2023
Find the best software for anything and everything you want to accomplish, as decided by software buyers on the world’s largest and most trusted software marketplace. Based on honest reviews and ratings from our G2 users this year, this list features the top software products found on G2.
1
Wiz
Cloud Security Posture Management (CSPM)
Wiz is a CNAPP that consolidates CSPM, KSPM, CWPP, vulnerability management, IaC scanning, CIEM, DSPM, and container and Kubernetes security into a single platform.
Reviews
Categories
G2 Awards
Best Security Products 2023
Best Products for Mid-Market 2023
Best Software Products 2023
Best Products for Enterprise 2023
Highest Satisfaction Products 2023
Grid Leader Cloud Security Winter 2024
Momentum Leader Cloud Compliance Winter 2024
Grid Leader Cloud Compliance Winter 2024
Relationship Leader Cloud Detection and Response (CDR) Winter 2024
2
Okta
Identity and Access Management (IAM)
Okta is The World’s Identity Company™. As the leading independent Identity partner, we free everyone to safely use any technology — anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core
Okta is The World’s Identity Company™. As the leading independent Identity partner, we free everyone to safely use any technology — anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core
Reviews
Categories
G2 Awards
Best Security Products 2023
Best Products for Enterprise 2023
Best Software Products 2023
Implementation Leader Zero Trust Networking Winter 2024
Europe Leader Single Sign-On (SSO) Winter 2024
EMEA Leader Single Sign-On (SSO) Winter 2024
Europe Leader User Provisioning and Governance Tools Winter 2024
Grid Leader Zero Trust Networking Winter 2024
3
JumpCloud
Cloud Directory Services
The JumpCloud Directory Platform reimagines the directory as a complete platform for identity, access, and device management.
The JumpCloud Directory Platform reimagines the directory as a complete platform for identity, access, and device management.
Reviews
Categories
G2 Awards
Best Security Products 2023
Highest Satisfaction Products 2023
Relationship Leader Mobile Device Management (MDM) Winter 2024
Grid Leader Mobile Device Management (MDM) Winter 2024
India Leader Mobile Device Management (MDM) Winter 2024
Asia Pacific Leader Unified Endpoint Management (UEM) Winter 2024
EMEA Leader User Provisioning and Governance Tools Winter 2024
EMEA Leader Unified Endpoint Management (UEM) Winter 2024
Asia Leader Unified Endpoint Management (UEM) Winter 2024
4
IBM QRadar SIEM
Sicherheitsinformations- und Ereignismanagement (SIEM)
IBM QRadar ist darauf ausgelegt, Protokolle, Ereignisse, Netzwerkflüsse und Benutzerverhalten in Ihrem gesamten Unternehmen zu sammeln, diese mit Bedrohungsinformationen und Schwachstellendaten zu korrelieren, um bekannte Bedrohungen zu erkennen, und fortschrittliche Analysen anzuwenden, um Anomalie
IBM QRadar ist darauf ausgelegt, Protokolle, Ereignisse, Netzwerkflüsse und Benutzerverhalten in Ihrem gesamten Unternehmen zu sammeln, diese mit Bedrohungsinformationen und Schwachstellendaten zu korrelieren, um bekannte Bedrohungen zu erkennen, und fortschrittliche Analysen anzuwenden, um Anomalie
G2 Auszeichnungen
Best Security Products 2023
Grid Leader Netzwerkverkehrsanalyse (NTA) Winter 2024
Grid Leader Benutzer- und Entity-Verhaltensanalyse (UEBA) Winter 2024
Grid Leader Digitale Forensik Winter 2024
Usability Leader Sicherheitsinformations- und Ereignismanagement (SIEM) Winter 2024
Asien Leader Netzwerkverkehrsanalyse (NTA) Winter 2024
5
CrowdStrike Falcon Endpoint Protection Platform
Endpoint Protection Platforms
CrowdStrike Falcon endpoint protection unifies the technologies required to successfully stop breaches: next-generation antivirus, endpoint detection and response, IT hygiene, 24/7 threat hunting and threat intelligence. They combine to provide continuous breach prevention in a single agent.
CrowdStrike Falcon endpoint protection unifies the technologies required to successfully stop breaches: next-generation antivirus, endpoint detection and response, IT hygiene, 24/7 threat hunting and threat intelligence. They combine to provide continuous breach prevention in a single agent.
Reviews
Categories
G2 Awards
Best Security Products 2023
Usability Leader Endpoint Detection & Response (EDR) Winter 2024
Results Leader Endpoint Detection & Response (EDR) Winter 2024
Results Leader Antivirus Winter 2024
Usability Leader Threat Intelligence Winter 2024
Usability Leader Antivirus Winter 2024
Grid Leader Threat Intelligence Winter 2024
Relationship Leader Threat Intelligence Winter 2024
6
Microsoft Entra ID
Identity and Access Management (IAM)
Entra ID is a comprehensive identity and access management cloud solution that provides a robust set of capabilities to manage users and groups and help secure access to applications including Microsoft online services like Office 365 and a world of non-Microsoft SaaS applications.
Entra ID is a comprehensive identity and access management cloud solution that provides a robust set of capabilities to manage users and groups and help secure access to applications including Microsoft online services like Office 365 and a world of non-Microsoft SaaS applications.
