Introducing G2.ai, the future of software buying.Try now

Best Cloud Access Security Broker (CASB) Software - Page 2

Lauren Worth
LW
Researched and written by Lauren Worth

Cloud access security broker (CASB) software is used to provide a layer of protection and policy enforcement for employees accessing cloud-based software. CASB serves as a gateway through which companies can enforce their security requirements beyond on-premise and secure connections between employees and cloud service providers. Companies use CASB software to reduce risks related to cloud applications and network connections while simultaneously monitoring actions and behaviors.

CASB solutions are also used to identify abnormal behaviors from internal actors and then alert administrators of potential shadow IT and noncompliant behaviors. These tools typically monitor and record the actions taken by an individual using the CASB, who can leverage the data collected for behavioral analysis and reporting.

To qualify for inclusion in the Cloud Access Security Broker (CASB) category, a product must:

Secure connections between end users and cloud service providers
Enforce security policies beyond local networks and infrastructure
Protect data and connected devices from cloud-based threats and malware
Show More
Show Less

Best Cloud Access Security Broker (CASB) Software At A Glance

Easiest to Use:
Top Trending:
Best Free Software:
Show LessShow More
Top Trending:
Best Free Software:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Cloud Access Security Broker (CASB) Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
55 Listings in Cloud Access Security Broker (CASB) Available
(43)4.4 out of 5
6th Easiest To Use in Cloud Access Security Broker (CASB) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Trend Micro Cloud App Security delivers advanced threat and data protection for Office 365 and cloud file-sharing services.

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 42% Enterprise
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Trend Micro Cloud App Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Email Security
    1
    Security
    1
    Security Protection
    1
    Threat Protection
    1
    Cons
    Access Limitations
    1
    Limited Features
    1
    Storage Limitations
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trend Micro Cloud App Security features and usability ratings that predict user satisfaction
    8.5
    Ease of Use
    Average: 8.8
    9.1
    Anomoly Detection
    Average: 8.5
    9.4
    Cloud Gap Analytics
    Average: 8.4
    8.5
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Tokyo
    Twitter
    @trendmicro
    111,953 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,862 employees on LinkedIn®
    Ownership
    OTCMKTS:TMICY
Product Description
How are these determined?Information
This description is provided by the seller.

Trend Micro Cloud App Security delivers advanced threat and data protection for Office 365 and cloud file-sharing services.

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 42% Enterprise
  • 40% Mid-Market
Trend Micro Cloud App Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Email Security
1
Security
1
Security Protection
1
Threat Protection
1
Cons
Access Limitations
1
Limited Features
1
Storage Limitations
1
Trend Micro Cloud App Security features and usability ratings that predict user satisfaction
8.5
Ease of Use
Average: 8.8
9.1
Anomoly Detection
Average: 8.5
9.4
Cloud Gap Analytics
Average: 8.4
8.5
Cloud Registry
Average: 8.6
Seller Details
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
111,953 Twitter followers
LinkedIn® Page
www.linkedin.com
7,862 employees on LinkedIn®
Ownership
OTCMKTS:TMICY
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Proofpoint provides the only CASB to meet the needs of security people serious about cloud threats, data loss and time-to-value. We secure Microsoft 365, Google Workspace, Box, Dropbox, Slack, Service

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 64% Enterprise
    • 18% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Proofpoint Cloud App Security Broker features and usability ratings that predict user satisfaction
    9.3
    Ease of Use
    Average: 8.8
    9.4
    Anomoly Detection
    Average: 8.5
    9.4
    Cloud Gap Analytics
    Average: 8.4
    9.4
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Sunnyvale, CA
    Twitter
    @proofpoint
    31,069 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,801 employees on LinkedIn®
    Ownership
    NASDAQ: PFPT
Product Description
How are these determined?Information
This description is provided by the seller.

Proofpoint provides the only CASB to meet the needs of security people serious about cloud threats, data loss and time-to-value. We secure Microsoft 365, Google Workspace, Box, Dropbox, Slack, Service

Users
No information available
Industries
No information available
Market Segment
  • 64% Enterprise
  • 18% Mid-Market
Proofpoint Cloud App Security Broker features and usability ratings that predict user satisfaction
9.3
Ease of Use
Average: 8.8
9.4
Anomoly Detection
Average: 8.5
9.4
Cloud Gap Analytics
Average: 8.4
9.4
Cloud Registry
Average: 8.6
Seller Details
Year Founded
2002
HQ Location
Sunnyvale, CA
Twitter
@proofpoint
31,069 Twitter followers
LinkedIn® Page
www.linkedin.com
4,801 employees on LinkedIn®
Ownership
NASDAQ: PFPT

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Prisma SaaS looks directly into SaaS applications, providing full visibility into the activities of users and data while granular controls maintain policy to eliminate data exposure and threat risks.

