Chart Key
Average Rating
Average rating based on reviews
Views
Number of total page views
Comparisons
Number of times compared to another product
Reviews
Total number of reviews on IT Central Station
Followers
Number of followers on IT Central Station
The total ranking of a product, represented by the bar length, is based on a weighted aggregate score. The score is calculated as follows: The product with the highest count in each area gets the highest available score. (20 points for Reviews; 16 points for Views, Comparisons, and Followers.) Every other product gets assigned points based on its total in proportion to the #1 product in that area. For example, if a product has 80% of the number of reviews compared to the product with the most reviews then the product's score for reviews would be 20% (weighting factor) * 80% = 16. For Average Rating, the maximum score is 32 points awarded linearly based on our rating scale of 1-10. If a product has fewer than ten reviews, the point contribution for Average Rating is reduced (one-third reduction in points for products with 5-9 reviews; two-thirds reduction for products with fewer than five reviews). Reviews that are more than 24 months old, as well as those written by resellers, are completely excluded from the ranking algorithm.
Most Views
From IT Central Station visitors
Most Reviews
Within the last 24 months
Most Followed
By IT Central Station users
Most Compared
From IT Central Station visitors

Cloud Access Security Brokers Reviews

Read reviews of Cloud Access Security Brokers that are trending in the IT Central Station community:
Your trust is our top concern, so companies can't alter or remove reviews.
McAfee
Real User
Solutions Architect at Credocom A/S
Dec 12 2016

What is most valuable?

The most valuable feature of Skyhigh networks is the capability of giving an overview of all active cloud services on our network. Skyhigh analyzes syslog data from our firewall, and returns a report of the cloud service usage on our network.... more»

How has it helped my organization?

We now have a good conscious about using Cloud services. Without an overview, you can only imagine what is going on. With monitoring, analysis and threat prevention, we know exactly what is going on and can prevent activity that we deem... more»

What needs improvement?

The Web UI is still not quite as responsive as we would like. However, in praise of Skyhigh, they have taken this feedback into account. This is their biggest focus area for next major release.
McAfee
Real User
Cyber Security Engineer at a recruiting/HR firm with 51-200 employees
Jun 09 2017

What is most valuable?

Box API access with DLP capabilities Shadow IT

How has it helped my organization?

Our organization is moving much of its non-sensitive data to Box and we needed the ability to have full visibility into what was occurring within the Box infrastructure. With the Skyhigh to Box API integration, we can not only see everything... more»

What needs improvement?

Reports. The reports are useful but they do not always give the information in the format that I'm looking for and can take a while to run. Probably my two biggest issues are as follows: * Even if you narrow down the scope of the report so... more»

Have A Question About Cloud Access Security Brokers?

Our experts can help. 278,861 professionals have used our research on 6,302 solutions.
McAfee
Real User
Security Analyst IV - Risk Management at a energy/utilities company with 1,001-5,000 employees
Jul 27 2017

What is most valuable?

Currently, we are using cloud discovery and analytics. This has given us an insight to which services our end users are subscribing to and where our business data may be held.

How has it helped my organization?

We are able to identify the high-risk websites and block them before the end users start using them to ensure that a business case is made for unblocking a high-risk site (rather than having to run interference after the fact). It also allows... more»

What needs improvement?

One feature offered is a 48-hour turnaround to add a service to the global registry upon request. While they do turn around risk assessments very quickly, often many of the answers are unknown which drives the risk scores of the services up.... more»
McAfee
Consultant
System Developer Analyst at a tech services company with 1,001-5,000 employees
Feb 28 2017

What is most valuable?

It has a very user-friendly UI and is easier to pick up for people with less technical experience.

How has it helped my organization?

It’s a small improvement; however, it has augmented the pre-existing network monitoring services already in place to something more meaningful for higher levels of management.

What needs improvement?

Its capabilities are still rather limited compared to other solutions. It’s a reasonable monitoring service, but it would still need to be coupled with other solutions to be practical. I found that when it comes to monitoring services on the... more»
CipherCloud
Real User
Salesforce Architect at a financial services firm with 1,001-5,000 employees
Mar 22 2017

What is most valuable?

The best feature it offers is encryption of data in motion. This is valuable for financial, government and healthcare industries to meet FINRA/FedRamp and HIPPA guidelines. That being said, overuse of this feature has severely limited usage... more»

How has it helped my organization?

This product helped my customers meet regular guidelines, and security and release management guidelines.

What needs improvement?

There is lot of room for improvement. Currently, CipherCloud does not offer out-of-the-box support for cross-object resource sharing. There is no full-fledged support for Process Builder, Lightning and other latest offerings from Salesforce.... more»
Consultant
IT Security Specialist at a consultancy with 1,001-5,000 employees
Nov 17 2016

What is most valuable?

We use the Application Discovery & Control feature. With Google’s G Suite, it is very easy for a user to give full control of their Google data to a third party. For example, when Pokémon Go was first released, it gave the vendor full... more»

How has it helped my organization?

With RegEx-based reporting on Google Drive data, we can report any inappropriate or privileged data that should not be stored in Google.