Reviews
Categories
G2 Awards
Best Security Products 2023
Asia Pacific Leader Multi-Factor Authentication (MFA) Winter 2024
Asia Leader Multi-Factor Authentication (MFA) Winter 2024
India Leader Multi-Factor Authentication (MFA) Winter 2024
Asia Leader Privileged Access Management (PAM) Winter 2024
EMEA Leader Multi-Factor Authentication (MFA) Winter 2024
Europe Leader Multi-Factor Authentication (MFA) Winter 2024
7

Hybrid Cloud Security
Cloud Workload Protection Platforms

Hybrid Cloud Security solution, powered by XGen security, delivers a blend of cross-generational threat defense techniques that have been optimized to protect physical, virtual, and cloud workloads.
Hybrid Cloud Security solution, powered by XGen security, delivers a blend of cross-generational threat defense techniques that have been optimized to protect physical, virtual, and cloud workloads.
Reviews
Categories
G2 Awards
Best Security Products 2023
Best Products for Enterprise 2023
Grid Leader Intrusion Detection and Prevention Systems (IDPS) Winter 2024
India Leader Cloud Workload Protection Platforms Winter 2024
Grid Leader Cloud Data Security Winter 2024
Asia Leader Intrusion Detection and Prevention Systems (IDPS) Winter 2024
Asia Pacific Leader Intrusion Detection and Prevention Systems (IDPS) Winter 2024
Asia Leader Cloud Workload Protection Platforms Winter 2024
8
LastPass
Passwortmanager
LastPass Businesslösungen helfen Teams und Unternehmen, die Kontrolle über ihr Identitätsmanagement mit Passwortverwaltung, Single Sign-On (SSO) und adaptiver Multifaktor-Authentifizierung (MFA) zu übernehmen.
LastPass Businesslösungen helfen Teams und Unternehmen, die Kontrolle über ihr Identitätsmanagement mit Passwortverwaltung, Single Sign-On (SSO) und adaptiver Multifaktor-Authentifizierung (MFA) zu übernehmen.
Reviews
Kategorien
G2 Auszeichnungen
Best Security Products 2023
Grid Leader Passwortmanager Winter 2024
Implementation Leader Mehrfaktor-Authentifizierung (MFA) Winter 2024
Implementation Leader Einmalanmeldung (SSO) Winter 2024
Usability Leader Dark-Web-Überwachung Winter 2024
Momentum Leader Dark-Web-Überwachung Winter 2024
Results Leader Passwortlose Authentifizierung Winter 2024
9
Sysdig Secure
Containersicherheit
Sysdig hilft Sicherheits- und Entwicklungsteams, Bedrohungen sofort zu verhindern, zu erkennen und darauf zu reagieren. Gegründet von den Schöpfern von Falco und Wireshark, bietet Sysdig Echtzeit-Cloud-Abwehr, die auf der kompromisslosen Wahrheit der Laufzeit basiert. Angetrieben von agentischer KI
Sysdig hilft Sicherheits- und Entwicklungsteams, Bedrohungen sofort zu verhindern, zu erkennen und darauf zu reagieren. Gegründet von den Schöpfern von Falco und Wireshark, bietet Sysdig Echtzeit-Cloud-Abwehr, die auf der kompromisslosen Wahrheit der Laufzeit basiert. Angetrieben von agentischer KI
Reviews
Kategorien
G2 Auszeichnungen
Best Security Products 2023
Results Leader Cloud-Sicherheitsüberwachung und -Analytik Winter 2024
Grid High performer Cloud-Sicherheitsüberwachung und -Analytik Winter 2024
Usability Leader Verwundbarkeitsscanner Winter 2024
Grid Leader Containersicherheit Winter 2024
Usability Leader Cloud-Sicherheitsstatus-Management (CSPM) Winter 2024
Momentum Leader Cloud-Workload-Schutzplattformen Winter 2024
10
Avanan Cloud Email Security
Cloud-E-Mail-Sicherheit
AVANAN schützt Ihre Daten in der Cloud mit derselben branchenführenden Sicherheit, der Sie in Ihrem Rechenzentrum vertrauen. Die cloudbasierte Plattform ist vollständig out-of-band, erfordert keinen Proxy und kann in nur 10 Minuten bereitgestellt werden.
AVANAN schützt Ihre Daten in der Cloud mit derselben branchenführenden Sicherheit, der Sie in Ihrem Rechenzentrum vertrauen. Die cloudbasierte Plattform ist vollständig out-of-band, erfordert keinen Proxy und kann in nur 10 Minuten bereitgestellt werden.
