Netskope vs Skyhigh Security comparison

Cancel
You must select at least 2 products to compare!
Lookout Logo
575 views|450 comparisons
71% willing to recommend
Netskope Logo
8,076 views|6,504 comparisons
97% willing to recommend
Skyhigh Security Logo
3,545 views|1,899 comparisons
91% willing to recommend
Comparison Buyer's Guide
Executive Summary
Updated on Jun 10, 2023

We compared Netskope and Skyhigh Security based on real PeerSpot user reviews in five categories. After reading all of the collected data, you can find our conclusion below.

  • Ease of Deployment: Skyhigh Security's setup is straightforward and complex, taking around two weeks on average. Some users found it easy, while others needed support. On the other hand, Netskope's setup is generally seen as easy and uncomplicated.
  • Features: Skyhigh Security and Netskope offer valuable security features , but they differ in their strengths. Skyhigh Security's strengths lie in their strong URL spam filtering, automatic reports, and endpoint protection. On the other hand, Netskope has superior client size and architectural components, built-in website classification, and cloud app management based on compliance.
  • Pricing: Skyhigh Security has a comparatively expensive hardware setup cost, but their licensing fees are reasonable. Netskope's pricing is middle of the range, and while some find it expensive, it offers value. Netskope's licensing fees include customer service and support, but there may be additional operational costs. Both products have potential for improvement in their pricing and licensing processes.
  • Service and Support: While Skyhigh Security has received mixed reviews on their technical support, their customer service is inconsistent. On the other hand, Netskope generally has good technical support, but some customers have experienced issues with responsiveness, particularly for critical issues. Netskope's premium support offers 24/7 assistance.
  • ROI: Skyhigh Security provides enhanced security, decreased data breach risk, better control and visibility over cloud usage, and simplified compliance. Netskope's ROI is difficult to gauge, but a user experienced a favorable return on investment.

Comparison Results: Netskope is the favored option when compared to Skyhigh Security. It has a larger client size and more advanced architectural components. Netskope also offers a wider range of features and is easier to set up initially. Its ability to work with Azure instance IDs, built-in website classification and safety ratings, and ability to classify and manage cloud apps based on compliance are highly valued. Both solutions offer good protection overall, but Netskope offers a strong ROI and is valuable for organizations looking to improve their security posture and compliance with industry regulations.

To learn more, read our detailed Netskope vs. Skyhigh Security Report (Updated: March 2024).
768,246 professionals have used our research since 2012.
Q&A Highlights
Question: Evaluating CASBs. Looking for community feedback on some vendors.
Answer: I have only done a peripheral review of CASB vendors in the past few months, but I do agree that the top ones to consider right now are Skyhigh Networks and Netskope. When looking at a CASB, be sure not only to consider if they offer all the right checkboxes, but take a look under the covers to see how they are handling those checkboxes. Sometimes, integration between the components is severely lacking or disjointed even when they have a high feature list.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The protection offered by the product is the most valuable feature. It detects vulnerabilities or traps on our users' phones and then prompts them to clean up their devices. Tools we used previously would only discover, which required us to gather information on the backend, so Lookout is a welcome upgrade.""On the outside, the main differentiation is because Lookout ingest. They have ingested basically all of the apps for the last ten years and all the versions of all the apps, and we have that in a corporate database that allows us to do very large-scale machine learning and analysis on that data set. That's not something that any of the competitors really have the capability to do because they don't have access to the data set. A lot of the apps you can no longer get them because that version of the app is five or six years old, and it just doesn't exist anywhere anymore, except within our infrastructure. So, the ability to have that very rich dataset and learn from that dataset is a real differentiator.""The solution is stable.""The most valuable features are the antivirus as a whole, the anti-malware, and all of the protection features that scan our enterprise devices."

More Lookout Pros →

"Technical support is pretty good.""Amazing reporting and tracking mechanisms.""It's a comprehensive security portfolio solution.""It's one of the top-ranking solutions in the market, and it's very responsive. We are using Netskope, and Netskope provides a load of features for SQL, STP, and traffic control.""It has hundreds of features and many of them are useful.""The solution offers a better understanding of the real scenario and identifies the cloud apps that are being utilized.""In Azure, we have multiple subscriptions and with every subscription, we add some kind of instance ID. We can work with the instance ID so that we allow all of the instances containing nodules. Everything else, we block. This way, if you go to outlook.com and check your email, if you log in with your company account, the instance ID will show. The network will take action according to the instance ID and say, "You are using the enterprise email. I'll let you surf. I'll let you see your email." But when you try to log in with your own email address, like Hotmail or Gmail, the instance ID will be different. This way we are not completely blocking Outlook, but we are blocking people from accessing their Outlook. We are only allowing the enterprise-level emails, and we are not allowing user-based emails.""The client size and architectural components in Netskope are far better than other solutions."

