Skyhigh Security Valuable Features
NR
Navin-Rehnius
SOC Analyst at Infosys
Skyhigh Security is user-friendly in terms of configuration and UI. Customer support has been very helpful to my team, resolving most of the problems we encounter. Its name in the market is also a positive aspect.
View full review »Data loss prevention and user behavior analysis are two valuable features. If a customer's password has been compromised, we can then recognize and authorize its login from another country, and we can block it.
View full review »The solution provides great security, higher availability, and policy granularity. Its integration with Active Directory and troubleshooting are important. The solution also provides easy integration and implementation.
View full review »Buyer's Guide
Skyhigh Security
June 2025

Learn what your peers think about Skyhigh Security. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
859,579 professionals have used our research since 2012.
The solution's best feature is the flexibility of use.
View full review »GM
Gururaj Meghraj
Technical Architect at a retailer with 1,001-5,000 employees
Skyhigh performs well, and we can choose from virtual and hardware plans. We can deploy the ISO on as many virtual machines as possible and easily set up high availability on the web proxy. The location doesn't matter. The user at a site will always access the web proxy for that location. It's suitable for an organization distributed across multiple regions.
The reporting is also straightforward, which is handy for troubleshooting. You can do live tracing and check the log to see the traffic on a particular IP to determine what happened. You can configure it to say certain websites are blocked by default. If traffic is allowed, you can trace the issue and fix it. The backup features are highly efficient.
View full review »VP
Vijay-Pandey
Network Architect at Neev limited
The cloud security features are the most valuable. The solution significantly helps in enhancing security management. It also contributes to operational cost savings.
View full review »VB
ValentinBerkut
Cybersecurity Project Officer at Sense
The product enables us to scan files for viruses and vulnerabilities. The threat protection capabilities are very strong. The product handles our compliance and governance challenges well. It enhances our security.
View full review »I personally don't have any issues with the performance or the stability of the solution. However, I am not the only person using this tool, and I can't speak for other colleagues using it.
View full review »Skyhigh Security is not a bad product. It was a market leader. When McAfee acquired it, it was in the top magic quadrant. It is a good product.
I also like that McAfee has been in the endpoint security market for quite a long time and knows how things work.
What I found most valuable in Skyhigh Security is its stability.
The solution also has good KB articles that make it simple for users to do the deployment of Skyhigh Security themselves, without the need for integrators.
View full review »Skyhigh offers solutions like WLP and CASB. These tools provide instructions and guidelines for enhancing data security. Additionally, they offer additional software solutions for further protection.
View full review »VP
Vijay-Pandey
Network Architect at Neev limited
The feature I like best about Skyhigh Security is its wide range of product support. For example, my company had NetApp storage running, and Skyhigh Security has on-premises NetApp storage support, which isn't available in other solutions.
Skyhigh Security also has a better filtering feature versus the filtering feature in other solutions.
The most valuable features of McAfee Web Gateway are anti-malware, reports, and powerful categorization of web pages.
View full review »A lot of people sell the solution, including Palo Alto. You've got Skyhigh Networks, which was the leader of CASB and then they were acquired by McAfee, and then now they've broken off into Skyhigh Security. They still have the CASB and they're still considered a market leader.
They were very, very aggressive in the market to get a new market share or to take over market share while other companies were being broken up.
It's a really easy product. It is a pretty straightforward product. The only thing that Skyhigh doesn't is what Palo Alto does - they don't do any kind of a software-defined WAN, SD-WAN. If you have different circuits to utilize different bandwidth across different media and also set up redundancy links and that kind of stuff, that's all the SD-WAN. They do not have SD-WAN, Skyhigh Security does not have SD-WAN. Palo Alto does.
They were real big on the secure services, edge SSE and zero-trust network architecture type deployments. A lot of that stuff coming out of the networking and when things moved to a cloud, you have what's called sanction IP, which is basically, what we always knew as an internal network in all the security and firewalls and everything about that and then as things moved to the cloud, business to business type stuff and then you start having what's called shadow IP. That's when you have to build all the firewall policy infrastructure in the cloud to emulate what we were doing down inside of a business, connecting servers or PCs or network switches and that kind of stuff. However, infrastructure as a service is doing the same type of functions yet they're cloud services and not physical network services, or switches, meaning there's no mounting it in the rack and that kind of stuff.
