Skyhigh Security Primary Use Case
NR
Navin-Rehnius
SOC Analyst at Infosys
Skyhigh Security is used as a proxy security tool, including forward proxy and reverse proxy functionalities. If any client faces an issue related to proxy settings, I use Skyhigh Proxy to troubleshoot and fix the problem.
View full review »The solution is primarily being used for data loss prevention in cloud environments and for PCI compliance. Right now, I'm implementing SecureWeb Gateway, Zero Trust, and VMware browser installations. My customers are in the financial or banking sectors, and they normally require new technologies. Skyhigh is mostly complete and it's a security host for other products.
View full review »We use Skyhigh Security to block user access or personal access. We have some services to prevent users from consuming all bandwidth for some applications that are very important for the organization. We also use the solution to permit some users to access personal networks.
View full review »Buyer's Guide
Skyhigh Security
June 2025

Learn what your peers think about Skyhigh Security. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
861,524 professionals have used our research since 2012.
We use the solution to monitor and secure our customers' internet access.
View full review »GM
Gururaj Meghraj
Technical Architect at a retailer with 1,001-5,000 employees
So we are using Skyhigh for SWG and CASB. Those are the two primary use cases. We also use it as a web proxy to allow users to access the internet securely. The product includes content filtering and reporting. In addition, we use McAfee EPO to manage McAfee antivirus and proxy agents.
View full review »VP
Vijay-Pandey
Network Architect at Neev limited
The typical use case for our clients is cloud security.
View full review »We use Skyhigh Security to audit people for internet behavior and for the discovery of shadow IT devices.
View full review »Skyhigh Security is used predominantly as a CWPP, where my customers have workloads in Azure or AWS, which require a workload protection solution and a post-production solution. In terms of Skyhigh Security being a CASB solution, it's for the SaaS applications of my customers, specifically for DLP protection, access control, and UEBA. The use case is based on what the customer gives me, then I would evaluate the requirements and propose a solution.
View full review »We use the solution to provide security to remote users.
View full review »VP
Vijay-Pandey
Network Architect at Neev limited
Our primary use case for Skyhigh Security is ICAP. We're also using it for web proxy and filtering purposes for all internal company websites and user sites such as Microsoft Team filtering.
View full review »McAfee Web Gateway is used as a proxy gateway in our company.
View full review »You can connect to SaaS applications, like Workday, Office 365, or Dropbox. There are hundreds of SaaS applications. A remote user can connect to some kind of gateway or be assisted by a gateway connection from his home, and he would then connect through that gateway to a broker, a broker with basically the CASB as a broker, and the broker would then put that layer of security too.
View full review »MVISION Cloud can be deployed on the cloud and on-premise.
I am using MVISION Cloud to have visibility for some CLP rules of the access to Office 365 applications.
View full review »We use this solution for web filtering.
I integrate and manage the solution. It's deployed on-premises.
View full review »We have 2 customers using McAfee Web Gateway. It is very useful as a complement to endpoint security. It is used to monitor incoming and outgoing traffic, as well as production.
View full review »HQ
Hai Quach
Senior IT Consultant at Yusen Logistics
We primarily use the solution for security purposes. We specifically use it for endpoint protection.
View full review »My experience with this product is from an evaluation standpoint. Since everybody is adopting cloud technologies such as SaaS, PaaS, and IaaS, they want to ensure that their data is secure. This product can be used to help people access our cloud applications securely, control users, and manage data movement over the cloud with respect to our data classification policies.
We have conducted a PoC but have not used it in our production environment.
View full review »We use this product for enterprise cloud security. My role is in strategy and security.
We are currently using Skyhigh Security with Office 365. We are, however, looking for another similar tool to be able to compare capacities with Skyhigh Security.
Our primary use case is the protection of sensitive information.
MT
Milos Tolpa
IT Engineer at FormatPC
We use this solution for controlling web content that the users are accessing. It's very good in case situations where you have the use of a VPN connection.
You can control your employees when they are in the office and out of the office, without using a VPN in the same fashion.
The on-premise solution will control them when they are on the corporate network, and when they're off the corporate network, the cloud's gateway will control them. They have the same policies.
View full review »MT
Milos Tolpa
IT Engineer at FormatPC
If you don't need an on-premises console for central management, this solution works very well. That's its main benefit. It's useful for companies that have a workforce that is dispersed as opposed to in a central location.
View full review »We primarily use the solution for security purposes. McAfee in general is very good for that.
View full review »The solution is basically it's a cloud access security broker. It's basically the leading cloud access security broker in the market. If you are talking about getting controlling access to AWS, Azure or Google cloud, or most of the major cloud providers, they can integrate that to help protect an organization from data loss, breaches, or from unauthorized access in general.
View full review »AG
Amadou Gatta Ba
IT Project Manager Individual Contributor at infolog
We use the solution for endpoint security.
View full review »This is a web security product, it controls the usage of web for employees. There is an integral anti-virus and web URL filtering solution. I've used the solution in multiple companies that I worked in, and for the last six months I have a new company and I sell the solution along with other security products. I'm a security engineer.
We use this solution to protect us against online threats, as well as for user activity monitoring.
View full review »We use this solution as a CASB, a Cloud Access Security Broker, to gain insight into our cloud environment. We integrate this solution for our clients as a companion service to our main cloud product.
View full review »AJ
Ankush-Jain
Deputy Specialist/Assistant Manager at a tech services company with 10,001+ employees
The primary use case is to prevent employees from extracting the data out of their corporate system and getting them outside through Gmail and things like that.
View full review »We use it for cloud risk services.
View full review »We use it to discover, protect, and permit.
Skyhigh for Shadow IT provides us visibility into the Shadow IT. It helps us in blocking high risk services and also in containing the data exfiltration to these high risk services.
View full review »We implemented Skyhigh for Shadow IT monitoring as well as Microsoft Office 365 real-time auditing. We monitor these on a daily basis and are currently in the process of implementing policies if certain activities are done by our end users.
Insight into services being accessed and/or used in corporate environment. Additionally, Shadow IT as a whole and provides another set of eyes on web proxy logs.
View full review »- The user analytics
- Having a full idea about infrastructure
- Shadow IT monitoring
- Sanctioned Cloud App Security
MR
Mateus Rodrigues
IT Intern
We use it to block malicious IP addresses and check for security leaks.
View full review »I have been implementing this solution for protection as an ERP solution. I've been using it to protect and implement private apps.
Buyer's Guide
Skyhigh Security
June 2025

Learn what your peers think about Skyhigh Security. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
861,524 professionals have used our research since 2012.