# Best Cloud Access Security Broker (CASB) Software

  *By [Lauren Worth](https://research.g2.com/insights/author/lauren-worth)*

   Cloud access security broker (CASB) software is used to provide a layer of protection and policy enforcement for employees accessing cloud-based software. CASB serves as a gateway through which companies can enforce their security requirements beyond on-premise and secure connections between employees and cloud service providers. Companies use CASB software to reduce risks related to cloud applications and network connections while simultaneously monitoring actions and behaviors.

CASB solutions are also used to identify abnormal behaviors from internal actors and then alert administrators of potential shadow IT and noncompliant behaviors. These tools typically monitor and record the actions taken by an individual using the CASB, who can leverage the data collected for behavioral analysis and reporting.

To qualify for inclusion in the Cloud Access Security Broker (CASB) category, a product must:

- Secure connections between end users and cloud service providers
- Enforce security policies beyond local networks and infrastructure
- Protect data and connected devices from cloud-based threats and malware





## Category Overview

**Total Products under this Category:** 53


## Trust & Credibility Stats

**Why You Can Trust G2's Software Rankings:**

- 30 Analysts and Data Experts
- 2,000+ Authentic Reviews
- 53+ Products
- Unbiased Rankings

G2's software rankings are built on verified user reviews, rigorous moderation, and a consistent research methodology maintained by a team of analysts and data experts. Each product is measured using the same transparent criteria, with no paid placement or vendor influence. While reviews reflect real user experiences, which can be subjective, they offer valuable insight into how software performs in the hands of professionals. Together, these inputs power the G2 Score, a standardized way to compare tools within every category.


## Best Cloud Access Security Broker (CASB) Software At A Glance

- **Leader:** [Netskope One Platform](https://www.g2.com/products/netskope-one-platform/reviews)
- **Highest Performer:** [Zscaler Zero Trust Cloud](https://www.g2.com/products/zscaler-zero-trust-cloud/reviews)
- **Easiest to Use:** [Cato SASE Cloud](https://www.g2.com/products/cato-networks-cato-sase-cloud/reviews)
- **Top Trending:** [Cato SASE Cloud](https://www.g2.com/products/cato-networks-cato-sase-cloud/reviews)
- **Best Free Software:** [Netskope One Platform](https://www.g2.com/products/netskope-one-platform/reviews)


---

**Sponsored**

### Foxpass by Splashtop

Foxpass Cloud RADIUS by Splashtop is a fully managed, cloud-hosted RADIUS authentication service designed to provide secure, passwordless access to Wi-Fi networks, VPNs, and various network infrastructures. This solution is particularly tailored for IT teams that prioritize security, control, and operational simplicity. By employing certificate-based and identity-based authentication protocols, Foxpass ensures that every device and user connection is validated, enhancing the overall security posture of an organization. The product is especially beneficial for organizations looking to eliminate the vulnerabilities associated with shared passwords. By utilizing X.509 certificate authentication (EAP-TLS) and identity-driven policies (EAP-TTLS), Foxpass facilitates the implementation of Zero Trust principles. This approach allows organizations to assign role-based access controls and maintain comprehensive audit visibility without the need for on-premises servers or complex Public Key Infrastructure (PKI). Such features make Foxpass an appealing choice for enterprises, educational institutions, and global teams seeking to streamline their authentication processes. Foxpass seamlessly integrates with various identity providers, including Microsoft Entra ID (Azure), Google, OKTA, and OneLogin. This integration is complemented by automated certificate management capabilities through leading Mobile Device Management (MDM) solutions such as Microsoft Intune, Jamf, Kandji, and Addigy. Additionally, the built-in Bring Your Own Device (BYOD) workflows enable secure enrollment of unmanaged or personal devices, ensuring that organizations can maintain security standards while accommodating diverse device types. Compliance with industry standards is another critical aspect of Foxpass. The service is designed to meet regulations such as GDPR, SOC 2, ISO 27001, HIPAA, FERPA, and CIPA, making it suitable for organizations with stringent compliance requirements. Furthermore, Foxpass offers regional hosting and data residency options, which are essential for organizations that must adhere to specific sovereignty or privacy mandates. This flexibility ensures that users can implement Foxpass in a manner that aligns with their operational and regulatory needs. Overall, Foxpass Cloud RADIUS by Splashtop stands out in the authentication service category by providing a robust, cloud-based solution that enhances security, simplifies management, and supports compliance across various industries. Its focus on passwordless access and seamless integration with existing identity systems positions it as a valuable tool for organizations aiming to enhance their network security infrastructure.



[Visit website](https://www.g2.com/external_clickthroughs/record?secure%5Bad_program%5D=ppc&amp;secure%5Bad_slot%5D=category_product_list&amp;secure%5Bcategory_id%5D=1860&amp;secure%5Bdisplayable_resource_id%5D=1497&amp;secure%5Bdisplayable_resource_type%5D=Category&amp;secure%5Bmedium%5D=sponsored&amp;secure%5Bplacement_reason%5D=neighbor_category&amp;secure%5Bplacement_resource_ids%5D%5B%5D=1848&amp;secure%5Bprioritized%5D=false&amp;secure%5Bproduct_id%5D=16236&amp;secure%5Bresource_id%5D=1860&amp;secure%5Bresource_type%5D=Category&amp;secure%5Bsource_type%5D=category_page&amp;secure%5Bsource_url%5D=https%3A%2F%2Fwww.g2.com%2Fcategories%2Fcloud-access-security-broker-casb%3Fpage%3D4&amp;secure%5Btoken%5D=a606976c68ac694f3d167efe42cf141793bc99bc2ee3869bd89fe776289c4da6&amp;secure%5Burl%5D=https%3A%2F%2Fwww.splashtop.com%2Ffoxpass%3Futm_source%3Dg2.com%26utm_medium%3Dcpc%26utm_campaign%3D251218_WW_WW_G2_NAC_Foxpass&amp;secure%5Burl_type%5D=custom_url&amp;secure%5Bvisitor_segment%5D=180)

---

## Top-Rated Products (Ranked by G2 Score)
### 1. [Netskope One Platform](https://www.g2.com/products/netskope-one-platform/reviews)
  Netskope is the leader in cloud security — we help the world’s largest organizations take advantage of cloud and web without sacrificing security. Our Cloud XD™ technology targets and controls activities across any cloud service or website and customers get 360-degree data and threat protection that works everywhere. We call this smart cloud security.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 70

