We performed a comparison between Skyhigh Security and Trend Micro Web Security based on real PeerSpot user reviews.
Find out in this report how the two Secure Web Gateways (SWG) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The protection offered by the product is the most valuable feature. It detects vulnerabilities or traps on our users' phones and then prompts them to clean up their devices. Tools we used previously would only discover, which required us to gather information on the backend, so Lookout is a welcome upgrade."
"The most valuable features are the antivirus as a whole, the anti-malware, and all of the protection features that scan our enterprise devices."
"The solution is stable."
"On the outside, the main differentiation is because Lookout ingest. They have ingested basically all of the apps for the last ten years and all the versions of all the apps, and we have that in a corporate database that allows us to do very large-scale machine learning and analysis on that data set. That's not something that any of the competitors really have the capability to do because they don't have access to the data set. A lot of the apps you can no longer get them because that version of the app is five or six years old, and it just doesn't exist anywhere anymore, except within our infrastructure. So, the ability to have that very rich dataset and learn from that dataset is a real differentiator."
"What's most valuable in Skyhigh Security is its level of security. Another valuable feature of the solution is threat analysis."
"I found the solution to be stable."
"It's an easy-to-use product."
"The product has a very high rating from reviewers. It's a well-respected product."
"User analytics."
"The solution performs well."
"I personally don't have any issues with the performance or the stability of the solution."
"All the information available on each service, including its risk assessment."
"The solution's technical support team is responsive."
"The most valuable feature of Trend Micro Web Security stems from the fact that it is neither a cheap nor an expensive tool."
"The real-time threat detection capability of Trend Micro Web Security has had a positive impact on our security."
"It's a very stable solution."
"Trend Micro has a centralized mechanism where we can control and monitor all system protections. It includes detecting any wireless problems, which will be displayed on our portal. We plan to investigate the issues with those systems internally."
"Threat protection solution with good stability and scalability. Installation is straightforward. Support for this product is good."
"The most valuable feature is machine learning, which automatically monitors the activity on the machine."
"The security of Trend Micro Web Security is good."
"Lookout was moving into the SSE space. And so their work on SecureWeb Gateway and SD-WAN is still sort of evolving."
"From the analysis that we've done, they do seem to be maybe a step behind in trying to enter the market with a new solution. But when they do pick up, they do come out with some good products."
"The stability depends on the service from where you access it. Because sometimes, the place you are in, you have Gateway. You don't have Gateway. The gateway is overutilized. At the end, you need to go through their gateways. And this is the key point here. You have a tracking point. If it's not well orchestrated, and it scales up as you add more to the existing team, you will suffer"
"We just submitted an enhancement request reflecting the main area we want to see improvement in; the APIs. Currently, we're able to build dashboards, but it's somewhat backward because we use our MDM API to create them. Lookout should provide API to customers so we can query our data and use it in our cloud, and this is the only outstanding area for improvement with the product right now."
"User interface could be more intuitive."
"The Skyhigh for Google Drive interface and policy engine is a bit confusing and limited when compared against other Google Drive CASB capabilities."
"Its initial setup could be more straightforward."
"You have to have some kind of background with cloud-based security, like working with different providers and how to make instances in the clouds and that kind of stuff - including cloud, networking cloud, cloud application development, anything like that is a requirement to be in the CASB space."
"An area for improvement in Skyhigh Security is its UI. It needs to be enhanced and made more user-friendly. Right now, the UI of Skyhigh Security is sometimes confusing. For example, my company is deploying Skyhigh Security for a client and integrating it on the cloud, from an on-premises deployment to a hybrid deployment. Though the experience isn't bad, there needs to be more enhancements. Another room for improvement in Skyhigh Security is the limited training resources, especially when you compare it with Cisco, which has many study materials in the market, even free training resources. You'll get limited resources if you search for Skyhigh Security tutorials on Google and YouTube. Because of high-security requirements and the training material for Skyhigh Security not being available, most engineers and architects avoid the product because there'd be a lack of knowledge in configuring and achieving the goals you'd want to reach via the use of Skyhigh Security. The NOC team deploying the product is having difficulty getting training resources for Skyhigh Security. You'll be charged an enormous amount if you search the market for training because of the limited resources available. Skyhigh Security needs to work on marketing and awareness as an improvement to the product."
"One thing that can be improved is their ability to integrate with other web proxies to discover unsanctioned IP apps."
"It would be nice to be able to get more advanced search functions to filter out data and quickly obtain the data that we need."
"The solution is hard to configure, our team does not have specific training requirements for McAfee making it difficult."
"The stability of the product is an area of concern where improvements are required."
"his legacy version currently lacks WFA, which is a useful tool for managing bandwidth and applying data control limits to specific users. It's especially beneficial for organizations using Android and Azure."
"The product should be more secure and stable. It is also not flexible."
"What could help Trend Micro Web Security in terms of improvement is the addition of a DDoS protection feature. It also needs to be more comprehensive to meet the needs of large-sized companies."
"The price of Trend Micro Web Security is the only area of concern where improvements are required. From an improvement perspective, the product should be made available to users at a cheaper rate."
"The costs are a bit high in terms of licensing."
"The solution's scalability could be better."
"The installation is a little bit complex."
Skyhigh Security is ranked 6th in Secure Web Gateways (SWG) with 51 reviews while Trend Micro Web Security is ranked 17th in Secure Web Gateways (SWG) with 16 reviews. Skyhigh Security is rated 8.4, while Trend Micro Web Security is rated 8.0. The top reviewer of Skyhigh Security writes "Good scalability, but the technical support service needs improvement". On the other hand, the top reviewer of Trend Micro Web Security writes "Though a tool suitable for medium-sized businesses, it needs to work on its price model". Skyhigh Security is most compared with Zscaler Internet Access, Netskope , Microsoft Defender for Cloud Apps, Symantec Proxy and Prisma Access by Palo Alto Networks, whereas Trend Micro Web Security is most compared with Zscaler Internet Access, Cisco Umbrella, Symantec Proxy, Infoblox Advanced DNS Protection and Fortinet FortiProxy. See our Skyhigh Security vs. Trend Micro Web Security report.
See our list of best Secure Web Gateways (SWG) vendors.
We monitor all Secure Web Gateways (SWG) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.