More Netskope Pros →

"Overall, the performance is good.""It's a great product with solid features.""It is easy to configure rules.""The solution performs well.""The initial setup is fairly straightforward and easy to perform.""Tokenization.""Box API features with DLP capabilities.""What's most valuable in Skyhigh Security is its level of security. Another valuable feature of the solution is threat analysis."

More Skyhigh Security Pros →

Cons
"From the analysis that we've done, they do seem to be maybe a step behind in trying to enter the market with a new solution. But when they do pick up, they do come out with some good products.""Lookout was moving into the SSE space. And so their work on SecureWeb Gateway and SD-WAN is still sort of evolving.""The stability depends on the service from where you access it. Because sometimes, the place you are in, you have Gateway. You don't have Gateway. The gateway is overutilized. At the end, you need to go through their gateways. And this is the key point here. You have a tracking point. If it's not well orchestrated, and it scales up as you add more to the existing team, you will suffer""We just submitted an enhancement request reflecting the main area we want to see improvement in; the APIs. Currently, we're able to build dashboards, but it's somewhat backward because we use our MDM API to create them. Lookout should provide API to customers so we can query our data and use it in our cloud, and this is the only outstanding area for improvement with the product right now."

More Lookout Cons →

"The solution is still pretty new to the CASB environment.""Netskope needs to improve its stability.""Setting up policies is something that we having been doing, and if the vendor were to provide example use cases that included different implementation options then it would be very useful for us.""The dashboard performance could be much better and faster, but because it is a complicated product, it takes time for the dashboard to process.""Lacking in local customer support.""In terms of improvements, enhancing support, particularly for OEM support with quicker response times would be beneficial.""They could improve their mobile agents as they have some limitations.""The solution's implementations can be made much easier because, currently, it is complex in nature."

More Netskope Cons →

"The Skyhigh for Google Drive interface and policy engine is a bit confusing and limited when compared against other Google Drive CASB capabilities.""The documentation could be improved.""You can integrate Skyhigh's rules with Active Directory groups. For example, you can allow access to a specific website for a defined set of users. I can do that, but the rules are not straightforward. It can look up the group in Active Directory. However, it doesn't always find the proper group name. The rule configuration should be simpler and more granular. The admin should be able to map 80 groups in the rules quickly.""Needs integration with other technology ecosystems.""De-tokenization.""Though the Skyhigh Dashboard is processing large amounts of data, the speed of the Dashboard could be improved.""The cloud needs improvement with respect to DLP.""The solution is hard to configure, our team does not have specific training requirements for McAfee making it difficult."

More Skyhigh Security Cons →

Pricing and Cost Advice
  • "The pricing is fair; it's comparable to our previous solution, and we carried out multiple POCs and POVs (proof of value). The product is worth the money we pay for it."
  • "Lookout is definitely on the lower end when it comes to price point and that seems to be the only differentiator. The technology is in place in this space and it's really about who is coming in at the better price point now."
  • "In terms of feature performance versus cost, they're a good value."
  • "The licensing costs are good. Prisma has much more options and support for security, but it has a higher cost. For example, Lookout costs 2/3rd of Prisma's licensing price."
  • More Lookout Pricing and Cost Advice →

  • "Pricing is a little expensive but it is affordable."
  • "They should work on licensing costs."
  • "The pricing is competitive."
  • "Licensing is on a yearly basis."
  • "The price of the solution is fair but it depends on your use case."
  • "There is a license required for this solution and there are many licensing models available. For example, what applications are covered as part of the license."
  • "I recall that the price was considerably cheaper than that of Zscaler. It was around 60,000 AUD for 1,000 users per year and included some training and some premier support offerings. If we wanted to take advantage of the CASB capabilities, then there was an additional subscription fee, for which we didn't have the budget. On price, I would give Netskope a three or four out of five because it's quite expensive, but it offers a lot of value."
  • "Licensing fees are paid annually."
  • More Netskope Pricing and Cost Advice →

