Introducing G2.ai, the future of software buying.Try now
It's been two months since this profile received a new review
Leave a Review

Skyhigh Cloud-Native Application Protection Platform Reviews & Product Details

Profile Status

This profile is currently managed by Skyhigh Cloud-Native Application Protection Platform but has limited features.

Are you part of the Skyhigh Cloud-Native Application Protection Platform team? Upgrade your plan to enhance your branding and engage with visitors to your profile!

Product Avatar Image

Have you used Skyhigh Cloud-Native Application Protection Platform before?

Answer a few questions to help the Skyhigh Cloud-Native Application Protection Platform community

Skyhigh Cloud-Native Application Protection Platform Reviews (2)

Reviews

Skyhigh Cloud-Native Application Protection Platform Reviews (2)

4.8
2 reviews

Pros & Cons

Generated from real user reviews
View All Pros and Cons
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
JR
Developer
Mid-Market (51-1000 emp.)
"A Comprehensive Analysis"
What do you like best about Skyhigh Cloud-Native Application Protection Platform?

I like some factors such as:

1. Cost-effectiveness: Cloud-native applications can reduce costs by optimizing resource utilization and minimizing waste.

2. Enhanced security: They incorporate advanced security features and best practices, such as encryption and identity management.

3. Improved collaboration: Cloud-native apps enable teams to work together more effectively, regardless of location.

4. Faster time-to-market: They accelerate the delivery of new applications and services, giving businesses a competitive edge.

5. Scalability: Cloud-native applications can scale quickly and efficiently to handle increased traffic or demand.

6. Customer support: Healthy relation between service providers and customers Review collected by and hosted on G2.com.

What do you dislike about Skyhigh Cloud-Native Application Protection Platform?

Though there is a good side but also has some dislike factors such as:

Over-engineering: Some users might find the cloud-native approach too robust for their needs, leading to unnecessary complexity.

Complexity: Some users find the cloud-native architecture and deployment complex and challenging to manage. Review collected by and hosted on G2.com.

Abhijit S.
AS
Sr. Executive: IT
Mid-Market (51-1000 emp.)
"Best Security"
What do you like best about Skyhigh Cloud-Native Application Protection Platform?

Ease to Use and customer support also good Review collected by and hosted on G2.com.

What do you dislike about Skyhigh Cloud-Native Application Protection Platform?

Laptop litilbet slow and stuck most of the time. Review collected by and hosted on G2.com.

