Introducing G2.ai, the future of software buying.Try now

Best Network Access Control Software for Medium-Sized Businesses

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Products classified in the overall Network Access Control (NAC) category are similar in many regards and help companies of all sizes solve their business problems. However, medium-sized business features, pricing, setup, and installation differ from businesses of other sizes, which is why we match buyers to the right Medium-Sized Business Network Access Control (NAC) to fit their needs. Compare product ratings based on reviews from enterprise users or connect with one of G2's buying advisors to find the right solutions within the Medium-Sized Business Network Access Control (NAC) category.

In addition to qualifying for inclusion in the Network Access Control Software category, to qualify for inclusion in the Medium-Sized Business Network Access Control Software category, a product must have at least 10 reviews left by a reviewer from a medium-sized business.

Show More
Show Less

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Network Access Control (NAC) Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
1 filter applied
Clear All
13 Listings in Network Access Control (NAC) Available
(91)4.7 out of 5
2nd Easiest To Use in Network Access Control (NAC) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SecureW2 is a cloud-native authentication solution designed to enhance security by eliminating credential compromise through its innovative JoinNow Platform. This platform combines Dynamic Public Key

    Users
    No information available
    Industries
    • Primary/Secondary Education
    • Computer Software
    Market Segment
    • 53% Mid-Market
    • 43% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SecureW2 JoinNow Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    23
    Ease of Use
    18
    Security
    18
    Setup Ease
    18
    Authentication
    15
    Cons
    Performance Issues
    13
    Expensive
    7
    Difficult Learning Curve
    6
    Poor Documentation
    6
    Difficult Configuration
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SecureW2 JoinNow features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 8.9
    9.6
    Security
    Average: 9.1
    9.3
    Data Protection
    Average: 9.0
    8.4
    Processes
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SecureW2
    Company Website
    Year Founded
    2014
    HQ Location
    Seattle, US
    Twitter
    @SecureW2
    86 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    115 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SecureW2 is a cloud-native authentication solution designed to enhance security by eliminating credential compromise through its innovative JoinNow Platform. This platform combines Dynamic Public Key

Users
No information available
Industries
  • Primary/Secondary Education
  • Computer Software
Market Segment
  • 53% Mid-Market
  • 43% Enterprise
SecureW2 JoinNow Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
23
Ease of Use
18
Security
18
Setup Ease
18
Authentication
15
Cons
Performance Issues
13
Expensive
7
Difficult Learning Curve
6
Poor Documentation
6
Difficult Configuration
5
SecureW2 JoinNow features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 8.9
9.6
Security
Average: 9.1
9.3
Data Protection
Average: 9.0
8.4
Processes
Average: 8.9
Seller Details
Seller
SecureW2
Company Website
Year Founded
2014
HQ Location
Seattle, US
Twitter
@SecureW2
86 Twitter followers
LinkedIn® Page
www.linkedin.com
115 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A seamless path from device and user discovery, wired and wireless access control, attack detection and adaptive response, based on set policies

    Users
    • Network Engineer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 48% Mid-Market
    • 45% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Aruba ClearPass Access Control and Policy Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Alert Notifications
    1
    Dashboard Usability
    1
    Intuitive
    1
    Management Ease
    1
    Cons
    Insufficient Training
    2
    Performance Issues
    2
    Complexity
    1
    Limited Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Aruba ClearPass Access Control and Policy Management features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 8.9
    9.4
    Security
    Average: 9.1
    8.8
    Data Protection
    Average: 9.0
    9.0
    Processes
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Santa Clara, California
    LinkedIn® Page
    www.linkedin.com
    5,219 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A seamless path from device and user discovery, wired and wireless access control, attack detection and adaptive response, based on set policies

Users
  • Network Engineer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 48% Mid-Market
  • 45% Enterprise
Aruba ClearPass Access Control and Policy Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Alert Notifications
1
Dashboard Usability
1
Intuitive
1
Management Ease
1
Cons
Insufficient Training
2
Performance Issues
2
Complexity
1
Limited Features
1
Aruba ClearPass Access Control and Policy Management features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 8.9
9.4
Security
Average: 9.1
8.8
Data Protection
Average: 9.0
9.0
Processes
Average: 8.9
Seller Details
HQ Location
Santa Clara, California
LinkedIn® Page
www.linkedin.com
5,219 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(50)4.5 out of 5
9th Easiest To Use in Network Access Control (NAC) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Gain awareness of everything hitting your network. Provide access consistently and efficiently. Relieve the stress of complex access management.

