With the continuous shift to cloud service and deployment models in the enterprise technology space, tech professionals are placing more of a focus on cloud security. Deep visibility, a comprehensive suite of security features, and ensuring real-time compliance are cited as important criteria to consider when evaluating cloud security solutions.According to enterprise users on the reviews site IT Central Station, top cloud security solutions in the market include Evident.io, Cisco CloudLock, Dome9, Netskope, Skyhigh, CloudPassage and Bitglass.Here, IT Central Station users share their experiences with using these solutions, describing which features they find valuable and where they see room for improvement.Evident.ioHigh points"It allows me to see what's happening in our AWS account. I have several, so this is a nice, single pane, point of view for me whenever I have to make sure that configurations are as secure as possible."\u2014 SrManage0c6e, a senior manager of information security at a software R&D company\u201cThis enables us to clean up our existing AWS accounts and to update our processes for new accounts. This improves our overall security process to an acceptable level. We are building out new AWS accounts that are secured from the beginning instead of fixing problems as they are detected. This ensures that everything is consistent and secure from the beginning.\u201d \u2014\u00a0Supervisa81a, an architecture & infrastructure platform delivery supervisor at a recruiting\/HR firmRoom for improvement\u201cI would like to see integration of PCI audits into the dashboard. That would help greatly in passing our PCI audits for AWS in an easy-to-view method.I would also like the ability to integrate Evident with AWS in such a way that we could make basic changes to the AWS environments based on security alerts. For example, the ability to lock down unsecured security groups, apply PW policies, and rotate IAM keys.\u201d \u2014 ITSecuribe99, an IT Security Professional at a comms service providerRead more Evident.io user reviews.Cisco CloudLockHigh points\u201cIt is a good CASB solution for protection of collaboration of content. The in-built features are apt to deal with SBU\/ITAR data. Data shared with external parties has been significantly controlled. This CASB solution eliminated unauthorized risk of accessing data in our organization.\u201d \u2014 Principal658, a Principal at a tech companyRoom for improvement\u201cThe issues with CloudLock are mostly for Google to address. Google is all about trusting users, which is a nightmare for an administrator. It allows any user to intentionally or accidentally give a random third party full access to a Google account. As long as this issue exists, CloudLock or any other product is only a band-aid solution. It can only work reactively, and not stop the incident from occurring.\u201d \u2014 ITSecSpecialist789, an IT security specialist at a financial services firmRead more Cisco CloudLock user reviews.Dome9High points\u201cWe have been able to empower our development team to work with the infrastructure in a managed, foolproof way to insure testing and other efforts don't leave unintended holes.\u201d \u2014 Eric H., President at a tech services companyRoom for improvement\u201cThe governance and compliance areas are becoming very useful, and continue to expand in very user-friendly ways. Addressing the large amount of compliance information and benchmarks we need to observe, the tools are becoming our go-to dashboards.\u201d \u2014 Eric H.NetskopeHigh points\u201cThe most valuable feature for us is the 360-degree visibility it provides. Now I have the ability to see what\u2019s coming and going in the organization from a cloud application perspective. I can see uptimes and I can assess risk to them based on things that are important to us and not just the industry.\u201d \u2014 Craig G., a Chief Security Officer at a healthcare companyRoom for improvement\u201cI would like for the product to have very clear visibility with regards to what SaaS is being used actively versus what SaaS is being accessed from a passive user.\u201d \u2014 Sujeet B., Enterprise Security Architect at a tech vendorSkyhighHigh points\u201cOur organization is moving much of its non-sensitive data to Box and we needed the ability to have full visibility into what was occurring within the Box infrastructure. With the Skyhigh to Box API integration, we can not only see everything that occurs but we can setup many DLP policies to block or monitor what is occurring in Box. You can also run a custom DLP query against your Box infrastructure to look for specific DLP issues that may have been created since the older data was loaded.\u201d \u2014 CyberSecurity33, aCyber Security Engineer at a recruiting\/HR firm\u201cWe now have a good conscious [sic] about using Cloud services. Without an overview, you can only imagine what is going on. With monitoring, analysis and threat prevention, we know exactly what is going on and can prevent activity that we deem unacceptable or creates unnecessary risk. We have a much better overview of where our data is, both in terms of which service, but also in terms of geographical location.\u201d \u2014 Lasse M. J., Solutions Architect at Credocom A\/SRoom for improvement\u201cThe Skyhigh for Google Drive interface and policy engine is a bit confusing and limited when compared against other Google Drive CASB capabilities.\u201d \u2014\u00a0Spencer J., Cyber Security Analyst at a tech services companyRead more Skyhigh user reviews\u00a0CloudPassageHigh points\u201cPolicies are very easy to manage on a day-to-day basis. With a few clicks in their cloud management portal, you can implement and change security policies in thousands of servers. This feature allowed us to implement changes in our environment much faster.\u201d \u2014 Alysson A., an Information Security Analyst at a transportation companyRoom for improvement\u201cThe reports and graphs are not intuitive. Also, there is no feature or CloudPassage tool that facilitates the implementation of the agents. We had to use third-party software to implement and update the agents.\u201d \u2014 Alysson A.BitglassHigh points\u201cIt allows a window into who is sharing what types of data internally and externally. It allows us to know where sensitive data is really stored and offers the ability to quarantine based on data types and sharing criteria.\u201d \u2014 SharedInfoSec438, aShared Information Security Officer at a universityRoom for improvement\u201cThe cloud-based portal tends to get slow as the number of events increase. There is room for improvement in regards to reporting and having simpler policy creation.\u201d \u2014 SharedInfoSec438To learn more from what real users have to say about other leading solutions in the market, read additional cloud security reviews by IT Central Station users.More on cloud securityTop cloud security controls you should be using12 cloud security threatsWho's responsible for cloud security?