What needs improvement?

The issues with CloudLock are mostly for Google to address. Google is all about trusting users, which is a nightmare for an administrator. It allows any user to intentionally or accidentally give a random third party full access to a Google... more»
Real User
Principal at a tech company with 51-200 employees
Nov 17 2016

What is most valuable?

It is a good CASB solution for protection of collaboration of content. The in-built features are apt to deal with SBU/ITAR data. These features allow configuration of data protection policies specific to the organization. Some of these data... more»

How has it helped my organization?

Data shared with external parties has been significantly controlled. This CASB solution eliminated unauthorized risk of accessing data in our organization.

What needs improvement?

Like all CASB products, this product also needs to expand its capabilities and features in order to increase scope of application. CloudLock’s security consists of eight core security services including content analysis, context analysis,... more»
McAfee
Real User
INNOVATOR,ENGINEER,DREAMER! at a transportation company
Oct 19 2017

What is most valuable?

* Box API features with DLP capabilities * Shadow IT

How has it helped my organization?

Our organization is moving much of its non-sensitive data to Box. We needed the ability to have full visibility into what was occurring within the Box infrastructure, from Skyhigh to Box API integration.

What needs improvement?

SkyHigh has the ability to place users or groups on a ‘Watchlist’; which allows you to see certain views with these Watchlists users/groups in them. This is great when you are looking at live data but if I wanted to generate a report on... more»
McAfee
Real User
Supervisor, IT Security at a healthcare company with 10,001+ employees
Nov 21 2017

What do you think of Skyhigh?

Primary Use Case Shadow IT monitoring  Sanctioned Cloud App Security • Valuable Features Shadow IT reporting capabilities DLP integration Encryption • Improvements to My Organization It has given us visibility into our employees activities and access to cloud apps. • Room for Improvement Support for securing more cloud apps. • Use of Solution Two and a half years. • Deployment Issues Some issues, but many had to do with the complexity of our deployment and they all have been worked through.  • Stability Issues The Shadow IT portion would sometimes stop processing our proxy logs, but these issues seem to have been fixed.   • Scalability Issues No. • Customer Service and Technical Support It is excellent and top-notch. • Previous Solutions ...
McAfee
Real User
Manager Infrastructure Security Engineering at a pharma/biotech company with 1,001-5,000 employees
Jul 10 2016

What is most valuable?

The ability to identify shadow IT within our environment through proxy log analysis based on risk assessments provided by Skyhigh Registry have been invaluable in helping us reduce our overall data risk

How has it helped my organization?

Once implemented we were able to identify 100+ high risk cloud services used by our users. Once identified we worked with our users to migrate their data to IT sanctioned services, then blocked all high risk services.

What needs improvement?

Sometimes the console performance is slow and updating custom attributes can be cumbersome as you have to do each attribute for a cloud service individually, the click the popup box to continue. The console performance is sometime slow,... more»
McAfee
Real User
Cyber Security Analyst at a tech services company
Jan 10 2017

What is most valuable?

Skyhigh's shadow IT capability and cloud risk registry are the two most helpful tools for our organization.

How has it helped my organization?

We are able to see what cloud services are being used with much more clarity than with our proxies and more importantly identify that we are using many cloud services we were not aware were even cloud services. Especially collaboration... more»

What needs improvement?

The Skyhigh for Google Drive interface and policy engine is a bit confusing and limited when compared against other Google Drive CASB capabilities.
McAfee
Real User
Information Security Analyst at a tech services company
Oct 18 2017

What is most valuable?

* Skyhigh's Shadow IT capability * Cloud Risk Registry * DLP policies and anomalies

How has it helped my organization?

We are able to see what cloud services are being used with more clarity than with our proxies. More importantly, we can identify that we are using many cloud services in which we were not aware that they were even cloud services, especially... more»

What needs improvement?

* The Skyhigh for Google Drive interface and policy engine is a bit confusing and limited when compared against other Google Drive CASB capabilities. * The de-tokenization process * Data anomalies
McAfee
User
IT Security Support Analyst with 5,001-10,000 employees
Sep 17 2017

What is most valuable?

All the information available on each service, including its risk assessment. Service groups, automatic assignment of services based on designated conditions, and the ability to utilize multiple log sources for the data.

How has it helped my organization?

Provides quite a bit of visibility into cloud services being utilized in our environment. I've been able to take the data available in Skyhigh and create discussions about whether we should be allowing or blocking certain services. This has... more»

What needs improvement?

Iron out the few bugs that I've seen.
Bitglass
Real User
Shared Information Security Officer at a university with 1,001-5,000 employees
Sep 06 2016

What do you think of Bitglass?

Valuable Features Location proximity mapping Data type inventory Simple integration • Improvements to My Organization It allows a window into who is sharing what types of data internally and externally. It allows us know where sensitive data is really stored and offers the ability to quarantine based on data types and sharing criteria. • Room for Improvement Reporting Simpler policy creation • Use of Solution I have used it for 16 months. • Scalability Issues The cloud-based portal tends to get slow as the number of events increase. • Customer Service and Technical Support The sales staff promised more than they can deliver, but the technical staff is excellent. • Previous Solutions I did not previously use a different solution. • Initial Setup ...
Real User
Shared Information Security Officer at a university with 1,001-5,000 employees
Sep 06 2016

What do you think of CloudLock?