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 54% Enterprise
    • 36% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cisco Identity Services Engine (ISE) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    1
    Easy Integrations
    1
    Integrations
    1
    Monitoring
    1
    Cons
    Expensive
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco Identity Services Engine (ISE) features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 8.9
    9.2
    Security
    Average: 9.1
    8.9
    Data Protection
    Average: 9.0
    8.7
    Processes
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    721,809 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,148 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Gain awareness of everything hitting your network. Provide access consistently and efficiently. Relieve the stress of complex access management.

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 54% Enterprise
  • 36% Mid-Market
Cisco Identity Services Engine (ISE) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
1
Easy Integrations
1
Integrations
1
Monitoring
1
Cons
Expensive
1
Cisco Identity Services Engine (ISE) features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 8.9
9.2
Security
Average: 9.1
8.9
Data Protection
Average: 9.0
8.7
Processes
Average: 8.9
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
721,809 Twitter followers
LinkedIn® Page
www.linkedin.com
95,148 employees on LinkedIn®
Ownership
NASDAQ:CSCO
(94)4.4 out of 5
Optimized for quick response
8th Easiest To Use in Network Access Control (NAC) software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Portnox offers cloud-native zero trust access control and cybersecurity essentials that enable agile, resource-constrained IT teams to proactively address today’s most pressing security challenges: th

    Users
    • Network Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 41% Enterprise
    • 36% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Portnox Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    16
    Customer Support
    11
    Implementation Ease
    11
    Integrations
    9
    Setup Ease
    9
    Cons
    Performance Issues
    9
    Connection Issues
    5
    Software Bugs
    5
    Difficult Learning
    4
    Expensive
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Portnox features and usability ratings that predict user satisfaction
    8.7
    Has the product been a good partner in doing business?
    Average: 8.9
    9.1
    Security
    Average: 9.1
    8.2
    Data Protection
    Average: 9.0
    7.8
    Processes
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Portnox
    Company Website
    Year Founded
    2007
    HQ Location
    Austin, Texas
    Twitter
    @portnox
    829 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    100 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Portnox offers cloud-native zero trust access control and cybersecurity essentials that enable agile, resource-constrained IT teams to proactively address today’s most pressing security challenges: th

Users
  • Network Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 41% Enterprise
  • 36% Mid-Market
Portnox Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
16
Customer Support
11
Implementation Ease
11
Integrations
9
Setup Ease
9
Cons
Performance Issues
9
Connection Issues
5
Software Bugs
5
Difficult Learning
4
Expensive
4
Portnox features and usability ratings that predict user satisfaction
8.7
Has the product been a good partner in doing business?
Average: 8.9
9.1
Security
Average: 9.1
8.2
Data Protection
Average: 9.0
7.8
Processes
Average: 8.9
Seller Details
Seller
Portnox
Company Website
Year Founded
2007
HQ Location
Austin, Texas
Twitter
@portnox
829 Twitter followers
LinkedIn® Page
www.linkedin.com
100 employees on LinkedIn®
(41)4.8 out of 5
5th Easiest To Use in Network Access Control (NAC) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Foxpass Cloud RADIUS by Splashtop is a fully managed, cloud-hosted RADIUS authentication service designed to provide secure, passwordless access to Wi-Fi networks, VPNs, and various network infrastruc