**User Satisfaction Scores:**

- **Ease of Use:** 8.5/10 (Category avg: 8.8/10)
- **Anomoly Detection:** 8.8/10 (Category avg: 8.5/10)
- **Cloud Gap Analytics:** 8.1/10 (Category avg: 8.3/10)
- **Cloud Registry:** 8.5/10 (Category avg: 8.5/10)


**Seller Details:**

- **Seller:** [Netskope](https://www.g2.com/sellers/netskope)
- **Year Founded:** 2012
- **HQ Location:** Santa Clara, CA
- **Twitter:** @Netskope (11,283 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/3338050/ (3,281 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 58% Enterprise, 33% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (7 reviews)
- Security (6 reviews)
- Visibility (5 reviews)
- Easy Integrations (4 reviews)
- Efficiency (4 reviews)

**Cons:**

- Complex Configuration (5 reviews)
- Complex Implementation (4 reviews)
- Complexity (3 reviews)
- Difficult Learning (3 reviews)
- Difficult Learning Curve (3 reviews)

### 2. [Citrix Workspace](https://www.g2.com/products/citrix-workspace-2024-10-30/reviews)
  Citrix Workspace Essentials provides a comprehensive, zero-trust approach to deliver secure and contextual access to corporate internal web apps, SaaS, and virtual applications. With Citrix Workspace Essentials, IT can consolidate traditional security products such as VPN, single-sign on, multi-factor authentication, and provide usage analytics for Web and SaaS apps. Citrix Workspace Essentials provides end-users with simplified, secure, and VPN-less access to Web apps, SaaS, virtualized apps, and data.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 61

**User Satisfaction Scores:**

- **Ease of Use:** 8.8/10 (Category avg: 8.8/10)
- **Anomoly Detection:** 8.5/10 (Category avg: 8.5/10)
- **Cloud Gap Analytics:** 8.6/10 (Category avg: 8.3/10)
- **Cloud Registry:** 8.4/10 (Category avg: 8.5/10)


**Seller Details:**

- **Seller:** [Citrix](https://www.g2.com/sellers/citrix)
- **Year Founded:** 1989
- **HQ Location:** Fort Lauderdale, FL
- **Twitter:** @citrix (198,389 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/2641/ (4,262 employees on LinkedIn®)
- **Ownership:** NASDAQ:CTXS

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Financial Services
  - **Company Size:** 64% Enterprise, 31% Mid-Market


#### Pros & Cons

**Pros:**

- Security (7 reviews)
- Ease of Use (5 reviews)
- Internet Security (4 reviews)
- Remote Work (4 reviews)
- Secure Access (4 reviews)

**Cons:**

- Connection Issues (3 reviews)
- Slow Loading (3 reviews)
- Slow Performance (3 reviews)
- Complex Configuration (2 reviews)
- Complex Setup (2 reviews)

### 3. [Prisma Access](https://www.g2.com/products/prisma-access/reviews)
  Palo Alto Networks Prisma® Access protects the hybrid workforce with the superior security of ZTNA while providing exceptional user experiences from a simple, unified security product. Purpose-built in the cloud to secure at cloud scale, only Prisma Access protects all application traffic with best-in-class capabilities while securing both access and data to dramatically reduce the risk of a data breach. With a common policy framework and single-pane-of-glass management, Prisma Access secures today’s hybrid workforce without compromising performance, backed by industry-leading SLAs to ensure exceptional user experiences.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 72

**User Satisfaction Scores:**

- **Ease of Use:** 8.2/10 (Category avg: 8.8/10)
- **Anomoly Detection:** 8.7/10 (Category avg: 8.5/10)
- **Cloud Gap Analytics:** 8.5/10 (Category avg: 8.3/10)
- **Cloud Registry:** 8.9/10 (Category avg: 8.5/10)


**Seller Details:**

- **Seller:** [Palo Alto Networks](https://www.g2.com/sellers/palo-alto-networks)
- **Year Founded:** 2005
- **HQ Location:** Santa Clara, CA
- **Twitter:** @PaloAltoNtwks (128,788 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/30086/ (21,355 employees on LinkedIn®)
- **Ownership:** NYSE: PANW

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 45% Enterprise, 27% Mid-Market


#### Pros & Cons

**Pros:**

- Security (34 reviews)
- Protection (23 reviews)
- Secure Access (22 reviews)
- Internet Security (21 reviews)
- Threat Protection (21 reviews)

**Cons:**

- Complex Setup (20 reviews)
- Complex Implementation (19 reviews)
- Complex Configuration (17 reviews)
- Expensive (15 reviews)
- Difficult Learning Curve (11 reviews)

### 4. [Cato SASE Cloud](https://www.g2.com/products/cato-networks-cato-sase-cloud/reviews)
  Cato provides the world’s leading single-vendor SASE platform. Cato creates a seamless and elegant customer experience that effortlessly enables threat prevention, data protection, and timely incident detection and response. Using Cato, businesses easily replace costly and rigid legacy infrastructure with an open and modular SASE architecture based on SD-WAN, a purpose-built global cloud network, and an embedded cloud-native security stack


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 80

**User Satisfaction Scores:**

- **Ease of Use:** 9.1/10 (Category avg: 8.8/10)
- **Anomoly Detection:** 8.7/10 (Category avg: 8.5/10)
- **Cloud Gap Analytics:** 9.0/10 (Category avg: 8.3/10)
- **Cloud Registry:** 9.1/10 (Category avg: 8.5/10)


**Seller Details:**

- **Seller:** [Cato Networks](https://www.g2.com/sellers/cato-networks)
- **Company Website:** https://www.catonetworks.com
- **Year Founded:** 2015
- **HQ Location:** Tel-Aviv, Israel
- **Twitter:** @CatoNetworks (12,673 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/3533853/ (1,479 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Financial Services
  - **Company Size:** 55% Mid-Market, 23% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (5 reviews)
- Customer Support (4 reviews)
- Reliability (4 reviews)
- Threat Protection (4 reviews)
- Deployment Ease (3 reviews)

**Cons:**

- Limited Features (3 reviews)
- Connection Issues (2 reviews)
- Expensive (2 reviews)
- Compatibility Issues (1 reviews)
- Expensive Licensing (1 reviews)

### 5. [Forcepoint Data Security Cloud](https://www.g2.com/products/forcepoint-data-security-cloud/reviews)
  Forcepoint Data Security Cloud delivers unified visibility, control, and protection for data across endpoints, web, SaaS, and private applications, powered by Forcepoint’s AI Mesh and Data Security Everywhere architecture. The platform integrates Data Loss Prevention (DLP), Cloud Access Security Broker (CASB), Secure Web Gateway (SWG), and Zero Trust Network Access (ZTNA) capabilities to help organizations prevent breaches, streamline compliance, and safely embrace AI and the cloud. Key capabilities include: • Unified data security across endpoints, web, cloud, and private apps • Distributed enforcement via endpoint, inline proxy, and API connectors • AI-driven data classification and adaptive risk protection • Industry-leading threat and data protection from one console • Seamless user experience with Zero Trust access and continuous monitoring Forcepoint Data Security Cloud simplifies and strengthens your security, delivering the freedom to work securely anywhere.