Valuable Features Location proximity mapping Data type inventory Simple integration • Improvements to My Organization It allows a window into who is sharing what types of data internally and externally. It allows us to know where sensitive data is really stored and offers the ability to quarantine based on data types and sharing criteria. • Room for Improvement Reporting Simpler policy creation • Scalability Issues I have not encountered any scalability issues. • Customer Service and Technical Support Technical staff are excellent. • Previous Solutions I did not previously use a different solution. • Initial Setup Initial setup was simple. • Pricing, Setup Cost and Licensing Negotiate for the pricing model that fits your budget. The vendor is willing...
McAfee
Vendor
Information Security Analyst at Kronos at a tech company with 1,001-5,000 employees
Feb 27 2018

What is most valuable?

The risk rating of each cloud application has been very useful. Whenever we discover a new application is use, we are able to quickly determine if this application is safe to use and whether or not we should allow our end users to be able to... more»

How has it helped my organization?

We have gained a deep insight into our Shadow IT usage as well as the different activities involved in Office 365. Without Skyhigh, we had zero visibility, but now we are aware of so much more.

What needs improvement?

Though the Skyhigh Dashboard is processing large amounts of data, the speed of the Dashboard could be improved. Also, it would be nice to be able to get more advanced search functions to filter out data and quickly obtain the data that we need.
McAfee
User
Operator at a leisure / travel company with 10,001+ employees
Jun 07 2018

What do you think of Skyhigh?

Primary Use Case We use it to discover, protect, and permit. Skyhigh for Shadow IT provides us visibility into the Shadow IT. It helps us in blocking high risk services and also in containing the data exfiltration to these high risk services. • Improvements to My Organization It help us monitor high risk services, blocking them, and also feeding them to our egress points. • Valuable Features The risk management feature. • Room for Improvement Integration with other technology ecosystems. • Use of Solution Three to five years. • Stability Issues Initially, there were stability issues, but now it is perfect. • Scalability Issues No scalability issues. • Customer Service and Technical Support The support team is very good. • Previous Solutions ...
McAfee
Real User
IT Security at a financial services firm with 5,001-10,000 employees
Dec 24 2017

What do you think of Skyhigh?

Primary Use Case Insight into services being accessed and/or used in corporate environment. Additionally, Shadow IT as a whole and provides another set of eyes on web proxy logs. • Improvements to My Organization It has allowed insight into gaps that may exist in current web proxy tool policies. Improves creation of security alerts on web proxy logs by having a separate system interpret said logs. • Valuable Features Skyhigh has given us categorization and rating of websites separate from what the web proxy places on the logs. • Room for Improvement The tool could improve flexibility with the creation of reports/querying data. A better search capability, similar to a SIEM, would also allow deeper log analysis. • Use of Solution One to three years.
McAfee
Real User
Information Security Lead Analyst at a healthcare company with 1,001-5,000 employees
Oct 25 2017

What do you think of Skyhigh?

Valuable Features The user analytics. • Improvements to My Organization We were able to analyse our user activity, which helped us to identify the associated risks. • Room for Improvement Improve the user interface (UI) of the tool and make it user-friendly. • Use of Solution Three years. • Deployment Issues Yes. • Stability Issues Yes. • Scalability Issues Yes. • Customer Service and Technical Support Customer Service: A six out of 10. Technical Support: A seven out of 10. • Previous Solutions No. • Initial Setup I was not part of the setup. • Implementation Team A vendor team did the implementation. I would give them a seven out of 10 on their expertise. • ROI I have no idea of what it is. • Other Solutions Considered No.
McAfee
Real User
INNOVATOR,ENGINEER,DREAMER! at a transportation company
Oct 26 2017

What do you think of Skyhigh?

Valuable Features Prevents unauthorized data being shared from external sources. Enforces data loss prevention. DLP reporting and deep integration. • Improvements to My Organization Malware and spam mails Attacks from hackers Data privacy • Room for Improvement Detecting threats. • Use of Solution One year. • Deployment Issues No. • Stability Issues No. • Scalability Issues No. • Customer Service and Technical Support Customer Service: A 10 out of 10. Technical Support: A 10 out of 10. • Previous Solutions No. • Initial Setup The initial setup was straightforward. • Implementation Team We implemented in-house. • ROI Our ROI is 150%. • Pricing, Setup Cost and Licensing The pricing is reasonable. • Other Solutions...

Have A Question About Cloud Access Security Brokers?

Our experts can help. 278,861 professionals have used our research on 6,302 solutions.

Cloud Access Security Brokers Articles

Content and Community Manager
IT Central Station
Feb 12 2018
How effective is cloud security software when serving IT infrastructure monitoring needs? What insight do information security professionals share in their cloud security reviews? How do users' software of choice serve their company's IT infrastructure monitoring needs? Which of their pain... more»

Sign Up with Email