There are not enough reviews of Skyhigh Cloud-Native Application Protection Platform for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Wiz Logo
Wiz
4.7
(752)
Wiz is a CNAPP that consolidates CSPM, KSPM, CWPP, vulnerability management, IaC scanning, CIEM, DSPM, and container and Kubernetes security into a single platform.
2
FortiCNAPP Logo
FortiCNAPP
4.4
(383)
FortiCNAPP is a comprehensive Cloud-Native Application Protection Platform (CNAPP) that consolidates Cloud Security Posture Management (CSPM), Cloud Workload Protection (CWPP), Cloud Infrastructure Entitlement Management (CIEM), Kubernetes security, and compliance into a single solution. Using AI-based anomaly detection and behavioral analytics, FortiCNAPP continuously monitors cloud environments to identify misconfigurations, vulnerabilities, and active threats in real time. The platform supports agentless and agent-based deployment models, ensuring flexible coverage across diverse architectures. FortiCNAPP also integrates with the Fortinet Security Fabric, correlating cloud data with network and endpoint insights from FortiGuard, FortiSOAR, and more, delivering full-stack threat context, faster remediation, and unified risk management.
3
Scrut Automation Logo
Scrut Automation
4.9
(1,296)
Automatically test your cloud configurations against 150+ CIS benchmarks across multiple cloud accounts on AWS, Azure, GCP and more, to maintain a strong infosec posture.
4
Vanta Logo
Vanta
4.6
(2,143)
It was clear that security and privacy had become mainstream issues, and that we all increasingly relied on cloud services to store everything from our personal photos to our communications at work. Vanta’s mission is to be the layer of trust on top of these services, and to secure the internet, increase trust in software companies, and keep consumer data safe. Today, we're a growing team in San Francisco passionate about making the internet more secure and elevating the standards for technology companies.
5
Sprinto Logo
Sprinto
4.8
(1,541)
Sprinto productizes and automates all compliance requirements that would otherwise require manual effort, documentation, and paperwork, end to end. It integrates with your business systems like GSuite, AWS, Github, Google Cloud, etc., and ensures that these systems are in the state required by SOC2/ISO27001. Sprinto also comes builtin with features like policies, security training, org charts, device monitoring, etc., to help you meet SOC 2/ISO27001 requirements without having to purchase new software for these. All in all, Sprinto takes care of all the compliance roadblocks and speaks the audit language on your behalf, while you focus on increasing revenue.
6
Drata Logo
Drata
4.8
(1,125)
Drata is the world's most advanced security and compliance automation platform with the mission to help businesses earn and keep the trust of their users, customers, partners, and prospects. With Drata, thousands of companies streamline risk management and over 12 compliance frameworks—such as SOC 2, ISO 27001, GDPR, CCPA, PCI DSS and more—through automation, resulting in a strong security posture, lower costs, and less time spent preparing for audits.
7
Secureframe Logo
Secureframe
4.7
(772)
Secureframe helps companies get enterprise ready by streamlining SOC 2 and ISO 27001 compliance. Secureframe allows companies to get compliant within weeks, rather than months and monitors 40+ services, including AWS, GCP, and Azure.
8
Thoropass Logo
Thoropass
4.7
(566)
Thoropass is an all-in-one compliance automation platform that streamlines the entire compliance and audit process by integrating advanced technology with expert guidance. Designed to eliminate the complexities associated with traditional compliance methods, Thoropass offers a seamless solution for achieving and maintaining certifications such as SOC 2, ISO 27001, HITRUST, PCI DSS, and HIPAA. By automating evidence collection, policy creation, and continuous monitoring, Thoropass significantly reduces manual effort, accelerates audit timelines, and enhances overall security posture. Key Features and Functionality: - Automated Evidence Collection and AI Validation: Streamlines the audit preparation process by automatically gathering and validating evidence, reducing manual workload and minimizing errors. - Continuous Monitoring and Alerts: Provides real-time tracking of compliance status and promptly notifies users of any issues, ensuring ongoing adherence to regulatory requirements. - Risk Assessment and Management: Offers tools to identify, assess, and mitigate security risks, helping organizations proactively manage their compliance landscape. - Security Questionnaire Automation: Simplifies the process of responding to security questionnaires by automating responses, saving time and ensuring consistency. - Integrated Audit Services: Combines compliance automation with in-house audit services, offering a cohesive and efficient audit experience without the need for third-party auditors. - Pentesting Services: Provides penetration testing to identify vulnerabilities, ensuring robust security measures are in place. Primary Value and Problem Solved: Thoropass addresses the challenges of traditional compliance processes, which often involve extensive manual effort, fragmented tools, and prolonged audit cycles. By offering a unified platform that automates key compliance tasks and integrates expert audit services, Thoropass reduces compliance and audit overhead by up to 80%, accelerates time-to-audit by 62%, and eliminates over 950 annual work hours for its customers. This comprehensive approach allows organizations to focus on their core business activities while maintaining a strong security and compliance posture.
9
Scytale Logo
Scytale
4.8
(555)
Scytale is the leading AI-powered compliance automation software, including dedicated GRC experts, that streamlines over 40 security and privacy frameworks like SOC 2, ISO 27001, PCI DSS, GDPR and ISO 42001.
10
Palo Alto Cortex XSIAM Logo
Palo Alto Cortex XSIAM
4.3
(473)
Product Description: Palo Alto Networks' Cortex XSIAM is an AI-driven security operations platform designed to transform traditional Security Operations Centers by integrating and automating key functions such as data centralization, threat detection, and incident response. By leveraging machine learning and automation, it enables organizations to detect and respond to threats more efficiently, reducing manual workloads and improving overall security posture. Key Features and Functionality: - Data Centralization: Aggregates data from various sources into a unified platform, providing comprehensive visibility across the enterprise. - AI-Powered Threat Detection: Utilizes machine learning algorithms to identify anomalies and potential threats in real-time. - Automated Incident Response: Streamlines response processes through automation, enabling rapid mitigation of security incidents. - Integrated SOC Capabilities: Combines functions such as Extended Detection and Response , Security Orchestration, Automation, and Response , Attack Surface Management , and Security Information and Event Management into a cohesive platform, eliminating the need for multiple disparate tools. - Scalability: Designed to handle large volumes of data and adapt to the evolving needs of modern enterprises. Primary Value and Problem Solved: Cortex XSIAM addresses the challenges of disjointed data, weak threat defense, and heavy reliance on manual work in traditional SOCs. By centralizing data and automating security operations, it simplifies processes, enhances threat detection accuracy, and accelerates incident response times. This transformation enables organizations to proactively outpace threats, reduce operational costs, and achieve a more robust security posture.
Show More

No Discussions for This Product Yet

Be the first to ask a question and get answers from real users and experts.

Start a discussion
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Skyhigh Cloud-Native Application Protection Platform
View Alternatives