  **Average Rating:** 4.2/5.0
  **Total Reviews:** 100

**User Satisfaction Scores:**

- **Ease of Use:** 8.6/10 (Category avg: 8.8/10)
- **Anomoly Detection:** 8.1/10 (Category avg: 8.5/10)
- **Cloud Gap Analytics:** 7.8/10 (Category avg: 8.3/10)
- **Cloud Registry:** 8.3/10 (Category avg: 8.5/10)


**Seller Details:**

- **Seller:** [Forcepoint](https://www.g2.com/sellers/forcepoint)
- **Year Founded:** 1994
- **HQ Location:** Austin, TX
- **Twitter:** @Forcepointsec (65,474 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/forcepoint/ (1,658 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 50% Enterprise, 38% Mid-Market


#### Pros & Cons

**Pros:**

- Features (7 reviews)
- Ease of Use (6 reviews)
- Security (6 reviews)
- Customer Support (5 reviews)
- Monitoring (5 reviews)

**Cons:**

- Complex Configuration (4 reviews)
- Expensive (4 reviews)
- Complexity (3 reviews)
- Complex Setup (3 reviews)
- Difficult Setup (3 reviews)

### 6. [Check Point Harmony Email &amp; Collaboration](https://www.g2.com/products/check-point-harmony-email-collaboration/reviews)
  Check Point Harmony Email &amp; Collaboration, protects enterprise data by preventing targeted attacks on SaaS applications and cloud-based email.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 465

**User Satisfaction Scores:**

- **Ease of Use:** 9.1/10 (Category avg: 8.8/10)
- **Anomoly Detection:** 8.8/10 (Category avg: 8.5/10)
- **Cloud Gap Analytics:** 8.7/10 (Category avg: 8.3/10)
- **Cloud Registry:** 8.9/10 (Category avg: 8.5/10)


**Seller Details:**

- **Seller:** [Check Point Software Technologies](https://www.g2.com/sellers/check-point-software-technologies)
- **Year Founded:** 1993
- **HQ Location:** Redwood City, CA
- **Twitter:** @CheckPointSW (70,998 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/check-point-software-technologies/ (8,356 employees on LinkedIn®)
- **Ownership:** NASDAQ:CHKP

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager, Systems Administrator
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 59% Mid-Market, 24% Enterprise


#### Pros & Cons

**Pros:**

- Email Security (94 reviews)
- Security (83 reviews)
- Protection (74 reviews)
- Ease of Use (50 reviews)
- Phishing Protection (45 reviews)

**Cons:**

- False Positives (29 reviews)
- Complexity (23 reviews)
- Complex Setup (22 reviews)
- Limited Features (18 reviews)
- Configuration Difficulties (17 reviews)

### 7. [Cloudflare One (SASE)](https://www.g2.com/products/cloudflare-one-sase/reviews)
  Cloudflare One is a single-vendor secure access service edge (SASE) platform that converges security and networking services into a unified, global connectivity cloud. It replaces legacy, fragmented hardware and first-generation SASE solutions with a composable, programmable architecture. Cloudflare One connects and protects an organization&#39;s workforce, AI agents, and infrastructure. Learn more at https://www.cloudflare.com/sase/ Designed for agility, it enables teams to: - Accelerate safe AI adoption with granular visibility, control, and AI agent governance. - Modernize remote access by replacing clunky VPNs with zero trust access. - Block email phishing attacks with flexible, SASE-native email security. - Protect web traffic for remote users and branch offices with lightweight DNS filtering. - Deploy “coffee shop networking” with a light branch, heavy cloud approach.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 101

**User Satisfaction Scores:**

- **Ease of Use:** 9.1/10 (Category avg: 8.8/10)
- **Anomoly Detection:** 9.4/10 (Category avg: 8.5/10)
- **Cloud Gap Analytics:** 9.4/10 (Category avg: 8.3/10)
- **Cloud Registry:** 9.4/10 (Category avg: 8.5/10)


**Seller Details:**

- **Seller:** [Cloudflare, Inc.](https://www.g2.com/sellers/cloudflare-inc)
- **Year Founded:** 2009
- **HQ Location:** San Francisco, California
- **Twitter:** @Cloudflare (279,070 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/407222/ (6,898 employees on LinkedIn®)
- **Ownership:** NYSE: NET

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 37% Small-Business, 34% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (8 reviews)
- Protection (7 reviews)
- Reliability (7 reviews)
- Security (7 reviews)
- User Interface (6 reviews)

**Cons:**

- Steep Learning Curve (5 reviews)
- Complexity (4 reviews)
- Difficult Learning (4 reviews)
- Difficult Learning Curve (4 reviews)
- Difficult Setup (4 reviews)

### 8. [Trend Micro Cloud App Security](https://www.g2.com/products/trend-micro-cloud-app-security/reviews)
  Trend Micro Cloud App Security delivers advanced threat and data protection for Office 365 and cloud file-sharing services.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 43

**User Satisfaction Scores:**

- **Ease of Use:** 8.5/10 (Category avg: 8.8/10)
- **Anomoly Detection:** 9.1/10 (Category avg: 8.5/10)
- **Cloud Gap Analytics:** 9.4/10 (Category avg: 8.3/10)
- **Cloud Registry:** 8.5/10 (Category avg: 8.5/10)


**Seller Details:**

- **Seller:** [Trend Micro](https://www.g2.com/sellers/trend-micro)
- **Year Founded:** 1988
- **HQ Location:** Tokyo
- **LinkedIn® Page:** https://www.linkedin.com/company/4312/ (8,090 employees on LinkedIn®)
- **Ownership:** OTCMKTS:TMICY
- **Total Revenue (USD mm):** $1,515

**Reviewer Demographics:**
  - **Top Industries:** Computer Software, Information Technology and Services
  - **Company Size:** 41% Enterprise, 41% Mid-Market


#### Pros & Cons

**Pros:**

- Email Security (1 reviews)
- Security (1 reviews)
- Security Protection (1 reviews)
- Threat Protection (1 reviews)

**Cons:**

- Access Limitations (1 reviews)
- Limited Features (1 reviews)
- Storage Limitations (1 reviews)

