

Find out what your peers are saying about Akamai, Broadcom, SentinelOne and others in Cloud and Data Center Security.
| Product | Mindshare (%) |
|---|---|
| Qualys Enterprise TruRisk Platform | 1.1% |
| Illumio | 17.2% |
| Akamai Guardicore Segmentation | 16.0% |
| Other | 65.7% |
| Product | Mindshare (%) |
|---|---|
| Skyhigh Security | 2.2% |
| Prisma Access by Palo Alto Networks | 10.8% |
| Cato SASE Cloud Platform | 9.4% |
| Other | 77.6% |
| Company Size | Count |
|---|---|
| Small Business | 28 |
| Midsize Enterprise | 6 |
| Large Enterprise | 38 |
Qualys Enterprise TruRisk Platform provides robust risk management, supporting both agent-based and agentless deployments, scanning environments, categorizing risks, and prioritizing threats with machine learning capabilities.
Qualys Enterprise TruRisk Platform enhances vulnerability management across diverse systems, including Windows Server, databases, and network devices. It assigns CVE and CVSS scores, delivers detailed reports, and guides threat prioritization. Machine learning enables precise risk assessment and prioritization, suggesting remediation for security improvements. Users have noted support efficiency and UI improvements needed for customized checks and downloads, with AI integration highlighted as lacking compared to competitors.
What are the key features of Qualys Enterprise TruRisk Platform?Qualys Enterprise TruRisk Platform is leveraged in industries for vulnerability scans across internal networks, URLs, and IP addresses, especially within cloud and hybrid environments. It supports businesses in securing Windows, Linux, and Kubernetes clusters, offering internal asset and vulnerability assessments, and aiding in zero-trust security strategies.
Skyhigh Security provides comprehensive protection with features like user behavior analytics, shadow IT identification, and data loss prevention. Its integration with IT infrastructure offers robust security insights and helps maintain compliance.
Skyhigh Security offers a user-friendly interface that simplifies navigation while delivering substantial threat protection. It enhances existing IT infrastructure integration, such as DLP and Active Directory, to strengthen security. Yet, there is room for improvement in report generation speed, interface intuitiveness, and integration with other products. Organizations utilize Skyhigh Security to audit internet behavior, secure cloud environments and control web content. It effectively manages data movement and ensures compliance, while preventing unauthorized access and bandwidth misuse.
What are the key features of Skyhigh Security?In sectors like finance, healthcare, and technology, companies implement Skyhigh Security for its comprehensive monitoring capabilities. It helps secure access to SaaS applications and protects against threats, ensuring adherence to regulatory requirements and preventing data breaches while optimizing performance in cloud environments.
We monitor all Cloud and Data Center Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.