    Users
    No information available
    Industries
    • Internet
    • Computer Software
    Market Segment
    • 66% Mid-Market
    • 24% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Foxpass by Splashtop Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    3
    Implementation Ease
    3
    Performance Efficiency
    3
    Reliability
    3
    Setup Ease
    3
    Cons
    Expensive
    1
    Limited OS Compatibility
    1
    Poor Navigation
    1
    UX Improvement
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Foxpass by Splashtop features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 8.9
    9.3
    Security
    Average: 9.1
    9.0
    Data Protection
    Average: 9.0
    7.6
    Processes
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2006
    HQ Location
    Cupertino, CA
    Twitter
    @splashtop
    5,233 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    335 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Foxpass Cloud RADIUS by Splashtop is a fully managed, cloud-hosted RADIUS authentication service designed to provide secure, passwordless access to Wi-Fi networks, VPNs, and various network infrastruc

Users
No information available
Industries
  • Internet
  • Computer Software
Market Segment
  • 66% Mid-Market
  • 24% Small-Business
Foxpass by Splashtop Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
3
Implementation Ease
3
Performance Efficiency
3
Reliability
3
Setup Ease
3
Cons
Expensive
1
Limited OS Compatibility
1
Poor Navigation
1
UX Improvement
1
Foxpass by Splashtop features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 8.9
9.3
Security
Average: 9.1
9.0
Data Protection
Average: 9.0
7.6
Processes
Average: 8.9
Seller Details
Company Website
Year Founded
2006
HQ Location
Cupertino, CA
Twitter
@splashtop
5,233 Twitter followers
LinkedIn® Page
www.linkedin.com
335 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    FortiNAC provides the network visibility to see everything connected to the network, as well as the ability to control those devices and users, including dynamic, automated responses.

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 55% Mid-Market
    • 35% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FortiNAC features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 8.9
    8.6
    Security
    Average: 9.1
    8.8
    Data Protection
    Average: 9.0
    8.6
    Processes
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortinet
    Year Founded
    2000
    HQ Location
    Sunnyvale, CA
    Twitter
    @Fortinet
    151,435 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    15,738 employees on LinkedIn®
    Ownership
    NASDAQ: FTNT
Product Description
How are these determined?Information
This description is provided by the seller.

FortiNAC provides the network visibility to see everything connected to the network, as well as the ability to control those devices and users, including dynamic, automated responses.

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 55% Mid-Market
  • 35% Enterprise
FortiNAC features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 8.9
8.6
Security
Average: 9.1
8.8
Data Protection
Average: 9.0
8.6
Processes
Average: 8.9
Seller Details
Seller
Fortinet
Year Founded
2000
HQ Location
Sunnyvale, CA
Twitter
@Fortinet
151,435 Twitter followers
LinkedIn® Page
www.linkedin.com
15,738 employees on LinkedIn®
Ownership
NASDAQ: FTNT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Go beyond traditional physical security technology. Maximize operational flexibility with our 100% serverless cloud-based solution, enabling fully remote management of your entire physical security sy

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 56% Mid-Market
    • 35% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Avigilon Alta Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Customer Support
    2
    Implementation Ease
    2
    Installation Ease
    2
    Reliability
    2
    Cons
    Performance Issues
    2
    Expensive
    1
    Outdated Technology
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Avigilon Alta features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 8.9
    9.7
    Security
    Average: 9.1
    8.0
    Data Protection
    Average: 9.0
    9.3
    Processes
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Avigilon
    Year Founded
    2004
    HQ Location
    Vancouver, BC
    Twitter
    @Avigilon
    8,134 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    403 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Go beyond traditional physical security technology. Maximize operational flexibility with our 100% serverless cloud-based solution, enabling fully remote management of your entire physical security sy