### 9. [Microsoft Defender for Cloud Apps](https://www.g2.com/products/microsoft-defender-for-cloud-apps/reviews)
  Microsoft Defender for Cloud Apps is an enterprise-grade security for cloud apps.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 46

**User Satisfaction Scores:**

- **Ease of Use:** 8.4/10 (Category avg: 8.8/10)
- **Anomoly Detection:** 8.7/10 (Category avg: 8.5/10)
- **Cloud Gap Analytics:** 8.7/10 (Category avg: 8.3/10)
- **Cloud Registry:** 8.5/10 (Category avg: 8.5/10)


**Seller Details:**

- **Seller:** [Microsoft](https://www.g2.com/sellers/microsoft)
- **Year Founded:** 1975
- **HQ Location:** Redmond, Washington
- **Twitter:** @microsoft (13,114,353 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/microsoft/ (227,697 employees on LinkedIn®)
- **Ownership:** MSFT

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Financial Services
  - **Company Size:** 53% Enterprise, 26% Mid-Market


#### Pros & Cons

**Pros:**

- Security Protection (1 reviews)

**Cons:**

- Expensive (1 reviews)

### 10. [Zscaler Zero Trust Cloud](https://www.g2.com/products/zscaler-zero-trust-cloud/reviews)
  Zscaler global cloud delivers the entire gateway security stack as a service. By securely connecting users to their applications, regardless of device, location, or network, Zscaler is transforming enterprise security.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 37

**User Satisfaction Scores:**

- **Ease of Use:** 8.6/10 (Category avg: 8.8/10)
- **Anomoly Detection:** 8.5/10 (Category avg: 8.5/10)
- **Cloud Gap Analytics:** 8.8/10 (Category avg: 8.3/10)
- **Cloud Registry:** 9.2/10 (Category avg: 8.5/10)


**Seller Details:**

- **Seller:** [Zscaler](https://www.g2.com/sellers/zscaler)
- **Year Founded:** 2008
- **HQ Location:** San Jose, California
- **Twitter:** @zscaler (17,513 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/234625/ (9,540 employees on LinkedIn®)
- **Ownership:** NASDAQ:ZS

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 52% Enterprise, 29% Small-Business


#### Pros & Cons

**Pros:**

- Security (5 reviews)
- Threat Detection (4 reviews)
- Ease of Use (3 reviews)
- Protection (3 reviews)
- Threat Protection (3 reviews)

**Cons:**

- Access Control (1 reviews)
- Complex Configuration (1 reviews)
- Complexity (1 reviews)
- Complex Setup (1 reviews)
- Difficult Configuration (1 reviews)

### 11. [Google VPC Service Controls](https://www.g2.com/products/google-vpc-service-controls/reviews)
  VPC Service Controls allow users to define a security perimeter around Google Cloud Platform resources such as Cloud Storage buckets, Bigtable instances, and BigQuery datasets to constrain data within a VPC and help mitigate data exfiltration risks. With VPC Service Controls, enterprises can keep their sensitive data private as they take advantage of the fully managed storage and data processing capabilities of Google Cloud Platform.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 15

**User Satisfaction Scores:**

- **Ease of Use:** 9.0/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Google](https://www.g2.com/sellers/google)
- **Year Founded:** 1998
- **HQ Location:** Mountain View, CA
- **Twitter:** @google (31,910,461 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/1441/ (336,169 employees on LinkedIn®)
- **Ownership:** NASDAQ:GOOG

**Reviewer Demographics:**
  - **Company Size:** 41% Enterprise, 41% Small-Business


### 12. [Oracle CASB Cloud](https://www.g2.com/products/oracle-casb-cloud/reviews)
  Oracle CASB Cloud is an API-based cloud access security broker for applications and workloads.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 12

**User Satisfaction Scores:**

- **Ease of Use:** 9.5/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Oracle](https://www.g2.com/sellers/oracle)
- **Year Founded:** 1977
- **HQ Location:** Austin, TX
- **Twitter:** @Oracle (827,868 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/1028/ (199,301 employees on LinkedIn®)
- **Ownership:** NYSE:ORCL

**Reviewer Demographics:**
  - **Company Size:** 58% Mid-Market, 25% Enterprise


### 13. [Akamai Enterprise Application Access](https://www.g2.com/products/akamai-akamai-enterprise-application-access/reviews)
  Enterprise Application Access is a unique cloud architecture that closes all inbound firewall ports, while ensuring that only authorized users and devices have access to the internal applications they need, and not the entire network. No one can access applications directly because they are hidden from the Internet and public exposure. Enterprise Application Access integrates data path protection, single sign-on, identity access, application security, and management visibility and control into a single service.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 27

**User Satisfaction Scores:**

- **Ease of Use:** 8.3/10 (Category avg: 8.8/10)
- **Anomoly Detection:** 7.5/10 (Category avg: 8.5/10)
- **Cloud Gap Analytics:** 8.5/10 (Category avg: 8.3/10)
- **Cloud Registry:** 8.8/10 (Category avg: 8.5/10)


**Seller Details:**

- **Seller:** [Akamai Technologies](https://www.g2.com/sellers/akamai-technologies)
- **Year Founded:** 1998
- **HQ Location:** Cambridge, MA
- **Twitter:** @Akamai (115,398 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/3925/ (10,444 employees on LinkedIn®)
- **Ownership:** NASDAQ:AKAM

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 37% Enterprise, 33% Small-Business


#### Pros & Cons

**Pros:**

- Customer Support (1 reviews)
- Ease of Use (1 reviews)
- Easy Access (1 reviews)
- Features (1 reviews)
- Security (1 reviews)


### 14. [Citrix Secure Private Access](https://www.g2.com/products/citrix-citrix-secure-private-access/reviews)
  Citrix Secure Workspace Access provides a comprehensive, zero-trust approach to deliver secure and contextual access to the corporate internal web apps, SaaS, and virtual applications. It enables the consolidation of traditional security products like VPN, single sign-on, and browser isolation technologies and provides advanced security controls for managed, unmanaged, and BYO devices. Citrix Secure Workspace Access provides a holistic security approach based on zero-trust principles, protecting users, applications, and corporate data against internet web threats and data exfiltration.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 69

**User Satisfaction Scores:**

- **Ease of Use:** 9.0/10 (Category avg: 8.8/10)
- **Anomoly Detection:** 8.1/10 (Category avg: 8.5/10)
- **Cloud Gap Analytics:** 8.5/10 (Category avg: 8.3/10)
- **Cloud Registry:** 8.0/10 (Category avg: 8.5/10)


