We performed a comparison between Rapid7 InsightVM and Skyhigh Security based on real PeerSpot user reviews.
Find out what your peers are saying about Tenable, Qualys, Rapid7 and others in Risk-Based Vulnerability Management."We can create our own templates."
"The solution is good because it has a lot of options."
"The most valuable feature is the vulnerability scan."
"The most valuable features of Rapid7 InsightVM are the accurate level of scanning and the workflows are good."
"The solution works well."
"NeXpose is a pretty good vulnerability scanner... There's a nice dashboard."
"I have been in contact with technical support and they are not bad."
"I liked the dashboard on it. I could customize my dashboard with different widgets and different heat maps."
"The product has a very high rating from reviewers. It's a well-respected product."
"Improves creation of security alerts on web proxy logs by having a separate system interpret said logs."
"DLP policies and anomalies."
"The solution performs well."
"I like the encrypted disk feature and the endpoint protection."
"They were very, very aggressive in the market to get a new market share or to take over market share while other companies were being broken up."
"The most valuable features of MVISION Cloud are the automatic reports and modification incidents."
"It's a great product with solid features."
"There needs to be much clearer instructions surrounding scanning."
"Some difficulties with the online reporting and lack of integrations."
"Rapid7 InsightVM could be easier to use for those who are using it for the first time."
"Their customer support should be improved, and the effectiveness of scans also needs to be improved."
"The authentication scan is not working."
"The solution could improve by being more secure."
"The reporting has room for improvement. You cannot customize any report. If I need a specific requirement, I have to create a new report for it."
"InsightVM is getting a little stale and is in danger of falling behind its competitors."
"The encrypted disk implementation could be improved. I currently use it from a dongle or USB key with two-factor authentication to access my computer."
"You have to have some kind of background with cloud-based security, like working with different providers and how to make instances in the clouds and that kind of stuff - including cloud, networking cloud, cloud application development, anything like that is a requirement to be in the CASB space."
"The biggest challenge we have with McAfee is their cross-cloud support."
"Support for securing more cloud apps."
"De-tokenization."
"You can integrate Skyhigh's rules with Active Directory groups. For example, you can allow access to a specific website for a defined set of users. I can do that, but the rules are not straightforward. It can look up the group in Active Directory. However, it doesn't always find the proper group name. The rule configuration should be simpler and more granular. The admin should be able to map 80 groups in the rules quickly."
"Skyhigh Security, as a product, is excellent, but in terms of the right services and support, those are lagging very much, for example, in Trellix. From one hundred, its score has gone down to ten, so ten out of one hundred, otherwise, it's the number one product."
"The cloud needs improvement with respect to DLP."
Rapid7 InsightVM is ranked 4th in Risk-Based Vulnerability Management with 55 reviews while Skyhigh Security is ranked 6th in Secure Web Gateways (SWG) with 51 reviews. Rapid7 InsightVM is rated 8.0, while Skyhigh Security is rated 8.4. The top reviewer of Rapid7 InsightVM writes "You can scan a network, and receive recommendations to address vulnerabilities with the click of a button". On the other hand, the top reviewer of Skyhigh Security writes "Good scalability, but the technical support service needs improvement". Rapid7 InsightVM is most compared with Tenable Nessus, Qualys VMDR, Tenable Security Center, Microsoft Defender Vulnerability Management and Rapid7 InsightIDR, whereas Skyhigh Security is most compared with Zscaler Internet Access, Netskope , Microsoft Defender for Cloud Apps, Symantec Proxy and Zscaler CASB.
We monitor all Risk-Based Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.