No more typing reviews! Try our Samantha, our new voice AI agent.

CyberArk Secure Cloud Access vs Skyhigh Security comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Mar 29, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

iboss
Sponsored
Ranking in Cloud Access Security Brokers (CASB)
7th
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
19
Ranking in other categories
Secure Web Gateways (SWG) (5th), Internet Security (3rd), Web Content Filtering (1st), ZTNA as a Service (7th), Secure Access Service Edge (SASE) (8th)
CyberArk Secure Cloud Access
Ranking in Cloud Access Security Brokers (CASB)
16th
Average Rating
8.4
Reviews Sentiment
5.7
Number of Reviews
6
Ranking in other categories
Cloud Infrastructure Entitlement Management (CIEM) (7th)
Skyhigh Security
Ranking in Cloud Access Security Brokers (CASB)
12th
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
57
Ranking in other categories
Secure Web Gateways (SWG) (16th), Data Loss Prevention (DLP) (32nd), ZTNA as a Service (17th), Secure Access Service Edge (SASE) (15th)
 

Mindshare comparison

As of March 2026, in the Cloud Access Security Brokers (CASB) category, the mindshare of iboss is 2.7%, up from 1.8% compared to the previous year. The mindshare of CyberArk Secure Cloud Access is 0.6%. The mindshare of Skyhigh Security is 3.4%, up from 3.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Cloud Access Security Brokers (CASB) Mindshare Distribution
ProductMindshare (%)
iboss2.7%
Skyhigh Security3.4%
CyberArk Secure Cloud Access0.6%
Other93.3%
Cloud Access Security Brokers (CASB)
 

Featured Reviews

reviewer2701851 - PeerSpot reviewer
Managing Director
Enhances web security with a single pane of glass and flexible deployment
I don't see any need for improvement; one of the really good things about iboss as a company is that they listen to customer feedback. I have suggested enhancements, and they are responsive, making changes for the better, and they do a lot of testing. To improve iboss, although we haven't used it, we considered the VPN solution that comes with the highest tier licensing, which includes DLP and various other add-ons. We prefer using another product which automatically logs you back onto your network when turning on your PC. With iboss, the connection is manual, which doesn't meet our needs. Additionally, sizing can be tricky because, although the initial recommendations may seem adequate, actual usage may require more gateways than anticipated.
Manojkumar Reddy - PeerSpot reviewer
Associate Technology Consultant at a tech vendor with 10,001+ employees
Centralized cloud access has strengthened identity control and simplified keyless logins
The best feature of CyberArk Secure Cloud Access is that private keys can be configured once and users can log in using CyberArk credentials. Instead of providing the private key every time into the system, it is not needed. With CyberArk, we do not require it and can directly use CyberArk credentials to access the virtual machines or run the pipelines. Using CyberArk credentials instead of private keys has made things easier for our team because previously every user had to remember the private key and store it somewhere else and insert it whenever they attempted to log into the server. This was cumbersome. Instead, organizations use CyberArk to configure the private keys, which helps because it is no longer required for users to store it on their system or somewhere else to maintain security. This additionally prevents users without access to the server from logging in. This feature of CyberArk Secure Cloud Access also reduces time and dependency on other people. Once a user is given access, they can be tracked anytime and anywhere. Access is revocable whenever people leave the organization. CyberArk Secure Cloud Access has positively impacted our organization because we have observed many changes. One significant impact is that since implementing it, the dependency on people has drastically been reduced. Additionally, we do not need to log in or store the private keys every time as they can be automatically configured.
KS
Technical Associate Network Security at Valuepoint Systems
Proxy integration has strengthened email security and centralized monitoring for all branches
We have nearly 900 plus branches here, where we have rerouted our traffic through proxy like Trellix Skyhigh Security. We operate in a major financial sector in India, and that is why we use Skyhigh Security to reroute all our traffic via proxy for our security. Only then will it reach our gateway. We monitor all the URLs and the plant IPs in our proxy. We are tracing those IPs to see whether they have a valid code or not. We also check with Trellix Sandbox to determine whether the URL is malicious or not. Additionally, we have included our Cisco Umbrella with our proxy, so the DNS resolution happens on our Umbrella side. We continuously monitor the traffic on our proxy side. The threat protection feature is a major useful thing because for our 900 branches we monitor with this proxy only. If any issue or any URL does not reach, it is quite helpful to check whether the issue is in the proxy side or in the actual end-user side. It is quite easy to monitor. We do not get all those things from the firewall end, and it is quite easy to gather that information from the proxy, which is a major benefit here. It also majorly helps to hide our actual IPs, as we have directed all the IPs from the proxy, making it very helpful to hide our internal servers.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"iboss is among the few products providing inline filtering where no application is needed on the device. It operates on the network side and is not device-based. This feature was one of the main reasons why we stayed with them for so long."
"I would rate the technical support of iboss a solid 10 without a shadow of a doubt."
"I would definitely recommend iboss for web filtering purposes to other organizations or individuals."
"We were impressed by the solution's mental health function, which can detect if someone needs help. It scans what users are browsing and flags warning signs so we can check to see if they are okay. We've had to use it a couple of times."
"Because of iboss, I did not have to assign web filtering tasks to my techs on a daily basis."
"The iboss solution gives me the ability to scan the traffic through all the ports, through all the 131,000 PCP and UDP ports, and with this ability, we have the granularity also for consults over social media and applications on mobile, and this is an advantage that the customers are looking for right now."
"The security aspect of the solution, particularly the malware behind it, is excellent."
"Its initial setup was straightforward."
"CyberArk Secure Cloud Access is a good product that is well positioned in the market as an enhancement that provides new possibilities beyond the classical PAM solution, for which CyberArk is most recognizable with its classical on-premises PAM."
"My advice to others looking into using CyberArk Secure Cloud Access is that it is a must-go product if they want to have a secure platform and secure product, and integrate it with the different products that the organization is using or virtual machines."
"The use of dynamic role-based access controls enhances our organization's cloud security as it is part of the controls that we require to meet our TFL obligations."
"Their presence in the European market and the cloud-based SaaS consumption model is the most exciting aspect for customers."
"My advice to others looking into using CyberArk Secure Cloud Access is that it is a must-go product if they want to have a secure platform and secure product, and integrate it with the different products that the organization is using or virtual machines."
"We were partners and a Tier 1 partner with CyberArk Secure Cloud Access, so the support was very high."
"CyberArk Secure Cloud Access offers unmatched security features, essential for critical sectors like finance and banking."
"As a cloud solution, it's easily scalable."
"It has a very user-friendly UI and is easier to pick up for people with less technical experience."
"With the Skyhigh to Box API integration, we can not only see everything that occurs but we can setup many DLP policies to block or monitor what is occurring in Box."
"It's the perfect tool for investigation of malicious IPs."
"Skyhigh offers solutions like WLP and CASB. These tools provide instructions and guidelines for enhancing data security. Additionally, they offer additional software solutions for further protection."
"Overall, we have been very happy with the product."
"Overall, the performance is good."
"If possible, have them run a simulation in your live environment for 30 days and you will be impressed with the kind of data that is collected."
 