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 35% Mid-Market
    • 35% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Prisma Saas Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    3
    Threat Detection
    3
    Cybersecurity
    2
    Data Protection
    2
    Insights
    2
    Cons
    Expensive
    2
    Limited Compatibility
    2
    Pricing Issues
    2
    Access Control
    1
    Access Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Prisma Saas Security features and usability ratings that predict user satisfaction
    8.6
    Ease of Use
    Average: 8.8
    7.9
    Anomoly Detection
    Average: 8.5
    7.4
    Cloud Gap Analytics
    Average: 8.4
    8.1
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    127,223 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    18,396 employees on LinkedIn®
    Ownership
    NYSE: PANW
Product Description
How are these determined?Information
This description is provided by the seller.

Prisma SaaS looks directly into SaaS applications, providing full visibility into the activities of users and data while granular controls maintain policy to eliminate data exposure and threat risks.

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 35% Mid-Market
  • 35% Small-Business
Prisma Saas Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
3
Threat Detection
3
Cybersecurity
2
Data Protection
2
Insights
2
Cons
Expensive
2
Limited Compatibility
2
Pricing Issues
2
Access Control
1
Access Issues
1
Prisma Saas Security features and usability ratings that predict user satisfaction
8.6
Ease of Use
Average: 8.8
7.9
Anomoly Detection
Average: 8.5
7.4
Cloud Gap Analytics
Average: 8.4
8.1
Cloud Registry
Average: 8.6
Seller Details
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
127,223 Twitter followers
LinkedIn® Page
www.linkedin.com
18,396 employees on LinkedIn®
Ownership
NYSE: PANW
(29)4.2 out of 5
11th Easiest To Use in Cloud Access Security Broker (CASB) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Avast Secure Internet Gateway is a cloud-based security solution designed to provide comprehensive, enterprise-grade network protection for small and midsize businesses and managed security service pr

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 45% Small-Business
    • 34% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Avast Secure Internet Gateway features and usability ratings that predict user satisfaction
    9.6
    Ease of Use
    Average: 8.8
    8.5
    Anomoly Detection
    Average: 8.5
    8.5
    Cloud Gap Analytics
    Average: 8.4
    9.0
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2022
    HQ Location
    Tempe, Arizona
    Twitter
    @GenDigitalInc
    4,288 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,382 employees on LinkedIn®
    Ownership
    NASDAQ: GEN
Product Description
How are these determined?Information
This description is provided by the seller.

Avast Secure Internet Gateway is a cloud-based security solution designed to provide comprehensive, enterprise-grade network protection for small and midsize businesses and managed security service pr

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 45% Small-Business
  • 34% Mid-Market
Avast Secure Internet Gateway features and usability ratings that predict user satisfaction
9.6
Ease of Use
Average: 8.8
8.5
Anomoly Detection
Average: 8.5
8.5
Cloud Gap Analytics
Average: 8.4
9.0
Cloud Registry
Average: 8.6
Seller Details
Year Founded
2022
HQ Location
Tempe, Arizona
Twitter
@GenDigitalInc
4,288 Twitter followers
LinkedIn® Page
www.linkedin.com
3,382 employees on LinkedIn®
Ownership
NASDAQ: GEN
(16)4.8 out of 5
2nd Easiest To Use in Cloud Access Security Broker (CASB) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ManagedMethods is a leading cloud application security platform for K-12 school districts, mid-market companies, and local governments. The platform provides award-winning cloud security that empowers

    Users
    No information available
    Industries
    • Education Management
    Market Segment
    • 69% Mid-Market
    • 25% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ManagedMethods features and usability ratings that predict user satisfaction
    9.2
    Ease of Use
    Average: 8.8
    8.9
    Anomoly Detection
    Average: 8.5
    9.2
    Cloud Gap Analytics
    Average: 8.4
    7.5
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Boulder, CO
    Twitter
    @managedmethods
    602 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    36 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ManagedMethods is a leading cloud application security platform for K-12 school districts, mid-market companies, and local governments. The platform provides award-winning cloud security that empowers

