Skip to main content
TrustRadius
Skyhigh Cloud Access Security Broker

Skyhigh Cloud Access Security Broker
Formerly McAfee MVISION Cloud

Overview

What is Skyhigh Cloud Access Security Broker?

Skyhigh Cloud Access Security Broker (formerly McAfee MVISION Cloud) is a cloud access security broker (CASB) that protects data and stops threats in the cloud across SaaS, PaaS, and IaaS from a single, cloud-native enforcement point.

Read more
Recent Reviews

TrustRadius Insights

Users have found immense value in implementing this product for various use cases related to data security and protection. One key use …
Continue reading
Read all reviews
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Skyhigh Cloud Access Security Broker?

Skyhigh Cloud Access Security Broker (formerly McAfee MVISION Cloud) is a cloud access security broker (CASB) that protects data and stops threats in the cloud across SaaS, PaaS, and IaaS from a single, cloud-native enforcement point.

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

16 people also want pricing

Alternatives Pricing

What is Avanan?

Avanan, from Check Point since the August 2021 acquisition, connects security technologies to enterprise cloud applications in order to improve protection of sensitive corporate data and IP. According to the vendor, Avanan's one-click deployment allows customers to deploy a new security solution in…

What is Oracle CASB Cloud Service?

Oracle acquired Palerra in September 2016, a cloud security company. The Palerra platform is now offered as Oracle CASB Cloud Service.

Return to navigation

Product Details

What is Skyhigh Cloud Access Security Broker?

Skyhigh Cloud Access Security Broker Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(10)

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

Users have found immense value in implementing this product for various use cases related to data security and protection. One key use case is the implementation of security policies, such as data loss prevention, to prevent data leakage. This has been successful in ensuring sensitive information remains within the organization's control. The product has also provided users with visibility into the use of cloud services, enabling quick detection of data transfers to specific platforms or categories of services. This has been particularly beneficial in addressing shadow IT, allowing users to see data that was previously inaccessible.

Another important use case is the ability of the product to detect and reduce unauthorized access to high-risk cloud services, like Office 365. By monitoring and preventing unauthorized access to sensitive data, such as PHI, and encrypting data at rest within sanctioned cloud applications, users have been able to ensure the security of their confidential information. Additionally, the product has proven effective in detecting intruders and reducing instances of data theft within organizations.

Furthermore, users have utilized this product for a wide range of purposes beyond just data security. It has been instrumental in addressing office business issues across various aspects of the typical work environment. Through surveys, it has provided benefits that are not specified in detail but have contributed to a more secure internet experience for users.

Moreover, the product excels in identifying and blocking high-risk services used daily within organizations while also providing insights into abnormal events such as large data transfers or downloads. Its implementation allows for the identification of inappropriate cloud services and the enforcement of policies, further enhancing overall security.

The versatility of this product is demonstrated through its ability to be integrated into custom apps or cloud software that lack native controls. Users have found it invaluable for abnormal activity detection as well as for monitoring and protecting against external attacks.

The user interface and simple dashboards offered by this product have also been highly appreciated by users. These features enable easy monitoring of applications and websites accessed by users along with the detection of malicious sites and identification of unapproved applications.

In summary, this product has proven to be an indispensable tool for organizations. It addresses critical use cases such as data security, protection against unauthorized access, detection of abnormal events, and prevention of data leakage. With its user-friendly interface and wide range of functionalities, it provides the necessary visibility and control to ensure a secure work environment.

Clever Single Pane of Glass Visualization: Several users have found the single pane of glass visualization of threats in their organization to be simply clever, allowing them to easily understand and analyze potential security risks.

Continuous Protection for Information: Many users appreciate that the product allows for continuous protection of information, both within and outside of the cloud. This feature ensures that data remains secure at all times, providing peace of mind for users.

Easy-to-Use Interface with Amazing Features: The user interface has received praise from multiple reviewers who describe it as cool and highlight the presence of amazing features. Users find the interface intuitive and user-friendly, making it easy to navigate and access important information.

Cons:

  1. Cumbersome encryption key entry process: Some users have found the need to enter encryption keys in Skyhigh Networks to be a tedious and time-consuming task. This can result in a slower onboarding process for them.
  2. Dissatisfaction with user experience, support, and bugs: Several reviewers expressed dissatisfaction with the overall user experience of Skyhigh Networks, including difficulties in implementing the product and encountering bugs. They have also mentioned inadequate support from the company, leading to frustration.
  3. Non-intuitive blocking and detokenization processes: Users have reported that blocking services or categories within the interface of Skyhigh Networks is not intuitive. Additionally, they find the detokenization process cumbersome, especially when working with multiple enterprise connectors. These challenges can hinder efficient workflow and data management for users.

