


Skyhigh Security and GoodAccess compete in the realm of IT security solutions, focusing on cloud security and VPN capabilities, respectively. Skyhigh Security has an upper hand due to its advanced threat analysis and data governance, offering organizations comprehensive risk management and compliance.
Features: Skyhigh Security provides shadow IT identification, a cloud risk registry, and integration with data loss prevention (DLP) tools. GoodAccess focuses on point-to-point security, offering static IPs, and streamlines user access management. It enhances connectivity for global teams with its VPN capabilities.
Room for Improvement: Skyhigh Security could improve UI responsiveness, enhance detail in reporting, and streamline integration with on-premises tools. There is also a demand for better support of custom applications and inclusion of more cloud services. GoodAccess could benefit from expanded server coverage, enhanced threat detailing in its interface, and clearer pricing models.
Ease of Deployment and Customer Service: Skyhigh Security offers flexible deployment options across hybrid, on-premises, and public cloud environments, though customer service experiences may vary. GoodAccess provides similar deployment options with a focus on private and public cloud integration, receiving positive ratings for consistent and effective customer service.
Pricing and ROI: Skyhigh Security is often considered more expensive, catering to large enterprises with various licensing options based on monitoring needs. Although pricier, the ROI potential is notable when backed by proactive support. GoodAccess stands out for its competitive pricing, especially appealing to smaller organizations, offering a scalable licensing model that supports business growth efficiently.
With iboss, whenever you turn on your laptop, the iboss agent automatically connects to the iboss cloud, enforcing all security policies. So with respect to the security side, it strengthens measures.
I have seen some cost effectiveness from iboss; it has reduced certain support requirements, making it a more hands-off solution.
They are very fast, responsive, and knowledgeable.
The quality of the support is fantastic.
We had promising discussions about resolving these issues, but no real action followed.
We can know the case severity such as P1, P2, or P3, allowing easy interaction from the customer support side.
They are also able to meet on-demand requirements based on your contract with them, and can easily provide adequate resources and scalability.
I would rate it a nine out of ten for scalability.
If I start seeing sluggishness or anything like that, I just reach out to my rep, and they connect with their dev team, typically resolving it the same day.
Scalability is very good, and I can give a rating up to nine out of ten for scalability.
It's been pretty solid; I've never had an outage with them, and if I ever had, it's only been once out of the seven years.
We've experienced zero downtime.
Our biggest problem with their service was it did not recognize the device despite our ClearPass sending information to the iboss box.
We did not face any downtime on that site, so it is quite reliable.
It has many gaps, so I think some customers take three months and up to six months for the deployment of Skyhigh Security.
It is not as intuitive as the rest of the platform.
We also had a problem with a transition when we upgraded from one appliance of theirs to another, but their engineer lost a good deal of our data.
Our iboss subscription access should be more secure with an OTP or VPN etc.
I would like to see more options and more granular controls for users who know what they are doing as an administrator.
Skyhigh Security is quite simple, but if there is any improvement in the GUI, it will be quite easy for us because it looks a legacy interface.
The solution has room for improvement in its DDoS protection.
The UI is another area where there is room for improvement in the product.
It offers the same features you would get from a vendor that charges 250,000 British pounds for a fraction of the price.
The following year, the cost of just licensing was similar to what was paid the previous year for a new appliance along with the implementation and licensing costs.
Regarding pricing, setup costs, and licensing, iboss is not cheap, and that's my only concern.
The solution's mental health function can detect if someone needs help.
It's given us a lot more visibility into our computer assets that may be infected with viruses and also shows us people who have unusually large uploads or might be engaging in high-risk activities, such as searches or going to sites not categorized by their web crawler.
iboss was the best solution for us because, no matter what domain you were in, everything is under a single pane of glass, which is exactly what we wanted.
GoodAccess has positively impacted my organization as we have fewer IPs to whitelist and limited access for anybody outside of our organization into our internal systems.