Users
No information available
Industries
  • Education Management
Market Segment
  • 69% Mid-Market
  • 25% Enterprise
ManagedMethods features and usability ratings that predict user satisfaction
9.2
Ease of Use
Average: 8.8
8.9
Anomoly Detection
Average: 8.5
9.2
Cloud Gap Analytics
Average: 8.4
7.5
Cloud Registry
Average: 8.6
Seller Details
Year Founded
2013
HQ Location
Boulder, CO
Twitter
@managedmethods
602 Twitter followers
LinkedIn® Page
www.linkedin.com
36 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Enterprise Application Access is a unique cloud architecture that closes all inbound firewall ports, while ensuring that only authorized users and devices have access to the internal applications they

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 38% Small-Business
    • 33% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Akamai Enterprise Application Access features and usability ratings that predict user satisfaction
    8.2
    Ease of Use
    Average: 8.8
    7.5
    Anomoly Detection
    Average: 8.5
    8.5
    Cloud Gap Analytics
    Average: 8.4
    8.8
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1998
    HQ Location
    Cambridge, MA
    Twitter
    @Akamai
    115,698 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10,286 employees on LinkedIn®
    Ownership
    NASDAQ:AKAM
Product Description
How are these determined?Information
This description is provided by the seller.

Enterprise Application Access is a unique cloud architecture that closes all inbound firewall ports, while ensuring that only authorized users and devices have access to the internal applications they

Users
No information available
Industries
No information available
Market Segment
  • 38% Small-Business
  • 33% Enterprise
Akamai Enterprise Application Access features and usability ratings that predict user satisfaction
8.2
Ease of Use
Average: 8.8
7.5
Anomoly Detection
Average: 8.5
8.5
Cloud Gap Analytics
Average: 8.4
8.8
Cloud Registry
Average: 8.6
Seller Details
Year Founded
1998
HQ Location
Cambridge, MA
Twitter
@Akamai
115,698 Twitter followers
LinkedIn® Page
www.linkedin.com
10,286 employees on LinkedIn®
Ownership
NASDAQ:AKAM
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Barracuda CloudGen Access makes it easy to simplify compliance and secure third-party access to your systems, providing Zero Trust Access to all your apps and data from any device and location. Barrac

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 53% Mid-Market
    • 37% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Barracuda CloudGen Access features and usability ratings that predict user satisfaction
    8.7
    Ease of Use
    Average: 8.8
    9.4
    Anomoly Detection
    Average: 8.5
    8.9
    Cloud Gap Analytics
    Average: 8.4
    10.0
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Barracuda
    Year Founded
    2002
    HQ Location
    Campbell, CA
    Twitter
    @Barracuda
    15,264 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,133 employees on LinkedIn®
    Ownership
    Private
Product Description
How are these determined?Information
This description is provided by the seller.

Barracuda CloudGen Access makes it easy to simplify compliance and secure third-party access to your systems, providing Zero Trust Access to all your apps and data from any device and location. Barrac

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 53% Mid-Market
  • 37% Small-Business
Barracuda CloudGen Access features and usability ratings that predict user satisfaction
8.7
Ease of Use
Average: 8.8
9.4
Anomoly Detection
Average: 8.5
8.9
Cloud Gap Analytics
Average: 8.4
10.0
Cloud Registry
Average: 8.6
Seller Details
Seller
Barracuda
Year Founded
2002
HQ Location
Campbell, CA
Twitter
@Barracuda
15,264 Twitter followers
LinkedIn® Page
www.linkedin.com
2,133 employees on LinkedIn®
Ownership
Private
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The internet is the new corporate network, leading organizations to transition to their network security to Secure Access Service Edge (SASE). However, current solutions break the user experience with

