Introducing G2.ai, the future of software buying.Try now

Compare Cyberhaven and Netskope One Platform

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Cyberhaven
Cyberhaven
Star Rating
(16)4.5 out of 5
Market Segments
Enterprise (56.3% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Cyberhaven
Netskope One Platform
Netskope One Platform
Star Rating
(68)4.4 out of 5
Market Segments
Enterprise (60.6% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Call for quote
Learn more about Netskope One Platform

Cyberhaven vs Netskope One Platform

When assessing the two solutions, reviewers found Netskope One Platform easier to use, set up, and administer. However, reviewers preferred doing business with Cyberhaven overall.

  • Cyberhaven and Netskope One Platform both meet the requirements of our reviewers at a comparable rate.
  • When comparing quality of ongoing product support, reviewers felt that Cyberhaven is the preferred option.
  • For feature updates and roadmaps, our reviewers preferred the direction of Netskope One Platform over Cyberhaven.
Pricing
Entry-Level Pricing
Cyberhaven
No pricing available
Netskope One Platform
Netskope Active Platform
Call for quote
Learn more about Netskope One Platform
Free Trial
Cyberhaven
No trial information available
Netskope One Platform
Free Trial is available
Ratings
Meets Requirements
8.8
15
8.8
58
Ease of Use
8.4
16
8.5
58
Ease of Setup
8.5
16
8.6
38
Ease of Admin
8.8
14
9.0
32
Quality of Support
8.7
15
8.5
56
Has the product been a good partner in doing business?
9.4
14
8.9
33
Product Direction (% positive)
9.2
14
9.6
57
Features by Category
Data Loss Prevention (DLP)Hide 10 FeaturesShow 10 Features
9.1
14
8.5
22
Administration
9.3
12
8.0
20
9.8
11
8.6
20
8.8
13
8.7
19
Governance
8.3
12
8.3
19
9.2
14
8.1
19
9.8
14
8.8
20
Security
9.0
10
8.8
19
8.6
12
8.1
20
9.5
14
8.9
21
9.0
13
8.7
19
Not enough data
8.7
15
Network Management
Not enough data
8.7
13
Not enough data
8.6
13
Not enough data
8.7
14
Not enough data
8.5
14
Security
Not enough data
8.7
14
Not enough data
8.6
14
Not enough data
8.9
12
Not enough data
9.2
13
Identity Management
Not enough data
8.7
13
Not enough data
8.8
12
Not enough data
9.0
13
Generative AI
Not enough data
9.2
8
Not enough data
7.9
8
Cloud Access Security Broker (CASB)Hide 10 FeaturesShow 10 Features
Not enough data
8.6
19
Analysis
Not enough data
8.8
18
Not enough data
8.3
17
Not enough data
8.8
16
Functionality
Not enough data
8.5
17
Not enough data
8.5
17
Not enough data
7.7
17
Security
Not enough data
8.6
17
Not enough data
8.9
19
Not enough data
8.6
18
Not enough data
9.1
16
Not enough data
Not enough data
Data Protection
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Analysis
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Data Protection
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Compliance
Not enough data
Not enough data
Not enough data
Not enough data
Usability
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Sensitive Data DiscoveryHide 14 FeaturesShow 14 Features
9.0
6
Not enough data
Functionality
Not enough data
Not enough data
9.7
5
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
8.3
5
Not enough data
8.9
6
Not enough data
9.7
6
Not enough data
8.6
6
Not enough data
9.3
5
Not enough data
8.7
5
Not enough data
Agentic AI - Sensitive Data Discovery
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Insider Threat Management (ITM)Hide 9 FeaturesShow 9 Features
8.2
11
Not enough data
Functionality
9.3
10
Not enough data
9.6
9
Not enough data
9.2
11
Not enough data
9.0
10
Not enough data
9.8
10
Not enough data
9.2
10
Not enough data
Monitoring
7.0
9
Not enough data
5.0
9
Not enough data
5.6
9
Not enough data
Not enough data
8.6
14
Management
Not enough data
7.8
12
Not enough data
8.7
13
Not enough data
8.2
12
Not enough data
9.1
13
Monitoring
Not enough data
8.8
11
Not enough data
8.6
12
Not enough data
8.2
13
Protection
Not enough data
8.8
13
Not enough data
9.1
11
Not enough data
8.7