Kategorien
G2 Auszeichnungen
Best Security Products 2023
Relationship Leader Intelligenter E-Mail-Schutz Winter 2024
Results Leader Intelligenter E-Mail-Schutz Winter 2024
Implementation Leader Cloud-Dateisicherheit Winter 2024
Results Leader Cloud-Dateisicherheit Winter 2024
Implementation Leader Intelligenter E-Mail-Schutz Winter 2024
Results Leader Cloud-E-Mail-Sicherheit Winter 2024
Results Leader E-Mail-Verschlüsselung Winter 2024
11
GitLab
Version Control Hosting
Reviews
Categories
G2 Awards
Best Development Products 2023
Best Security Products 2023
Best Products for Enterprise 2023
Best Products for Small Business 2023
Best Software Products 2023
Canada Leader Continuous Delivery Winter 2024
Europe Leader Continuous Delivery Winter 2024
Asia Pacific Leader Continuous Delivery Winter 2024
EMEA Leader Continuous Integration Winter 2024
12

IBM Verify CIAM
Identity and Access Management (IAM)

Provides identity-as-a-service (IDaaS) for every user, including single sign-on (SSO), risk-based multi-factor authentication (MFA), adaptive access, user lifecycle management, and identity analytics
Provides identity-as-a-service (IDaaS) for every user, including single sign-on (SSO), risk-based multi-factor authentication (MFA), adaptive access, user lifecycle management, and identity analytics
Reviews
Categories
G2 Awards
Best Security Products 2023
Grid Leader Risk-Based Authentication (RBA) Winter 2024
Americas Leader Customer Identity and Access Management (CIAM) Winter 2024
Grid Leader Consent Management Platform (CMP) Winter 2024
Americas Leader Identity and Access Management (IAM) Winter 2024
Americas Leader Multi-Factor Authentication (MFA) Winter 2024
Americas Leader Passwordless Authentication Winter 2024
13
Rippling
Core HR
Reviews
Categories
G2 Awards
Best HR Products 2023
Best Products for Mid-Market 2023
Best Security Products 2023
Best Products for Small Business 2023
Best Software Products 2023
Highest Satisfaction Products 2023
Usability Leader Payroll Winter 2024
Usability Leader Multi-Country Payroll Winter 2024
Usability Leader Time Tracking Winter 2024
14
Virtru Email Encryption
Email Encryption
Virtru puts you in charge of how your digital information is shared. Combining control, convenience, and simplicity, Virtru makes it easy to keep your private communications private.
Virtru puts you in charge of how your digital information is shared. Combining control, convenience, and simplicity, Virtru makes it easy to keep your private communications private.
Reviews
Categories
G2 Awards
Best Security Products 2023
Grid Leader Email Encryption Winter 2024
Grid High performer HIPAA Compliant Messaging Winter 2024
Grid High performer Data-Centric Security Winter 2024
Grid Leader Secure Email Gateway Winter 2024
Implementation Leader Encryption Key Management Winter 2024
15
BetterCloud
SaaS Management Platforms (SMP)
BetterCloud provides critical insights, automated management, and intelligent data security for cloud office platforms.
BetterCloud provides critical insights, automated management, and intelligent data security for cloud office platforms.
Reviews
Categories
G2 Awards
Best Security Products 2023
Best Products for Enterprise 2023
Best IT Management Products 2023
Implementation Leader SaaS Spend Management Winter 2024
Grid Leader Data Loss Prevention (DLP) Winter 2024
Grid Leader SaaS Management Platforms (SMP) Winter 2024
16

Snyk
Software Composition Analysis
Reviews
Categories
G2 Awards
Best Security Products 2023
Best Products for Small Business 2023
Fastest Growing Products 2023
Grid Leader Container Security Winter 2024
Relationship Leader Static Application Security Testing (SAST) Winter 2024
Grid Leader Vulnerability Scanner Winter 2024
Europe Leader Static Application Security Testing (SAST) Winter 2024
Momentum Leader Static Application Security Testing (SAST) Winter 2024
17
Coro Cybersecurity
Cloud Data Security
Monitors your cloud applications for data leaks, cyber-threats and regulatory violations that put your business at risk.
Monitors your cloud applications for data leaks, cyber-threats and regulatory violations that put your business at risk.
Reviews
Categories
G2 Awards
Best Security Products 2023
Fastest Growing Products 2023
Relationship Leader Cloud File Security Winter 2024
Grid Leader Insider Threat Management (ITM) Winter 2024
Relationship Leader Insider Threat Management (ITM) Winter 2024
Implementation Leader Malware Analysis Tools Winter 2024
Implementation Leader Cloud Security Monitoring and Analytics Winter 2024
Relationship Leader Cloud Security Monitoring and Analytics Winter 2024
18
Datadog
Enterprise Monitoring
Datadog is a monitoring service for IT, Dev and Ops teams who write and run applications at scale, and want to turn the massive amounts of data produced by their apps, tools and services into actionable insight.
Datadog is a monitoring service for IT, Dev and Ops teams who write and run applications at scale, and want to turn the massive amounts of data produced by their apps, tools and services into actionable insight.