View full review »The most valuable features of MVISION Cloud are the automatic reports and modification incidents.
View full review »The stability is the most valuable feature. We haven't had any issues with the product.
It's easy to configure. It's not hard to manage day to day.
View full review »MD
Mohit Dhingra
Senior Vice President IT at AS IT Consulting Pvt. Ltd.
What's most valuable in Skyhigh Security is its level of security. Another valuable feature of the solution is threat analysis.
View full review »McAfee has a very strong URL spam filtering feature.
View full review »HQ
Hai Quach
Senior IT Consultant at Yusen Logistics
The product has a very high rating from reviewers. It's a well-respected product.
The initial setup is pretty simple.
We've found the scalability potential to be good. Technical support is often helpful.
The solution is stable and the performance is good.
View full review »We were using MVISION for data protection.
The most valuable feature is the support. It's the best.
MVISION has a really good strategy and the CASB solution is excellent.
The feature I found most valuable is the API.
View full review »MT
Milos Tolpa
IT Engineer at FormatPC
It's a great product with solid features.
It's a security appliance and it is quite secure.
They are quite well integrated.
View full review »MT
Milos Tolpa
IT Engineer at FormatPC
The solution is very easy to use. It's easy to navigate.
The product has proven itself to be very stable.
The solution is scalable.
We find it to be quite flexible.
Overall, the performance is good.
Due to the fact that it's in the cloud, you don't have to maintain it. It's maintained by McAfee. You don't need to worry about updates and upgrades.
View full review »The solution is stable. The performance has been great.
It's an easy-to-use product. We find it to be quite user-friendly.
The scalability of the product is excellent.
Overall, we have been very happy with the product. It's been working well.
The installation was straightforward and pretty simple.
View full review »What I really like about the product is something called the ability to view the sanctioned IP apps, which is a major challenge for organizations today. There are sanctioned IP apps or unsanctioned IP apps. In an organization, you will find employees that will use services or applications for the business, which are not authorized by the IT department, and the organization fails to have visibility over this.
What McAfee can provide is full details into what your users are doing on the cloud. For example, lots of employees may be using WhatsApp for conducting critical business workflows, and yet their organization is not permitting them to use WhatsApp. Without a solution such as this, the company will never find out if they actually are using WhatsApp and to what rates. With MVISION Cloud and their web gateway, companies basically get visibility and insights into what their users are using on the cloud.
The product has the ability to provide insights and also to advise on misconfigurations on the cloud. For example, I may be a cloud customer and I'm using IS workloads or infrastructure and service workloads on Azure. I may have object storage configured on Azure, however, this object storage didn't get secured properly. It was publicly open. The system can suggest changes to alert you to this item and advise on how to fix the issue.
With MVISION Cloud, you can actually get detection notices. It will notify you, tell you, hey, be careful. You have object storage that is open to the public. You should lock it down, should have restricted access. You should have some credentials here or there. It will basically act like an advisor for your cloud configuration as well. This is what I really like about it, to be honest. It can tell you if something can go wrong before it happens. It allows you to fix things before situations can get out of hand.
In terms of their compatibility with major cloud providers, in terms of their abilities, capabilities, and features, they exceed everyone's capabilities in the CASB market.
Their integration capabilities are vast. They seem to be able to integrate all major clouds.
The solution is very stable.
The solution can scale.
Technical support has been very helpful.
View full review »They provide a variety of options for scalability, where we can use it over the cloud, or we can deploy it on-premises through our proxy. We can also use agent-based installation. Together, from a coverage point of view, the solution is pretty good. The other products that I have evaluated do not have the scalability options that McAfee has.
View full review »I like the anti-virus filtering, URL categorization, and reporting capabilities. I also like the ability to control what kinds of files or content can be downloaded. So you can restrict executables and potential harmful files. It's a very sophisticated and mature solution.
The most valuable feature is the SSL decryption.
View full review »The most valuable feature for us is the integration with DLP.