Users of the software have made several recommendations for a successful deployment and usage experience. One common recommendation is to plan the deployment carefully. By breaking the project into phases, users can ensure a more successful outcome. This approach allows for better organization and control over each phase, helping to minimize issues and ensure smooth progress throughout the implementation process.

Another recommendation is to develop a good rapport with the team responsible for the cloud application. Establishing a positive and collaborative relationship with the team in charge of maintaining and managing the cloud application is highly recommended by users. This recommendation aims to foster open communication and cooperation between users and the team, enabling efficient troubleshooting, timely support, and tailored solutions to any challenges that may arise.

Additionally, users suggest taking advantage of the free security audit offered by the software provider. This audit helps identify potential risks associated with using cloud services and highlights areas for improvement in terms of security measures. By addressing these risks proactively, users can enhance their data protection and minimize vulnerabilities within their cloud environment.

Overall, these recommendations emphasize the importance of careful planning, effective collaboration with the software team, and utilizing security audits as key strategies for a successful deployment and usage experience.

Attribute Ratings

Reviews

(1-5 of 5)
Companies can't remove reviews or game the system. Here's why
Score 7 out of 10
Vetted Review
Verified User
Incentivized
It is used to monitor the activities of all the employees. In an industry that is dependent upon exclusive content and resources, it is necessary to have a service that keeps a tab on the resources and websites being accessed by everyone. Not only does it show each and every resource that has been accessed on a particular device, but it also narrows down their risk.
  • Highly accurate and detailed analysis
  • Identifies and rates high risk resources
  • Can be easily fused with several other apps especially Microsoft Office
  • The encryption service
  • The interface is a tad complicated, especially for a beginner
  • There are bugs that need to be addressed
  • Can be really slow
It really helps with data breaches as it provides a detailed report of the data that was downloaded to or from a particular device. It is suitable for services that deal with exclusive or sensitive content. Since it provides a detailed report of everything that was accessed by the devices on the Cloud, it becomes much easier to encounter any kind of malicious attacks and block certain services.
  • Ability to integrate with other softwares
  • The security access cannot be breached
  • Highly accurate and detailed analysis and reports
  • Has prevented the possibility of data leak
  • Easy integration has allowed it to be implemented throughout the organisation
  • Affordable and foolproof security
McAfee is definitely the best in the market. Their security services are vast and highly competent. I personally love the encryption feature.
Microsoft Defender for Cloud Apps (formerly Microsoft Cloud App Security), dotConnect for Salesforce Marketing Cloud, Microsoft 365 (formerly Office 365)
Sneha Sharma | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We use McAfee MVISION for detecting abnormal or malicious activities in our apps or if somehow the user clicked on malicious links and installed something MVISION helps us to detect these links. With these insights, we can plan on how to prevent these activities.it also helps us in identifying abnormal events like huge amounts of data transfer or large data downloads.
  • Very good at detecting malicious links in application
  • easy to integrate with third party software like salesforce, office etc.
  • Detailed insights and report analysis.
  • UI side is not that great.
  • Hard to detect every attack or event.
  • Not work in real time means there is a latency in detection.
It is well suited for almost every organization [that] deals with sensitive data or [their] users have to perform certain sensitive actions that can go [into] financial loss if somehow there are attacked by [viruses] or malicious links. To prevent that a company must have certain apps prevent these and MVISION is [one] of them. so I recommend it.
  • Malicious Activity Detection
  • Secure Data Encryption
  • Risk analysis
  • less spend on security
  • more utilisation of existing infrastructure
  • prevention from future attacks due to very good insights
It integrates great with third-party software. so part of our company's choosing this depends on the great and smooth integration it provides. except previous software were not good and We have to hire an expert to deal with this particular software cause it was hard to understand at first. but with McAfee, it was easy to deal with.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Skyhigh is used by the data security team, where it helps us by noting the services browsed by the users in the organization. It not only shows the services but also marks the high-risk services with appropriate reasons. This helps us block those services in our organization from external attacks.
  • It helps in identifying high risk services and also shows the reasons for its rating as high and also the user activity on that service like amount data uploaded/downloaded which helps us in easily tracking the bad services and blocking them in our organisation