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 54% Mid-Market
    • 35% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Check Point Harmony SASE is a cloud-based solution that combines network security and secure remote access into a single platform, simplifying management and reducing the need for multiple tools.
    • Users frequently mention the seamless user experience, the integration of firewall, zero-trust access, and web security features for enhanced visibility and control, and the platform's ability to simplify connectivity for remote users while maintaining robust protection against malware and phishing.
    • Users reported that the initial learning curve can be steep, the interface sometimes requires extra clicks to access simple options, and performance can sometimes vary by region, requiring advanced knowledge for troubleshooting.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point Harmony SASE Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    22
    Secure Access
    20
    Protection
    18
    Internet Security
    13
    Ease of Use
    11
    Cons
    Complex Configuration
    15
    Complex Implementation
    14
    Complex Setup
    13
    Difficult Learning Curve
    9
    Expensive
    9
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point Harmony SASE features and usability ratings that predict user satisfaction
    9.2
    Ease of Use
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
    7.9
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    70,917 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,323 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

The internet is the new corporate network, leading organizations to transition to their network security to Secure Access Service Edge (SASE). However, current solutions break the user experience with

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 54% Mid-Market
  • 35% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Check Point Harmony SASE is a cloud-based solution that combines network security and secure remote access into a single platform, simplifying management and reducing the need for multiple tools.
  • Users frequently mention the seamless user experience, the integration of firewall, zero-trust access, and web security features for enhanced visibility and control, and the platform's ability to simplify connectivity for remote users while maintaining robust protection against malware and phishing.
  • Users reported that the initial learning curve can be steep, the interface sometimes requires extra clicks to access simple options, and performance can sometimes vary by region, requiring advanced knowledge for troubleshooting.
Check Point Harmony SASE Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
22
Secure Access
20
Protection
18
Internet Security
13
Ease of Use
11
Cons
Complex Configuration
15
Complex Implementation
14
Complex Setup
13
Difficult Learning Curve
9
Expensive
9
Check Point Harmony SASE features and usability ratings that predict user satisfaction
9.2
Ease of Use
Average: 8.8
0.0
No information available
0.0
No information available
7.9
Cloud Registry
Average: 8.6
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
70,917 Twitter followers
LinkedIn® Page
www.linkedin.com
8,323 employees on LinkedIn®
Ownership
NASDAQ:CHKP
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Skyhigh Security Service Edge portfolio goes beyond data access and focuses on data use, allowing organizations to collaborate from any device and from anywhere without sacrificing security, while

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 33% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Skyhigh Security Service Edge Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    5
    Data Security
    4
    Cloud Services
    3
    Data Protection
    3
    Easy Integrations
    3
    Cons
    Expensive
    2
    Complex Configuration
    1
    Complexity
    1
    Complex Setup
    1
    Dependency Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Skyhigh Security Service Edge features and usability ratings that predict user satisfaction
    9.0
    Ease of Use
    Average: 8.8
    6.1
    Anomoly Detection
    Average: 8.5
    6.7
    Cloud Gap Analytics
    Average: 8.4
    7.2
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2022
    HQ Location
    San Jose, CA
    Twitter
    @skyhighsecurity
    17,710 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    675 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Skyhigh Security Service Edge portfolio goes beyond data access and focuses on data use, allowing organizations to collaborate from any device and from anywhere without sacrificing security, while

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 33% Enterprise
  • 33% Mid-Market
Skyhigh Security Service Edge Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
5
Data Security
4
Cloud Services
3
Data Protection
3
Easy Integrations
3
Cons
Expensive
2
Complex Configuration
1
Complexity
1
Complex Setup
1
Dependency Issues
1
Skyhigh Security Service Edge features and usability ratings that predict user satisfaction
9.0
Ease of Use
Average: 8.8
6.1
Anomoly Detection
Average: 8.5
6.7
Cloud Gap Analytics
Average: 8.4
7.2
Cloud Registry
Average: 8.6
Seller Details
Year Founded
2022
HQ Location
San Jose, CA
Twitter
@skyhighsecurity
17,710 Twitter followers
LinkedIn® Page
www.linkedin.com
675 employees on LinkedIn®
(8)4.7 out of 5
View top Consulting Services for Nudge Security
Save to My Lists
Entry Level Price:$5.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Nudge Security continuously discovers and inventories every cloud and SaaS application your employees use at work, including shadow IT, so you can understand and manage your SaaS security posture. Nud