The cloud security features are the most valuable.
It is actually very flexible, so I think that is the opportunity since it is not resource-intensive.
We operate in a major financial sector in India, and that is why we use Skyhigh Security to reroute all our traffic via proxy for our security.
| Product | Mindshare (%) |
|---|---|
| iboss | 3.3% |
| Skyhigh Security | 3.2% |
| GoodAccess | 0.7% |
| Other | 92.8% |


| Company Size | Count |
|---|---|
| Small Business | 6 |
| Midsize Enterprise | 7 |
| Large Enterprise | 8 |
| Company Size | Count |
|---|---|
| Small Business | 21 |
| Midsize Enterprise | 4 |
| Large Enterprise | 1 |
| Company Size | Count |
|---|---|
| Small Business | 28 |
| Midsize Enterprise | 6 |
| Large Enterprise | 38 |
Iboss offers a comprehensive cloud-based security platform valued for its scalability and autonomous features, ensuring robust security with easy deployment and management capabilities.
Renowned for its robust security architecture, Iboss integrates seamlessly within diverse networks, delivering efficient granular filtering and advanced content categorization. Its single pane of glass console provides ease of management, allowing rapid scalability suitable for rapidly deploying environments. Operates in BYOD setups due to inline filtering without device installation. Integration with cloud-based applications enhances user control, and features like SASE, SSL inspection, and ChatGPT risk protection stand as highlights. Despite its strengths, users have pointed out areas for enhancement like direct navigation in reports, SSL decryption, and better cloud integration while having room to improve data loss prevention.
What are the most important features of Iboss?The usage of Iboss spans educational institutions, specifically K-12, to enforce internet policies, protect data, and support remote work environments. It provides web filtering and security frameworks to ensure safe browsing. Its platform-as-a-service model offers flexibility for both cloud-based and on-premises requirements, integrating seamlessly to deliver enhanced security features suitable for various deployment needs including zero trust, CASB, and network security for work-from-home setups.
GoodAccess is a cybersecurity platform enabling medium-sized enterprises to implement Zero Trust Architecture (ZTA) effortlessly, offering protection for remote and hybrid workforces.
GoodAccess empowers enterprises by providing a low-code, hardware-free SASE/SSE platform. It simplifies deploying zero trust architectures quickly, integrating with both modern SaaS applications and legacy systems. This makes it an ideal choice for businesses with 50-5,000 employees, particularly those adopting multi-cloud and SaaS environments. GoodAccess safeguards infrastructures by unifying them under a stringent zero-trust model, utilizing advanced technologies to address major cybersecurity challenges.
What are the key features of GoodAccess?GoodAccess finds application in industries focusing on remote work, particularly those needing secure point-to-point network connections. It serves technical teams seeking to optimize cloud operations, enhance network management, and ensure compliance. The platform is valuable for organizations aiming to support a hybrid workforce and achieve robust endpoint protection.
Skyhigh Security provides comprehensive protection with features like user behavior analytics, shadow IT identification, and data loss prevention. Its integration with IT infrastructure offers robust security insights and helps maintain compliance.
Skyhigh Security offers a user-friendly interface that simplifies navigation while delivering substantial threat protection. It enhances existing IT infrastructure integration, such as DLP and Active Directory, to strengthen security. Yet, there is room for improvement in report generation speed, interface intuitiveness, and integration with other products. Organizations utilize Skyhigh Security to audit internet behavior, secure cloud environments and control web content. It effectively manages data movement and ensures compliance, while preventing unauthorized access and bandwidth misuse.
What are the key features of Skyhigh Security?In sectors like finance, healthcare, and technology, companies implement Skyhigh Security for its comprehensive monitoring capabilities. It helps secure access to SaaS applications and protects against threats, ensuring adherence to regulatory requirements and preventing data breaches while optimizing performance in cloud environments.
We monitor all Secure Web Gateways (SWG) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.