Skyhigh Security Valuable Features

Chinthu James - PeerSpot reviewer
SME/Manager -Secure Web Access at Capgemini

The solution's best feature is the flexibility of use.

View full review »
Santiago Gomez - PeerSpot reviewer
Cio at a security firm with 11-50 employees

Data loss prevention and user behavior analysis are two valuable features. If a customer's password has been compromised, we can then recognize and authorize its login from another country, and we can block it.

View full review »
KV
IT Manager at a energy/utilities company with 10,001+ employees

I personally don't have any issues with the performance or the stability of the solution. However, I am not the only person using this tool, and I can't speak for other colleagues using it.

View full review »
Buyer's Guide
Skyhigh Security
March 2024
Learn what your peers think about Skyhigh Security. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
765,234 professionals have used our research since 2012.
Fernando Allendes - PeerSpot reviewer
Senior IT Security Consultant at Universal Network Solutions, Inc (UNS)

The most valuable features of MVISION Cloud are the automatic reports and modification incidents.

View full review »
DA
Sr. Sales Engineer at a tech services company with 11-50 employees

A lot of people sell the solution, including Palo Alto. You've got Skyhigh Networks, which was the leader of CASB and then they were acquired by McAfee, and then now they've broken off into Skyhigh Security. They still have the CASB and they're still considered a market leader. 

They were very, very aggressive in the market to get a new market share or to take over market share while other companies were being broken up.

It's a really easy product. It is a pretty straightforward product. The only thing that Skyhigh doesn't is what Palo Alto does - they don't do any kind of a software-defined WAN, SD-WAN. If you have different circuits to utilize different bandwidth across different media and also set up redundancy links and that kind of stuff, that's all the SD-WAN. They do not have SD-WAN, Skyhigh Security does not have SD-WAN. Palo Alto does.

They were real big on the secure services, edge SSE and zero-trust network architecture type deployments. A lot of that stuff coming out of the networking and when things moved to a cloud, you have what's called sanction IP, which is basically, what we always knew as an internal network in all the security and firewalls and everything about that and then as things moved to the cloud, business to business type stuff and then you start having what's called shadow IP. That's when you have to build all the firewall policy infrastructure in the cloud to emulate what we were doing down inside of a business, connecting servers or PCs or network switches and that kind of stuff. However, infrastructure as a service is doing the same type of functions yet they're cloud services and not physical network services, or switches, meaning there's no mounting it in the rack and that kind of stuff.

View full review »
Jathin Das - PeerSpot reviewer
Solutions Architect at Paramount Computer Systems

Skyhigh Security is not a bad product. It was a market leader. When McAfee acquired it, it was in the top magic quadrant. It is a good product.

I also like that McAfee has been in the endpoint security market for quite a long time and knows how things work.

What I found most valuable in Skyhigh Security is its stability.

The solution also has good KB articles that make it simple for users to do the deployment of Skyhigh Security themselves, without the need for integrators.

View full review »
HQ
Senior IT Consultant at Yusen Logistics

The product has a very high rating from reviewers. It's a well-respected product.

The initial setup is pretty simple.

We've found the scalability potential to be good. Technical support is often helpful.

The solution is stable and the performance is good.

View full review »
VP
Network Architect at Neev limited

The feature I like best about Skyhigh Security is its wide range of product support. For example, my company had NetApp storage running, and Skyhigh Security has on-premises NetApp storage support, which isn't available in other solutions.

Skyhigh Security also has a better filtering feature versus the filtering feature in other solutions.

View full review »
JM
Data Centric Security Expert, Strategic DCAP Business Enabler at a tech services company with 10,001+ employees

We were using MVISION for data protection.

The most valuable feature is the support. It's the best.

MVISION has a really good strategy and the CASB solution is excellent.