  • "Skyhigh provided a FedRAMP solution, tokenization, a better shadow IT capability, and lower cost."
  • "The biggest thing to watch for is the difference in price per monitored user for the different API integrations."
  • "Have a risk-based approach towards pricing."
  • "They definitely charge a huge amount. All the security service providers charge a huge amount."
  • "The licensing fees are based on what environments you are monitoring."
  • "This is an expensive product, but you have to compare that with other solutions that are on the market."
  • "This is an expensive product, although it is made for larger enterprises and not for small organizations."
  • "The price of the solution is good and we pay an annual license."
  • More Skyhigh Security Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Cloud Access Security Brokers (CASB) solutions are best for your needs.
    768,246 professionals have used our research since 2012.
    Answers from the Community
    Tim Thomasson
    it_user754782 - PeerSpot reviewerit_user754782 (Reporting Analyst at a energy/utilities company with 10,001+ employees)
    Real User

    Hi Tim, I'm currently a student and doing research about cyber security market, may I know how do you narrow your list down to these 5 vendors?

    ramesh1923 - PeerSpot reviewerramesh1923 (Technical Specialist with 5,001-10,000 employees)
    Real User

    Hi, I am working on both Skyhigh and Netskope. The both has their own unique features. List down your requirement and do the POC with the said products.

    Skyhigh is efficiently handling both shadow IT and sanctioned IT applications. DLP, threat protection and access controls are the key features of skyhigh.

    Netskope is good in access control.

    Regards / Ramesh M

    it_user645183 - PeerSpot reviewerit_user645183 (Product Marketing Engineer at a tech company with 10,001+ employees)
    Real User

    Hello,

    The CASB space is booming right now. Everyone is leveraging the cloud for various reasons and having a CASB in place is paramount to security. What CASB to get is really a matter of your business requirements. What exactly are you trying to do? Do you want to get a handle on all the Shadow IT that your company is currently exposed to and set up a plan for such activity? Do you want to apply DLP policies to safeguard your data? Perhaps GDPR and other regulatory issues are forcing you to get into compliance? There are many reasons for adopting a CASB solution, the best place to start is with an Audit of your current traffic and finding out what Shadow IT is present, any related Shadow Data that needs to be monitored, and come up with a plan on how to handle SaaS apps in the cloud. The best CASB vendors out there will offer the audit service as part of the CASB solution. From there, you can design policy and stipulate what cloud apps to sanction, which ones to block, and how to coach users during any suspect activity. The end goal is to keep your users productive and happy while securing your data in cloud apps.
    For an unbiased answer, I would direct you to Gartner and Forrester for reports on CASB. They will detail what the landscape looks like, who the vendors are, what the pillars of a good CASB solution should entail, as well as some features and functionality that are specific to the various CASB vendors. Gartner has a CASB overview document that is very handy and they are currently working on a magic quadrant for the existing vendors. Forrester has released a “ForresterWaveCASB” document that dives into the vendors and who they think are the best based on market presence, features, etc.
    Of course, Symantec offers a CASB solution that should be added to your list of vendors for review. Do not look at a CASB vendor without looking at Symantec. Currently, Forrester ranks Symantec as the number 1 CASB vendor in the marketplace. Symantec offers the following:

    · Cloud app discovery and analysis

    · Data governance and protection

    · Threat detection and incident response

    · A CASB that integrates with Symantec DLP (the industry’s leading DLP solution)

    · Integration with endpoint

    · Integration with Secure Web Gateway (Blue Coat proxies are the best in the industry)

    · Authentication with Symantec VIP

    · Field level tokenization and encryption

    · File-level encryption

    Consider these questions when looking for a CASB vendor:

    · What do yo udo when you need to apply consistent DLP policies to data in the cloud and on premise?

    · What are your options for encrypting confidential data

    · Can you safeguard against confidential data transfer to unsanctioned cloud apps or personal cloud accounts?

    · Can the CASB automatically identify and respond when a user account has been compromised?

    · Does the CASB automatically classify confidential data or do you have to build a system from scratch?

    it_user216333 - PeerSpot reviewerit_user216333 (Information Security Engineer at a retailer with 10,001+ employees)
    Real User

    Netskope is really good. MCAS meets the requirements but lacking features, it is cheaper though. Depends on your requirements, netskope has an optional light weight desktop agent which makes monitoring easy.

    Do you have any specific requirements?

    it_user489630 - PeerSpot reviewerit_user489630 (Works)
    Vendor

    we use ciphercloud. basically, all of them handles: office, google, & salesforce. now with the GDPR happening in our european offices they're mainly SAP & ciphercloud is the only one approved by SAP.

    it_user720069 - PeerSpot reviewerit_user720069 (CTO, CISO, Co-Founder with 11-50 employees)
    Vendor

    At the risk of giving a solution without knowing the situation, some very broadbrush advice would be to look at these vendors in this priority order. That said, given the right environment, any of them could be the best fit. CASB is not a market that is matured with standard architectures and features, so it is advisable to consider the specific requirements before making a decision. Another way to say this is there is not one that is universally superior in most situation.

