Skyhigh Security Primary Use Case

Chinthu James - PeerSpot reviewer
SME/Manager -Secure Web Access at Capgemini

We use the solution to monitor and secure our customers' internet access.

View full review »
Santiago Gomez - PeerSpot reviewer
Cio at a security firm with 11-50 employees

The solution is primarily being used for data loss prevention in cloud environments and for PCI compliance. Right now, I'm implementing SecureWeb Gateway, Zero Trust, and VMware browser installations. My customers are in the financial or banking sectors, and they normally require new technologies. Skyhigh is mostly complete and it's a security host for other products.

View full review »
KV
IT Manager at a energy/utilities company with 10,001+ employees

We use Skyhigh Security to audit people for internet behavior and for the discovery of shadow IT devices.

View full review »
Buyer's Guide
Skyhigh Security
March 2024
Learn what your peers think about Skyhigh Security. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
768,246 professionals have used our research since 2012.
Fernando Allendes - PeerSpot reviewer
Senior IT Security Consultant at Universal Network Solutions, Inc (UNS)

MVISION Cloud can be deployed on the cloud and on-premise.

I am using MVISION Cloud to have visibility for some CLP rules of the access to Office 365 applications.

View full review »
DA
Sr. Sales Engineer at a tech services company with 11-50 employees

You can connect to SaaS applications, like Workday, Office 365, or Dropbox. There are hundreds of SaaS applications. A remote user can connect to some kind of gateway or be assisted by a gateway connection from his home, and he would then connect through that gateway to a broker, a broker with basically the CASB as a broker, and the broker would then put that layer of security too.

View full review »
Jathin Das - PeerSpot reviewer
Solutions Architect at Paramount Computer Systems

Skyhigh Security is used predominantly as a CWPP, where my customers have workloads in Azure or AWS, which require a workload protection solution and a post-production solution. In terms of Skyhigh Security being a CASB solution, it's for the SaaS applications of my customers, specifically for DLP protection, access control, and UEBA. The use case is based on what the customer gives me, then I would evaluate the requirements and propose a solution.

View full review »
HQ
Senior IT Consultant at Yusen Logistics

We primarily use the solution for security purposes. We specifically use it for endpoint protection.

View full review »
VP
Network Architect at Neev limited

Our primary use case for Skyhigh Security is ICAP. We're also using it for web proxy and filtering purposes for all internal company websites and user sites such as Microsoft Team filtering.

View full review »
JM
Data Centric Security Expert, Strategic DCAP Business Enabler at a tech services company with 10,001+ employees

We use this product for enterprise cloud security. My role is in strategy and security.

View full review »
GM
Technical Architect at a retailer with 1,001-5,000 employees

So we are using Skyhigh for SWG and CASB. Those are the two primary use cases. We also use it as a web proxy to allow users to access the internet securely. The product includes content filtering and reporting. In addition, we use McAfee EPO to manage McAfee antivirus and proxy agents.

View full review »
Yovanny Amariles - PeerSpot reviewer
Information Security Leader at Alcaldía de Medellín

McAfee Web Gateway is used as a proxy gateway in our company.

View full review »
reviewer826926 - PeerSpot reviewer
Information Security Analyst at Kronos at a tech company with 5,001-10,000 employees

We implemented Skyhigh for Shadow IT monitoring as well as Microsoft Office 365 real-time auditing. We monitor these on a daily basis and are currently in the process of implementing policies if certain activities are done by our end users.

View full review »
it_user774504 - PeerSpot reviewer
Supervisor, IT Security at a healthcare company with 10,001+ employees
  • Shadow IT monitoring 
  • Sanctioned Cloud App Security
View full review »
David Ferreira - PeerSpot reviewer
Network Security Engineer at a consultancy with 11-50 employees

We use this solution for web filtering.

I integrate and manage the solution. It's deployed on-premises.

View full review »
Thanakorn Withawatkajee - PeerSpot reviewer
Senior Product Consultant at M.Tech

We are currently using Skyhigh Security with Office 365. We are, however, looking for another similar tool to be able to compare capacities with Skyhigh Security.

Our primary use case is the protection of sensitive information.