Cons

"It is stable, but due to growth, it can sometimes be less stable than wanted."
"Sometimes, obviously, there are bugs."
"Sometimes when you call in support, you get someone who is just following a sheet. It feels like a runaround. You feel that you are running into that support wall."
"Our biggest problem with their service was it did not recognize the device and filtering did not always work correctly."
"The reporting feature needs improvement. It doesn't give you the expected results. It is quite difficult to get the specific reports needed, and it is not as intuitive as the rest of the platform."
"The solution could be stronger on the integration side and offer more cloud applications like G Suite or Oracle."
"The area I would like to see improvement in is the ability within the reporter to navigate directly to the content the user is traversing."
"The solution could be stronger on the integration side and offer more cloud applications like G Suite or Oracle."
"CyberArk Secure Cloud Access has limitations in support for on-premise teams. When issues arise with the VPN portal or the frontend, the admin team must directly engage the vendor, which can be time-consuming."
"I find the pricing definitely expensive, and it is something that we are debating as to whether we will continue longer term with CyberArk, but at the moment, it is the platform that is there and it is being rolled out to meet our TFL obligations, so it will continue, but there is significant discussion around the cost of the licenses."
"The efficacy of the solution is more or less specific to particular use cases rather than generic use cases."
"CyberArk Secure Cloud Access involves substantial effort when performing on-premises deployments."
"The customization of CyberArk Secure Cloud Access could be improved because I found scenarios where I could not provide the correct configuration due to insufficient options available."
"The cloud needs improvement with respect to DLP."
"When compared to other technologies, Skyhigh Security is quite simple, but if there is any improvement in the GUI, it will be quite easy for us because it looks a legacy interface."
"The biggest challenge we have with McAfee is their cross-cloud support."
"The tool could improve flexibility with the creation of reports/querying data."
"Even if you narrow down the scope of the report so that there is not too much data, when a report is generating, sometimes it will get hung; thus you have to delete it and run it again."
"An area for improvement in Skyhigh Security is its UI. It needs to be enhanced and made more user-friendly. Right now, the UI of Skyhigh Security is sometimes confusing. For example, my company is deploying Skyhigh Security for a client and integrating it on the cloud, from an on-premises deployment to a hybrid deployment. Though the experience isn't bad, there needs to be more enhancements. Another room for improvement in Skyhigh Security is the limited training resources, especially when you compare it with Cisco, which has many study materials in the market, even free training resources. You'll get limited resources if you search for Skyhigh Security tutorials on Google and YouTube. Because of high-security requirements and the training material for Skyhigh Security not being available, most engineers and architects avoid the product because there'd be a lack of knowledge in configuring and achieving the goals you'd want to reach via the use of Skyhigh Security. The NOC team deploying the product is having difficulty getting training resources for Skyhigh Security. You'll be charged an enormous amount if you search the market for training because of the limited resources available. Skyhigh Security needs to work on marketing and awareness as an improvement to the product."
"One thing that can be improved is their ability to integrate with other web proxies to discover unsanctioned IP apps."
"De-tokenization."
 

