TrustRadius: an HG Insights company

Skyhigh Secure Web Gateway

Score8 out of 10

20 Reviews and Ratings

What is Skyhigh Secure Web Gateway?

Skyhigh Secure Web Gateway (replacing the former McAfee Web Gateway) is presented by the vendor as high-performance on-premises web security, that can be deployed as dedicated hardware or a virtual machine. With it, users can enforce internet-use policies, analyze the nature and intent of content and active code entering the network, and use DLP technology to scan outbound traffic.

Categories & Use Cases

Skyhigh Secure Web Gateway is a great tool for web inspection traffic

Use Cases and Deployment Scope

Web traffic inspection and CASB protection. Also block of personal tenants for email, file share services and cloud services. We use the client proxy and the web filtering on-prem gateway to control the different use cases for our own needs. It give us the ability to do SSL inspection for computers using the SCP.

Pros

  • Web inspection
  • SSL inspection
  • CASB implemtation
  • Tenant restrictions
  • Cloud sanction and unsaction apps

Cons

  • Support response
  • Better pricing
  • Best practices guides

Return on Investment

  • Unify SASE solutions
  • SaaS based
  • Single client

Usability

Alternatives Considered

Zscaler Internet Access

Other Software Used

Zscaler Internet Access, CrowdStrike Falcon, IBM Security QRadar SIEM

McAfee Web Gateway- Industry best Secure Web Gateway.....

Pros

  • Unified Architecture
  • Reporting
  • Hybrid Deployment
  • SSL Inspection

Cons

  • Customer Support
  • Documentation not available
  • Higher Cost

Most Important Features

  • SSL traffic inspection
  • DLP
  • Anti- Malware

Return on Investment

  • Inbound and outbound both traffic protection
  • URL/ Content filtering
  • Protection available for both inside/outside office users
  • Sometimes slowness is faced by users

Alternatives Considered

Sophos Secure Web Gateway

Other Software Used

Forcepoint Web Security, Check Point Harmony Endpoint Security (formerly Sandblast Agent), FireEye Helix

Decent Proxy solution

Use Cases and Deployment Scope

We use it as our Webproxy to prorect the surf traffic from malware and integrate it with a third party threat emulation solution. We chose it, since we used to use the precssor product Webwasher and the competitors were not so much better to decide for a migration to a totally new product.

Pros

  • Performance

Cons

  • UI
  • Malware detection
  • reporting

Return on Investment

  • Performance
  • Security
  • Visibility

Alternatives Considered

Cisco Secure Web Appliance

Other Software Used

CheckPoint, Lastline

An excellent security tool

Pros

  • Great malware protection.
  • Excellent sandboxing.
  • Great URL filtering.
  • Very good pre-defined policies.

Cons

  • Excellent high-performance web security.
  • Incredibly efficient application finding any threat.
  • The ransomware simulator does a pretty good job.
  • Email protection, malware, spyware, DDOS, BOT-ing, website filtering, spam filtering, and much more.

Return on Investment

  • Risk management
  • Improve compliance
  • Assure information security

Other Software Used

Check Point Next Generation Firewall, Trend Micro Integrated Data Loss Prevention, Citrix Gateway (formerly NetScaler Unified Gateway)

McAfee Web Gateway

Pros

  • Very flexible rule configuration for tiered access. With AD integration, easily allow Internet access based on groups.
  • SSL inspection of web content. URL categories can be exempted from inspection such as financial or health.
  • Customizable block pages. Allows you to place your policy statement on the block page as well as explanations for why a page is blocked.

Cons

  • Sometimes rule tracing is difficult to pinpoint errors.
  • HTML interface is in early stages. Both Java and HTML are available.

Return on Investment

  • An effective tool in enforcing Internet policies.
  • Adds a necessary layer of Internet security over and above UTM Firewall offerings.

Alternatives Considered

Cisco IronPort Web Security Appliance

Other Software Used

SafeNet Authentication Service (SAS), FortiSwitch Secure Access Switches, Fortinet FortiGate, Cisco ASA, McAfee Enterprise Security Manager, Trend Micro Deep Security, Trend Micro InterScan Messaging Security