View full review »
GM
Technical Architect at a retailer with 1,001-5,000 employees

Skyhigh performs well, and we can choose from virtual and hardware plans. We can deploy the ISO on as many virtual machines as possible and easily set up high availability on the web proxy. The location doesn't matter. The user at a site will always access the web proxy for that location. It's suitable for an organization distributed across multiple regions. 

The reporting is also straightforward, which is handy for troubleshooting. You can do live tracing and check the log to see the traffic on a particular IP to determine what happened. You can configure it to say certain websites are blocked by default. If traffic is allowed, you can trace the issue and fix it. The backup features are highly efficient. 

View full review »
Thanakorn Withawatkajee - PeerSpot reviewer
Senior Product Consultant at M.Tech

The feature I found most valuable is the API.

View full review »
Yovanny Amariles - PeerSpot reviewer
Information Security Leader at Alcaldía de Medellín

The most valuable features of McAfee Web Gateway are anti-malware, reports, and powerful categorization of web pages.

View full review »
MD
Senior Vice President IT at AS IT Consulting Pvt. Ltd.

What's most valuable in Skyhigh Security is its level of security. Another valuable feature of the solution is threat analysis.

View full review »
TH
Cyber Security Engineer at a recruiting/HR firm with 51-200 employees

Box API access with DLP capabilities

Shadow IT

View full review »
reviewer826926 - PeerSpot reviewer
Information Security Analyst at Kronos at a tech company with 5,001-10,000 employees

The risk rating of each cloud application has been very useful. Whenever we discover a new application is use, we are able to quickly determine if this application is safe to use and whether or not we should allow our end users to be able to access it.

View full review »
it_user774504 - PeerSpot reviewer
Supervisor, IT Security at a healthcare company with 10,001+ employees
  • Shadow IT reporting capabilities
  • DLP integration
  • Encryption
View full review »
David Ferreira - PeerSpot reviewer
Network Security Engineer at a consultancy with 11-50 employees

The stability is the most valuable feature. We haven't had any issues with the product.

It's easy to configure. It's not hard to manage day to day.

View full review »
it_user469728 - PeerSpot reviewer
Manager Infrastructure Security Engineering at a pharma/biotech company with 1,001-5,000 employees

The ability to identify shadow IT within our environment through proxy log analysis based on risk assessments provided by Skyhigh Registry have been invaluable in helping us reduce our overall data risk

View full review »
MA
Technical Presales Consultant/ Engineer at a tech vendor with 10,001+ employees

What I really like about the product is something called the ability to view the sanctioned IP apps, which is a major challenge for organizations today. There are sanctioned IP apps or unsanctioned IP apps. In an organization, you will find employees that will use services or applications for the business, which are not authorized by the IT department, and the organization fails to have visibility over this.

What McAfee can provide is full details into what your users are doing on the cloud. For example, lots of employees may be using WhatsApp for conducting critical business workflows, and yet their organization is not permitting them to use WhatsApp. Without a solution such as this, the company will never find out if they actually are using WhatsApp and to what rates. With MVISION Cloud and their web gateway, companies basically get visibility and insights into what their users are using on the cloud.

The product has the ability to provide insights and also to advise on misconfigurations on the cloud. For example, I may be a cloud customer and I'm using IS workloads or infrastructure and service workloads on Azure. I may have object storage configured on Azure, however, this object storage didn't get secured properly. It was publicly open. The system can suggest changes to alert you to this item and advise on how to fix the issue.

With MVISION Cloud, you can actually get detection notices. It will notify you, tell you, hey, be careful. You have object storage that is open to the public. You should lock it down, should have restricted access. You should have some credentials here or there. It will basically act like an advisor for your cloud configuration as well. This is what I really like about it, to be honest. It can tell you if something can go wrong before it happens. It allows you to fix things before situations can get out of hand.

In terms of their compatibility with major cloud providers, in terms of their abilities, capabilities, and features, they exceed everyone's capabilities in the CASB market.

Their integration capabilities are vast. They seem to be able to integrate all major clouds. 

The solution is very stable.