Users
No information available
Industries
No information available
Market Segment
  • 56% Mid-Market
  • 35% Small-Business
Avigilon Alta Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Customer Support
2
Implementation Ease
2
Installation Ease
2
Reliability
2
Cons
Performance Issues
2
Expensive
1
Outdated Technology
1
Avigilon Alta features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 8.9
9.7
Security
Average: 9.1
8.0
Data Protection
Average: 9.0
9.3
Processes
Average: 8.9
Seller Details
Seller
Avigilon
Year Founded
2004
HQ Location
Vancouver, BC
Twitter
@Avigilon
8,134 Twitter followers
LinkedIn® Page
www.linkedin.com
403 employees on LinkedIn®
(94)4.4 out of 5
Optimized for quick response
10th Easiest To Use in Network Access Control (NAC) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Genea Security is a cloud-native access control solution designed to provide IT and security teams with comprehensive oversight of access activities across global enterprises or building portfolios. T

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 60% Mid-Market
    • 21% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Genea is an access control solution that simplifies management and monitoring through a cloud-based platform.
    • Users frequently mention the ease of use, the ability to control mobile access from a computer, the user-friendly interface, and the efficient chat support that helps overcome initial installation hurdles.
    • Users mentioned issues with the software design when setting up holidays, the need to pay extra for Apple Watch key use, the loss of elevator control during transition, and the inability to edit the date and time when programming doors.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Genea Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    6
    Remote Access
    4
    Access
    3
    Simple
    3
    Access Control
    2
    Cons
    Performance Issues
    6
    Limited Features
    3
    Poor Customer Support
    2
    Access Issues
    1
    Communication Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Genea Security features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 8.9
    9.3
    Security
    Average: 9.1
    8.9
    Data Protection
    Average: 9.0
    8.8
    Processes
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Genea
    Company Website
    Year Founded
    2006
    HQ Location
    Irvine, CA
    Twitter
    @GetGenea
    780 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    186 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Genea Security is a cloud-native access control solution designed to provide IT and security teams with comprehensive oversight of access activities across global enterprises or building portfolios. T

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 60% Mid-Market
  • 21% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Genea is an access control solution that simplifies management and monitoring through a cloud-based platform.
  • Users frequently mention the ease of use, the ability to control mobile access from a computer, the user-friendly interface, and the efficient chat support that helps overcome initial installation hurdles.
  • Users mentioned issues with the software design when setting up holidays, the need to pay extra for Apple Watch key use, the loss of elevator control during transition, and the inability to edit the date and time when programming doors.
Genea Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
6
Remote Access
4
Access
3
Simple
3
Access Control
2
Cons
Performance Issues
6
Limited Features
3
Poor Customer Support
2
Access Issues
1
Communication Issues
1
Genea Security features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 8.9
9.3
Security
Average: 9.1
8.9
Data Protection
Average: 9.0
8.8
Processes
Average: 8.9
Seller Details
Seller
Genea
Company Website
Year Founded
2006
HQ Location
Irvine, CA
Twitter
@GetGenea
780 Twitter followers
LinkedIn® Page
www.linkedin.com
186 employees on LinkedIn®
(54)4.4 out of 5
11th Easiest To Use in Network Access Control (NAC) software
View top Consulting Services for Google Cloud Identity-Aware Proxy
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Use identity to guard access for applications deployed on GCP

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 44% Small-Business
    • 30% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Google Cloud Identity-Aware Proxy features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 8.9
    9.2
    Security
    Average: 9.1
    9.1
    Data Protection
    Average: 9.0
    8.6
    Processes
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Google
    Year Founded
    1998
    HQ Location
    Mountain View, CA
    Twitter
    @google
    31,524,859 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    325,307 employees on LinkedIn®
    Ownership
    NASDAQ:GOOG
Product Description
How are these determined?Information
This description is provided by the seller.

