We performed a comparison between Check Point Quantum SASE and Skyhigh Security based on real PeerSpot user reviews.
Find out in this report how the two Secure Access Service Edge (SASE) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The solution is stable."
"The most valuable features are the antivirus as a whole, the anti-malware, and all of the protection features that scan our enterprise devices."
"On the outside, the main differentiation is because Lookout ingest. They have ingested basically all of the apps for the last ten years and all the versions of all the apps, and we have that in a corporate database that allows us to do very large-scale machine learning and analysis on that data set. That's not something that any of the competitors really have the capability to do because they don't have access to the data set. A lot of the apps you can no longer get them because that version of the app is five or six years old, and it just doesn't exist anywhere anymore, except within our infrastructure. So, the ability to have that very rich dataset and learn from that dataset is a real differentiator."
"The protection offered by the product is the most valuable feature. It detects vulnerabilities or traps on our users' phones and then prompts them to clean up their devices. Tools we used previously would only discover, which required us to gather information on the backend, so Lookout is a welcome upgrade."
"The Harmony Connect solution helped by unifying in a single portal all the necessary accesses for the company's internal employees, such as RDP, SSH, bank access databases, and even internal portals, bringing security and organization to the entire environment and facilitating employee access with a single, centralized login to the entire environment."
"I find it very easy to implement and deploy in the organization."
"The DRP is the most valuable feature."
"The installation is very easy."
"The solution has many valuable aspects, including anti-Phishing, which blocks phishing attacks in all applications (email, messaging, and social networks)."
"It is a very stable solution."
"It has centralized management that allows administrators to supervise and control the security of the entire network."
"The integration that this solution has with the different routers or perimeter equipment is exceptional."
"There is [a feature] called cloud registry where we can see a risk assessment for the cloud services being used. If we want to add a new cloud service or a new cloud application, we can check into it and do an assessment through the cloud registry."
"I personally don't have any issues with the performance or the stability of the solution."
"The feature I found most valuable is the API."
"It's an easy-to-use product."
"DLP policies and anomalies."
"We have gained a deep insight into our Shadow IT usage as well as the different activities involved in Office 365."
"It's a great product with solid features."
"User analytics."
"From the analysis that we've done, they do seem to be maybe a step behind in trying to enter the market with a new solution. But when they do pick up, they do come out with some good products."
"Lookout was moving into the SSE space. And so their work on SecureWeb Gateway and SD-WAN is still sort of evolving."
"The stability depends on the service from where you access it. Because sometimes, the place you are in, you have Gateway. You don't have Gateway. The gateway is overutilized. At the end, you need to go through their gateways. And this is the key point here. You have a tracking point. If it's not well orchestrated, and it scales up as you add more to the existing team, you will suffer"
"We just submitted an enhancement request reflecting the main area we want to see improvement in; the APIs. Currently, we're able to build dashboards, but it's somewhat backward because we use our MDM API to create them. Lookout should provide API to customers so we can query our data and use it in our cloud, and this is the only outstanding area for improvement with the product right now."
"In mobile devices, there is also sometimes a bit of tear when it is via LTE, however, that must be due to connectivity."
"Sometimes downloading PDF files can be slow."
"They should work towards the WAN intergration."
"An improvement could be made in terms of achieving better coverage in such complicated regions as the Asia Pacific, China, and Russia."
"In order to be able to invite users, send the agent and implement it, the user input must be generated manually."
"There is an issue when installing the Check Point client."
"Regarding the support, the schedules can be improved since they are generally in another geographical area, and it is difficult to solve the problems with the time differences between them and us."
"The access to the portal should be faster. It shouldn't crash a lot."
"It would be nice to be able to get more advanced search functions to filter out data and quickly obtain the data that we need."
"SkyHigh has the ability to place users or groups on a ‘Watchlist’; which allows you to see certain views with these Watchlists users/groups in them. This is great when you are looking at live data but if I wanted to generate a report on "only" the watchlists."
"The encrypted disk implementation could be improved. I currently use it from a dongle or USB key with two-factor authentication to access my computer."
"One thing that can be improved is their ability to integrate with other web proxies to discover unsanctioned IP apps."
"Needs integration with other technology ecosystems."
"An area for improvement in Skyhigh Security is its UI. It needs to be enhanced and made more user-friendly. Right now, the UI of Skyhigh Security is sometimes confusing. For example, my company is deploying Skyhigh Security for a client and integrating it on the cloud, from an on-premises deployment to a hybrid deployment. Though the experience isn't bad, there needs to be more enhancements. Another room for improvement in Skyhigh Security is the limited training resources, especially when you compare it with Cisco, which has many study materials in the market, even free training resources. You'll get limited resources if you search for Skyhigh Security tutorials on Google and YouTube. Because of high-security requirements and the training material for Skyhigh Security not being available, most engineers and architects avoid the product because there'd be a lack of knowledge in configuring and achieving the goals you'd want to reach via the use of Skyhigh Security. The NOC team deploying the product is having difficulty getting training resources for Skyhigh Security. You'll be charged an enormous amount if you search the market for training because of the limited resources available. Skyhigh Security needs to work on marketing and awareness as an improvement to the product."
"The tool could improve flexibility with the creation of reports/querying data."
"There isn't really any aspect that is lacking."
Check Point Quantum SASE is ranked 8th in Secure Access Service Edge (SASE) with 31 reviews while Skyhigh Security is ranked 9th in Secure Access Service Edge (SASE) with 51 reviews. Check Point Quantum SASE is rated 8.4, while Skyhigh Security is rated 8.4. The top reviewer of Check Point Quantum SASE writes "Very agile with a granular level of control over users ". On the other hand, the top reviewer of Skyhigh Security writes "Good scalability, but the technical support service needs improvement". Check Point Quantum SASE is most compared with Prisma Access by Palo Alto Networks, Perimeter 81, Cisco Umbrella, Netskope and Zscaler Zero Trust Exchange, whereas Skyhigh Security is most compared with Zscaler Internet Access, Netskope , Microsoft Defender for Cloud Apps, Symantec Proxy and Zscaler CASB. See our Check Point Quantum SASE vs. Skyhigh Security report.
See our list of best Secure Access Service Edge (SASE) vendors.
We monitor all Secure Access Service Edge (SASE) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.