Try our new research platform with insights from 80,000+ expert users

Skyhigh Security vs Zscaler Zero Trust Exchange Platform comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Feb 8, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

iboss
Sponsored
Ranking in Cloud Access Security Brokers (CASB)
7th
Ranking in ZTNA as a Service
7th
Ranking in Secure Access Service Edge (SASE)
8th
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
19
Ranking in other categories
Secure Web Gateways (SWG) (5th), Internet Security (3rd), Web Content Filtering (1st)
Skyhigh Security
Ranking in Cloud Access Security Brokers (CASB)
12th
Ranking in ZTNA as a Service
17th
Ranking in Secure Access Service Edge (SASE)
15th
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
57
Ranking in other categories
Secure Web Gateways (SWG) (16th), Data Loss Prevention (DLP) (32nd)
Zscaler Zero Trust Exchange...
Ranking in Cloud Access Security Brokers (CASB)
9th
Ranking in ZTNA as a Service
1st
Ranking in Secure Access Service Edge (SASE)
4th
Average Rating
8.4
Reviews Sentiment
6.9
Number of Reviews
66
Ranking in other categories
Data Loss Prevention (DLP) (6th), Application Control (6th), Remote Browser Isolation (RBI) (1st)
 

Mindshare comparison

As of March 2026, in the Secure Access Service Edge (SASE) category, the mindshare of iboss is 2.3%, up from 1.6% compared to the previous year. The mindshare of Skyhigh Security is 2.1%, up from 2.0% compared to the previous year. The mindshare of Zscaler Zero Trust Exchange Platform is 9.5%, down from 11.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Secure Access Service Edge (SASE) Mindshare Distribution
ProductMindshare (%)
Zscaler Zero Trust Exchange Platform9.5%
iboss2.3%
Skyhigh Security2.1%
Other86.1%
Secure Access Service Edge (SASE)
 

Featured Reviews

reviewer2701851 - PeerSpot reviewer
Managing Director
Enhances web security with a single pane of glass and flexible deployment
I don't see any need for improvement; one of the really good things about iboss as a company is that they listen to customer feedback. I have suggested enhancements, and they are responsive, making changes for the better, and they do a lot of testing. To improve iboss, although we haven't used it, we considered the VPN solution that comes with the highest tier licensing, which includes DLP and various other add-ons. We prefer using another product which automatically logs you back onto your network when turning on your PC. With iboss, the connection is manual, which doesn't meet our needs. Additionally, sizing can be tricky because, although the initial recommendations may seem adequate, actual usage may require more gateways than anticipated.
KS
Technical Associate Network Security at Valuepoint Systems
Proxy integration has strengthened email security and centralized monitoring for all branches
We have nearly 900 plus branches here, where we have rerouted our traffic through proxy like Trellix Skyhigh Security. We operate in a major financial sector in India, and that is why we use Skyhigh Security to reroute all our traffic via proxy for our security. Only then will it reach our gateway. We monitor all the URLs and the plant IPs in our proxy. We are tracing those IPs to see whether they have a valid code or not. We also check with Trellix Sandbox to determine whether the URL is malicious or not. Additionally, we have included our Cisco Umbrella with our proxy, so the DNS resolution happens on our Umbrella side. We continuously monitor the traffic on our proxy side. The threat protection feature is a major useful thing because for our 900 branches we monitor with this proxy only. If any issue or any URL does not reach, it is quite helpful to check whether the issue is in the proxy side or in the actual end-user side. It is quite easy to monitor. We do not get all those things from the firewall end, and it is quite easy to gather that information from the proxy, which is a major benefit here. It also majorly helps to hide our actual IPs, as we have directed all the IPs from the proxy, making it very helpful to hide our internal servers.
Zaheer_Khan - PeerSpot reviewer
Cybersecurity Senior Program Manager at Dayforce
Secure access has improved remote work and has reduced vulnerabilities across our workforce
Zscaler Zero Trust Exchange Platform probably needs to be more efficient because scanning takes a lot of time. Some vulnerabilities create issues, and when we wanted to identify the source of the vulnerabilities, specifically focusing on mobile ID and related areas, it was unable to provide assistance. However, according to discussions with Zscaler Zero Trust Exchange Platform, they said that by the end of mid-2026, they are exploring these features, and probably those features can be incorporated or embedded into this particular system. That is the only major negative point.In terms of responses, Zscaler Zero Trust Exchange Platform is good. In terms of controlling vulnerability, it is good. The only cons I have noticed is that it is a bit slower, and sometimes it is unable to identify the source. These are the key areas for improvement.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Valuable features: Within the filter: Controls (Web categories, applications, and Allow/Block list) and Network (local Subnets). Within the reporter: Logs (Event Log) and Reports."
"The iboss system is highly reliable. The false positive rates are small compared to some other systems we've experienced through other partner agencies who use competing solutions."
"Our primary use case for this product is DLP,"
"We were impressed by the solution's mental health function, which can detect if someone needs help. It scans what users are browsing and flags warning signs so we can check to see if they are okay. We've had to use it a couple of times."
"Technical support is pretty sharp and very responsive."
"Its initial setup was straightforward."
"From a use-case scenario, what I like the most is the plug-in. I like the fact that we can do the filtering of these devices offsite independent of the network they are connected to, and we do not have to have traffic coming back inside our network."
"The security aspect of the solution, particularly the malware behind it, is excellent."
"In that way, it gives in-depth visibility and a granular monitoring facility for the company: What is happening inside the company, what people are using, what kind of data is going through the company."
"It also prevents you from writing data to your Gmail and does not allow you to move your data outside of the corporate system."
"Skyhigh networks is the most mature and feature-rich product and integrates with your current infrastructure, rather than adding another agent or needing to send all traffic through a proxy, which simplifies setup and ensures the product does not cause bottlenecks while adding value to your already existing security infrastructure."
"The solution provides great security, higher availability, and policy granularity."
"In security posture, we have integrated Skyhigh Security with IBM QRadar, which is quite helpful to know how the activities are going, and if any critical or security events occur in Skyhigh Security, we are able to get those to our IBM QRadar, making it very much easier to monitor all the security events in our environment."
"The risk rating of each cloud application has been very useful. Whenever we discover a new application is use, we are able to quickly determine if this application is safe to use and whether or not we should allow our end users to be able to access it."
"Offers a very strong URL spam filtering feature."
"The cloud security features are the most valuable."
"With SASE, we have a single platform that covers multiple task services with which we need to control access. All the features are equally valuable."
"The solution offers a simplified network infrastructure and security functions and it enables secure remote access for the users"
"What I find most valuable in Zscaler Private Access is that it's a VPN. Its connectivity as a VPN is its most valuable feature."
"It has some good data security and WIP features, providing secure Internet access."
"It has been helpful in maintaining our infrastructure. The granular level control it offers allows us to set application policies per application for each user."
"I find all Zscaler Private Access features valuable because each replaces flawed technologies, such as EPAs being replacements for VPN and PR as a replacement for PAM, so I can't mention only one valuable feature. Overall, Zscaler Private Access is a good solution."
"The platform offers advanced threat protection features and embedded AI/ML capabilities, making it more proactive in blocking threats."
"Users get direct secure access to applications over the internet."
 