The solution can scale.

Technical support has been very helpful.

View full review »
it_user523368 - PeerSpot reviewer
Solutions Architect at Credocom A/S

The most valuable feature of Skyhigh networks is the capability of giving an overview of all active cloud services on our network. Skyhigh analyzes syslog data from our firewall, and returns a report of the cloud service usage on our network. In other words, this takes the 'shadow' out of Shadow IT. It sheds some light on the current situation.

The report returned by Skyhigh not only shows which cloud services are in use, but also gives each individual cloud service a risk assessment in terms of risks associated with the service. The categories are Data Risk, User Risk, Legal Risk and Business Risk. With this overview of the associated risk for cloud services on our network, we can make some very conscious decisions about how we want to shape which services are used on the network. We can make sure that we offer safe alternatives to the services already in use. We want all our users to use cloud services, so that we can stay agile and flexible, but we also want to make sure we don't take any unnecessary risk.

Skyhigh furthers the protection of our sanctioned cloud services. Once we make a decision on which services we feel are a good match for our company, we can add extra protection to those services in the form of monitoring and threat prevention. Skyhigh can make sure that all data we put in our sanctioned cloud service is compliant with our company policy as well, as industry regulations. In other words, if one of our users accidentally puts data in the cloud that isn't compliant, we can remove this data before it causes problems. This is a win for our users and the company as a whole.

Skyhigh also monitors the usage of our sanctioned cloud services. They can spot any abnormal activity, such as users logging in from several different countries in a short period of time, or other suspicious activity.

View full review »
NK
Sr. Analyst Governance and Compliance at a aerospace/defense firm with 10,001+ employees

There is one feature called data governance that shows all the cloud services which are used.

There is another one called cloud registry where we can see a risk assessment for the cloud services being used. If we want to add a new cloud service or a new cloud application, we can check into it and do an assessment through the cloud registry. That is the feature that I like most.

View full review »
AR
Delivery Engineer at a tech services company with 11-50 employees

The broader solution is quite useful. They provide service management for a variety of environments, including Office 365, Google, AWS, and Azure. 

It offers very good protection overall.

The management is very good.

We're able to provide the customer with best practices for coding.

It is a stable product.

Technical support is helpful.

The pricing is reasonable. 

View full review »
MT
IT Engineer at FormatPC

The solution is very easy to use. It's easy to navigate.

The product has proven itself to be very stable.

The solution is scalable.

We find it to be quite flexible.

Overall, the performance is good.

Due to the fact that it's in the cloud, you don't have to maintain it. It's maintained by McAfee. You don't need to worry about updates and upgrades.

View full review »
AC
Vice President - Risk Management, Chief Information Security Officer at a computer software company with 10,001+ employees

The most valuable feature is the SSL decryption.

View full review »
AJ
Deputy Specialist/Assistant Manager at a tech services company with 10,001+ employees

Predominantly, there are two valuable features: One is the data loss and the other one is network loss. 

It also prevents you from writing data to your Gmail and does not allow you to move your data outside of the corporate system. That is the most important feature for me.

View full review »
Nadeem Syed - PeerSpot reviewer
CEO at Haniya Technologies

McAfee has a very strong URL spam filtering feature.

View full review »
MT
IT Engineer at FormatPC

It's a great product with solid features.

It's a security appliance and it is quite secure.

They are quite well integrated.

View full review »
DS
Director, GRC Applications and Systems Delivery at a tech company with 501-1,000 employees

The most valuable feature for us is the integration with DLP. 

View full review »
MS
Consultor de Soluções at a tech services company with 10,001+ employees

I like the encrypted disk feature and the endpoint protection.

View full review »
it_user535407 - PeerSpot reviewer
Security Analyst IV - Risk Management at a energy/utilities company with 1,001-5,000 employees

Currently, we are using cloud discovery and analytics. This has given us an insight to which services our end users are subscribing to and where our business data may be held.