Reviews
Categories
G2 Awards
Best IT Infrastructure Products 2023
Best Security Products 2023
Best Products for Enterprise 2023
Best Development Products 2023
Best Software Products 2023
India Leader Log Monitoring Winter 2024
Asia Leader Log Monitoring Winter 2024
Momentum Leader Log Monitoring Winter 2024
Grid Leader Log Monitoring Winter 2024
19
Sophos Endpoint
Endpoint Protection Platforms
Sophos Intercept X is the world’s most comprehensive endpoint protection solution. Built to stop the widest range of attacks, Intercept X has been proven to prevent even the most advanced ransomware and malware by leveraging a unique combination of next-generation techniques. This includes the abili
Sophos Intercept X is the world’s most comprehensive endpoint protection solution. Built to stop the widest range of attacks, Intercept X has been proven to prevent even the most advanced ransomware and malware by leveraging a unique combination of next-generation techniques. This includes the abili
Reviews
Categories
G2 Awards
Best Security Products 2023
Best Global Sellers 2023
Best UK Sellers 2023
EMEA Leader Endpoint Detection & Response (EDR) Winter 2024
Usability Leader Extended Detection and Response (XDR) Platforms Winter 2024
Best EMEA Sellers 2023
Results Leader Extended Detection and Response (XDR) Platforms Winter 2024
Europe Leader Antivirus Winter 2024
20
ESET PROTECT
Endpoint Protection Platforms
ESET PROTECT is a cutting-edge cybersecurity platform that leverages the latest in AI, state-of-the-art technologies, and human expertise to safeguard your organization from emerging threats and zero-day attacks. As a cloud-first XDR solution, it integrates unique threat intelligence to deliver next
ESET PROTECT is a cutting-edge cybersecurity platform that leverages the latest in AI, state-of-the-art technologies, and human expertise to safeguard your organization from emerging threats and zero-day attacks. As a cloud-first XDR solution, it integrates unique threat intelligence to deliver next
Reviews
Categories
G2 Awards
Best Security Products 2023
Momentum Leader Network Sandboxing Winter 2024
Latin America Leader Antivirus Winter 2024
Implementation Leader Encryption Winter 2024
Results Leader Mobile Data Security Winter 2024
Relationship Leader Network Sandboxing Winter 2024
Relationship Leader Encryption Winter 2024
Grid Leader Antivirus Winter 2024
21
WSO2 Identity Server
Identity and Access Management (IAM)
WSO2 Identity Server, part of WSO2’s CIAM suite, is the market’s leading open-source CIAM solution. It provides modern identity and access management capabilities that can be easily built into your organization’s customer experience (CX) mobile apps or websites, or even deployed to fulfill workforce
WSO2 Identity Server, part of WSO2’s CIAM suite, is the market’s leading open-source CIAM solution. It provides modern identity and access management capabilities that can be easily built into your organization’s customer experience (CX) mobile apps or websites, or even deployed to fulfill workforce
Reviews
Categories
G2 Awards
Best Security Products 2023
Grid Leader Risk-Based Authentication (RBA) Winter 2024
Relationship Leader Risk-Based Authentication (RBA) Winter 2024
EMEA Leader Customer Identity and Access Management (CIAM) Winter 2024
Grid High performer Customer Identity and Access Management (CIAM) Winter 2024
Usability Leader Risk-Based Authentication (RBA) Winter 2024
Asia Pacific Leader Consent Management Platform (CMP) Winter 2024
Europe High performer Customer Identity and Access Management (CIAM) Winter 2024
22
Proofpoint Core Email Protection
Secure Email Gateway
Proofpoint Core Email Protection stops malware and non-malware threats such as impostor email.
Reviews
Categories
G2 Awards
Best Security Products 2023
Momentum Leader Secure Email Gateway Winter 2024
Momentum Leader Email Encryption Winter 2024
Grid Leader Intelligent Email Protection Winter 2024
Momentum Leader Intelligent Email Protection Winter 2024
Grid Leader Secure Email Gateway Winter 2024
23
Intruder
Vulnerability Scanner
Intruder is a proactive security monitoring platform for internet-facing systems.
Reviews
Categories
G2 Awards
Best Global Sellers 2023
Best Security Products 2023
Results Leader Dynamic Application Security Testing (DAST) Winter 2024
Best UK Sellers 2023
Results Leader Penetration Testing Winter 2024
Results Leader Vulnerability Scanner Winter 2024
Relationship Leader Vulnerability Scanner Winter 2024
Implementation Leader API Security Winter 2024
Results Leader API Security Winter 2024
24
Citrix Workspace
Zero Trust Networking
Citrix Workspace Essentials provides a comprehensive, zero-trust approach to deliver secure and contextual access to corporate internal web apps, SaaS, and virtual applications. With Citrix Workspace Essentials, IT can consolidate traditional security products such as VPN, single-sign on, multi-f
Citrix Workspace Essentials provides a comprehensive, zero-trust approach to deliver secure and contextual access to corporate internal web apps, SaaS, and virtual applications. With Citrix Workspace Essentials, IT can consolidate traditional security products such as VPN, single-sign on, multi-f
Reviews
Categories
G2 Awards
Best Security Products 2023
Momentum Leader Cloud Access Security Broker (CASB) Winter 2024
Grid Leader Cloud Access Security Broker (CASB) Winter 2024
Grid Leader Single Sign-On (SSO) Winter 2024
India High performer Single Sign-On (SSO) Winter 2024
Asia High performer Single Sign-On (SSO) Winter 2024
Grid Leader Cloud Access Security Broker (CASB) Fall 2023
25
Cisco Duo
Zero Trust Networking
Duo is a cloud-based access security platform built to protect access to any application, from any device. Duo’s passwordless authentication, single sign-on (SSO) and user-friendly multi-factor authentication make secure logins easy for users, reducing friction to their workflow.
Reviews
Categories
G2 Awards
Best Security Products 2023
Usability Leader Multi-Factor Authentication (MFA) Winter 2024
Usability Leader Risk-Based Authentication (RBA) Winter 2024
Usability Leader Cloud Security Winter 2024
Grid Leader Passwordless Authentication Winter 2024
Usability Leader Passwordless Authentication Winter 2024
26
Frontegg
Customer Identity and Access Management (CIAM)
Frontegg is a platform for SaaS companies, offering out-of-the-box Enterprise-Readiness products for very quick integration as features into an existing SaaS web application. Frontegg components are all customer-facing and include the UI, backend, and Data layers. The feature-set includes Granular
Frontegg is a platform for SaaS companies, offering out-of-the-box Enterprise-Readiness products for very quick integration as features into an existing SaaS web application. Frontegg components are all customer-facing and include the UI, backend, and Data layers. The feature-set includes Granular
Reviews
G2 Awards
Best Security Products 2023
Implementation Leader Low-Code Development Platforms Winter 2024
Usability Leader Customer Identity and Access Management (CIAM) Winter 2024
Results Leader Identity and Access Management (IAM) Winter 2024
Results Leader Multi-Factor Authentication (MFA) Winter 2024
Usability Leader Identity and Access Management (IAM) Winter 2024
27
FortiGate-VM NGFW
Firewall Software
FortiGate offers a network security platform, designed to deliver threat protection and performance with reduced complexity.
