Try our new research platform with insights from 80,000+ expert users

Forcepoint ONE vs Microsoft Defender for Cloud Apps vs Skyhigh Security comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Mindshare comparison

As of May 2025, in the Cloud Access Security Brokers (CASB) category, the mindshare of iboss is 1.9%, up from 1.3% compared to the previous year. The mindshare of Forcepoint ONE is 2.3%, up from 1.7% compared to the previous year. The mindshare of Microsoft Defender for Cloud Apps is 10.1%, down from 13.4% compared to the previous year. The mindshare of Skyhigh Security is 3.7%, down from 3.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Cloud Access Security Brokers (CASB)
 

Featured Reviews

Matt Crockford - PeerSpot reviewer
It's easy to roll out, and their understanding of our business made it seamless
One aspect we value about iboss is its simplicity. Their customer service is brilliant, and they are super responsive and knowledgeable. It's easy to roll out, and their understanding of our business made it seamless. We were impressed by the solution's mental health function, which can detect if someone needs help. It scans what users are browsing and flags warning signs so we can check to see if they are okay. We've had to use it a couple of times. The user interface is highly intuitive. Our IT team picked it up with minimal training. It's arranged so that it's easy to find where things are. Another advantage is the single pane of glass console, which gives you visibility into what's happening. We're not fully there yet because we haven't implemented zero trust, but we're excited about the possibilities from the demos we've seen. We launched a POC of iboss' ChatGPT Risk Protection feature two weeks ago. AI is a great tool, but you need to be careful what you put into it. My biggest fear is employees inputting sensitive corporate information or customer PII data into one of these chatbots. I was impressed by our trial of the feature. It's exactly what we wanted. Now, when a user goes to ChatGPT, there's a banner warning them not to share information, and we can block conversations containing customer data like bank details and email addresses. I don't want to stop people from using it, but we need visibility. We've only tried it on a test group of 15 people. You can configure it to look for specific keywords or integrate it with your DLP policy if you have that configured
KimioTanaka - PeerSpot reviewer
Has valuable monitoring, DLP, and SIEM communication features
My company is a partner and reseller of Forcepoint ONE. I work with the solution, though I'm not as experienced with it. I had my training in the Forcepoint laboratory in Brazil because I just started working with the solution, but I know how Forcepoint ONE works, how to use it, and how to implement it. I'm using the latest version of the solution. The number of staff required to deploy and maintain Forcepoint ONE depends on the number of users because the solution can also be used individually or by a single user. My advice for people looking into implementing Forcepoint ONE is to take a course or go into training because the solution may seem easy, but it's not, particularly during implementation, because it would still depend on your tool. You need to understand your tool well and how you can adapt it to Forcepoint ONE. The solution is not easy if it doesn't have a direct integration with your tool. When you go direct to the cloud, there's no problem, but when you need it to be a hybrid solution, it could be a bit difficult in terms of integrating it well. The integration, though it's not very, very difficult, still requires attention and care for it to be successful. My rating for Forcepoint ONE is eight out of ten. For me to rate it a ten out of ten, the support, price, and functionality should first be improved. There would be a need to speak with the Forcepoint team about it, and the team is very, very dedicated in terms of explaining and helping you understand the solution.
Jagadeesh Gunasekaran - PeerSpot reviewer
Saves us time, has good visibility, and a single dashboard
The solution is user-friendly and provides great visibility into threats. There are easy options available for specific workflow inspections. We can also get support by going through the Microsoft documentation, which is straightforward. Microsoft Defender for Cloud Apps helps us prioritize threats across our enterprise. It covers us from a compliance perspective and protects our organization's data. Data protection is a very important aspect of any new organization, as we need to protect our data from both external attacks and insider threats. Microsoft Defender for Cloud Apps helps us monitor for abnormal activity by insiders, which is one of the most important access points for attackers today. Additionally, the different cloud apps that Defender for Cloud Apps supports provide us with much more visibility into potential threats and activities on the internet. We have integrated Microsoft Defender for Cloud Apps alerts with Sentinel. The integration is straightforward. We can find the configuration details on Microsoft's official documentation website. If