    1. Netskope
    2. Skyhigh
    3. CipherCloud
    4. Bitglass
    5. Microsoft Cloud App Security
    The ones higher on this list tend to have a greater number of use cases where they do a good job. I don’t feel I can publish pros and cons in this forum.

    ramesh1923 - PeerSpot reviewerramesh1923 (Technical Specialist with 5,001-10,000 employees)
    Real User

    We have used Skyhigh and its pretty good to handle cloud sanctioned IT applications like Office365, Google APPs and salesforce etc.

    Easy to deploy, better application, device and user visibility.

    Earl Clark - PeerSpot reviewerEarl Clark
    Real User

    No help on any of these, but thanks for the question. For a holistic approach (because anything less is insufficient), I've begun using Sophos appliances, services, and endpoint protection which all speak with each other and really fortify a network on all fronts. Services take up resources, so be sure to invest in an appliance powerful enough to serve all your endpoints effectively. Hope this helps.

    Questions from the Community
    Top Answer:The licensing costs are good. Prisma has much more options and support for security, but it has a higher cost. For… more »
    Top Answer:The solution could improve identity integration as well. Zero trust, it's a good start as a zero-trust solution… more »
    Top Answer:We researched Netskope but ultimately chose Zscaler Netskope is a cloud access security broker that helps identify… more »
    Top Answer:The product's analytics part is pretty fine.
    Top Answer:The pricing is good and the licensing is straightforward. I'd rate the affordability nine out of ten.
    Top Answer:The secure gateway could be improved. If they worked on that they would be more competitive. They should offer more… more »
    Comparisons
    Also Known As
    CipherCloud
    Netskope CASB
    McAfee MVISION Cloud, McAfee MVISION Unified Cloud Edge, McAfee Web Gateway, McAfee MVISION CNAPP, and Skyhigh Networks, McAfee Web Gateway
    Learn More
    Overview

    Lookout is a well-established and powerful secure web gateway (SWG) solution that protects more than 200 million users from threats that can result from the penetration of unsecured web traffic into their networks. Lookout is designed to enable organizations to work remotely while maintaining a tight blanket of security over their confidential business data. It provides administrators with security that extends from their endpoints to the cloud service that they are using to run their organization’s network. 

    Users of Lookout are able to proactively detect threats and keep themselves secure from a field of threats that constantly evolves. IT teams can protect their organizations without having to rely on any other security solutions. This singular solution can run on multiple kinds of mobile devices. The privacy of individuals is preserved while keeping compliance rules intact. Additionally, users gain access to a number of tools that enable them to prevent security breaches from taking place.

    Lookout Benefits

    Some of the ways that organizations can benefit by deploying Lookout include:

    • Ease of deployment. Lookout is a solution whose design makes it easy for users to deploy it. It provides users with simple, step-by-step instructions that remove the need for organizations to devote extensive amounts of time to make sure that it is properly set up. Anyone can quickly set up the solution without undergoing technical training. 
    • Built-in support. Users of the Lookout application have access to built-in demos that can teach them how to use various solution features. Instead of spending time trying to figure out the application, users can watch the demo that is most relevant to them and see for themselves how that particular feature is used.
    • Easy-to-use user interface. Lookout’s user interface is laid out in an intuitive way that makes it easy for administrators to navigate. This interface is present in both the mobile and desktop versions of this solution. 
    • Settings customization. Lookout has a built-in settings customization menu. This makes it possible for administrators to easily customize their settings so that they best conform to their needs. 

    Lookout Features

    • Activity monitoring and activity tracking. Lookout’s activity monitoring and activity tracking capabilities enable users to keep a close eye on the activities that are taking place in their networks. IT teams and administrators have the ability to watch their networks for any unusual activity. These features ensure that organizations can keep ahead of any potential threats. They provide the kinds of insights and warnings that make the jobs of those IT teams and administrators much easier and more streamlined. 
    • Encryption. Organizations that employ Lookout can encrypt their networks and keep crucial business data from being read by unauthorized parties. This feature keeps the secrets organizations are trying to keep out of the wrong hands.
    • Anti-virus tools. Lookout provides users with tools to block threats from harming their networks. These tools can successfully block 99.6 percent of threats without raising false alarms. 