FortiGate offers a network security platform, designed to deliver threat protection and performance with reduced complexity.
Reviews
Categories
G2 Awards
Best Security Products 2023
Grid Leader Data Center Security Solutions Winter 2024
Grid Leader Unified Threat Management (UTM) Winter 2024
Usability Leader Threat Intelligence Winter 2024
Grid Leader Threat Intelligence Winter 2024
Momentum Leader Unified Threat Management (UTM) Winter 2024
28

GitHub
Version Control Hosting
GitHub is the best place to share code with friends, co-workers, classmates, and complete strangers. Over two million people use GitHub to build amazing things together.
Reviews
Categories
G2 Awards
Best Development Products 2023
Best Security Products 2023
EMEA Leader DevOps Platforms Winter 2024
Grid Leader Secure Code Review Winter 2024
Implementation Leader Software Composition Analysis Winter 2024
29
Fortra VM
Risk-Based Vulnerability Management
Fortra VM, a Frontline.Cloud™ system, is the industry’s most comprehensive, accurate, and easy-to-use SaaS vulnerability management solution—bar none. Using our proprietary scanning technology, our vulnerability management solution performs comprehensive security assessments and helps prioritize and
Fortra VM, a Frontline.Cloud™ system, is the industry’s most comprehensive, accurate, and easy-to-use SaaS vulnerability management solution—bar none. Using our proprietary scanning technology, our vulnerability management solution performs comprehensive security assessments and helps prioritize and
Reviews
Categories
G2 Awards
Best Security Products 2023
Usability Leader Risk-Based Vulnerability Management Winter 2024
Implementation Leader Risk-Based Vulnerability Management Winter 2024
Grid Leader Risk-Based Vulnerability Management Winter 2024
Momentum Leader Risk-Based Vulnerability Management Winter 2024
Grid High performer Risk-Based Vulnerability Management Winter 2024
Momentum Leader Vulnerability Scanner Winter 2024
Implementation Leader Vulnerability Scanner Winter 2024
30
Absolute Secure Access
Zero Trust Networking
Absolute Secure Access delivers modern remote access for highly mobile workforces without sacrificing productivity. It provides reliable network connectivity for users to securely access critical resources in the public cloud, private data centers, or on-premises -- even in challenging environments.
Absolute Secure Access delivers modern remote access for highly mobile workforces without sacrificing productivity. It provides reliable network connectivity for users to securely access critical resources in the public cloud, private data centers, or on-premises -- even in challenging environments.
Reviews
Categories
G2 Awards
Best Security Products 2023
Relationship Leader Business VPN Winter 2024
Usability Leader Business VPN Winter 2024
Implementation Leader Business VPN Winter 2024
Relationship Leader Zero Trust Networking Winter 2024
Momentum Leader Software-Defined Perimeter (SDP) Winter 2024
Grid Leader Business VPN Winter 2024
31

Uniqkey
Password Managers

Uniqkey is an all-in-one platform designed to protect companies against the increasing cyber threat with innovative password & identity management. With excellent end-user experience, easy implementation, and military-grade offline security we provide maximum security while empowering your workforce
Uniqkey is an all-in-one platform designed to protect companies against the increasing cyber threat with innovative password & identity management. With excellent end-user experience, easy implementation, and military-grade offline security we provide maximum security while empowering your workforce
Reviews
Categories
G2 Awards
Best Security Products 2023
Relationship Leader Password Managers Winter 2024
Momentum Leader Risk-Based Authentication (RBA) Winter 2024
Relationship Leader User Provisioning and Governance Tools Winter 2024
Results Leader Multi-Factor Authentication (MFA) Winter 2024
EMEA High performer Multi-Factor Authentication (MFA) Winter 2024
Europe High performer Multi-Factor Authentication (MFA) Winter 2024
Grid High performer User Provisioning and Governance Tools Winter 2024
32

Tufin Orchestration Suite
Network Security Policy Management (NSPM)

Tufin Network Security Policy Management (NSPM) e automates and accelerates network configuration changes while maintaining security and compliance.
Tufin Network Security Policy Management (NSPM) e automates and accelerates network configuration changes while maintaining security and compliance.
Reviews
G2 Awards
Best Security Products 2023
Relationship Leader Network Security Policy Management (NSPM) Winter 2024
Grid Leader Network Security Policy Management (NSPM) Winter 2024
Grid High performer Network Security Policy Management (NSPM) Winter 2024
Asia High performer Network Security Policy Management (NSPM) Winter 2024
Asia Pacific High performer Network Security Policy Management (NSPM) Winter 2024
Grid High performer Cloud Security Winter 2024
Grid Leader Network Security Policy Management (NSPM) Fall 2023
33
Webroot Business Endpoint Protection
Endpoint Protection Platforms
Webroot SecureAnywhere Business Endpoint Protection offers a revolutionary approach to malware protection.