Pricing and Cost Advice

"We had the cost of purchasing a new appliance along with the implementation and licensing costs. However, the following year, the cost of just licensing was similar to what was paid the previous year for a new appliance along with the implementation and licensing costs."
"We have not priced the solution recently, but they were competitive with other vendors in the past."
"It is probably in line with other solutions, but I do not deal with the financial side."
"It is expensive compared to one of its competitors."
"It is not expensive, and it is also not cheap. iboss is priced right in the sweet spot for the number of features it offers."
"The overall pricing for iboss is very competitive and transparent."
Information not available
"Pricing for Skyhigh Security is fine."
"The tool is not expensive."
"This is an expensive product, although it is made for larger enterprises and not for small organizations."
"The biggest thing to watch for is the difference in price per monitored user for the different API integrations."
"The solution's hardware is expensive."
"Have a risk-based approach towards pricing."
"It's an expensive solution."
"Some of our clients have a perpetual license and pay additional support yearly."
report
Use our free recommendation engine to learn which Cloud Access Security Brokers (CASB) solutions are best for your needs.
885,311 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
11%
Computer Software Company
9%
Manufacturing Company
9%
Construction Company
6%
No data available
Financial Services Firm
14%
Government
11%
Manufacturing Company
9%
Computer Software Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business6
Midsize Enterprise6
Large Enterprise6
By reviewers
Company SizeCount
Small Business4
Large Enterprise3
By reviewers
Company SizeCount
Small Business30
Midsize Enterprise4
Large Enterprise38
 

Questions from the Community

What needs improvement with iboss?
For zero trust implementation, we encountered complexity issues, especially with a large infrastructure company Exxon...
What is your primary use case for iboss?
Previously when I used iboss, we did the POC for iboss for ExxonMobil. Four or five people wanted to move from our ol...
What is your experience regarding pricing and costs for iboss?
Regarding pricing, setup costs, and licensing, iboss is not cheap, and that's my only concern. There are cheaper alte...
What is your experience regarding pricing and costs for CyberArk Secure Cloud Access?
The experience with pricing, setup cost, and licensing for CyberArk Secure Cloud Access is that the setup cost initia...
What needs improvement with CyberArk Secure Cloud Access?
The customization of CyberArk Secure Cloud Access could be improved because I found scenarios where I could not provi...
What is your primary use case for CyberArk Secure Cloud Access?
As a distributor, I sell CyberArk Secure Cloud Access to partners and then to customers. I don't have the products de...
What needs improvement with McAfee Web Gateway?
When compared to other technologies, Skyhigh Security is quite simple, but if there is any improvement in the GUI, it...
What is your primary use case for McAfee Web Gateway?
I am currently working on Cisco Email Security Gateway, ESA, and I am also exploring Trellix Skyhigh proxy. I have be...
What advice do you have for others considering McAfee Web Gateway?
For IAM, we are using other tools, as we are a financial institution, so we do not go with a single vendor platform. ...
 

Also Known As

iBoss Cloud Platform
No data available
McAfee MVISION Cloud, McAfee MVISION Unified Cloud Edge, McAfee Web Gateway, McAfee MVISION CNAPP, and Skyhigh Networks, McAfee Web Gateway
 

Interactive Demo

Demo not available
Demo not available
 

Overview

 

Sample Customers

More than 4,000 global enterprises trust the iboss Cloud Platform to support their modern workforces, including a large number of Fortune 50 companies.
Information Not Available
Western Union.Aetna.DirecTV.Adventist.Equinix.Perrigo.Goodyear.HP.Cargill.Sony.Bank of the West.Prudential.
Find out what your peers are saying about CyberArk Secure Cloud Access vs. Skyhigh Security and other solutions. Updated: March 2026.
885,311 professionals have used our research since 2012.