2026 Best Software Awards are here!See the list
It's been two months since this profile received a new review
Leave a Review

Skyhigh Cloud Access Security Broker Reviews & Product Details

Profile Status

This profile is currently managed by Skyhigh Cloud Access Security Broker but has limited features.

Are you part of the Skyhigh Cloud Access Security Broker team? Upgrade your plan to enhance your branding and engage with visitors to your profile!

Product Avatar Image

Have you used Skyhigh Cloud Access Security Broker before?

Answer a few questions to help the Skyhigh Cloud Access Security Broker community

Skyhigh Cloud Access Security Broker Reviews (2)

Reviews

Skyhigh Cloud Access Security Broker Reviews (2)

4.8
2 reviews
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Verified User in Higher Education
AH
Enterprise (> 1000 emp.)
"Excellent tool to control Office 365 data usage"
What do you like best about Skyhigh Cloud Access Security Broker?

The UX of the product is very intuitive and simple, so even for new users the learning curve on the plataform is very fast.

The granularity of controls you can implement into DLP policies was a big differential to us.

The support documentation provided by the vendor are very extensive, complete and ease to use, its a powerfull tool in the daily routine operating the tool.

The implementation was very fast and simple, with their team giving all the instructions. It took a few days to have it completed configured. Review collected by and hosted on G2.com.

What do you dislike about Skyhigh Cloud Access Security Broker?

Their staff in Brazil is small, so we do not have full customer support in our native language. Even the implementation was conducted by an international team, so if the admin(s) of the tool do not speak English, it may be a problem. Review collected by and hosted on G2.com.

Nicolás M.
NM
Technical Engineer
Information Technology and Services
Small-Business (50 or fewer emp.)
"Secure access to cloud applications"
What do you like best about Skyhigh Cloud Access Security Broker?

The strong point of Skyhigh Cloud Access Security Broker is the high capacity for discovery and visibility, for the identification and subsequent classification of cloud services used by users of the organization, adding to the access control it provides, offers capacity robust data protection Review collected by and hosted on G2.com.

What do you dislike about Skyhigh Cloud Access Security Broker?

Perhaps the point that I did not like, more than the service, would be the speed at which threats evolve in the cloud world

This makes it necessary to constantly update the service in order to be up to date with the latest threats. Review collected by and hosted on G2.com.

There are not enough reviews of Skyhigh Cloud Access Security Broker for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Check Point Harmony Email & Collaboration Logo
Check Point Harmony Email & Collaboration
4.6
(513)
Check Point Harmony Email & Office, protects enterprise data by preventing targeted attacks on SaaS applications and cloud-based email.
2
Check Point SASE Logo
Check Point SASE
4.5
(195)
Check Point Harmony SASE is a converged networking and network security platform which connects all users, in the office or remote, to all resources, located on-prem, cloud, SaaS or web. It delivers secure Zerto Trust Network Access (ZTNA) connectivity along web protection capabilities including Internet access control, malware protection, data loss prevention(DLP), and sandboxing, as well as a firewall as a service. The solution employs a hybrid architecture, combining on-device and cloud-based protections, which delivers market leading security and performance.
3
Symantec Web Security Service Logo
Symantec Web Security Service
4.4
(120)
Symantec Web Security is a cloud based software that helps protect organization from compromised websites and malicious downloads and allows user to control, monitor and enforce Acceptable Use Policies for organizations users, whether on-premises or away from the office.
4
Forcepoint Data Security Cloud Logo
Forcepoint Data Security Cloud
4.2
(103)
Forcepoint Data Security Cloud is a unified cloud security platform that enables Zero Trust access to the web, SaaS and private applications with best-in-class data security and malware protection while delivering a great user experience. Gain the full visibility and control over web and application usage to mitigate digital risks and give your organization more freedom and flexibility. Key product capabilities include: • Visibility into web, SaaS and private application use • Distributed enforcement – endpoint enforcement, cloud enforcement via in-line proxy & API, and on-prem enforcement • Industry-leading data and threat protection capabilities to secure data everywhere, for people working anywhere • Seamless user experience from any location and any device "
5
Cloudflare SSE & SASE Platform Logo
Cloudflare SSE & SASE Platform
4.6
(103)
Cloudflare Area 1 Security identifies and prevents advanced socially engineered attacks before they impact your enterprise.
6
Todyl Security Platform Logo
Todyl Security Platform
4.6
(93)
The Todyl Security Platform spans prevention, detection, and response by unifying SASE, Endpoint Security (EDR + NGAV), SIEM, MXDR, and GRC in a cloud-first platform. Todyl streamlines operations, simplifies architectures, and empowers your team to deliver highly effective security while simplifying compliance management.
7
Cato SASE Cloud Logo
Cato SASE Cloud
4.5
(82)
Cato SASE Cloud delivers a global SD-WAN with built-in network security stack for all enterprise locations, cloud resources and mobile users
8
Prisma Access Logo
Prisma Access
4.3
(73)
Secure access service edge (SASE) for branch offices, retail locations and mobile users
9
Citrix Secure Private Access Logo
Citrix Secure Private Access
4.5
(70)
Citrix Secure Workspace Access provides a comprehensive, zero-trust approach to deliver secure and contextual access to the corporate internal web apps, SaaS, and virtual applications. It enables the consolidation of traditional security products like VPN, single sign-on, and browser isolation technologies and provides advanced security controls for managed, unmanaged, and BYO devices. Citrix Secure Workspace Access provides a holistic security approach based on zero-trust principles, protecting users, applications, and corporate data against internet web threats and data exfiltration.
10
Netskope One Platform Logo
Netskope One Platform
4.4
(67)
Netskope is a Cloud Access Security Broker (CASB)
Show More

No Discussions for This Product Yet

Be the first to ask a question and get answers from real users and experts.

Start a discussion
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Skyhigh Cloud Access Security Broker