Making the cloud more secure with Skyhigh
February 12, 2018

Making the cloud more secure with Skyhigh

Anonymous | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User

Overall Satisfaction with Skyhigh Cloud Access Security Broker

We use Skyhigh Cloud Access Security to monitor the users in our environment. With the decent UI and simple dashboards, we are able to determine what applications and websites the users are accessing. We can easily find if a user has accessed a malicious site or downloaded an unapproved application. With this information, we check the logs using other tools and know if it was a one time event or a regular one. This helped us to mitigate much of the risks that could have happened otherwise.
  • It has a very clear and simple dashboard.
  • Good way of arranging the services.
  • Easy identification of information.
  • We don't get all the information about the particular event.
  • User needs to get acquainted with the UI for easy use.
  • Reduction of high risks.
  • Allowed to set up policies.
Consider a scenario where a user is accessing some information on a website which is infected with adware or coinminer. With the help of Skyhigh, we are able to determine the time at which the user has accessed the site. Using other tools, we can check the exact site which he/she visited when the event was generated and advise the user to not visit such sites or create a blacklist.