we are familiar with how Microsoft products work, we will be able to follow the instructions clearly. Microsoft Defender for Cloud Apps and Sentinel work natively together to deliver coordinated detection and response across our environment. Our integrated Microsoft solutions provide comprehensive threat protection, covering most of the tactics and techniques relevant to the MITRE ATT&CK framework. Sentinel allows us to ingest data from our entire ecosystem. When implementing an SIEM solution, there are always prerequisites such as Active Directory logs, security logs, firewall logs, and DNS logs. These are important logs that need to be ingested into the environment. Sentinel has many third-party connectors available that make integrations straightforward. Microsoft provides the configuration details in the Sentinel platform. It is important to integrate all relevant log sources into the SIEM solution so that we can detect and be alerted to any type of threat factor, whether it is from an internal or external source. Integrating third-party solutions into the platform requires a separate configuration, but Microsoft provides the necessary information. However, we need to have the appropriate permissions to execute these setups. Sentinel provides a centralized dashboard that covers threat management and configuration. It gives us complete insight into what entities are accessing, as well as full details for investigation. We can see how the alerts and threats are relevant to suspicious activities, whether they are related to malicious IP addresses, suspicious ASHAs, or any other indicators of compromise. All of this relevant data can be seen in a single pane. Recently, Microsoft introduced a new investigation experience in a single pane. This means that we can now get a lot of details in a single pane, without having to go there and execute a query. There are a lot of new insights being developed in the Sentinel platform these days. It has software intelligence. They recently introduced Microsoft Defender Threat Intelligence, which covers almost all IOCs. This protects organizational assets from threats and suspicious traffic associated with IOCs. If a match is found, alerts are generated. This is a very interesting feature. Another great feature is automation and logic apps. We can create a number of operations, such as posting in a team's channel if a severe incident occurs or sending an email notification. There are many operations available, so we can automate a lot of tasks. Microsoft Defender for Cloud Apps helps us stay compliant. It has predefined mechanisms in place to prevent attacks. For example, if an external user tries to access our SharePoint folders or files, an attack will be blocked. This is why it is important to give appropriate access to guest users. Microsoft Defender for Cloud Apps has many features and benefits. It provides a number of policies that can be configured to meet the specific needs of our security team. These policies can be used to customize cloud applications so that only authorized users can access them and perform operations that benefit the organization. In terms of safety and security, Microsoft Defender for Cloud Apps is top-notch. Using the solution's automation features, we can suppress false positive alerts. We can also close alerts, lower their severity from "high" to "low" or "informational," or close them immediately with the appropriate commands. This will depend on the configuration automation rule and the perspective from which we are testing. Microsoft Defender for Cloud Apps provides a single console. We are also provided with Microsoft templates to enable workbooks instantly. Alternatively, we can build our own customized workbooks to provide better insights and improve our SOC efficiency and overall performance. Consolidating all of our security data into one dashboard has saved our security operations team a significant amount of time. From an analyst's perspective, it is now much easier to correlate events, investigate alerts, and visualize specific entities. For example, an analyst can quickly see all of the alerts associated with a particular IP address, or they can view all of the activity for a specific entity over the past 24 hours or 7 days. This level of detail and insight would not be possible if our data were siloed in multiple dashboards. The single dashboard saves our operations approximately 20 hours per week by eliminating the need to access multiple consoles and tabs. Microsoft Defender for Cloud Apps threat intelligence can help us prepare for potential threats before they happen. However, it depends on how we develop the policies for the database to block or ignore things in our environment.
Jathin Das - PeerSpot reviewer
Has good KB articles that make it simple for users to do the deployment themselves