**Seller Details:**

- **Seller:** [Citrix](https://www.g2.com/sellers/citrix)
- **Year Founded:** 1989
- **HQ Location:** Fort Lauderdale, FL
- **Twitter:** @citrix (198,389 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/2641/ (4,262 employees on LinkedIn®)
- **Ownership:** NASDAQ:CTXS

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 59% Enterprise, 26% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (2 reviews)
- Easy Access (1 reviews)
- Intuitive (1 reviews)
- Login Efficiency (1 reviews)
- Simple (1 reviews)

**Cons:**

- Connection Issues (1 reviews)
- Delay Issues (1 reviews)
- Login Issues (1 reviews)
- Slow Internet (1 reviews)

### 15. [CloudSOC Cloud Access Security Broker (CASB)](https://www.g2.com/products/cloudsoc-cloud-access-security-broker-casb/reviews)
  Securely adopt cloud apps and meet your regulatory compliance requirements with an industry-leading Cloud Access Security Broker (CASB) that integrates with the rest of your enterprise security. CloudSOC CASB provides visibility, data security and threat protection for today’s generation of cloud users across a wide range of sanctioned and unsanctioned apps.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 28

**User Satisfaction Scores:**

- **Ease of Use:** 8.1/10 (Category avg: 8.8/10)
- **Anomoly Detection:** 7.8/10 (Category avg: 8.5/10)
- **Cloud Gap Analytics:** 7.4/10 (Category avg: 8.3/10)
- **Cloud Registry:** 8.1/10 (Category avg: 8.5/10)


**Seller Details:**

- **Seller:** [Broadcom](https://www.g2.com/sellers/broadcom-ab3091cd-4724-46a8-ac89-219d6bc8e166)
- **Year Founded:** 1991
- **HQ Location:** San Jose, CA
- **Twitter:** @broadcom (63,196 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/broadcom/ (55,707 employees on LinkedIn®)
- **Ownership:** NASDAQ: CA

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 58% Enterprise, 27% Mid-Market


#### Pros & Cons

**Pros:**

- Cloud Integration (1 reviews)
- Cloud Management (1 reviews)
- Cloud Security (1 reviews)
- Cybersecurity (1 reviews)
- Data Protection (1 reviews)

**Cons:**

- Complex Configuration (1 reviews)
- Complexity (1 reviews)
- Inefficiency (1 reviews)
- Licensing Issues (1 reviews)

### 16. [Symantec Web Security Service](https://www.g2.com/products/symantec-web-security-service/reviews)
  Symantec Web Security Service (WSS) provides the same proactive web protection capabilities delivered by the market’s leading on-premises Secure Web Gateway, Symantec ProxySG, but delivered as a resilient and performant cloud security service. Sitting between employees, wherever they are located, and the Internet, the service protects the enterprise from cyber threats, controls and protects corporate use of cloud applications and the web, prevents data leaks, and ensures compliance with all company information and web/cloud access policies. Symantec WSS delivers web and cloud security from a diversified network of certified global data centers. Universal Policy Enforcement (UPE) capabilities allow administrators to define protection policies once and distribute them to all of their gateways. Whether they are in the cloud or on-premises, enterprises can ensure consistent protection is in place. Its best-in-class feature set, combined with powerful integrated solution options, enterprise-class network security capabilities, and flexible subscription pricing model, has made WSS the smart choice for companies looking for enterprise-class security capabilities in a cloud-delivered service.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 109

**User Satisfaction Scores:**

- **Ease of Use:** 8.9/10 (Category avg: 8.8/10)
- **Anomoly Detection:** 8.4/10 (Category avg: 8.5/10)
- **Cloud Gap Analytics:** 8.7/10 (Category avg: 8.3/10)
- **Cloud Registry:** 8.7/10 (Category avg: 8.5/10)


**Seller Details:**

- **Seller:** [Broadcom](https://www.g2.com/sellers/broadcom-ab3091cd-4724-46a8-ac89-219d6bc8e166)
- **Year Founded:** 1991
- **HQ Location:** San Jose, CA
- **Twitter:** @broadcom (63,196 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/broadcom/ (55,707 employees on LinkedIn®)
- **Ownership:** NASDAQ: CA

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 48% Enterprise, 28% Small-Business


#### Pros & Cons

**Pros:**

- Security Protection (6 reviews)
- Ease of Use (5 reviews)
- Simple (2 reviews)
- Affordable (1 reviews)
- Analytics (1 reviews)

**Cons:**

- Notification Issues (2 reviews)
- Expensive (1 reviews)
- Integration Issues (1 reviews)
- Poor Customer Support (1 reviews)
- Slow Performance (1 reviews)

### 17. [FortiCASB-SaaS](https://www.g2.com/products/forticasb-saas/reviews)
  FortiCASB is Fortinet&#39;s cloud-native Cloud Access Security Broker service, designed to provide comprehensive visibility, compliance, data security, and threat protection for cloud-based services. By leveraging direct API access, FortiCASB enables deep inspection and policy management for data stored in various cloud application platforms. It offers detailed user analytics and management tools to ensure that organizational policies are enforced, safeguarding sensitive data across multiple SaaS applications. Key Features and Functionality: - Visibility: FortiCASB utilizes data scans and analytics to monitor who accessed information, what was accessed, when, and from where, providing comprehensive insights into cloud application usage. - Compliance: The service offers file content monitoring to identify and report on regulated data within the cloud, aiding organizations in meeting compliance requirements such as SOX, GDPR, PCI, HIPAA, NIST, and ISO27001. - Data Security: FortiCASB conducts scans to detect sensitive data, such as social security or credit card numbers, classifies this data based on sensitivity levels, and issues alerts accordingly. - Threat Protection: Employing User Entity Behavior Analytics, FortiCASB monitors for suspicious or irregular user behavior and sends alerts for potential malicious activities. - API-Based Integration: The service integrates directly with major SaaS applications, including Office 365, Dropbox, AWS S3, Google Workspace, and more, ensuring seamless security management across platforms. - Shadow IT Discovery: FortiCASB provides consolidated reporting to detect unsanctioned on-network SaaS usage, helping organizations identify and manage unauthorized applications. Primary Value and Problem Solved: FortiCASB addresses the critical need for organizations to maintain visibility and control over their cloud-based services. As businesses increasingly adopt SaaS applications, they often face challenges in monitoring application usage, securing sensitive data, and ensuring compliance with regulatory standards. FortiCASB mitigates these challenges by offering a centralized solution that provides real-time insights, enforces data security policies, and protects against threats, thereby enabling organizations to confidently leverage cloud technologies without compromising security.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 24

