No more typing reviews! Try our Samantha, our new voice AI agent.

BigID Next vs Skyhigh Security comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Jan 22, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cloudflare One
Sponsored
Ranking in Data Loss Prevention (DLP)
20th
Average Rating
8.6
Reviews Sentiment
6.5
Number of Reviews
23
Ranking in other categories
Email Security (20th), Secure Web Gateways (SWG) (13th), Cloud Access Security Brokers (CASB) (12th), Distributed Denial-of-Service (DDoS) Protection (7th), Software Defined WAN (SD-WAN) Solutions (12th), Access Management (11th), Bot Management (3rd), ZTNA as a Service (9th), ZTNA (4th), Secure Access Service Edge (SASE) (10th), Remote Browser Isolation (RBI) (3rd)
BigID Next
Ranking in Data Loss Prevention (DLP)
8th
Average Rating
8.2
Reviews Sentiment
7.0
Number of Reviews
15
Ranking in other categories
Data Governance (4th), Data Privacy Management Software (1st), Data Security Posture Management (DSPM) (4th), AI Data Analysis (3rd)
Skyhigh Security
Ranking in Data Loss Prevention (DLP)
21st
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
57
Ranking in other categories
Secure Web Gateways (SWG) (10th), Cloud Access Security Brokers (CASB) (11th), ZTNA as a Service (14th), Secure Access Service Edge (SASE) (12th)
 

Mindshare comparison

As of May 2026, in the Data Loss Prevention (DLP) category, the mindshare of Cloudflare One is 2.1%, up from 1.4% compared to the previous year. The mindshare of BigID Next is 2.7%, down from 4.4% compared to the previous year. The mindshare of Skyhigh Security is 0.9%, up from 0.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Data Loss Prevention (DLP) Mindshare Distribution
ProductMindshare (%)
BigID Next2.7%
Cloudflare One2.1%
Skyhigh Security0.9%
Other94.3%
Data Loss Prevention (DLP)
 