13
Not enough data
8.5
12
SaaS Security Posture Management (SSPM) SolutionsHide 9 FeaturesShow 9 Features
Not enough data
Not enough data
Monitoring
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - SaaS Security Posture Management (SSPM) Solutions Features
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
9.2
9
Web Content and Traffic Filtering - Secure Web Gateways
Not enough data
9.3
7
Not enough data
9.4
8
Not enough data
9.8
7
Not enough data
9.0
7
Not enough data
8.6
7
Data Protection and Loss Prevention - Secure Web Gateways
Not enough data
9.6
9
Not enough data
9.0
7
Not enough data
9.3
7
Not enough data
9.5
7
Access Control and Authentication - Secure Web Gateways
Not enough data
9.0
7
Not enough data
9.5
7
Not enough data
9.8
7
Performance and Management - Secure Web Gateways
Not enough data
9.5
7
Not enough data
8.6
6
Not enough data
8.5
8
Not enough data
9.3
7
Not enough data
9.0
7
Data Security Posture Management (DSPM)Hide 9 FeaturesShow 9 Features
Not enough data
Not enough data
Discovery & Classification - Data Security Posture Management (DSPM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Risk Prioritization - Data Security Posture Management (DSPM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Remediation & Governance - Data Security Posture Management (DSPM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Secure Service Edge (SSE) SolutionsHide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Components - Secure Service Edge (SSE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Artificial Intelligence -Secure Service Edge (SSE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Secure Service Edge (SSE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
AI Security Posture Management (AI-SPM) ToolsHide 9 FeaturesShow 9 Features
Not enough data
Not enough data
Functionality - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Risk Assessment - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Governance & Compliance - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Compliance
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Reviews
Reviewers' Company Size
Cyberhaven
Cyberhaven
Small-Business(50 or fewer emp.)
12.5%
Mid-Market(51-1000 emp.)
31.3%
Enterprise(> 1000 emp.)
56.3%
Netskope One Platform
Netskope One Platform
Small-Business(50 or fewer emp.)
7.6%
Mid-Market(51-1000 emp.)
31.8%
Enterprise(> 1000 emp.)
60.6%
Reviewers' Industry
Cyberhaven
Cyberhaven
Financial Services
37.5%
Manufacturing
25.0%
Venture Capital & Private Equity
6.3%
Marketing and Advertising
6.3%
Legal Services
6.3%
Other
18.8%
Netskope One Platform
Netskope One Platform
Information Technology and Services
38.8%
Computer & Network Security
13.4%
Financial Services
7.5%
Banking
7.5%
Computer Software
6.0%
Other
26.9%
Alternatives
Cyberhaven
Cyberhaven Alternatives
BetterCloud
BetterCloud
Add BetterCloud
Egnyte
Egnyte
Add Egnyte
Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud
Add Acronis Cyber Protect Cloud
Druva Data Security Cloud
Druva Data Security Cloud
Add Druva Data Security Cloud
Netskope One Platform
Netskope One Platform Alternatives
Cato SASE Cloud
Cato SASE Cloud
Add Cato SASE Cloud
Check Point Harmony SASE
Check Point Harmony SASE
Add Check Point Harmony SASE
Zscaler Internet Access
Zscaler Internet Access
Add Zscaler Internet Access
Cisco Umbrella
Cisco Umbrella
Add Cisco Umbrella
Discussions
Cyberhaven
Cyberhaven Discussions
Monty the Mongoose crying
Cyberhaven has no discussions with answers
Netskope One Platform
Netskope One Platform Discussions
What is a cloud access security broker (CASB)?
1 Comment
Official Response from Netskope One Platform
By 2020, 60 percent of large enterprises will use a cloud access security broker. According to Gartner, a cloud access security broker (CASB) is an...Read more
Is Netskope a CASB?
1 Comment
DN
yes, its one of many offerings Read more
Monty the Mongoose crying
Netskope One Platform has no more discussions with answers