Webroot SecureAnywhere Business Endpoint Protection offers a revolutionary approach to malware protection.
Reviews
Categories
G2 Awards
Best Security Products 2023
Usability Leader Endpoint Protection Platforms Winter 2024
EMEA Leader Endpoint Protection Platforms Winter 2024
Usability Leader Antivirus Winter 2024
Results Leader Antivirus Winter 2024
Implementation Leader Endpoint Protection Platforms Winter 2024
34
Tenable Security Center
Risk-Based Vulnerability Management
Tenable, Inc. is the Cyber Exposure company that provides solutions on reducing cyber risk
Reviews
Categories
G2 Awards
Best Security Products 2023
Implementation Leader Risk-Based Vulnerability Management Winter 2024
Asia Leader Risk-Based Vulnerability Management Winter 2024
Asia Pacific Leader Risk-Based Vulnerability Management Winter 2024
Grid Leader Risk-Based Vulnerability Management Winter 2024
Usability Leader Vulnerability Scanner Winter 2024
Grid Leader Vulnerability Scanner Winter 2024
Implementation Leader Risk-Based Vulnerability Management Fall 2023
Asia Leader Risk-Based Vulnerability Management Fall 2023
35
Vanta
Security Compliance
It was clear that security and privacy had become mainstream issues, and that we all increasingly relied on cloud services to store everything from our personal photos to our communications at work. Vanta’s mission is to be the layer of trust on top of these services, and to secure the internet, inc
It was clear that security and privacy had become mainstream issues, and that we all increasingly relied on cloud services to store everything from our personal photos to our communications at work. Vanta’s mission is to be the layer of trust on top of these services, and to secure the internet, inc
Reviews
Categories
G2 Awards
Best Products for Small Business 2023
Fastest Growing Products 2023
Best Security Products 2023
Best Software Products 2023
Best Products for Mid-Market 2023
Europe Leader Security Compliance Winter 2024
EMEA Leader Security Compliance Winter 2024
36
WatchGuard Network Security
Unified Threat Management (UTM)
WatchGuard has deployed nearly a million integrated, multi-function threat management appliances worldwide. Our signature red boxes are architected to be the industry's smartest, fastest, and meanest security devices with every scanning engine running at full throttle.
WatchGuard has deployed nearly a million integrated, multi-function threat management appliances worldwide. Our signature red boxes are architected to be the industry's smartest, fastest, and meanest security devices with every scanning engine running at full throttle.
Reviews
Categories
G2 Awards
Best Security Products 2023
Momentum Leader Unified Threat Management (UTM) Winter 2024
Results Leader Unified Threat Management (UTM) Winter 2024
Grid Leader Unified Threat Management (UTM) Winter 2024
Usability Leader Unified Threat Management (UTM) Winter 2024
Usability Leader Encryption Winter 2024
37
nOps
Cloud Cost Management
nOps is cloud management for AWS: Resource & cost optimization, security & compliance, monitor infrastructure changes, automation & workflows.
Reviews
Categories
G2 Awards
Best Security Products 2023
Grid Leader Cloud Cost Management Winter 2024
Relationship Leader Cloud Cost Management Winter 2024
Asia Leader Cloud Cost Management Winter 2024
India Leader Cloud Cost Management Winter 2024
Momentum Leader Cloud Cost Management Winter 2024
Asia Pacific Leader Cloud Cost Management Winter 2024
Momentum Leader Cloud Management Platforms Winter 2024
Asia High performer Cloud Management Platforms Winter 2024
38
Valimail
DMARC
Valimail is the only solution that automates the path to DMARC enforcement from start to finish, providing rapid, ongoing protection against fraudulent use of your domains.
Valimail is the only solution that automates the path to DMARC enforcement from start to finish, providing rapid, ongoing protection against fraudulent use of your domains.
Reviews
Categories
G2 Awards
Best Security Products 2023
Momentum Leader DMARC Winter 2024
Grid Leader DMARC Winter 2024
Grid High performer Email Verification Winter 2024
39
Drata
Cloud Compliance
Drata is the world's most advanced security and compliance automation platform with the mission to help businesses earn and keep the trust of their users, customers, partners, and prospects. With Drata, thousands of companies streamline risk management and over 12 compliance frameworks—such as SOC 2
Drata is the world's most advanced security and compliance automation platform with the mission to help businesses earn and keep the trust of their users, customers, partners, and prospects. With Drata, thousands of companies streamline risk management and over 12 compliance frameworks—such as SOC 2
Reviews
Categories
G2 Awards
Fastest Growing Products 2023
Best Products for Small Business 2023
Best Security Products 2023
Best Products for Mid-Market 2023
Best Software Products 2023
Highest Satisfaction Products 2023
Grid Leader Vendor Security and Privacy Assessment Winter 2024
Asia Leader Vendor Security and Privacy Assessment Winter 2024
EMEA Leader Security Compliance Winter 2024
40
Tenable Vulnerability Management
Risk-Based Vulnerability Management
Tenable.io is the only cybersecurity company that empowers customers to gain control of their risk by knowing and prioritizing vulnerabilities across their entire attack surface including traditional, cloud, mobile and DevOps environments.
Tenable.io is the only cybersecurity company that empowers customers to gain control of their risk by knowing and prioritizing vulnerabilities across their entire attack surface including traditional, cloud, mobile and DevOps environments.