Cons

"One thing I would like to see differently with their Zero Trust platform is that some of the AI aspects related to high-risk activities have more false positives."
"Our biggest problem with their service was it did not recognize the device and filtering did not always work correctly."
"Sometimes when you call in support, you get someone who is just following a sheet. It feels like a runaround. You feel that you are running into that support wall."
"Fold that in with the risk intelligence they're getting from all of the different subscriptions they are a part of. Now, these security companies subscribe to things like emerging threats, databases, etc. You can fold all this intelligence to decide what's happening on an endpoint. I would love to see them start moving into that space. That would compete directly with Microsoft. Maybe that's why they haven't. Having that ability native within the solution would be great. The other area in which I would love to see improvement is more detailed descriptions of why they block websites."
"Our iboss subscription access should be more secure with an OTP or VPN etc. It is easy to gain access if, for example, hackers obtain my username and password."
"File integrity monitoring would be very advantageous as an additional feature."
"Our biggest problem with their service was it did not recognize the device and filtering did not always work correctly."
"I am currently doing a PoC of the zero trust aspect of it. Compared to other similar solutions, it is hard to get around each feature. It takes a while to get used to it."
"You can integrate Skyhigh's rules with Active Directory groups. For example, you can allow access to a specific website for a defined set of users. I can do that, but the rules are not straightforward. It can look up the group in Active Directory. However, it doesn't always find the proper group name. The rule configuration should be simpler and more granular. The admin should be able to map 80 groups in the rules quickly."
"The performance of the tool can be improved to provide faster report generation."
"User interface could be more intuitive."
"Improve the user interface (UI) of the tool and make it user-friendly."
"SkyHigh has the ability to place users or groups on a ‘Watchlist’; which allows you to see certain views with these Watchlists users/groups in them. This is great when you are looking at live data but if I wanted to generate a report on "only" the watchlists."
"Its initial setup could be more straightforward."
"They only have English support, so I would like for them to add some Spanish support."
"Support for securing more cloud apps."
"We'd like to have two-factor authentication that is quite simple."
"It needs to offer SSO, single sign-on, and items of that nature."
"The pre-defined dictionaries could be improved."
"There could be additional ways to define proximity. Additionally, they should provide some exclusion options for specific policies and an ability to control the DLP engine."
"The solution's granularity should be improved because it has limited granular options to control, visible, allow, block, delay, and receive."
"They should work on a replica account. There could be alerts and replica files sent to the DLP team during data collection."
"Setup is a bit complex because there are many steps that need to be taken before onboarding and activating the solution."
"We have issues with the tool's maintenance and networking. It should be able to work in offline mode as well."
 