Featured Reviews

CV
Network Architect at IP Dimension
Cloud security has improved remote access and has reduced costs for smaller client sites
I have used Cloudflare One's Identity-Aware Proxy, and it is quite straightforward from what I have seen so far. The app registration on the Azure side integrates fully into Cloudflare, and I am very satisfied with that part because it is easy to set up. The integration of Cloudflare One's Secure Web Gateway and Zero Trust Network Access works without any issues. That part is pretty automatic, and if you complete the rest of the setup, it comes together by itself with no issues from my side. What makes it nice is that we can actually start replacing on-site firewalls at this stage for the smaller clients because it does not matter if they go to a coffee shop or work from home; they are still secured by the same connection. The hops get shorter and you get better latency. We have done testing to see if it is better. One thing that we did notice with our proof of concept with our current client is that they have people connecting from the UK. When they used their previous VPN solution, uploading CAD drawings and other files to the server took a long time. They mentioned that it is much quicker on Cloudflare One's solution. I definitely believe that is part of the improved performance, and I am satisfied with that as well. What is nice about Cloudflare One is that it makes the setup easier and also easier to train technicians to maintain it. Compared to legacy systems, we do not need to get fancy firewalls in place that are costly. That is definitely also a cost-saver with Cloudflare One.
Aniruddha Nath - PeerSpot reviewer
Senior Security Consultant at a consultancy with 10,001+ employees
Data discovery has transformed compliance workflows and automation now speeds up requests and remediation
The best feature that BigID offers is data discovery and classification, which is the most powerful engine. It allows connecting to many different data sources, ranging from cloud to on-premises to structured to unstructured data. If there is no connector available, you can build your own classifiers as well. Regarding the custom classifier option, you can build custom classifiers using regular expressions, and I have done that if you know how to create regular expressions. Custom connectors are something you create to connect to a database where the connector is not available. BigID has positively impacted my organization as it's a very powerful tool, especially with the increasing regulatory compliances for different countries such as GDPR, CCPA, and India's recent DPDPA act. Having these tools in place greatly helps organizations avoid any penal charges for not being compliant with the regulatory compliances. For example, regarding compliance or reduced risks for my clients, the DSAR process I was talking about allows organizations to respond quickly to user data deletion requests under GDPR law, which traditionally has a 30-day or 60-day timeline. In larger organizations, when the number of requests is high, it becomes tedious. However, using DSAR automation with BigID, it's almost instantaneous; instead of 30 days, you can respond in just one day to what users have requested.
KS
Technical Associate Network Security at Valuepoint Systems
Proxy integration has strengthened email security and centralized monitoring for all branches
We have nearly 900 plus branches here, where we have rerouted our traffic through proxy like Trellix Skyhigh Security. We operate in a major financial sector in India, and that is why we use Skyhigh Security to reroute all our traffic via proxy for our security. Only then will it reach our gateway. We monitor all the URLs and the plant IPs in our proxy. We are tracing those IPs to see whether they have a valid code or not. We also check with Trellix Sandbox to determine whether the URL is malicious or not. Additionally, we have included our Cisco Umbrella with our proxy, so the DNS resolution happens on our Umbrella side. We continuously monitor the traffic on our proxy side. The threat protection feature is a major useful thing because for our 900 branches we monitor with this proxy only. If any issue or any URL does not reach, it is quite helpful to check whether the issue is in the proxy side or in the actual end-user side. It is quite easy to monitor. We do not get all those things from the firewall end, and it is quite easy to gather that information from the proxy, which is a major benefit here. It also majorly helps to hide our actual IPs, as we have directed all the IPs from the proxy, making it very helpful to hide our internal servers.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Cloudflare Access is part of the Zero Trust philosophy."
"It's a perfect solution from my perspective; it's easy to understand and easy to configure."
"The best feature is rate limiting. If I'm expecting 500 visits per hour, Cloudflare will limit the requests if I suddenly get 50,000."
"The capabilities of the software are strong enough for me to do what it's supposed to do. For me, we don't need to do a lot of configuration on our site. We just enable it and monitor it."
"The simplicity of the solution is its valuable features as almost no effort was needed to learn the configurations. It is also one of the cheapest firewalls available in this category."
"Clover is the best product globally."
"Using Cloudflare One makes my work quite easy because for DDoS protection, all I need to do is understand the OSI model and click; it makes it easier than trying to write a command line or use a Linux command."
"For Cloudflare Access, I am using the free plan...The most valuable feature is their protection."
"BigID integrates well with our other products."
"It provides a unified view across different databases and supports a wide range of data source types, including cloud and on-premises systems."
"Although I was serving the client rather than my own organization, BigID has made scans faster and more efficient, and the DSR results are much more accurate."
"My experience with BigID has been very positive and memorable, as BigID is simple, straightforward, and reliable when it comes to data discovery and data scanning exercises."
"I like BigID's in-depth discovery and scanning capabilities, especially for unstructured data. This feature is a standout compared to competitors. The tool's data classification capabilities are impressive. It offers custom classifiers and a blend of regular exploration and artificial intelligence, making it a next-generation solution. This enhances data security, and its security posture management is straightforward and user-friendly."
"BigID's scanning feature is its most valuable component."
"The best feature that BigID offers is data discovery and classification, which is the most powerful engine, allowing connection to many different data sources ranging from cloud to on-premises and from structured to unstructured data, with the ability to build your own classifiers if no connector is available."
"The features that I have found most valuable are the user experience, the credentialing, and that BigID is user friendly."
"We are able to see what cloud services are being used with more clarity than with our proxies."
"What I found most valuable in Skyhigh Security is its stability. The solution also has good KB articles that make it simple for users to do the deployment of Skyhigh Security themselves, without the need for integrators."
"The support is excellent."
"I found the solution to be stable."
"The ability to identify shadow IT within our environment through proxy log analysis based on risk assessments provided by Skyhigh Registry have been invaluable in helping us reduce our overall data risk."
"Without Skyhigh, we had zero visibility, but now we are aware of so much more."
"Shadow IT Sanctioned IT."
"It is easy to configure rules."
 