View full review »
MA
Technical Presales Consultant/ Engineer at a tech vendor with 10,001+ employees

The solution is basically it's a cloud access security broker. It's basically the leading cloud access security broker in the market. If you are talking about getting controlling access to AWS, Azure or Google cloud, or most of the major cloud providers, they can integrate that to help protect an organization from data loss, breaches, or from unauthorized access in general.

View full review »
NK
Sr. Analyst Governance and Compliance at a aerospace/defense firm with 10,001+ employees

We use it for cloud risk services.

View full review »
AR
Delivery Engineer at a tech services company with 11-50 employees

I have been implementing this solution for protection as an ERP solution. I've been using it to protect and implement private apps.

View full review »
MT
IT Engineer at FormatPC

If you don't need an on-premises console for central management, this solution works very well. That's its main benefit. It's useful for companies that have a workforce that is dispersed as opposed to in a central location.

View full review »
AG
IT Project Manager Individual Contributor at infolog

We use the solution for endpoint security. 

View full review »
AC
Vice President - Risk Management, Chief Information Security Officer at a computer software company with 10,001+ employees

We use this solution to protect us against online threats, as well as for user activity monitoring.

View full review »
AJ
Deputy Specialist/Assistant Manager at a tech services company with 10,001+ employees

The primary use case is to prevent employees from extracting the data out of their corporate system and getting them outside through Gmail and things like that.

View full review »
Nadeem Syed - PeerSpot reviewer
CEO at Haniya Technologies

We have 2 customers using McAfee Web Gateway. It is very useful as a complement to endpoint security. It is used to monitor incoming and outgoing traffic, as well as production.

View full review »
MT
IT Engineer at FormatPC

We use this solution for controlling web content that the users are accessing. It's very good in case situations where you have the use of a VPN connection.

You can control your employees when they are in the office and out of the office, without using a VPN in the same fashion.

The on-premise solution will control them when they are on the corporate network, and when they're off the corporate network, the cloud's gateway will control them. They have the same policies.

View full review »
DS
Director, GRC Applications and Systems Delivery at a tech company with 501-1,000 employees

We use this solution as a CASB, a Cloud Access Security Broker, to gain insight into our cloud environment. We integrate this solution for our clients as a companion service to our main cloud product.

View full review »
it_user789939 - PeerSpot reviewer
IT Security at a financial services firm with 5,001-10,000 employees

Insight into services being accessed and/or used in corporate environment. Additionally, Shadow IT as a whole and provides another set of eyes on web proxy logs.

View full review »
it_user774840 - PeerSpot reviewer
Works at a healthcare company with 1,001-5,000 employees
  • The user analytics
  • Having a full idea about infrastructure
View full review »
HK
Lead - Information Security at a tech services company with 10,001+ employees

My experience with this product is from an evaluation standpoint. Since everybody is adopting cloud technologies such as SaaS, PaaS, and IaaS, they want to ensure that their data is secure. This product can be used to help people access our cloud applications securely, control users, and manage data movement over the cloud with respect to our data classification policies.

We have conducted a PoC but have not used it in our production environment.

View full review »
MR
IT Intern

We use it to block malicious IP addresses and check for security leaks. 

View full review »
NF
Security Engineer at a tech services company with 201-500 employees

This is a web security product, it controls the usage of web for employees. There is an integral anti-virus and web URL filtering solution. I've used the solution in multiple companies that I worked in, and for the last six months I have a new company and I sell the solution along with other security products. I'm a security engineer. 

View full review »
it_user775083 - PeerSpot reviewer
Information Assurance Manager at a transportation company with 10,001+ employees

We use it to discover, protect, and permit.

Skyhigh for Shadow IT provides us visibility into the Shadow IT. It helps us in blocking high risk services and also in containing the data exfiltration to these high risk services.

View full review »
SK
Security Engineer at a tech services company with 51-200 employees

We primarily use the solution for security purposes. McAfee in general is very good for that.

View full review »
Buyer's Guide
Skyhigh Security
March 2024
Learn what your peers think about Skyhigh Security. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
768,246 professionals have used our research since 2012.