Pricing and Cost Advice

"We had the cost of purchasing a new appliance along with the implementation and licensing costs. However, the following year, the cost of just licensing was similar to what was paid the previous year for a new appliance along with the implementation and licensing costs."
"The overall pricing for iboss is very competitive and transparent."
"We have not priced the solution recently, but they were competitive with other vendors in the past."
"It is probably in line with other solutions, but I do not deal with the financial side."
"It is not expensive, and it is also not cheap. iboss is priced right in the sweet spot for the number of features it offers."
"It is expensive compared to one of its competitors."
"The tool is not expensive."
"The biggest thing to watch for is the difference in price per monitored user for the different API integrations."
"Some of our clients have a perpetual license and pay additional support yearly."
"Have a risk-based approach towards pricing."
"This is an expensive product, although it is made for larger enterprises and not for small organizations."
"It's an expensive solution."
"Commercially, I find Skyhigh Security a little costlier, compared to other products such as SentinelOne or Cybereason which are really novelty products. I'm not comparing Skyhigh Security with Trend Micro, but with other products, in particular the new, next-generation products. The price for Skyhigh Security is high in terms of value and ROI. I would rate the product price combined with product efficacy a six out of ten."
"Pricing is not out of reach."
"The solution is expensive."
"The product is a bit expensive."
"There is definitely an ROI."
"Zscaler Private Access is extremely expensive."
"Zscaler Private Access can be an expensive solution, depending on the license type you will purchase."
"Pricing for Zscaler Private Access is moderate. It's acceptable, though I can't give you the exact price currently. It's not too expensive, and on a scale of one to five, I would rate it a four out of five in terms of pricing."
"As per industry leads, Zscaler CASB is an expensive solution."
"It's expensive currently. But when purchasing for a large number of users, there's room to negotiate. It's really up to the procurement team."
report
Use our free recommendation engine to learn which Secure Access Service Edge (SASE) solutions are best for your needs.
884,933 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
11%
Computer Software Company
10%
Manufacturing Company
9%
Comms Service Provider
6%
Financial Services Firm
14%
Government
11%
Manufacturing Company
9%
Computer Software Company
6%
Financial Services Firm
13%
Computer Software Company
10%
Manufacturing Company
10%
Insurance Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business6
Midsize Enterprise6
Large Enterprise6
By reviewers
Company SizeCount
Small Business30
Midsize Enterprise4
Large Enterprise38
By reviewers
Company SizeCount
Small Business16
Midsize Enterprise12
Large Enterprise42
 

Questions from the Community

What needs improvement with iboss?
For zero trust implementation, we encountered complexity issues, especially with a large infrastructure company Exxon...
What is your primary use case for iboss?
Previously when I used iboss, we did the POC for iboss for ExxonMobil. Four or five people wanted to move from our ol...
What is your experience regarding pricing and costs for iboss?
Regarding pricing, setup costs, and licensing, iboss is not cheap, and that's my only concern. There are cheaper alte...
What needs improvement with McAfee Web Gateway?
When compared to other technologies, Skyhigh Security is quite simple, but if there is any improvement in the GUI, it...
What is your primary use case for McAfee Web Gateway?
I am currently working on Cisco Email Security Gateway, ESA, and I am also exploring Trellix Skyhigh proxy. I have be...
What advice do you have for others considering McAfee Web Gateway?
For IAM, we are using other tools, as we are a financial institution, so we do not go with a single vendor platform. ...
What is the better solution - Prisma Access or Zscaler Private Access?
We looked into Prisma Access before choosing Zscaler Private Access (ZPA). Palo Alto’s Prisma Access is a secure ac...
What do you like most about Zscaler SASE?
The most valuable features of Zscaler Private Access are reliability, scalability, and availability.
What needs improvement with Zscaler SASE?
The solution needs to improve a lot of aspects.
 

Also Known As

iBoss Cloud Platform
McAfee MVISION Cloud, McAfee MVISION Unified Cloud Edge, McAfee Web Gateway, McAfee MVISION CNAPP, and Skyhigh Networks, McAfee Web Gateway
Zscaler SASE, Zscaler DLP, Zscaler CASB, Zscaler CSPM, Zscaler Browser Isolation, Zscaler Posture Control
 

Interactive Demo

Demo not available
Demo not available
 

Overview

 

Sample Customers

More than 4,000 global enterprises trust the iboss Cloud Platform to support their modern workforces, including a large number of Fortune 50 companies.
Western Union.Aetna.DirecTV.Adventist.Equinix.Perrigo.Goodyear.HP.Cargill.Sony.Bank of the West.Prudential.
Siemens, AutoNation, GE, NOV
Find out what your peers are saying about Skyhigh Security vs. Zscaler Zero Trust Exchange Platform and other solutions. Updated: March 2026.
884,933 professionals have used our research since 2012.