**User Satisfaction Scores:**

- **Ease of Use:** 8.6/10 (Category avg: 8.8/10)
- **Anomoly Detection:** 8.6/10 (Category avg: 8.5/10)
- **Cloud Gap Analytics:** 8.7/10 (Category avg: 8.3/10)
- **Cloud Registry:** 8.6/10 (Category avg: 8.5/10)


**Seller Details:**

- **Seller:** [Fortinet](https://www.g2.com/sellers/fortinet)
- **Year Founded:** 2000
- **HQ Location:** Sunnyvale, CA
- **Twitter:** @Fortinet (151,495 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/6460/ (16,112 employees on LinkedIn®)
- **Ownership:** NASDAQ: FTNT

**Reviewer Demographics:**
  - **Top Industries:** Computer &amp; Network Security, Information Technology and Services
  - **Company Size:** 48% Mid-Market, 36% Small-Business


### 18. [Proofpoint Cloud App Security Broker](https://www.g2.com/products/proofpoint-cloud-app-security-broker/reviews)
  Proofpoint provides the only CASB to meet the needs of security people serious about cloud threats, data loss and time-to-value. We secure Microsoft 365, Google Workspace, Box, Dropbox, Slack, ServiceNow, AWS, Azure and more. Proofpoint CASB protects organizations from account compromise, oversharing of data and compliance risks in the cloud. Our solution combines: - account compromise and post-compromise activity detection and automated response, - protection against malicious files in the cloud, - data security including data loss prevention (DLP), - cloud and third-party apps governance, - cloud security posture management and -inline access and data controls for managed and unmanaged devices, incl. browser isolation People-centric visibility to email and cloud threats helps you identify very attacked people (VAPs) and protect their data and cloud accounts. Proofpoint CASB is a part of our broader Information and Cloud Security Platform, a cloud-native, comprehensive and contextualized platform that aligns to the industry vision of SASE security use cases.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 10

**User Satisfaction Scores:**

- **Ease of Use:** 9.3/10 (Category avg: 8.8/10)
- **Anomoly Detection:** 9.4/10 (Category avg: 8.5/10)
- **Cloud Gap Analytics:** 9.4/10 (Category avg: 8.3/10)
- **Cloud Registry:** 9.4/10 (Category avg: 8.5/10)


**Seller Details:**

- **Seller:** [Proofpoint](https://www.g2.com/sellers/proofpoint)
- **Year Founded:** 2002
- **HQ Location:** Sunnyvale, CA
- **Twitter:** @proofpoint (31,155 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/proofpoint (5,020 employees on LinkedIn®)
- **Ownership:** NASDAQ: PFPT

**Reviewer Demographics:**
  - **Company Size:** 64% Enterprise, 18% Mid-Market


### 19. [Prisma Saas Security](https://www.g2.com/products/prisma-saas-security/reviews)
  Prisma SaaS looks directly into SaaS applications, providing full visibility into the activities of users and data while granular controls maintain policy to eliminate data exposure and threat risks.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 17

**User Satisfaction Scores:**

- **Ease of Use:** 8.6/10 (Category avg: 8.8/10)
- **Anomoly Detection:** 7.9/10 (Category avg: 8.5/10)
- **Cloud Gap Analytics:** 7.4/10 (Category avg: 8.3/10)
- **Cloud Registry:** 8.1/10 (Category avg: 8.5/10)


**Seller Details:**

- **Seller:** [Palo Alto Networks](https://www.g2.com/sellers/palo-alto-networks)
- **Year Founded:** 2005
- **HQ Location:** Santa Clara, CA
- **Twitter:** @PaloAltoNtwks (128,788 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/30086/ (21,355 employees on LinkedIn®)
- **Ownership:** NYSE: PANW

**Reviewer Demographics:**
  - **Top Industries:** Computer &amp; Network Security
  - **Company Size:** 35% Small-Business, 35% Mid-Market


### 20. [ManagedMethods](https://www.g2.com/products/managedmethods/reviews)
  ManagedMethods is a leading cloud application security platform for K-12 school districts, mid-market companies, and local governments. The platform provides award-winning cloud security that empowers organizations with full visibility and control of data stored in cloud applications, including Google G Suite, Microsoft Office 365, OneDrive, SharePoint, Box, Dropbox, Slack, and more. ManagedMethods makes cloud security easy — no proxy, no agent and no special training needed. It helps IT &amp; security teams secure data against internal and external breaches by leveraging AI and machine learning-powered malware and phishing threat protection, account takeover detection, and data loss prevention. ManagedMethods is the industry’s only cloud application security solution that can be deployed in minutes with no special training, and zero impact on users or network speed. Visit our website to start your 30-day free trial for cloud security, visibility, and control like you&#39;ve never experienced before!


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 16

**User Satisfaction Scores:**

- **Ease of Use:** 9.2/10 (Category avg: 8.8/10)
- **Anomoly Detection:** 8.9/10 (Category avg: 8.5/10)
- **Cloud Gap Analytics:** 9.2/10 (Category avg: 8.3/10)
- **Cloud Registry:** 7.5/10 (Category avg: 8.5/10)


**Seller Details:**

- **Seller:** [ManagedMethods](https://www.g2.com/sellers/managedmethods)
- **Year Founded:** 2013
- **HQ Location:** Boulder, CO
- **Twitter:** @managedmethods (602 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/3552449/ (35 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Education Management
  - **Company Size:** 69% Mid-Market, 25% Enterprise


### 21. [Check Point SASE](https://www.g2.com/products/check-point-sase/reviews)
  The internet is the new corporate network, leading organizations to transition to their network security to Secure Access Service Edge (SASE). However, current solutions break the user experience with slow connections and complex management. Check Point SASE is a game-changing solution that delivers 10x faster internet security, SaaS Security, and full mesh Zero Trust Access and optimized SD-WAN performance—all with an emphasis on streamlined management. Combining innovative on-device and cloud-delivered network protections, Check Point SASE offers a local browsing experience with tighter security and privacy, and an identity-centric zero trust access policy that accommodates everyone: employees, BYOD and third parties. Its SD-WAN solution unifies industry-leading threat prevention with optimized connectivity, automated steering for over 10,000 applications and seamless link failover for uninterrupted web conferencing. Using Check Point SASE, business can build a secure corporate network over a private global backbone in less than an hour. The service is managed from a unified console and is backed by an award-winning global support team that has you covered 24/7.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 210

**User Satisfaction Scores:**

- **Ease of Use:** 9.0/10 (Category avg: 8.8/10)
- **Cloud Registry:** 7.9/10 (Category avg: 8.5/10)