    Netscope is a Secure Access Service Edge (SASE) platform that includes core products such as Cloud Access Security Broker (CASB) and Security Service Edge (SSE).

    Netskope CASB is a cloud access security broker tool that allows you to adopt cloud applications and services without sacrificing security. The solution makes it possible to manage the movement of sensitive data between cloud app instances and in the context of app risk and user risk. With Netskope’s industry-leading cloud security solution, you can also prevent sensitive data from being exfiltrated from your environment by risky insiders or malicious cybercriminals who have breached your perimeter.

    Netskope CASB Features

    Netskope CASB has many valuable key features. Some of the most useful ones include:

    • Cloud app risk scoring: With this feature you can automatically audit your traffic to discover your overall risk profile.
    • Advanced data loss protection: The solution’s data loss protection capabilities provide contextual awareness of content being used in the cloud and include machine learning enhancements to simplify, expedite, and accurately scan and classify data.
    • Granular visibility and control: The Netskope CASB solution gives you inline visibility for thousands of apps (managed and unmanaged) in use, including users, file names, activity, and other contextual information.
    • Real-time enforcement: Netskope CASB offers real-time enforcement of security policies to prevent data loss and stop threats.
    • Streamlined operations: Because of its streamlined operations, you can identify, mitigate, and remediate insider threats, compromised accounts, and privileged user threats across web and cloud applications within a single centralized administrative console.
    • Global scale and performance: The solution runs on NewEdge, a carrier-class global network, to provide maximum performance and efficacy worldwide.

    Netskope CASB Benefits

    There are many benefits to implementing Netskope CASB. Some of the biggest advantages the solution offers include:

    • Granular control of personal devices: With Netskope CASB, you can enforce granular control of unmanaged devices that have single-sign-on (SSO) access to managed cloud services, like Box and Microsoft 365.
    • Data protection: The solution has a single pane of glass and a policy interface that is easy to use to create security policies across cloud services, apps, and digital assets.
    • Find cloud services in use and assess risk: Netskope CASB can help you discover 50,000+ cloud apps and also provides risk-ratings for cloud apps so you can devise appropriate security policies.
    • Data exfiltration prevention: By using this solution, you can prevent users on corporate cloud services who download sensitive data from uploading that data to unmanaged or personal cloud apps.
    • Protection against cloud threats: Netskope CASB enables you to stop malware and advanced threats from infected users spreading through your organization. The solution directly blocks malware, whether it’s delivered from collaboration tools or downloaded from a cloud storage service to a sync client.

    Reviews from Real Users

    Netskope CASB is a solution that stands out when compared to many of its competitors. Some of its major advantages are that it offers great reporting, has a good tracking mechanism, and has a solid Cloud Control feature.

    Prerna S., Senior Information Security Analyst II at Workato, says, “[Netskope] CASB has a lot of good features; their reporting and tracking mechanism is amazing.”

    PeerSpot reviewer Dima Z., Director at Irangers International Inc., mentions, “The most useful feature of this solution is Cloud Control, which allows me to schedule cloud uploads.”

    Syed H., Lead Cloud Security Practice at Vincacyber, states, "I have found the most useful features to be the Web Secure Gateway, CASB, infrastructural service scanning, and Zero Trust."

    Skyhigh Security protects organizations with cloud-based Zero Trust security solutions that are both data-aware and simple to use. Skyhigh’s Security Service Edge portfolio goes beyond data access and focuses on data use, allowing organizations to collaborate from any device and from anywhere without sacrificing security, while providing the visibility and control required to monitor and mitigate security risks.

    The Skyhigh Security Service Edge portfolio includes Skyhigh Secure Web Gateway, Skyhigh Cloud Access Security Broker, Skyhigh Private Access, and Skyhigh Cloud Native Application Protection Platform. All solutions form a fully converged, consolidated platform, and are managed from the same single console.

