Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Browse vs Skyhigh Security comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 4, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

iboss
Sponsored
Ranking in Secure Web Gateways (SWG)
6th
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
19
Ranking in other categories
Internet Security (3rd), Web Content Filtering (1st), Cloud Access Security Brokers (CASB) (7th), ZTNA as a Service (10th), Secure Access Service Edge (SASE) (9th)
Check Point Harmony Browse
Ranking in Secure Web Gateways (SWG)
15th
Average Rating
8.8
Reviews Sentiment
7.5
Number of Reviews
26
Ranking in other categories
Enterprise Browsers (4th)
Skyhigh Security
Ranking in Secure Web Gateways (SWG)
20th
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
56
Ranking in other categories
Data Loss Prevention (DLP) (28th), Cloud Access Security Brokers (CASB) (11th), ZTNA as a Service (16th), Secure Access Service Edge (SASE) (17th)
 

Mindshare comparison

As of July 2025, in the Secure Web Gateways (SWG) category, the mindshare of iboss is 2.1%, up from 1.7% compared to the previous year. The mindshare of Check Point Harmony Browse is 0.7%, up from 0.3% compared to the previous year. The mindshare of Skyhigh Security is 3.1%, down from 3.5% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Secure Web Gateways (SWG)
 

Featured Reviews

Matt Crockford - PeerSpot reviewer
It's easy to roll out, and their understanding of our business made it seamless
One aspect we value about iboss is its simplicity. Their customer service is brilliant, and they are super responsive and knowledgeable. It's easy to roll out, and their understanding of our business made it seamless. We were impressed by the solution's mental health function, which can detect if someone needs help. It scans what users are browsing and flags warning signs so we can check to see if they are okay. We've had to use it a couple of times. The user interface is highly intuitive. Our IT team picked it up with minimal training. It's arranged so that it's easy to find where things are. Another advantage is the single pane of glass console, which gives you visibility into what's happening. We're not fully there yet because we haven't implemented zero trust, but we're excited about the possibilities from the demos we've seen. We launched a POC of iboss' ChatGPT Risk Protection feature two weeks ago. AI is a great tool, but you need to be careful what you put into it. My biggest fear is employees inputting sensitive corporate information or customer PII data into one of these chatbots. I was impressed by our trial of the feature. It's exactly what we wanted. Now, when a user goes to ChatGPT, there's a banner warning them not to share information, and we can block conversations containing customer data like bank details and email addresses. I don't want to stop people from using it, but we need visibility. We've only tried it on a test group of 15 people. You can configure it to look for specific keywords or integrate it with your DLP policy if you have that configured
AndreiBosinceanu - PeerSpot reviewer
Real-time threat intelligence enhances security and user confidence
At this point, I do not have any suggestions for improvements to Check Point Harmony Browse because I haven't encountered anything that would need changing. If a solution is installed correctly, it usually won't fail. It's hard to suggest new features for Check Point Harmony Browse because it's a sub-component of a larger Harmony Endpoint Security solution, which is handled separately under specific situations, and while it has many options, it already scans and delivers files efficiently. Regarding the scanning of large files in Check Point Harmony Browse, the process typically involves sending the file to Check Point cloud for scanning and returning the clean file to the user, which is inherently complex and I do not see how it could be optimized to be faster.
Santiago Gomez - PeerSpot reviewer
Has improved the organization's PCI compliance with data loss prevention
I use the solution on a Macintosh computer and it has issues and does not work when I try to log in from the Safari Browser, but it works fine when I log in from the Google Chrome browser. The console has issues when the login is done through a Safari Browser. The console has to be more competitive and the compatibility of the browser needs to be better. I want to know about Skyhigh's competitiveness with other brands and about the vulnerability assessment and micro segmentations. I know Skyhigh has other products, but right now, I am studying what this new product is about. They only have English support, so I would like for them to add some Spanish support.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"iboss is easy to use despite its complexity. Multiple engineers manage it, but it's significantly more straightforward to administer than traditional VPNs and web proxies."
"We were impressed by the solution's mental health function, which can detect if someone needs help. It scans what users are browsing and flags warning signs so we can check to see if they are okay. We've had to use it a couple of times."
"The console is cloud-based, which is something I really appreciate."
"Content filtering is the most useful feature of iboss."
"iboss has significantly lowered the number of security incidents. It is crazy how much it blocks and how much it is aware of the outside danger."
"Iboss is a solution that prevents advanced persistent threats, and has a zero tolerance for attacks."
"Its initial setup was straightforward."
"Technical support is pretty sharp and very responsive."
"It completely restricts and blocks phishing attacks and any threat entry into the system and keeps the work pace fast and secure without showing any signs of lag or latency."
"It provides end-to-end encryption for the communication between the user's device and the remote browser, which helps to protect against eavesdropping and other forms of man-in-the-middle attacks."
"Check Point Harmony Browse has a feature that allows users to check the extensions installed in their browser. This feature is valuable because hackers may install malicious extensions on a target computer without the user's knowledge. When browsing, users are often less aware of the extensions installed in their browsers, making it easier for malicious extensions to go unnoticed. By providing visibility into installed extensions, Check Point Harmony Browse enhances security by allowing users to identify and remove potentially harmful extensions."
"Check Point's technical support is very impressive."
"The downloaded protection as it scans and emulates the files on a browser level is great."
"The installation process is simple. Once initiated, the process is quite straightforward and seamless, making it easy to complete."
"Its content filtering is great."
"Check Point Harmony Browse has greatly impacted our organization positively."
"Offers a very strong URL spam filtering feature."
"Overall, the performance is good."
"All the information available on each service, including its risk assessment."
"The risk rating of each cloud application has been very useful. Whenever we discover a new application is use, we are able to quickly determine if this application is safe to use and whether or not we should allow our end users to be able to access it."
"Tokenization."
"The other products that I have evaluated do not have the scalability options that McAfee has."
"I personally don't have any issues with the performance or the stability of the solution."
"Skyhigh offers solutions like WLP and CASB. These tools provide instructions and guidelines for enhancing data security. Additionally, they offer additional software solutions for further protection."
 