**Seller Details:**

- **Seller:** [Check Point Software Technologies](https://www.g2.com/sellers/check-point-software-technologies)
- **Company Website:** https://www.checkpoint.com/
- **Year Founded:** 1993
- **HQ Location:** Redwood City, CA
- **Twitter:** @CheckPointSW (70,998 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/check-point-software-technologies/ (8,356 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 46% Mid-Market, 36% Small-Business


#### Pros & Cons

**Pros:**

- Security (46 reviews)
- Ease of Use (39 reviews)
- Secure Access (34 reviews)
- Protection (26 reviews)
- Reliability (25 reviews)

**Cons:**

- Complex Implementation (28 reviews)
- Complex Configuration (24 reviews)
- Complex Setup (22 reviews)
- Expensive (17 reviews)
- Learning Curve (17 reviews)

### 22. [Barracuda CloudGen Access](https://www.g2.com/products/barracuda-cloudgen-access/reviews)
  Barracuda CloudGen Access makes it easy to simplify compliance and secure third-party access to your systems, providing Zero Trust Access to all your apps and data from any device and location. Barracuda CloudGen Access provides employees and partners with access to corporate apps and cloud workloads without creating additional attack surfaces.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 18

**User Satisfaction Scores:**

- **Ease of Use:** 8.7/10 (Category avg: 8.8/10)
- **Anomoly Detection:** 9.4/10 (Category avg: 8.5/10)
- **Cloud Gap Analytics:** 8.9/10 (Category avg: 8.3/10)
- **Cloud Registry:** 10.0/10 (Category avg: 8.5/10)


**Seller Details:**

- **Seller:** [Barracuda](https://www.g2.com/sellers/barracuda)
- **Year Founded:** 2002
- **HQ Location:** Campbell, CA
- **Twitter:** @Barracuda (15,238 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/barracuda-networks/ (2,229 employees on LinkedIn®)
- **Ownership:** Private

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 53% Mid-Market, 37% Small-Business


#### Pros & Cons

**Pros:**

- Affordable Pricing (2 reviews)
- Deployment Ease (2 reviews)
- Ease of Use (2 reviews)
- Security (2 reviews)
- App Integration (1 reviews)

**Cons:**

- Expensive (2 reviews)
- Complex Configuration (1 reviews)
- Complex Implementation (1 reviews)
- Difficult Learning (1 reviews)
- Difficult Navigation (1 reviews)

### 23. [Todyl Security Platform](https://www.g2.com/products/todyl-security-platform/reviews)
  Todyl empowers businesses of any size with a complete, end-to-end security program. The Todyl Security Platform converges SASE, SIEM, Endpoint Security, GRC, MXDR, and more into a cloud-native, single-agent platform purpose-built for MSPs, MSSPs, and Mid-Market IT professionals. Each module is designed to be deployed in a targeted, agile approach to meet any use case. When all modules are combined, our platform becomes a comprehensive security solution that is cloud-first, globally accessible, and features a highly intuitive interface. With Todyl, your security stack becomes one comprehensive, consolidated, and customizable platform, making security more intuitive and streamlined to combat modern threats. Our platform helps to eliminate the complexity, cost, and operational overhead traditional approaches to cybersecurity require, empowering teams with the capabilities they need to protect, detect, and respond to cyberattacks.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 96

**User Satisfaction Scores:**

- **Ease of Use:** 8.6/10 (Category avg: 8.8/10)
- **Anomoly Detection:** 8.7/10 (Category avg: 8.5/10)
- **Cloud Gap Analytics:** 7.9/10 (Category avg: 8.3/10)
- **Cloud Registry:** 6.7/10 (Category avg: 8.5/10)


**Seller Details:**

- **Seller:** [Todyl](https://www.g2.com/sellers/todyl)
- **Company Website:** https://www.todyl.com/
- **Year Founded:** 2015
- **HQ Location:** Denver, CO
- **LinkedIn® Page:** https://www.linkedin.com/company/todylprotection (125 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Owner, President
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 73% Small-Business, 8% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (64 reviews)
- Customer Support (51 reviews)
- Features (41 reviews)
- Security (39 reviews)
- Deployment Ease (35 reviews)

**Cons:**

- Improvements Needed (21 reviews)
- Integration Issues (14 reviews)
- Inadequate Reporting (12 reviews)
- Limited Features (12 reviews)
- Poor Reporting (12 reviews)

### 24. [Nudge Security](https://www.g2.com/products/nudge-security/reviews)
  Nudge Security is a security governance solution that helps IT and security teams take control of SaaS sprawl, shadow AI, and identity sprawl. Through unrivaled discovery capabilities, AI-driven risk insights, and behavioral science-based user engagement, Nudge Security make security a natural part of how modern work gets done rather than an obstacle to innovation.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 15

**User Satisfaction Scores:**

- **Ease of Use:** 9.3/10 (Category avg: 8.8/10)
- **Anomoly Detection:** 8.9/10 (Category avg: 8.5/10)
- **Cloud Gap Analytics:** 8.9/10 (Category avg: 8.3/10)
- **Cloud Registry:** 8.3/10 (Category avg: 8.5/10)


**Seller Details:**

- **Seller:** [Nudge Security](https://www.g2.com/sellers/nudge-security)
- **Company Website:** https://www.nudgesecurity.com
- **Year Founded:** 2022
- **HQ Location:** Austin, Texas, United States
- **Twitter:** @nudge_security (445 Twitter followers)
- **LinkedIn® Page:** http://www.linkedin.com/company/nudge-security (34 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 53% Mid-Market, 33% Small-Business


#### Pros & Cons

**Pros:**

- Features (3 reviews)
- Security (3 reviews)
- Deployment Ease (2 reviews)
- Malware Protection (2 reviews)
- Reliability (2 reviews)

**Cons:**

- Access Control (1 reviews)
- Limited Acceptance (1 reviews)
- Limited Features (1 reviews)
- Technical Issues (1 reviews)
- User Management (1 reviews)

### 25. [Skyhigh Security Service Edge](https://www.g2.com/products/skyhigh-security-service-edge/reviews)
  The Skyhigh Security Service Edge portfolio goes beyond data access and focuses on data use, allowing organizations to collaborate from any device and from anywhere without sacrificing security, while providing the visibility and control required to monitor and mitigate security risks. The Skyhigh Security Service Edge platform includes Skyhigh Secure Web Gateway, Skyhigh Cloud Access Security Broker, Skyhigh Private Access, and Skyhigh Cloud Native Application Protection Platform.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 12