View full review »AJ
Ankush-Jain
Deputy Specialist/Assistant Manager at a tech services company with 10,001+ employees
Predominantly, there are two valuable features: One is the data loss and the other one is network loss.
It also prevents you from writing data to your Gmail and does not allow you to move your data outside of the corporate system. That is the most important feature for me.
View full review »There is one feature called data governance that shows all the cloud services which are used.
There is another one called cloud registry where we can see a risk assessment for the cloud services being used. If we want to add a new cloud service or a new cloud application, we can check into it and do an assessment through the cloud registry. That is the feature that I like most.
View full review »The risk management feature.
View full review »The risk rating of each cloud application has been very useful. Whenever we discover a new application is use, we are able to quickly determine if this application is safe to use and whether or not we should allow our end users to be able to access it.
Skyhigh has given us categorization and rating of websites separate from what the web proxy places on the logs.
View full review »User analytics.
View full review »DLP rules.
View full review »- Shadow IT reporting capabilities
- DLP integration
- Encryption
- Prevents unauthorized data being shared from external sources.
- Enforces data loss prevention.
- DLP reporting and deep integration.
Tokenization.
View full review »The user analytics.
View full review »Skyhigh Box
View full review »Sanctioned IT.
View full review »- Tokenization
- User analytics
- Box API features with DLP capabilities
- Shadow IT
- Shadow IT
- Sanctioned IT
- Skyhigh's Shadow IT capability
- Cloud Risk Registry
- DLP policies and anomalies
All the information available on each service, including its risk assessment. Service groups, automatic assignment of services based on designated conditions, and the ability to utilize multiple log sources for the data.
View full review »Currently, we are using cloud discovery and analytics. This has given us an insight to which services our end users are subscribing to and where our business data may be held.
TH
CyberSecurity33
Cyber Security Engineer at a recruiting/HR firm with 51-200 employees
It has a very user-friendly UI and is easier to pick up for people with less technical experience.
View full review »Skyhigh's shadow IT capability and cloud risk registry are the two most helpful tools for our organization.
View full review »The most valuable feature of Skyhigh networks is the capability of giving an overview of all active cloud services on our network. Skyhigh analyzes syslog data from our firewall, and returns a report of the cloud service usage on our network. In other words, this takes the 'shadow' out of Shadow IT. It sheds some light on the current situation.
The report returned by Skyhigh not only shows which cloud services are in use, but also gives each individual cloud service a risk assessment in terms of risks associated with the service. The categories are Data Risk, User Risk, Legal Risk and Business Risk. With this overview of the associated risk for cloud services on our network, we can make some very conscious decisions about how we want to shape which services are used on the network. We can make sure that we offer safe alternatives to the services already in use. We want all our users to use cloud services, so that we can stay agile and flexible, but we also want to make sure we don't take any unnecessary risk.
Skyhigh furthers the protection of our sanctioned cloud services. Once we make a decision on which services we feel are a good match for our company, we can add extra protection to those services in the form of monitoring and threat prevention. Skyhigh can make sure that all data we put in our sanctioned cloud service is compliant with our company policy as well, as industry regulations. In other words, if one of our users accidentally puts data in the cloud that isn't compliant, we can remove this data before it causes problems. This is a win for our users and the company as a whole.
Skyhigh also monitors the usage of our sanctioned cloud services. They can spot any abnormal activity, such as users logging in from several different countries in a short period of time, or other suspicious activity.
View full review »The ability to identify shadow IT within our environment through proxy log analysis based on risk assessments provided by Skyhigh Registry have been invaluable in helping us reduce our overall data risk
View full review »MR
Mateus Rodrigues
IT Intern
It is easy to configure rules.
View full review »I like the encrypted disk feature and the endpoint protection.
View full review »The broader solution is quite useful. They provide service management for a variety of environments, including Office 365, Google, AWS, and Azure.
It offers very good protection overall.
The management is very good.
We're able to provide the customer with best practices for coding.
It is a stable product.
Technical support is helpful.
The pricing is reasonable.
View full review »Buyer's Guide
Skyhigh Security
June 2025

Learn what your peers think about Skyhigh Security. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
859,579 professionals have used our research since 2012.