Reviews
Categories
G2 Awards
Best Security Products 2023
Usability Leader Risk-Based Vulnerability Management Winter 2024
Implementation Leader Risk-Based Vulnerability Management Winter 2024
Grid Leader Risk-Based Vulnerability Management Winter 2024
Grid Leader Vulnerability Scanner Winter 2024
India Leader Risk-Based Vulnerability Management Winter 2024
Usability Leader Vulnerability Scanner Winter 2024
41

FireEye Security Suite
Endpoint Protection Platforms
42
FortiClient
Endpoint Protection Platforms
FortiClient Fabric Agent integrates endpoints into the Security Fabric and provides endpoint telemetry, including user identity, protection status, risk scores, unpatched vulnerabilities, security events, and more.
FortiClient Fabric Agent integrates endpoints into the Security Fabric and provides endpoint telemetry, including user identity, protection status, risk scores, unpatched vulnerabilities, security events, and more.
Reviews
Categories
G2 Awards
Best Security Products 2023
Latin America Leader Antivirus Winter 2024
Asia Pacific Leader Endpoint Protection Platforms Winter 2024
Asia Leader Endpoint Protection Platforms Winter 2024
India Leader Endpoint Protection Platforms Winter 2024
Grid Leader Endpoint Protection Platforms Winter 2024
Implementation Leader Antivirus Winter 2024
Grid Leader Endpoint Management Winter 2024
43
Check Point CloudGuard Harmony Connect (CloudGuard Connect)
Cloud-Edge-Sicherheit
Check Point Harmony Connect definiert SASE neu, indem es den Zugriff auf Unternehmensanwendungen, SaaS und das Internet für jeden Benutzer oder jede Niederlassung von jedem Gerät aus erleichtert, ohne die Sicherheit zu beeinträchtigen. Harmony Connect ist ein cloud-nativer Dienst, der entwickelt wur
Check Point Harmony Connect definiert SASE neu, indem es den Zugriff auf Unternehmensanwendungen, SaaS und das Internet für jeden Benutzer oder jede Niederlassung von jedem Gerät aus erleichtert, ohne die Sicherheit zu beeinträchtigen. Harmony Connect ist ein cloud-nativer Dienst, der entwickelt wur
Kategorien
G2 Auszeichnungen
Best Security Products 2023
Grid Leader Cloud-Edge-Sicherheit Winter 2024
44
Check Point Harmony Endpoint
Endpoint Protection Platforms
Check Point Endpoint Security combines data security, network security, threat prevention technologies and remote access VPN into one package for complete Windows and Mac OS X protection.
Check Point Endpoint Security combines data security, network security, threat prevention technologies and remote access VPN into one package for complete Windows and Mac OS X protection.
Reviews
Categories
G2 Awards
Best Security Products 2023
Momentum Leader Antivirus Winter 2024
EMEA High performer Endpoint Protection Platforms Winter 2024
EMEA Leader Antivirus Winter 2024
Europe High performer Endpoint Protection Platforms Winter 2024
Grid Leader Endpoint Protection Platforms Winter 2024
Results Leader Endpoint Protection Platforms Winter 2024
45
Acronis Cyber Protect Cloud
Cloud-Datensicherheit
Modernisieren Sie die Sicherheit und das Backup Ihrer Kunden mit integrierter Cyber-Sicherheit.
Reviews
Kategorien
G2 Auszeichnungen
Best Products for Small Business 2023
Best EMEA Sellers 2023
Best IT Management Products 2023
Best Software Products 2023
Best Security Products 2023
Highest Satisfaction Products 2023
Nahost & Afrika Leader Server-Backup Winter 2024
EMEA Leader Server-Backup Winter 2024
Asien-Pazifik Leader SaaS-Backup Winter 2024
EMEA Leader Cloud-Sicherheit Winter 2024
46
Thoropass
Cloud-Compliance
Thoropass ist eine All-in-One-Plattform zur Automatisierung von Compliance, die den gesamten Compliance- und Audit-Prozess durch die Integration fortschrittlicher Technologie mit fachkundiger Anleitung optimiert. Thoropass wurde entwickelt, um die Komplexität traditioneller Compliance-Methoden zu be
Thoropass ist eine All-in-One-Plattform zur Automatisierung von Compliance, die den gesamten Compliance- und Audit-Prozess durch die Integration fortschrittlicher Technologie mit fachkundiger Anleitung optimiert. Thoropass wurde entwickelt, um die Komplexität traditioneller Compliance-Methoden zu be
Reviews
Kategorien
G2 Auszeichnungen
Best Security Products 2023
Highest Satisfaction Products 2023
Results Leader Audit-Management Winter 2024
Relationship Leader Audit-Management Winter 2024
Usability Leader Audit-Management Winter 2024
Implementation Leader Audit-Management Winter 2024
47
KnowBe4 PhishER/PhishER Plus
Incident Response
KnowBe4 PhishER is the key ingredient of an essential security workstream. It's your lightweight Security Orchestration, Automation and Response (SOAR) platform to orchestrate your threat response and manage the high volume of potentially malicious email messages reported by your users. And, with a
KnowBe4 PhishER is the key ingredient of an essential security workstream. It's your lightweight Security Orchestration, Automation and Response (SOAR) platform to orchestrate your threat response and manage the high volume of potentially malicious email messages reported by your users. And, with a
Reviews
Categories
G2 Awards
Best Security Products 2023
Implementation Leader Incident Response Winter 2024
Relationship Leader Incident Response Winter 2024
Usability Leader Security Orchestration, Automation, and Response (SOAR) Winter 2024
Results Leader Security Orchestration, Automation, and Response (SOAR) Winter 2024
Relationship Leader Security Orchestration, Automation, and Response (SOAR) Winter 2024
48
Tresorit
Cloud Content Collaboration
Tresorit provides an end-to-end encrypted productivity solution for ultra-secure collaboration including managing, storing, syncing, and transferring files.
