We performed a comparison between Menlo Security Remote Browser Isolation and Skyhigh Security based on real PeerSpot user reviews.
Find out what your peers are saying about Cisco, Zscaler, Forcepoint and others in Internet Security."Menlo Security RBI's best feature is its threat isolation engine."
"It is easy to configure rules."
"Shadow IT reporting capabilities."
"I like the encrypted disk feature and the endpoint protection."
"Offers a very strong URL spam filtering feature."
"The product has a very high rating from reviewers. It's a well-respected product."
"The stability is the most valuable feature. We haven't had any issues with the product."
"The solution performs well."
"What I found most valuable in Skyhigh Security is its stability. The solution also has good KB articles that make it simple for users to do the deployment of Skyhigh Security themselves, without the need for integrators."
"Menlo Security RBI could be more cloud-friendly, and its mobility could be improved."
"I would like to see more power being given to the admin. In the sense that in case an employee is facing an issue and they want to configure a service, like attaching an email in Gmail, for example, they should be given the option to make the service request and get that configured on the go."
"An area for improvement in Skyhigh Security is its UI. It needs to be enhanced and made more user-friendly. Right now, the UI of Skyhigh Security is sometimes confusing. For example, my company is deploying Skyhigh Security for a client and integrating it on the cloud, from an on-premises deployment to a hybrid deployment. Though the experience isn't bad, there needs to be more enhancements. Another room for improvement in Skyhigh Security is the limited training resources, especially when you compare it with Cisco, which has many study materials in the market, even free training resources. You'll get limited resources if you search for Skyhigh Security tutorials on Google and YouTube. Because of high-security requirements and the training material for Skyhigh Security not being available, most engineers and architects avoid the product because there'd be a lack of knowledge in configuring and achieving the goals you'd want to reach via the use of Skyhigh Security. The NOC team deploying the product is having difficulty getting training resources for Skyhigh Security. You'll be charged an enormous amount if you search the market for training because of the limited resources available. Skyhigh Security needs to work on marketing and awareness as an improvement to the product."
"They only have English support, so I would like for them to add some Spanish support."
"The encrypted disk implementation could be improved. I currently use it from a dongle or USB key with two-factor authentication to access my computer."
"They could be integrated with CASB. I think normally McAfee has this solution in the cloud, but for us the best is on-premise."
"The cloud needs improvement with respect to DLP."
"It is an expensive solution."
"The only thing we have faced is that sometimes, randomly, the portal becomes too slow."
More Menlo Security Remote Browser Isolation Pricing and Cost Advice →
Menlo Security Remote Browser Isolation is ranked 7th in Internet Security with 1 review while Skyhigh Security is ranked 6th in Secure Web Gateways (SWG) with 51 reviews. Menlo Security Remote Browser Isolation is rated 8.0, while Skyhigh Security is rated 8.4. The top reviewer of Menlo Security Remote Browser Isolation writes "Stable and scalable solution with a great threat isolation engine". On the other hand, the top reviewer of Skyhigh Security writes "Good scalability, but the technical support service needs improvement". Menlo Security Remote Browser Isolation is most compared with Zscaler Internet Access, Cisco Umbrella, Cloudflare Access, Perimeter 81 and Akamai Enterprise Application Access, whereas Skyhigh Security is most compared with Zscaler Internet Access, Netskope , Microsoft Defender for Cloud Apps, Symantec Proxy and Cisco Web Security Appliance.
We monitor all Internet Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.