Cons

"Feedback could be enhanced. While I work efficiently with Clover as a partner in Mexico City, sometimes the information and requests are easier to manage with more concrete solutions."
"Our customers no longer use Cloudflare because its service is subpar."
"Cloudflare DDoS has poor technical support."
"Our subscription plan for the solution has a limitation of bot signatures."
"There are premium tier live service and lower tier live service, so we opted for the lower tier. But there is no medium tier where we pay a little extra and get a bit more service. So if that can be improved."
"Cloudflare One is not very powerful, but for what we require, it is basic and sufficient."
"The response time for support must be reduced."
"The initial onboarding was causing us some confusion."
"One area where BigID can be improved is the UI, which has a lot of bugs."
"The tool currently lacks security features."
"Improvement could be made in data consent management and data privacy impact assessment."
"The challenge we encountered was with data connection across multiple databases. We struggled with configuring the data connection successfully. However, with the assistance of dynamic teams, we resolved this issue."
"I want them to focus on data mapping, assessment, automation workflow, and privacy incident management."
"Some users find catalog navigation challenging due to the lack of a search-by-column feature, which makes it difficult to locate specific data quickly."
"One improvement I would suggest is addressing the intermittent failures of BigID scans, as there are times when some errors occur."
"There are some shortcomings when it comes to Calvirus authentication, which is not yet supported by BigID."
"One area for improvement I've seen in Skyhigh Security is that it lacks support for unsanctioned applications, where customers have their applications. Those applications do not come from Microsoft or other popular vendors. For example, Microsoft has support for Teams and it has support for OneDrive, but it doesn't have support for custom applications built by customers. Customers have internal teams building and publishing applications to the external world, but Skyhigh Security doesn't have support for those applications, and this is the main problem I've seen. The solution only supports a pool of applications that are from Microsoft and other major SaaS vendors. McAfee doesn't provide support for custom applications, compared to other vendors who provide it. For example, Bitglass and Netskope both have support for custom applications. Another area for improvement in Skyhigh Security is that its API support is a little weak. I also have not seen a strong integration between the solution and other McAfee products."
"The encrypted disk implementation could be improved. I currently use it from a dongle or USB key with two-factor authentication to access my computer."
"It is an expensive solution."
"De-tokenization."
"Skyhigh Security, as a product, is excellent, but in terms of the right services and support, those are lagging very much, for example, in Trellix. From one hundred, its score has gone down to ten, so ten out of one hundred, otherwise, it's the number one product."
"McAfee Web Gateway could improve the reporting. We have the reporting on a separate server and sometimes the database becomes full."
"Iron out the few bugs that I've seen."
"It has many gaps, so I think some customers take three months and up to six months for the deployment of Skyhigh Security, and after the deployment, they use it for years."
 