**User Satisfaction Scores:**

- **Ease of Use:** 9.0/10 (Category avg: 8.8/10)
- **Anomoly Detection:** 6.1/10 (Category avg: 8.5/10)
- **Cloud Gap Analytics:** 6.7/10 (Category avg: 8.3/10)
- **Cloud Registry:** 7.2/10 (Category avg: 8.5/10)


**Seller Details:**

- **Seller:** [Skyhigh Security](https://www.g2.com/sellers/skyhigh-security)
- **Year Founded:** 2022
- **HQ Location:** San Jose, CA
- **Twitter:** @skyhighsecurity (17,637 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/78449382 (721 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 33% Enterprise, 33% Mid-Market


#### Pros & Cons

**Pros:**

- Security (5 reviews)
- Data Security (4 reviews)
- Cloud Services (3 reviews)
- Data Protection (3 reviews)
- Easy Integrations (3 reviews)

**Cons:**

- Expensive (2 reviews)
- Complex Configuration (1 reviews)
- Complexity (1 reviews)
- Complex Setup (1 reviews)
- Dependency Issues (1 reviews)



## Parent Category

[Security Software](https://www.g2.com/categories/security)



## Related Categories

- [Zero Trust Networking Software](https://www.g2.com/categories/zero-trust-networking)
- [Cloud Edge Security Software](https://www.g2.com/categories/cloud-edge-security)
- [Secure Service Edge (SSE) Solutions](https://www.g2.com/categories/secure-service-edge-sse-solutions)



---

## Buyer Guide

### What You Should Know About Cloud Access Security Broker (CASB) Software

### What is Cloud Access Security Broker (CASB) Software?

Cloud access security broker (CASB) technology secures data stored within or processed by cloud-based applications, typically software as a service (SaaS) solutions. Cloud security access brokers focus on protecting cloud applications. Users of CASB can launch and access their cloud applications in a secured environment.These tools utilize multiple security technologies that help prevent unapproved parties from accessing applications while also preventing data loss and data breaches. They provide a single, secure location for users to access applications. Many platforms support single sign-on for easier access once operating in the CASB environment.

Some CASB tools provide users with a sandboxed environment. The sandbox is a resource-isolated working environment that ensures files and data are transferred directly to the cloud application provider. Other CASB tools utilize firewall and malware detection features, along with security policy enforcement mechanisms to protect information connected to SaaS applications.

These tools can be utilized across devices and operated locally, regardless of the user’s physical location. Individual users can be isolated and cut off from the network. These tools can function across a variety of SaaS applications and software vendors. They can be integrated directly or chosen from a marketplace. Many tools have centralized access through a single sign-on portal. Users can log in to a secure portal and have access to all of the cloud applications they use.

Key Benefits of CASB Software

- Improves cloud application and data security
- Simplifies management to improve compliance-related operations
- Improves identity management and user governance
- Increases visibility of users, activities, and anomalies

### Why Use Cloud Access Security Broker (CASB) Software?

These tools make it easier for businesses to provide secure access to cloud-based applications for their employees. Almost all the benefits of using a CASB system pertain to information security. The majority of benefits can be classified into three categories: threat protection, data security, and governance.

**Threat protection —** Threats come in multiple forms and CASB products are prepared to defend against them from any direction. Common threat protection features are designed to prevent phishing, malware, account takeover, and malicious content. Phishing can be prevented by securing cloud-based email applications. Malicious attachments and urls can be flagged or sent to spam. Malware can come from emails, downloads or any other kind of malicious content; if malware is present, CASB software can alert users and prevent them from engaging with it. Account takeover can be discovered by monitoring functionality designed to detect abnormal behavior, policy violations, and unexpected configuration changes.

**Data security and loss prevention —** All data requires security, but some information requires more protection than others. CASB tools help users discover sensitive data within cloud-based applications. Most CASB tools allow for user permission policy enforcement, this helps prevent unauthorized parties from viewing or downloading sensitive information. Many sensitive datasets require increased encryption; these files must be classified as such and CASB solutions will enforce stronger encryption and anomaly monitoring on those specific files.

**Governance and compliance —** Compliance goes hand in hand with data security and loss prevention. However, increased visibility is a key benefit of CASB solutions. This makes it easier to discover non-compliant datasets and audit systems for policy requirements. They improve a company’s ability to delegate user permissions, enforce security policies and alert security teams of both cloud-based and insider threats.

### What are the Common Features of Cloud Access Security Broker (CASB) Software?

**Single sign-on (SSO) —** SSO features provide a single access point for users to access multiple cloud products without multiple logins. This reduces the time users spend finding applications and logging onto them, improving productivity and user experience.

**User analytics —** User analytics and monitoring allow companies to view and document individual behaviors and report suspicious activities. They can also alert security teams to compromised accounts by flagging anomalous behaviors.

**Cloud gap analytics —** Cloud gap analysis features examine data associated with denied entries and policy violations. This helps provide security teams with information that can be used to improve authentication and security protocols.

**Anomaly detection —** Anomaly detection identifies abnormal behavior by monitoring activity related to user behavior and comparing it to benchmarked patterns.

**Cloud registry —** Cloud registries provide a list or marketplace of SaaS applications compatible with a CASB solution. Users can access this list to explore integrations or new applications.

**Mobile device management (MDM) —** MDM functionality offers users the ability to set standards for types of mobile devices and networks capable of accessing data. This allows security teams to customize access requirements and permissions of off-premise and mobile device users.

**Access control —** Access control features typically refers to support of lightweight directory access protocol (LDAP). This simplifies an administrator’s ability to edit or update application availability and information access.

**Data encryption —** Data encryption features might refer to data-centric policy enforcement for sensitive information or encompassing encryption for any information stored or accessed through the CASB system.

### Software and Services Related to Cloud Access Security Broker (CASB) Software

[**Secure web gateways**](https://www.g2.com/categories/secure-web-gateway) **—** Secure web gateways are similar to CASB products. However, secure web gateways focus on browser security and cloud security access brokers focus on protecting cloud applications. With a CASB, users launch and access their cloud applications within a secured environment.

[**Secure email gateways**](https://www.g2.com/categories/secure-email-gateway) **—** Like secure web gateways, secure email gateways operate similarly to CASB technology, but serve a different purpose. Instead of protecting information in cloud-based apps, these tools protect email, text, data, and attachments.

[**Firewall software**](https://www.g2.com/categories/firewall) **—** Firewall software is one of the many technologies that allow CASB systems to function securely. While a firewall is necessary for CASB usage, firewalls can be used to secure anything from an entire network to a single endpoint as well.