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 38% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Nudge Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    3
    Security
    3
    Deployment Ease
    2
    Malware Protection
    2
    Reliability
    2
    Cons
    Access Control
    1
    Limited Acceptance
    1
    Limited Features
    1
    Technical Issues
    1
    User Management
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Nudge Security features and usability ratings that predict user satisfaction
    9.3
    Ease of Use
    Average: 8.8
    8.9
    Anomoly Detection
    Average: 8.5
    8.9
    Cloud Gap Analytics
    Average: 8.4
    8.3
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2022
    HQ Location
    Austin, Texas, United States
    Twitter
    @nudge_security
    408 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    34 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Nudge Security continuously discovers and inventories every cloud and SaaS application your employees use at work, including shadow IT, so you can understand and manage your SaaS security posture. Nud

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 38% Small-Business
Nudge Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
3
Security
3
Deployment Ease
2
Malware Protection
2
Reliability
2
Cons
Access Control
1
Limited Acceptance
1
Limited Features
1
Technical Issues
1
User Management
1
Nudge Security features and usability ratings that predict user satisfaction
9.3
Ease of Use
Average: 8.8
8.9
Anomoly Detection
Average: 8.5
8.9
Cloud Gap Analytics
Average: 8.4
8.3
Cloud Registry
Average: 8.6
Seller Details
Year Founded
2022
HQ Location
Austin, Texas, United States
Twitter
@nudge_security
408 Twitter followers
LinkedIn® Page
www.linkedin.com
34 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Todyl empowers businesses of any size with a complete, end-to-end security program. The Todyl Security Platform converges SASE, SIEM, Endpoint Security, GRC, MXDR, and more into a cloud-native, singl

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 89% Small-Business
    • 11% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Todyl Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    15
    Customer Support
    12
    Features
    11
    Solutions
    8
    Easy Integrations
    7
    Cons
    Limited Features
    5
    Technical Issues
    4
    Difficult Setup
    3
    Improvements Needed
    3
    Lacking Features
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Todyl Security Platform features and usability ratings that predict user satisfaction
    8.5
    Ease of Use
    Average: 8.8
    8.3
    Anomoly Detection
    Average: 8.5
    7.9
    Cloud Gap Analytics
    Average: 8.4
    6.7
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Todyl
    Company Website
    Year Founded
    2015
    HQ Location
    Denver, CO
    LinkedIn® Page
    www.linkedin.com
    125 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Todyl empowers businesses of any size with a complete, end-to-end security program. The Todyl Security Platform converges SASE, SIEM, Endpoint Security, GRC, MXDR, and more into a cloud-native, singl

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 89% Small-Business
  • 11% Mid-Market
Todyl Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
15
Customer Support
12
Features
11
Solutions
8
Easy Integrations
7
Cons
Limited Features
5
Technical Issues
4
Difficult Setup
3
Improvements Needed
3
Lacking Features
3
Todyl Security Platform features and usability ratings that predict user satisfaction
8.5
Ease of Use
Average: 8.8
8.3
Anomoly Detection
Average: 8.5
7.9
Cloud Gap Analytics
Average: 8.4
6.7
Cloud Registry
Average: 8.6
Seller Details
Seller
Todyl
Company Website
Year Founded
2015
HQ Location
Denver, CO
LinkedIn® Page
www.linkedin.com
125 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CloudWize is a no-code Cloud Security Center of Excellence that gives you maximum cloud compliance & security. Get 360° Protection from Architecture Design to Runtime. CludWize enforces cloud reg

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CloudWize Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    7
    Ease of Use
    6
    Cloud Integration
    5
    Cloud Management
    5
    Cloud Services
    5
    Cons
    Complex Implementation
    1
    Complex Setup
    1
    Customization Difficulty
    1
    Difficult Navigation
    1
    Excessive Customization
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CloudWize features and usability ratings that predict user satisfaction
    9.0
    Ease of Use
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CloudWize
    Year Founded
    2019
    HQ Location
    Netanya, IL
    Twitter
    @cloud_wize
    96 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CloudWize is a no-code Cloud Security Center of Excellence that gives you maximum cloud compliance & security. Get 360° Protection from Architecture Design to Runtime. CludWize enforces cloud reg

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
  • 33% Mid-Market
CloudWize Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
7
Ease of Use
6
Cloud Integration
5
Cloud Management
5
Cloud Services
5
Cons
Complex Implementation
1
Complex Setup
1
Customization Difficulty
1
Difficult Navigation
1
Excessive Customization
1
CloudWize features and usability ratings that predict user satisfaction
9.0
Ease of Use
Average: 8.8
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
CloudWize
Year Founded
2019
HQ Location
Netanya, IL
Twitter
@cloud_wize
96 Twitter followers
LinkedIn® Page
www.linkedin.com
5 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Censornet Cloud Application Security (CASB) enables your business to discover, analyse, secure and manage user interaction with cloud applications. Achieve complete visibility and control with a full-