Pricing and Cost Advice

"The pricing is somewhere in the middle. I would rate the pricing a seven out of ten."
"Cloudflare Zero Trust Platform's pricing is good."
"The prices are slightly expensive."
"The price tag is no longer $200,000, but rather $300,000 to $400,000. It's twice."
"My company has to make yearly payments towards the licensing costs attached to the solution. There are no hidden charges apart from the licensing costs of the solution."
"The solution is not that expensive."
"The pricing of the solution is cheap. The licensing cost is also very low. I rate the cost and pricing a three out of ten."
"The solution's pricing lacks transparency."
"The product is expensive, but so are all competitor tools"
"The solution is not licensed per user but rather based on capacity. For instance, organizations with large amounts of data, such as 50 GB or more, are the ones that typically qualify for BigID."
"I think that BigID's pricing is very reasonable."
"The pricing depends. If you have thousands of data sources to connect and manage, and you struggled with an MDM package in the past, you'll find BigID valuable and even cheap. But if you're a small business, it's probably not the right tool for you."
"The solution is expensive."
"Pricing for Skyhigh Security is okay, though there's always a scope for price improvements. Its pricing is okay compared to other products because other products have very expensive licensing costs. Along with the licensing, support is also provided for Skyhigh Security, so pricing is reasonable, but if there's proactive or better support, that will justify the pricing. I haven't interacted with the Skyhigh Security technical support team yet, so I'd give pricing a four out of five rating for now."
"There is a license required to use this solution and it is paid annually. The price is reasonable."
"The price of the solution is good and we pay an annual license."
"They definitely charge a huge amount. All the security service providers charge a huge amount."
"It's an expensive solution."
"Some of our clients have a perpetual license and pay additional support yearly."
"Commercially, I find Skyhigh Security a little costlier, compared to other products such as SentinelOne or Cybereason which are really novelty products. I'm not comparing Skyhigh Security with Trend Micro, but with other products, in particular the new, next-generation products. The price for Skyhigh Security is high in terms of value and ROI. I would rate the product price combined with product efficacy a six out of ten."
"Skyhigh provided a FedRAMP solution, tokenization, a better shadow IT capability, and lower cost."
report
Use our free recommendation engine to learn which Data Loss Prevention (DLP) solutions are best for your needs.
894,738 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Construction Company
20%
Comms Service Provider
11%
Financial Services Firm
9%
Manufacturing Company
6%
Financial Services Firm
20%
Manufacturing Company
8%
Insurance Company
8%
Comms Service Provider
6%
Financial Services Firm
14%
Government
11%
Manufacturing Company
9%
Computer Software Company
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business10
Midsize Enterprise1
Large Enterprise12
By reviewers
Company SizeCount
Small Business5
Large Enterprise11
By reviewers
Company SizeCount
Small Business28
Midsize Enterprise6
Large Enterprise40
 

Questions from the Community

What needs improvement with Cloudflare Access?
Cloudflare Access has strong integration with Microsoft, among other platforms. However, when it comes to Kaspersky, ...
What is your primary use case for Cloudflare Access?
Cloudflare Access provides secure access to internal applications for employees, external members of the organization...
What advice do you have for others considering Cloudflare Access?
Cloudflare Access is one of the best integrations available. While about two hundred vendors offer similar services, ...
What do you like most about BigID?
I like BigID's in-depth discovery and scanning capabilities, especially for unstructured data. This feature is a stan...
What needs improvement with BigID?
One improvement I would suggest is addressing the intermittent failures of BigID scans, as there are times when some ...
What is your primary use case for BigID?
BigID's main use case is connecting to various data sources to perform the data discovery process, classify the data ...
What needs improvement with McAfee Web Gateway?
When compared to other technologies, Skyhigh Security is quite simple, but if there is any improvement in the GUI, it...
What is your primary use case for McAfee Web Gateway?
I am currently working on Cisco Email Security Gateway, ESA, and I am also exploring Trellix Skyhigh proxy. I have be...
What advice do you have for others considering McAfee Web Gateway?
For IAM, we are using other tools, as we are a financial institution, so we do not go with a single vendor platform. ...
 

Also Known As

Cloudflare Area 1 Email Security, Cloudflare Bot Management, Cloudflare Gateway, Cloudflare Zero Trust Platform, Cloudflare DDoS, Cloudflare SASE & SSE Platform
No data available
McAfee MVISION Cloud, McAfee MVISION Unified Cloud Edge, McAfee Web Gateway, McAfee MVISION CNAPP, and Skyhigh Networks, McAfee Web Gateway
 

Interactive Demo

Demo not available
Demo not available
 

Overview

 

Sample Customers

23andMe
Home Depot, Grant Thornton LLP, Cimpress, Fidelity Investments
Western Union.Aetna.DirecTV.Adventist.Equinix.Perrigo.Goodyear.HP.Cargill.Sony.Bank of the West.Prudential.
Find out what your peers are saying about BigID Next vs. Skyhigh Security and other solutions. Updated: April 2026.
894,738 professionals have used our research since 2012.