    • Skyhigh Cloud Access Security Broker protects data and stops threats in the cloud across SaaS, and PaaS, and IaaS environments from a single, cloud-native enforcement point. It enables organizations to accelerate their business by giving them visibility and control over their data in the cloud and protection from threats with a frictionless deployment model.
    • Skyhigh Secure Web Gateway connects and secures your workforce from malicious websites and cloud apps from anywhere, any application, and any device. It protects users from threats and data loss with integrated Remote Browser Isolation, Cloud Access Security Broker and Data Loss Prevention capabilities while providing the ability to access the web and cloud.
    • Skyhigh Private Access is the data centric Zero Trust Network Access (ZTNA) solution that provides integrated Data Loss Prevention scanning and seamless Remote Browser Isolation integration for robust data protection, using Zero Trust principles. Apply a unified policy across web, SaaS, and private apps.
    • Skyhigh Cloud Native Application Protection Platform is the industry’s first platform to extend Cloud Access Security Broker, bringing application and data context to converge Cloud Security Posture Management (CSPM) with IaaS Data Loss Prevention for IaaS public clouds. Skyhigh CNAPP provides consistent data protection, threat prevention, governance, and compliance throughout the cloud-native application development lifecycle.

    Skyhigh Security Benefits

    • Modern Data Protection. Extensible data protection policies to determine what can be accessed, shared, and how it can be used.
    • Zero Trust for the Cloud. Extend zero trust to the cloud ensuring that your sensitive data is accessed, shared, and stored appropriately.
    • Actionable Insights. Unified view of data and risk, regardless of where and how the policy is enforced.

    Skyhigh Security Features

    • 99.999% Uptime. Connects users seamlessly and without disruption through Hyperscale Service Edge with cloud-native web security that operates with ultra-low latency and 99.999% uptime.
    • Remote Browser Isolation. Prevents threats of a web page from reaching endpoints with intelligent, multi-layer remote browser isolation technology that provides secure web browsing through robust machine learning analysis on real-time telemetry.
    • Cloud Registry. The world’s largest and most accurate registry of cloud services based on a customizable 261-point risk assessment to support risk-aware cloud governance.
    Sample Customers
    NetApp, Genomic Health, Caterpillar, Apollo, Pandora, Continental Resources, Fractal, infinera, Tesla
    Western Union.Aetna.DirecTV.Adventist.Equinix.Perrigo.Goodyear.HP.Cargill.Sony.Bank of the West.Prudential.
    Top Industries
    VISITORS READING REVIEWS
    Computer Software Company20%
    Financial Services Firm10%
    Manufacturing Company10%
    Government6%
    REVIEWERS
    Computer Software Company24%
    Manufacturing Company24%
    Financial Services Firm14%
    Security Firm10%
    VISITORS READING REVIEWS
    Computer Software Company17%
    Financial Services Firm15%
    Manufacturing Company8%
    Insurance Company5%
    REVIEWERS
    Healthcare Company20%
    Pharma/Biotech Company13%
    Energy/Utilities Company10%
    Computer Software Company10%
    VISITORS READING REVIEWS
    Educational Organization44%
    Financial Services Firm10%
    Computer Software Company8%
    Manufacturing Company6%
    Company Size
    VISITORS READING REVIEWS
    Small Business22%
    Midsize Enterprise16%
    Large Enterprise62%
    REVIEWERS
    Small Business39%
    Midsize Enterprise18%
    Large Enterprise42%
    VISITORS READING REVIEWS
    Small Business21%
    Midsize Enterprise14%
    Large Enterprise66%
    REVIEWERS
    Small Business41%
    Midsize Enterprise6%
    Large Enterprise53%
    VISITORS READING REVIEWS
    Small Business10%
    Midsize Enterprise50%
    Large Enterprise40%
    Buyer's Guide
    Netskope vs. Skyhigh Security
    March 2024
    Find out what your peers are saying about Netskope vs. Skyhigh Security and other solutions. Updated: March 2024.
    768,246 professionals have used our research since 2012.

    Netskope is ranked 4th in Cloud Access Security Brokers (CASB) with 35 reviews while Skyhigh Security is ranked 5th in Cloud Access Security Brokers (CASB) with 51 reviews. Netskope is rated 8.4, while Skyhigh Security is rated 8.4. The top reviewer of Netskope writes "Network proxy that provides visibility during deployment and allows you to control PII". On the other hand, the top reviewer of Skyhigh Security writes "Good scalability, but the technical support service needs improvement". Netskope is most compared with Zscaler Internet Access, Prisma Access by Palo Alto Networks, Microsoft Defender for Cloud Apps, Cisco Umbrella and Cato SASE Cloud Platform, whereas Skyhigh Security is most compared with Zscaler Internet Access, Microsoft Defender for Cloud Apps, Symantec Proxy, Prisma Access by Palo Alto Networks and Zscaler CASB. See our Netskope vs. Skyhigh Security report.

    See our list of best Cloud Access Security Brokers (CASB) vendors and best Secure Access Service Edge (SASE) vendors.

    We monitor all Cloud Access Security Brokers (CASB) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.