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • TrustLayer Cloud Application Security (CASB) features and usability ratings that predict user satisfaction
    9.4
    Ease of Use
    Average: 8.8
    8.3
    Anomoly Detection
    Average: 8.5
    8.3
    Cloud Gap Analytics
    Average: 8.4
    8.3
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    Basingstoke, England
    LinkedIn® Page
    www.linkedin.com
    51 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Censornet Cloud Application Security (CASB) enables your business to discover, analyse, secure and manage user interaction with cloud applications. Achieve complete visibility and control with a full-

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
TrustLayer Cloud Application Security (CASB) features and usability ratings that predict user satisfaction
9.4
Ease of Use
Average: 8.8
8.3
Anomoly Detection
Average: 8.5
8.3
Cloud Gap Analytics
Average: 8.4
8.3
Cloud Registry
Average: 8.6
Seller Details
Year Founded
2015
HQ Location
Basingstoke, England
LinkedIn® Page
www.linkedin.com
51 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    VMware VeloCloud SASE, secured by Symantec, is a comprehensive cloud-delivered Secure Access Service Edge platform that integrates VMware's leading SD-WAN technology with Symantec's advanced Security

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 38% Small-Business
    • 38% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • VeloCloud SASE features and usability ratings that predict user satisfaction
    9.1
    Ease of Use
    Average: 8.8
    10.0
    Anomoly Detection
    Average: 8.5
    10.0
    Cloud Gap Analytics
    Average: 8.4
    9.2
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2004
    HQ Location
    Santa Clara, US
    Twitter
    @arista_channels
    2,469 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,311 employees on LinkedIn®
    Ownership
    NYSE:ANET
Product Description
How are these determined?Information
This description is provided by the seller.

VMware VeloCloud SASE, secured by Symantec, is a comprehensive cloud-delivered Secure Access Service Edge platform that integrates VMware's leading SD-WAN technology with Symantec's advanced Security

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 38% Small-Business
  • 38% Mid-Market
VeloCloud SASE features and usability ratings that predict user satisfaction
9.1
Ease of Use
Average: 8.8
10.0
Anomoly Detection
Average: 8.5
10.0
Cloud Gap Analytics
Average: 8.4
9.2
Cloud Registry
Average: 8.6
Seller Details
Year Founded
2004
HQ Location
Santa Clara, US
Twitter
@arista_channels
2,469 Twitter followers
LinkedIn® Page
www.linkedin.com
5,311 employees on LinkedIn®
Ownership
NYSE:ANET
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Atmos is a modern Security Service Edge (SSE) platform powered by Axis. Atmos securely connects users to the business resources needed in order to get work done, regardless of application, device, or

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 38% Mid-Market
    • 38% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • HPE Aruba Networking SSE features and usability ratings that predict user satisfaction
    9.6
    Ease of Use
    Average: 8.8
    6.7
    Anomoly Detection
    Average: 8.5
    4.2
    Cloud Gap Analytics
    Average: 8.4
    8.3
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1939
    HQ Location
    Palo Alto, CA
    Twitter
    @HPE
    88,361 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    84,251 employees on LinkedIn®
    Ownership
    NYSE: HPQ
Product Description
How are these determined?Information
This description is provided by the seller.

Atmos is a modern Security Service Edge (SSE) platform powered by Axis. Atmos securely connects users to the business resources needed in order to get work done, regardless of application, device, or

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 38% Mid-Market
  • 38% Enterprise
HPE Aruba Networking SSE features and usability ratings that predict user satisfaction
9.6
Ease of Use
Average: 8.8
6.7
Anomoly Detection
Average: 8.5
4.2
Cloud Gap Analytics
Average: 8.4
8.3
Cloud Registry
Average: 8.6
Seller Details
Year Founded
1939
HQ Location
Palo Alto, CA
Twitter
@HPE
88,361 Twitter followers
LinkedIn® Page
www.linkedin.com
84,251 employees on LinkedIn®
Ownership
NYSE: HPQ