Tresorit provides an end-to-end encrypted productivity solution for ultra-secure collaboration including managing, storing, syncing, and transferring files.
Reviews
Categories
G2 Awards
Best Security Products 2023
Best EMEA Sellers 2023
Grid Leader Encryption Winter 2024
Results Leader Encryption Winter 2024
Relationship Leader Cloud File Security Winter 2024
Implementation Leader Cloud File Security Winter 2024
Grid Leader Cloud File Security Winter 2024
Usability Leader Encryption Winter 2024
49
NinjaOne
Endpoint Management
NinjaOne unifies IT to simplify work for 35,000+ customers in 140+ countries. The NinjaOne Unified IT Operations Platform delivers endpoint management, autonomous patching, backup, and remote access in a single console to improve efficiency, increase resilience, and reduce spend. Intelligent automat
NinjaOne unifies IT to simplify work for 35,000+ customers in 140+ countries. The NinjaOne Unified IT Operations Platform delivers endpoint management, autonomous patching, backup, and remote access in a single console to improve efficiency, increase resilience, and reduce spend. Intelligent automat
Reviews
Categories
G2 Awards
Best IT Management Products 2023
Best Security Products 2023
Grid Leader Network Monitoring Winter 2024
Grid Leader Remote Monitoring & Management (RMM) Winter 2024
Grid Leader Endpoint Management Winter 2024
Implementation Leader Online Backup Winter 2024
Results Leader Unified Endpoint Management (UEM) Winter 2024
EMEA Leader Network Monitoring Winter 2024
50
Tenable Nessus
Vulnerability Scanner
From the beginning, we've worked hand-in-hand with the security community. We continuously optimize Nessus based on community feedback to make it the most accurate and comprehensive vulnerability assessment solution in the market. 20 years later and we're still laser focused on community collaborati
From the beginning, we've worked hand-in-hand with the security community. We continuously optimize Nessus based on community feedback to make it the most accurate and comprehensive vulnerability assessment solution in the market. 20 years later and we're still laser focused on community collaborati
Reviews
Categories
G2 Awards
Best Security Products 2023
Best Products for Small Business 2023
Grid Leader Vulnerability Scanner Winter 2024
Usability Leader Vulnerability Scanner Winter 2024
Asia Pacific Leader Vulnerability Scanner Winter 2024
India Leader Vulnerability Scanner Winter 2024
Implementation Leader Vulnerability Scanner Winter 2024
Asia Leader Vulnerability Scanner Winter 2024
What are the G2 Best Software Awards?
G2’s Annual Best Software Awards ranks the world’s best software companies and products based on authentic, timely reviews from real users.
How are the winners determined?
30 different lists are generated using G2’s proprietary algorithm based on G2’s verified user reviews and publicly available market presence data. The top 100 software companies are ranked based on a combination of Satisfaction and Market Presence scores. The top 100 products are ranked based on reviews across all categories they are a part of. Satisfaction is an aggregate score based on a company’s products across their assigned categories. More tailored company and product lists (e.g., "India Software Companies" and "Products for Small Businesses") feature a smaller set of winners at 50 appearing on each list.
Read more about the methodology used to calculate G2’s Best Software Awards here.
How many reviews does a vendor need to be eligible?
To be included in one of G2’s Best Software Sellers or Best Software Products Lists, a software company or product must receive at least 50 approved and published reviews during the 2022 calendar year. Scores reflect only data from reviews submitted during this evaluation period.
How are the Best Software Awards different from quarterly badge lists?
For G2’s annual Best Software Awards, the scores reflect reviews submitted in the evaluation period - in this case, the calendar year 2022. Other G2 reports might include more or less data which would potentially show different rankings for software companies and products. Also, broadly-defined “Other” categories such as “Other Marketing Software” and “Other IT Security Software” were excluded to ensure we were evaluating products with relevant comparative scoring.
Read more about G2’s research scoring methodologies.
Can software sellers and products win multiple awards?
Yes. A software seller and/or product has the potential to be named on multiple lists based on its eligibility and rankings.
How are reviews verified and vetted?
It is important to us at G2 to be objective and trustworthy, with reviews being thoroughly vetted. To ensure this, we require the use of a LinkedIn™ account or verified business email address to validate a G2 reviewer’s identity and current employer. We also validate reviewers by partnering with companies to securely authenticate users through select platforms. We do not allow users to leave reviews for their current employers, former employers, or competitors.
For more information on the reviews process, view G2’s community guidelines.
Were G2’s 2023 Best Software Lists researched and published using the same methodology and criteria as past years? If not, what is new?
To be more inclusive of software companies and products, in 2022, we reduced the number of vendor-level reviews per calendar year to be eligible - from 100 to 50. This criteria is being leveraged for the 2023 list as well. Being eligible of course does not guarantee inclusion on a list.
In 2023, we also added net-new lists for: