TrustRadius
Skyhigh helps us protect the cloudSkyHigh is a CASB solution that spans shadow IT all the way into API level control of sanctioned Apps. SkyHigh also allows us to integrate CASB controls into custom apps or cloud software that don't have native controls.,Great visibility into cloud apps Understanding of unsanctioned services Control of sanctioned services,Interface is split between 2 generations of look and feel,10,Allowed us to gain understanding of use of unsanctioned services and sanctioned services in use Allowed us to implement DLP controls across many different cloud services,Netskope and Cisco CloudLock,ForeScout CounterACT, Splunk Enterprise, ZeroFOXSkyhigh Cloud Access -A leading CASB to protect you and your organisation.Skyhigh is used by the data security team, where it helps us by noting the services browsed by the users in the organization. It not only shows the services but also marks the high-risk services with appropriate reasons. This helps us block those services in our organization from external attacks.,It helps in identifying high risk services and also shows the reasons for its rating as high and also the user activity on that service like amount data uploaded/downloaded which helps us in easily tracking the bad services and blocking them in our organisation It has a great User interface. Skyhigh has a great feature called Detokenization where only a user with a high level of authenticity can decrypt the tokenized user data in the UI. This is really a promising feature for customers: they like that they need not worry about our data since the entire thing is being encrypted It helps in integrating cloud tools like office 365 ,box ,salesforce etc.Where for every abnormal activity there will be anomaly created and alerts customers that there is some suspicious thing is happening and notifies us to investigate,Skyhigh support should be improved a bit in pleasing customer needs during calls for any issue Skyhigh need to reflect data from the integrated tools like office 365 /sales force without any time gap as most of the time it reflects data almost after 24 hrs where a customer may potentially be delayed in remediating to an incident There should be email alerting system must be implemented in Skyhigh for every anomaly triggered.,10,Notifying us about bad services and abnormal activities performed by user in the cloud drives if I have to say negative impact that is a reflection of logs from cloud drives to Skyhigh is slow, where we will be losing huge time for remediation/containment of the issue,Microsoft cloud app security,Splunk Cloud, SolarWinds Log & Event Manager, McAfee Endpoint Protection Suite,50,20,Detokenization High risk services DLP policies and Anomalies,Creating a rule for anomalies to trigger some special incidents Identifying high risk services,In creating customized DLP policies and triggering anomalies on those policies Performing a on demand scan on the apps integrated with the skyhigh,10Making the cloud more secure with SkyhighWe use Skyhigh Cloud Access Security to monitor the users in our environment. With the decent UI and simple dashboards, we are able to determine what applications and websites the users are accessing. We can easily find if a user has accessed a malicious site or downloaded an unapproved application. With this information, we check the logs using other tools and know if it was a one time event or a regular one. This helped us to mitigate much of the risks that could have happened otherwise.,It has a very clear and simple dashboard. Good way of arranging the services. Easy identification of information.,We don't get all the information about the particular event. User needs to get acquainted with the UI for easy use.,8,Reduction of high risks. Allowed to set up policies.
Unspecified
Skyhigh Cloud Access Security Broker
4 Ratings
Score 9.0 out of 101
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow'>trScore algorithm: Learn more.</a>TRScore

Skyhigh Cloud Access Security Broker Reviews

Skyhigh Cloud Access Security Broker
4 Ratings
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow'>trScore algorithm: Learn more.</a>
Score 9.0 out of 101
Show Filters 
Hide Filters 
Filter 4 vetted Skyhigh Cloud Access Security Broker reviews and ratings
Clear all filters
Overall Rating
Reviewer's Company Size
Last Updated
By Topic
Industry
Department
Experience
Job Type
Role
Reviews (1-3 of 3)
  Vendors can't alter or remove reviews. Here's why.
Mitchell Greenfield profile photo
January 16, 2018

Skyhigh Cloud Access Security Broker Review: "Skyhigh helps us protect the cloud"

