
4.5
(71)
Citrix Secure Workspace Access provides a comprehensive, zero-trust approach to deliver secure and contextual access to the corporate internal web apps, SaaS, and virtual applications. It enables the consolidation of traditional security products like VPN, single sign-on, and browser isolation technologies and provides advanced security controls for managed, unmanaged, and BYO devices. Citrix Secure Workspace Access provides a holistic security approach based on zero-trust principles, protecting users, applications, and corporate data against internet web threats and data exfiltration.
8
Lookout Logo
Lookout
4.3
(69)
Lookout is a mobile app that fights cybercriminals by predicting and stopping mobile attacks before they do harm.
9
Microsoft Defender for Cloud Apps Logo
Microsoft Defender for Cloud Apps
4.4
(59)
Microsoft Defender for Cloud Apps is an enterprise-grade security for cloud apps.
10
Prisma Access Logo
Prisma Access
4.3
(59)
Secure access service edge (SASE) for branch offices, retail locations and mobile users
Show More