One area for improvement I've seen in Skyhigh Security is that it lacks support for unsanctioned applications, where customers have their applications. Those applications do not come from Microsoft or other popular vendors. For example, Microsoft has support for Teams and it has support for OneDrive, but it doesn't have support for custom applications built by customers. Customers have internal teams building and publishing applications to the external world, but Skyhigh Security doesn't have support for those applications, and this is the main problem I've seen. The solution only supports a pool of applications that are from Microsoft and other major SaaS vendors. McAfee doesn't provide support for custom applications, compared to other vendors who provide it. For example, Bitglass and Netskope both have support for custom applications. Another area for improvement in Skyhigh Security is that its API support is a little weak. I also have not seen a strong integration between the solution and other McAfee products. SkyHigh Security is also not closely integrated with other McAfee CWPP products. If you have McAfee-connected security storage that you've built in the past, I have not seen integration between that storage and SkyHigh Security. Integration between the solution and other McAfee products needs improvement, though it may be because SkyHigh Security is an acquired product and is not a homegrown product of McAfee. McAfee may not have invested time with integration, but that is one good idea where McAfee could turn SkyHigh Security into a complete security product, and not just a CASB solution. Integration is really important and could help transform SkyHigh Security into a complete security solution. Performance could also be improved in SkyHigh Security because it is the main concern of customers. What's challenging is that the solution has a lot of CPU and requires a lot of memory which affects performance. What I'd like to see in the next release of SkyHigh Security is strong integration with third-party products. API integration is also another feature to focus on because everybody is now building APIs.
report
Use our free recommendation engine to learn which Cloud Access Security Brokers (CASB) solutions are best for your needs.
852,649 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
13%
Financial Services Firm
11%
Manufacturing Company
9%
Government
6%
Computer Software Company
16%
Financial Services Firm
13%
Government
10%
Manufacturing Company
6%
Computer Software Company
16%
Financial Services Firm
12%
Manufacturing Company
8%
Government
7%
Educational Organization
48%
Financial Services Firm
9%
Computer Software Company
6%
Manufacturing Company
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about iboss?
Content filtering is the most useful feature of iboss.
What needs improvement with iboss?
I have a couple of thoughts for improvement, but usually when I address them with my rep, they put it into the featur...
What is your primary use case for iboss?
We use it primarily for simpler filtering because we're a K12 entity.
What do you like most about Forcepoint ONE?
The platform's feature that has been most beneficial for our web security is its capability to replicate rules.
What is your experience regarding pricing and costs for Forcepoint ONE?
The licensing and pricing were fine with no issues. I took over from somebody else, and it stayed as it was until we ...
What needs improvement with Forcepoint ONE?
There is room for improvement in making the reporting closer to real-time, ideally around five or ten minutes instead...
Which is the better security solution - Cisco Umbrella or Microsoft Cloud App Security?
Cisco Umbrella is an integral component of the Cisco SASE architecture. It integrates security in a single, cloud-nat...
What do you like most about Microsoft Cloud App Security?
It does a great job of monitoring and maintaining a security baseline. For us, that is a key element. The notificatio...
What is your experience regarding pricing and costs for Microsoft Cloud App Security?
The pricing for Microsoft Defender for Cloud Apps is acceptable. If a product is of high quality, it justifies the ex...
What do you like most about McAfee Web Gateway?
Data loss prevention and user behavior analysis are two valuable features.
What needs improvement with McAfee Web Gateway?
The solution has room for improvement in its DDoS protection. Additionally, the documentation needs enhancement to pr...
What is your primary use case for McAfee Web Gateway?
The typical use case for our clients is cloud security.
 

Also Known As

iBoss Cloud Platform
Bitglass
MS Cloud App Security, Microsoft Cloud App Security
McAfee MVISION Cloud, McAfee MVISION Unified Cloud Edge, McAfee Web Gateway, McAfee MVISION CNAPP, and Skyhigh Networks, McAfee Web Gateway
 

Interactive Demo

Demo not available
Demo not available
Demo not available
 

Overview

 

Sample Customers

More than 4,000 global enterprises trust the iboss Cloud Platform to support their modern workforces, including a large number of Fortune 50 companies.
UNC-Charlotte
Customers for Microsoft Defender for Cloud Apps include Accenture, St. Luke’s University Health Network, Ansell, and Nakilat.
Western Union.Aetna.DirecTV.Adventist.Equinix.Perrigo.Goodyear.HP.Cargill.Sony.Bank of the West.Prudential.
Find out what your peers are saying about Palo Alto Networks, Cisco, Zscaler and others in Cloud Access Security Brokers (CASB). Updated: May 2025.
852,649 professionals have used our research since 2012.