Skyhigh Security Primary Use Case
We use the solution to monitor and secure our customers' internet access.
View full review »The solution is primarily being used for data loss prevention in cloud environments and for PCI compliance. Right now, I'm implementing SecureWeb Gateway, Zero Trust, and VMware browser installations. My customers are in the financial or banking sectors, and they normally require new technologies. Skyhigh is mostly complete and it's a security host for other products.
View full review »KV
reviewer2000751
IT Manager at a energy/utilities company with 10,001+ employees
We use Skyhigh Security to audit people for internet behavior and for the discovery of shadow IT devices.
View full review »Buyer's Guide
Skyhigh Security
March 2024
Learn what your peers think about Skyhigh Security. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
768,246 professionals have used our research since 2012.
MVISION Cloud can be deployed on the cloud and on-premise.
I am using MVISION Cloud to have visibility for some CLP rules of the access to Office 365 applications.
View full review »DA
reviewer1861374
Sr. Sales Engineer at a tech services company with 11-50 employees
You can connect to SaaS applications, like Workday, Office 365, or Dropbox. There are hundreds of SaaS applications. A remote user can connect to some kind of gateway or be assisted by a gateway connection from his home, and he would then connect through that gateway to a broker, a broker with basically the CASB as a broker, and the broker would then put that layer of security too.
View full review »Skyhigh Security is used predominantly as a CWPP, where my customers have workloads in Azure or AWS, which require a workload protection solution and a post-production solution. In terms of Skyhigh Security being a CASB solution, it's for the SaaS applications of my customers, specifically for DLP protection, access control, and UEBA. The use case is based on what the customer gives me, then I would evaluate the requirements and propose a solution.
View full review »HQ
Hai Quach
Senior IT Consultant at Yusen Logistics
We primarily use the solution for security purposes. We specifically use it for endpoint protection.
View full review »VP
Vijay-Pandey
Network Architect at Neev limited
Our primary use case for Skyhigh Security is ICAP. We're also using it for web proxy and filtering purposes for all internal company websites and user sites such as Microsoft Team filtering.
View full review »JM
reviewer1281354
Data Centric Security Expert, Strategic DCAP Business Enabler at a tech services company with 10,001+ employees
We use this product for enterprise cloud security. My role is in strategy and security.
GM
Gururaj Meghraj
Technical Architect at a retailer with 1,001-5,000 employees
So we are using Skyhigh for SWG and CASB. Those are the two primary use cases. We also use it as a web proxy to allow users to access the internet securely. The product includes content filtering and reporting. In addition, we use McAfee EPO to manage McAfee antivirus and proxy agents.
View full review »McAfee Web Gateway is used as a proxy gateway in our company.
View full review »We implemented Skyhigh for Shadow IT monitoring as well as Microsoft Office 365 real-time auditing. We monitor these on a daily basis and are currently in the process of implementing policies if certain activities are done by our end users.
- Shadow IT monitoring
- Sanctioned Cloud App Security
We use this solution for web filtering.
I integrate and manage the solution. It's deployed on-premises.
View full review »We are currently using Skyhigh Security with Office 365. We are, however, looking for another similar tool to be able to compare capacities with Skyhigh Security.
Our primary use case is the protection of sensitive information.
MA
reviewer1053252
Technical Presales Consultant/ Engineer at a tech vendor with 10,001+ employees
The solution is basically it's a cloud access security broker. It's basically the leading cloud access security broker in the market. If you are talking about getting controlling access to AWS, Azure or Google cloud, or most of the major cloud providers, they can integrate that to help protect an organization from data loss, breaches, or from unauthorized access in general.
View full review »NK
user8988
Sr. Analyst Governance and Compliance at a aerospace/defense firm with 10,001+ employees
We use it for cloud risk services.
View full review »AR
reviewer2117211
Delivery Engineer at a tech services company with 11-50 employees
I have been implementing this solution for protection as an ERP solution. I've been using it to protect and implement private apps.
MT
Milos Tolpa
IT Engineer at FormatPC
If you don't need an on-premises console for central management, this solution works very well. That's its main benefit. It's useful for companies that have a workforce that is dispersed as opposed to in a central location.
View full review »AG
Amadou Gatta Ba
IT Project Manager Individual Contributor at infolog
We use the solution for endpoint security.
View full review »AC
reviewer1294107
Vice President - Risk Management, Chief Information Security Officer at a computer software company with 10,001+ employees
We use this solution to protect us against online threats, as well as for user activity monitoring.
View full review »AJ
Ankush-Jain
Deputy Specialist/Assistant Manager at a tech services company with 10,001+ employees
The primary use case is to prevent employees from extracting the data out of their corporate system and getting them outside through Gmail and things like that.
View full review »We have 2 customers using McAfee Web Gateway. It is very useful as a complement to endpoint security. It is used to monitor incoming and outgoing traffic, as well as production.
View full review »MT
Milos Tolpa
IT Engineer at FormatPC
We use this solution for controlling web content that the users are accessing. It's very good in case situations where you have the use of a VPN connection.
You can control your employees when they are in the office and out of the office, without using a VPN in the same fashion.
The on-premise solution will control them when they are on the corporate network, and when they're off the corporate network, the cloud's gateway will control them. They have the same policies.
View full review »DS
reviewer953730
Director, GRC Applications and Systems Delivery at a tech company with 501-1,000 employees
We use this solution as a CASB, a Cloud Access Security Broker, to gain insight into our cloud environment. We integrate this solution for our clients as a companion service to our main cloud product.
View full review »Insight into services being accessed and/or used in corporate environment. Additionally, Shadow IT as a whole and provides another set of eyes on web proxy logs.
View full review »- The user analytics
- Having a full idea about infrastructure
HK
reviewer1505541
Lead - Information Security at a tech services company with 10,001+ employees
My experience with this product is from an evaluation standpoint. Since everybody is adopting cloud technologies such as SaaS, PaaS, and IaaS, they want to ensure that their data is secure. This product can be used to help people access our cloud applications securely, control users, and manage data movement over the cloud with respect to our data classification policies.
We have conducted a PoC but have not used it in our production environment.
View full review »MR
Mateus Rodrigues
IT Intern
We use it to block malicious IP addresses and check for security leaks.
View full review »NF
reviewer1415217
Security Engineer at a tech services company with 201-500 employees
This is a web security product, it controls the usage of web for employees. There is an integral anti-virus and web URL filtering solution. I've used the solution in multiple companies that I worked in, and for the last six months I have a new company and I sell the solution along with other security products. I'm a security engineer.
We use it to discover, protect, and permit.
Skyhigh for Shadow IT provides us visibility into the Shadow IT. It helps us in blocking high risk services and also in containing the data exfiltration to these high risk services.
View full review »SK
reviewer1569468
Security Engineer at a tech services company with 51-200 employees
We primarily use the solution for security purposes. McAfee in general is very good for that.
View full review »Buyer's Guide
Skyhigh Security
March 2024
Learn what your peers think about Skyhigh Security. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
768,246 professionals have used our research since 2012.