We implemented Skyhigh for Shadow IT monitoring as well as Microsoft Office 365 real-time auditing. We monitor these on a daily basis and are currently in the process of implementing policies if certain activities are done by our end users.
Information Security Analyst at Kronos at a tech company with 5,001-10,000 employees
We have gained a deep insight into our Shadow IT usage
Pros and Cons
- "The risk rating of each cloud application has been very useful. Whenever we discover a new application is use, we are able to quickly determine if this application is safe to use and whether or not we should allow our end users to be able to access it."
- "We have gained a deep insight into our Shadow IT usage as well as the different activities involved in Office 365."
- "Without Skyhigh, we had zero visibility, but now we are aware of so much more."
- "Though the Skyhigh Dashboard is processing large amounts of data, the speed of the Dashboard could be improved."
- "It would be nice to be able to get more advanced search functions to filter out data and quickly obtain the data that we need."
What is our primary use case?
How has it helped my organization?
We have gained a deep insight into our Shadow IT usage as well as the different activities involved in Office 365. Without Skyhigh, we had zero visibility, but now we are aware of so much more.
What is most valuable?
The risk rating of each cloud application has been very useful. Whenever we discover a new application is use, we are able to quickly determine if this application is safe to use and whether or not we should allow our end users to be able to access it.
What needs improvement?
Though the Skyhigh Dashboard is processing large amounts of data, the speed of the Dashboard could be improved. Also, it would be nice to be able to get more advanced search functions to filter out data and quickly obtain the data that we need.
Buyer's Guide
Skyhigh Security
May 2025

Learn what your peers think about Skyhigh Security. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
857,028 professionals have used our research since 2012.
For how long have I used the solution?
Less than one year.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
IT Security at a financial services firm with 5,001-10,000 employees
Provides categorization and rating of websites separate from what the web proxy places on the logs
Pros and Cons
- "Skyhigh has given us categorization and rating of websites separate from what the web proxy places on the logs."
- "Improves creation of security alerts on web proxy logs by having a separate system interpret said logs."
- "The tool could improve flexibility with the creation of reports/querying data."
What is our primary use case?
Insight into services being accessed and/or used in corporate environment. Additionally, Shadow IT as a whole and provides another set of eyes on web proxy logs.
How has it helped my organization?
It has allowed insight into gaps that may exist in current web proxy tool policies. Improves creation of security alerts on web proxy logs by having a separate system interpret said logs.
What is most valuable?
Skyhigh has given us categorization and rating of websites separate from what the web proxy places on the logs.
What needs improvement?
The tool could improve flexibility with the creation of reports/querying data. A better search capability, similar to a SIEM, would also allow deeper log analysis.
For how long have I used the solution?
One to three years.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Skyhigh Security
May 2025

Learn what your peers think about Skyhigh Security. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
857,028 professionals have used our research since 2012.
IT Security Analyst at a tech services company
The user activity identification in my organization improved
Pros and Cons
- "User analytics."
- "The services take some time to load. It would be helpful if the loading time was reduced."
What is most valuable?
User analytics.
How has it helped my organization?
The user activity identification improved.
What needs improvement?
The services take some time to load. It would be helpful if the loading time was reduced.
For how long have I used the solution?
I have been using it for the past few months.
What was my experience with deployment of the solution?
No issues.
What do I think about the stability of the solution?
No issues.
What do I think about the scalability of the solution?
No issues.
How are customer service and technical support?
I have not used the support as of now.
Which solution did I use previously and why did I switch?
No.
How was the initial setup?
I was not a part of the initial setup.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Works at a healthcare company with 1,001-5,000 employees
Provides full control of the infrastructure process, but needs to improve its support
What is our primary use case?
- The user analytics
- Having a full idea about infrastructure
What is most valuable?
DLP rules.
How has it helped my organization?
Having full control of infrastructure.
What needs improvement?
Iteration process.
For how long have I used the solution?
Two years.
What was my experience with deployment of the solution?
Yes.
What do I think about the stability of the solution?
Yes.
What do I think about the scalability of the solution?
No.
How are customer service and technical support?
Five out of 10.
Which solution did I use previously and why did I switch?
No.
How was the initial setup?
The support team implemented the solution.
What was our ROI?
Not applicable.
What's my experience with pricing, setup cost, and licensing?
It is good.
Which other solutions did I evaluate?
Yes.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Supervisor, IT Security at a healthcare company with 10,001+ employees
It gives us visibility into our employees activities and access to cloud apps
Pros and Cons
- "Shadow IT reporting capabilities."
- "Support for securing more cloud apps."
What is our primary use case?
- Shadow IT monitoring
- Sanctioned Cloud App Security
What is most valuable?
- Shadow IT reporting capabilities
- DLP integration
- Encryption
How has it helped my organization?
It has given us visibility into our employees activities and access to cloud apps.
What needs improvement?
Support for securing more cloud apps.
For how long have I used the solution?
Two and a half years.
What was my experience with deployment of the solution?
Some issues, but many had to do with the complexity of our deployment and they all have been worked through.
What do I think about the stability of the solution?