View full review »
it_user789939 - PeerSpot reviewer
IT Security at a financial services firm with 5,001-10,000 employees

Skyhigh has given us categorization and rating of websites separate from what the web proxy places on the logs.

View full review »
it_user774840 - PeerSpot reviewer
Works at a healthcare company with 1,001-5,000 employees
it_user732489 - PeerSpot reviewer
IT Security Support Analyst with 5,001-10,000 employees

All the information available on each service, including its risk assessment. Service groups, automatic assignment of services based on designated conditions, and the ability to utilize multiple log sources for the data.

View full review »
it_user540324 - PeerSpot reviewer
System Developer Analyst at a tech services company with 10,001+ employees

It has a very user-friendly UI and is easier to pick up for people with less technical experience.

View full review »
HK
Lead - Information Security at a tech services company with 10,001+ employees

They provide a variety of options for scalability, where we can use it over the cloud, or we can deploy it on-premises through our proxy. We can also use agent-based installation. Together, from a coverage point of view, the solution is pretty good. The other products that I have evaluated do not have the scalability options that McAfee has.

View full review »
it_user760911 - PeerSpot reviewer
Information Security Lead Analyst at a healthcare company with 1,001-5,000 employees

The user analytics.

View full review »
it_user757260 - PeerSpot reviewer
Information Security Analyst at a security firm with 1,001-5,000 employees
  • Tokenization
  • User analytics
View full review »
MR
IT Intern

It is easy to configure rules.

View full review »
NF
Security Engineer at a tech services company with 201-500 employees

I like the anti-virus filtering, URL categorization, and reporting capabilities. I also like the ability to control what kinds of files or content can be downloaded. So you can restrict executables and potential harmful files. It's a very sophisticated and mature solution. 

View full review »
it_user775083 - PeerSpot reviewer
Information Assurance Manager at a transportation company with 10,001+ employees

The risk management feature.

View full review »
it_user581127 - PeerSpot reviewer
Cyber Security Analyst at a tech services company

Skyhigh's shadow IT capability and cloud risk registry are the two most helpful tools for our organization.

View full review »
SK
Security Engineer at a tech services company with 51-200 employees

The solution is stable. The performance has been great.

It's an easy-to-use product. We find it to be quite user-friendly.

The scalability of the product is excellent. 

Overall, we have been very happy with the product. It's been working well.

The installation was straightforward and pretty simple. 

View full review »
it_user757164 - PeerSpot reviewer
INNOVATOR,ENGINEER,DREAMER! at a tech company with 51-200 employees
  • Box API features with DLP capabilities
  • Shadow IT
View full review »
it_user776880 - PeerSpot reviewer
IT Security Analyst at a tech services company

User analytics.

View full review »
RB
Information Security Analyst at a tech services company
  • Skyhigh's Shadow IT capability
  • Cloud Risk Registry
  • DLP policies and anomalies
View full review »
it_user757164 - PeerSpot reviewer
INNOVATOR,ENGINEER,DREAMER! at a tech company with 51-200 employees
  • Prevents unauthorized data being shared from external sources.
  • Enforces data loss prevention.
  • DLP reporting and deep integration.
View full review »
it_user758346 - PeerSpot reviewer
Student at Marri Educational Society's Marri Laxman Reddy Institute of Technology and Management at a tech company with 51-200 employees

Tokenization.

View full review »
it_user758421 - PeerSpot reviewer
Attended JNTUH College of Engineering Hyderabad at a tech company with 51-200 employees
it_user758109 - PeerSpot reviewer
-- at a tech company with 51-200 employees

Sanctioned IT.

View full review »
it_user755946 - PeerSpot reviewer
Student at a tech company with 51-200 employees
  • Shadow IT
  • Sanctioned IT
View full review »
Buyer's Guide
Skyhigh Security
March 2024
Learn what your peers think about Skyhigh Security. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
765,234 professionals have used our research since 2012.