Score 10 out of 10
Vetted Review
Verified User
Review Source
SkyHigh is a CASB solution that spans shadow IT all the way into API level control of sanctioned Apps. SkyHigh also allows us to integrate CASB controls into custom apps or cloud software that don't have native controls.
  • Great visibility into cloud apps
  • Understanding of unsanctioned services
  • Control of sanctioned services
  • Interface is split between 2 generations of look and feel
Skyhigh is great for an organization that is invested in office 365, box, etc and would like to apply the same controls across all the environments.
Read Mitchell Greenfield's full review
No photo available
February 23, 2018

Skyhigh Cloud Access Security Broker Review: "Skyhigh Cloud Access -A leading CASB to protect you and your organisation."

Score 10 out of 10
Vetted Review
Verified User
Review Source
Skyhigh is used by the data security team, where it helps us by noting the services browsed by the users in the organization. It not only shows the services but also marks the high-risk services with appropriate reasons. This helps us block those services in our organization from external attacks.
  • It helps in identifying high risk services and also shows the reasons for its rating as high and also the user activity on that service like amount data uploaded/downloaded which helps us in easily tracking the bad services and blocking them in our organisation
  • It has a great User interface. Skyhigh has a great feature called Detokenization where only a user with a high level of authenticity can decrypt the tokenized user data in the UI. This is really a promising feature for customers: they like that they need not worry about our data since the entire thing is being encrypted
  • It helps in integrating cloud tools like office 365 ,box ,salesforce etc.Where for every abnormal activity there will be anomaly created and alerts customers that there is some suspicious thing is happening and notifies us to investigate
  • Skyhigh support should be improved a bit in pleasing customer needs during calls for any issue
  • Skyhigh need to reflect data from the integrated tools like office 365 /sales force without any time gap as most of the time it reflects data almost after 24 hrs where a customer may potentially be delayed in remediating to an incident
  • There should be email alerting system must be implemented in Skyhigh for every anomaly triggered.
Skyhigh is best suited for notifying us of the bad services which are being run in the organization. It really reduces the time it takes for in-depth analysis of proxy logs. It is also helpful for notifying us of any abnormal activities performed by the users in the cloud apps. For example, if a user has left the company and then there was a huge amount of files downloaded from his drive, we may not have known. Here, Skyhigh helps by notifying us of anomaly-like data (high amounts of download and upload activities performed). This is one of the best scenarios I can say, where we see what actually is happening in the cloud drives for the organization. It also helps by notifying if there is any service or activity performed against any sort of compliance with its own mechanisms.
Read this authenticated review
No photo available
February 12, 2018

Skyhigh Cloud Access Security Broker Review: "Making the cloud more secure with Skyhigh"

Score 8 out of 10
Vetted Review
Verified User
Review Source
We use Skyhigh Cloud Access Security to monitor the users in our environment. With the decent UI and simple dashboards, we are able to determine what applications and websites the users are accessing. We can easily find if a user has accessed a malicious site or downloaded an unapproved application. With this information, we check the logs using other tools and know if it was a one time event or a regular one. This helped us to mitigate much of the risks that could have happened otherwise.
  • It has a very clear and simple dashboard.
  • Good way of arranging the services.
  • Easy identification of information.
  • We don't get all the information about the particular event.
  • User needs to get acquainted with the UI for easy use.
Consider a scenario where a user is accessing some information on a website which is infected with adware or coinminer. With the help of Skyhigh, we are able to determine the time at which the user has accessed the site. Using other tools, we can check the exact site which he/she visited when the event was generated and advise the user to not visit such sites or create a blacklist.
Read this authenticated review

Skyhigh Cloud Access Security Broker Scorecard Summary

About Skyhigh Cloud Access Security Broker

Skyhigh Cloud Access Security Broker Technical Details

Operating Systems: Unspecified
Mobile Application:No