The Shadow IT portion would sometimes stop processing our proxy logs, but these issues seem to have been fixed.
What do I think about the scalability of the solution?
No.
How are customer service and technical support?
It is excellent and top-notch.
Which solution did I use previously and why did I switch?
No previous solution was used.
How was the initial setup?
For Shadow IT, it was straightforward.
For Sanctioned App Security deployment, it was a bit more complex. This was primarily due to the amount of integrations we decided to do with the existing technologies we owned, like DLP, SSO, etc., and because of the size of our cloud application.
What about the implementation team?
An in-house team.
What was our ROI?
Very good.
What's my experience with pricing, setup cost, and licensing?
I don't deal with pricing. Thus, I cannot answer this.
Which other solutions did I evaluate?
What other advice do I have?
Make sure you plan your deployment carefully. Break the project into phases. This makes for more wins sooner, which you can report to your upper management. Develop a good rapport with the team who owns the cloud application, so you can get full cooperation from them.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
INNOVATOR,ENGINEER,DREAMER! at a tech company with 51-200 employees
For a reasonable price, it enforces data loss prevention
What is most valuable?
- Prevents unauthorized data being shared from external sources.
- Enforces data loss prevention.
- DLP reporting and deep integration.
How has it helped my organization?
- Malware and spam mails
- Attacks from hackers
- Data privacy
What needs improvement?
Detecting threats.
For how long have I used the solution?
One year.
What was my experience with deployment of the solution?
No.
What do I think about the stability of the solution?
No.
What do I think about the scalability of the solution?
No.
How are customer service and technical support?
Customer Service:
A 10 out of 10.
Technical Support:A 10 out of 10.
Which solution did I use previously and why did I switch?
No.
How was the initial setup?
The initial setup was straightforward.
What about the implementation team?
We implemented in-house.
What was our ROI?
Our ROI is 150%.
What's my experience with pricing, setup cost, and licensing?
The pricing is reasonable.
Which other solutions did I evaluate?
No.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Student at Marri Educational Society's Marri Laxman Reddy Institute of Technology and Management at a tech company with 51-200 employees
Provides a perfect level of customer service
Pros and Cons
- "Tokenization."
- "De-tokenization."
What is most valuable?
Tokenization.
How has it helped my organization?
High-risk services.
What needs improvement?
De-tokenization.
For how long have I used the solution?
One year.
What was my experience with deployment of the solution?
No.
What do I think about the stability of the solution?
No.
What do I think about the scalability of the solution?
No.
How are customer service and technical support?
Customer Service:
A 10 out of 10.
Technical Support:An eight out of 10.
Which solution did I use previously and why did I switch?
No.
What about the implementation team?
We implemented in-house.
Disclosure: My company has a business relationship with this vendor other than being a customer:
Information Security Lead Analyst at a healthcare company with 1,001-5,000 employees
We have been able to analyse our user activity, which has helped us to identify the associated risks
What is most valuable?
The user analytics.
How has it helped my organization?
We were able to analyse our user activity, which helped us to identify the associated risks.
What needs improvement?
Improve the user interface (UI) of the tool and make it user-friendly.
For how long have I used the solution?
Three years.
What was my experience with deployment of the solution?
Yes.
What do I think about the stability of the solution?
Yes.
What do I think about the scalability of the solution?
Yes.
How are customer service and technical support?
Customer Service:
A six out of 10.
Technical Support:A seven out of 10.
Which solution did I use previously and why did I switch?
No.
How was the initial setup?
I was not part of the setup.
What about the implementation team?
A vendor team did the implementation. I would give them a seven out of 10 on their expertise.
What was our ROI?
I have no idea of what it is.
Which other solutions did I evaluate?
No.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free Skyhigh Security Report and get advice and tips from experienced pros
sharing their opinions.
Updated: May 2025
Product Categories
Secure Access Service Edge (SASE) Secure Web Gateways (SWG) Data Loss Prevention (DLP) Cloud Access Security Brokers (CASB) ZTNA as a ServicePopular Comparisons
Cisco Umbrella
Prisma Access by Palo Alto Networks
Zscaler Internet Access
Lookout
Zscaler Zero Trust Exchange Platform
Cloudflare One
Microsoft Defender for Cloud Apps
Netskope
Cato SASE Cloud Platform
Check Point Harmony SASE (formerly Perimeter 81)
FortiSASE
VMware VeloCloud SD-WAN
Appgate SDP
Fortinet FortiGate SWG
Buyer's Guide
Download our free Skyhigh Security Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Evaluating CASBs. Looking for community feedback on some vendors.
- What is the difference between point solutions (SD-WAN, NGFW, SWG, VPN) and SASE?
- What questions do you need to ask when choosing a Secure Access Service Edge (SASE) solution?
- When evaluating Secure Access Service Edge (SASE), what aspect do you think is the most important to look for?
- Has anyone ever heard of secureaccess.com?
- What is the difference between SASE and SD-WAN?
- What is the difference between SASE and CASB?
- What SASE solution does your company use?
- Why is SASE (Secure Access Service Edge) important?
- What SASE solution do you recommend?
tool is useful