  • It has a great User interface. Skyhigh has a great feature called Detokenization where only a user with a high level of authenticity can decrypt the tokenized user data in the UI. This is really a promising feature for customers: they like that they need not worry about our data since the entire thing is being encrypted
  • It helps in integrating cloud tools like office 365 ,box ,salesforce etc.Where for every abnormal activity there will be anomaly created and alerts customers that there is some suspicious thing is happening and notifies us to investigate
  • Skyhigh support should be improved a bit in pleasing customer needs during calls for any issue
  • Skyhigh need to reflect data from the integrated tools like office 365 /sales force without any time gap as most of the time it reflects data almost after 24 hrs where a customer may potentially be delayed in remediating to an incident
  • There should be email alerting system must be implemented in Skyhigh for every anomaly triggered.
Skyhigh is best suited for notifying us of the bad services which are being run in the organization. It really reduces the time it takes for in-depth analysis of proxy logs. It is also helpful for notifying us of any abnormal activities performed by the users in the cloud apps. For example, if a user has left the company and then there was a huge amount of files downloaded from his drive, we may not have known. Here, Skyhigh helps by notifying us of anomaly-like data (high amounts of download and upload activities performed). This is one of the best scenarios I can say, where we see what actually is happening in the cloud drives for the organization. It also helps by notifying if there is any service or activity performed against any sort of compliance with its own mechanisms.
  • Notifying us about bad services and abnormal activities performed by user in the cloud drives
  • if I have to say negative impact that is a reflection of logs from cloud drives to Skyhigh is slow, where we will be losing huge time for remediation/containment of the issue
  • Microsoft cloud app security
Skyhigh is one of the leading CASB on the market because it has a cool User interface where it is easy for a normal user who cannot read raw logs to easily understand the issue by the UI and perform remediation steps. The way it provides security to customer data is exceptional, like the detokenization feature which is a promising one and really delights customers so they won't worry about their data.
Splunk Cloud, SolarWinds Log & Event Manager, McAfee Endpoint Protection Suite
50
They all represent an information and infrastructure security team.
20
People should have understanding on proxy logs and cloud apps
  • Detokenization
  • High risk services
  • DLP policies and Anomalies
  • Creating a rule for anomalies to trigger some special incidents
  • Identifying high risk services
  • In creating customized DLP policies and triggering anomalies on those policies
  • Performing a on demand scan on the apps integrated with the skyhigh
Skyhigh is a leading CASB helps in identifying the bad services and protecting user data with a detokenization feature and also with the anomalies triggering alarms to customers for any suspicious activities. It provides users by providing blocking script to block service on the proxy or firewall and also shows the abilities to the user to balance the weight of risk service.
Score 8 out of 10
Vetted Review
Verified User
We use Skyhigh Cloud Access Security to monitor the users in our environment. With the decent UI and simple dashboards, we are able to determine what applications and websites the users are accessing. We can easily find if a user has accessed a malicious site or downloaded an unapproved application. With this information, we check the logs using other tools and know if it was a one time event or a regular one. This helped us to mitigate much of the risks that could have happened otherwise.
  • It has a very clear and simple dashboard.
  • Good way of arranging the services.
  • Easy identification of information.
  • We don't get all the information about the particular event.
  • User needs to get acquainted with the UI for easy use.
Consider a scenario where a user is accessing some information on a website which is infected with adware or coinminer. With the help of Skyhigh, we are able to determine the time at which the user has accessed the site. Using other tools, we can check the exact site which he/she visited when the event was generated and advise the user to not visit such sites or create a blacklist.
  • Reduction of high risks.
  • Allowed to set up policies.
Mitchell Greenfield | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
SkyHigh is a CASB solution that spans shadow IT all the way into API level control of sanctioned Apps. SkyHigh also allows us to integrate CASB controls into custom apps or cloud software that don't have native controls.
  • Great visibility into cloud apps
  • Understanding of unsanctioned services
  • Control of sanctioned services
  • Interface is split between 2 generations of look and feel
Skyhigh is great for an organization that is invested in office 365, box, etc and would like to apply the same controls across all the environments.
  • Allowed us to gain understanding of use of unsanctioned services and sanctioned services in use
  • Allowed us to implement DLP controls across many different cloud services
We felt like when we looked at at Netskope, Skyhigh had the most complete vision. They also have custom apps which I am not aware of other services being able to do
Return to navigation