Cons

"If they could implement an extra security layer preventing access to iboss from the open internet, it would be great."
"Its pricing could be better."
"Iboss is growing so fast that it is often hard for them to keep up with the challenges."
"I'd like to see them accelerate development on the security side, particularly around data loss prevention."
"File integrity monitoring would be very advantageous as an additional feature."
"Our biggest problem with their service was it did not recognize the device and filtering did not always work correctly."
"One thing I would like to see differently with their Zero Trust platform is that some of the AI aspects related to high-risk activities have more false positives."
"The reporting feature needs improvement."
"The ease of handling should be improved, as it is currently intrusive and some users don't like it."
"A slight reduction in the cost subscription model can prove to be a game changer."
"The pricing for Check Point Harmony Browse can be a bit pricey sometimes, depending on the project."
"The pricing for Check Point Harmony Browse can be a bit pricey sometimes, depending on the project."
"By default, on Harmony Browse there is no URL group which is commonly blocked worldwide."
"They should focus on new areas of product. In the last year, they have not released any updates with improvements or extra options."
"security solution for users Devices and Access" What is our primary use case? The application is good as its lightweight and its functions are really similar to a browser extension. It offers real-time protection for internet users by addressing active concerns. Moreover, it incorporates a reputation feature to ensure swift access to websites within a second. The effectiveness of Harmony Browse’s capabilities is really an advantage. What is most valuable? The installation process is simple. Once initiated, the process is quite straightforward and seamless, making it easy to complete. What needs improvement? Regarding the Harmony Browse, I call it "Kuna" which is accurate. The quantum product serves as my primary focus due to its project cost, and I aim to introduce support in this area. This is because firewall implementation holds significant importance for organizations. I want to improve more on the quantum losses. There's a concept I'd like to include in Harmony Browse, known as automatic catching. This mechanism comes into play when an individual closes their browser while possessing sensitive information, like monetary data. To counteract potential risks, we employ a browser cache-clearing process to minimize the cache's accumulation. This action ensures that malicious entities can't exploit the cached data for attacks. To enhance this further, there's potential for the implementation of a self-cleaning technology. For instance, when a user exits the browser, an automatic action could be initiated to clear the browser cache, serving as an additional layer of security. This can be helpful if added."
"It seems to us that the performance in some opportunities of Check Point Infinity and the administration web portal is slow."
"It is an expensive solution."
"Skyhigh Security is complex to manage. While it should ideally be more user-friendly, customers often find themselves having to manage it post-deployment."
"MVISION Cloud is not well known and there should be more information about the solution. There could be integration to local applications."
"De-tokenization."
"An area for improvement in Skyhigh Security is its UI. It needs to be enhanced and made more user-friendly. Right now, the UI of Skyhigh Security is sometimes confusing. For example, my company is deploying Skyhigh Security for a client and integrating it on the cloud, from an on-premises deployment to a hybrid deployment. Though the experience isn't bad, there needs to be more enhancements. Another room for improvement in Skyhigh Security is the limited training resources, especially when you compare it with Cisco, which has many study materials in the market, even free training resources. You'll get limited resources if you search for Skyhigh Security tutorials on Google and YouTube. Because of high-security requirements and the training material for Skyhigh Security not being available, most engineers and architects avoid the product because there'd be a lack of knowledge in configuring and achieving the goals you'd want to reach via the use of Skyhigh Security. The NOC team deploying the product is having difficulty getting training resources for Skyhigh Security. You'll be charged an enormous amount if you search the market for training because of the limited resources available. Skyhigh Security needs to work on marketing and awareness as an improvement to the product."
"The documentation could be improved."
"They could be integrated with CASB. I think normally McAfee has this solution in the cloud, but for us the best is on-premise."
"They only have English support, so I would like for them to add some Spanish support."
 

Pricing and Cost Advice

"We had the cost of purchasing a new appliance along with the implementation and licensing costs. However, the following year, the cost of just licensing was similar to what was paid the previous year for a new appliance along with the implementation and licensing costs."
"It is probably in line with other solutions, but I do not deal with the financial side."
"It is not expensive, and it is also not cheap. iboss is priced right in the sweet spot for the number of features it offers."
"The overall pricing for iboss is very competitive and transparent."
"We have not priced the solution recently, but they were competitive with other vendors in the past."
"It is expensive compared to one of its competitors."
"The price is not very expensive for our organisation, but for others, it might be a little expensive."
"The product has a reasonable pricing."
"Commercially, I find Skyhigh Security a little costlier, compared to other products such as SentinelOne or Cybereason which are really novelty products. I'm not comparing Skyhigh Security with Trend Micro, but with other products, in particular the new, next-generation products. The price for Skyhigh Security is high in terms of value and ROI. I would rate the product price combined with product efficacy a six out of ten."
"There is an annual licensing cost to use McAfee Web Gateway. The purchasing of licensing can be difficult for the government sector."
"The biggest thing to watch for is the difference in price per monitored user for the different API integrations."
"There is a license required to use this solution and it is paid annually. The price is reasonable."
"Some of our clients have a perpetual license and pay additional support yearly."
"This is an expensive product, but you have to compare that with other solutions that are on the market."
"The tool is not expensive."
"It's an expensive solution."
report
Use our free recommendation engine to learn which Secure Web Gateways (SWG) solutions are best for your needs.
860,168 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
12%
Financial Services Firm
11%
Manufacturing Company
9%
Government
6%
Computer Software Company
32%
Manufacturing Company
8%
Security Firm
7%
Financial Services Firm
7%
Educational Organization
30%
Financial Services Firm
11%
Manufacturing Company
8%
Computer Software Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about iboss?
Content filtering is the most useful feature of iboss.
What needs improvement with iboss?
For zero trust implementation, we encountered complexity issues, especially with a large infrastructure company Exxon...
What is your primary use case for iboss?
Previously when I used iboss, we did the POC for iboss for ExxonMobil. Four or five people wanted to move from our ol...
What needs improvement with Check Point Harmony Browse?
There is always scope for improvement for Check Point Harmony Browse, particularly in the user interface and adding t...
What is your primary use case for Check Point Harmony Browse?
We are working in a SOC environment as an MSSP ( /categories/managed-security-services-providers-mssp ) SOC. Our clie...
What do you like most about McAfee Web Gateway?
Data loss prevention and user behavior analysis are two valuable features.
What needs improvement with McAfee Web Gateway?
The solution has room for improvement in its DDoS protection. Additionally, the documentation needs enhancement to pr...
What is your primary use case for McAfee Web Gateway?
The typical use case for our clients is cloud security.
 

Also Known As

iBoss Cloud Platform
No data available
McAfee MVISION Cloud, McAfee MVISION Unified Cloud Edge, McAfee Web Gateway, McAfee MVISION CNAPP, and Skyhigh Networks, McAfee Web Gateway
 

Interactive Demo

Demo not available
 

Overview

 

Sample Customers

More than 4,000 global enterprises trust the iboss Cloud Platform to support their modern workforces, including a large number of Fortune 50 companies.
Information Not Available
Western Union.Aetna.DirecTV.Adventist.Equinix.Perrigo.Goodyear.HP.Cargill.Sony.Bank of the West.Prudential.
Find out what your peers are saying about Check Point Harmony Browse vs. Skyhigh Security and other solutions. Updated: June 2025.
860,168 professionals have used our research since 2012.