Use identity to guard access for applications deployed on GCP

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 44% Small-Business
  • 30% Enterprise
Google Cloud Identity-Aware Proxy features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 8.9
9.2
Security
Average: 9.1
9.1
Data Protection
Average: 9.0
8.6
Processes
Average: 8.9
Seller Details
Seller
Google
Year Founded
1998
HQ Location
Mountain View, CA
Twitter
@google
31,524,859 Twitter followers
LinkedIn® Page
www.linkedin.com
325,307 employees on LinkedIn®
Ownership
NASDAQ:GOOG
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AWS Resource Access Manager is a service that enables you to securely share your AWS resources across multiple AWS accounts or within your AWS Organization. By allowing centralized creation and manage

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 38% Enterprise
    • 38% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AWS Resource Access Manager (RAM) features and usability ratings that predict user satisfaction
    8.7
    Has the product been a good partner in doing business?
    Average: 8.9
    9.6
    Security
    Average: 9.1
    9.1
    Data Protection
    Average: 9.0
    9.1
    Processes
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2006
    HQ Location
    Seattle, WA
    Twitter
    @awscloud
    2,218,302 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    143,584 employees on LinkedIn®
    Ownership
    NASDAQ: AMZN
Product Description
How are these determined?Information
This description is provided by the seller.

AWS Resource Access Manager is a service that enables you to securely share your AWS resources across multiple AWS accounts or within your AWS Organization. By allowing centralized creation and manage

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 38% Enterprise
  • 38% Mid-Market
AWS Resource Access Manager (RAM) features and usability ratings that predict user satisfaction
8.7
Has the product been a good partner in doing business?
Average: 8.9
9.6
Security
Average: 9.1
9.1
Data Protection
Average: 9.0
9.1
Processes
Average: 8.9
Seller Details
Year Founded
2006
HQ Location
Seattle, WA
Twitter
@awscloud
2,218,302 Twitter followers
LinkedIn® Page
www.linkedin.com
143,584 employees on LinkedIn®
Ownership
NASDAQ: AMZN
(74)4.7 out of 5
Optimized for quick response
7th Easiest To Use in Network Access Control (NAC) software
Save to My Lists
Entry Level Price:Starting at $5.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Twingate is a secure remote access solution for an organization’s private applications, data, and environments, whether they are on-premise or in the cloud. Built to make the lives of DevOps teams, IT

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 51% Mid-Market
    • 43% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Twingate Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    9
    Security
    9
    Secure Access
    7
    Access Management
    6
    Easy Setup
    6
    Cons
    Performance Issues
    10
    Limited Customization
    5
    Complex Implementation
    4
    Complex Configuration
    3
    Lacking Features
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Twingate features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 8.9
    9.3
    Security
    Average: 9.1
    9.0
    Data Protection
    Average: 9.0
    8.5
    Processes
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    HQ Location
    Redwood City, California
    Twitter
    @TwingateHQ
    2,336 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    75 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Twingate is a secure remote access solution for an organization’s private applications, data, and environments, whether they are on-premise or in the cloud. Built to make the lives of DevOps teams, IT

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 51% Mid-Market
  • 43% Small-Business
Twingate Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
9
Security
9
Secure Access
7
Access Management
6
Easy Setup
6
Cons
Performance Issues
10
Limited Customization
5
Complex Implementation
4
Complex Configuration
3
Lacking Features
3
Twingate features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 8.9
9.3
Security
Average: 9.1
9.0
Data Protection
Average: 9.0
8.5
Processes
Average: 8.9
Seller Details
Company Website
HQ Location
Redwood City, California
Twitter
@TwingateHQ
2,336 Twitter followers
LinkedIn® Page
www.linkedin.com
75 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SonicWall Secure Mobile Access (SMA) is a unified secure access gateway that enables organization to provide anytime, anywhere and any device access to any application. SMA’s granular access control p

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 55% Mid-Market
    • 24% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SonicWall Secure Mobile Access features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 8.9
    9.6
    Security
    Average: 9.1
    9.8
    Data Protection
    Average: 9.0
    9.6
    Processes
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SonicWall
    Year Founded
    1991
    HQ Location
    Milpitas, CA
    Twitter
    @SonicWall
    29,415 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,987 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SonicWall Secure Mobile Access (SMA) is a unified secure access gateway that enables organization to provide anytime, anywhere and any device access to any application. SMA’s granular access control p

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 55% Mid-Market
  • 24% Enterprise
SonicWall Secure Mobile Access features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 8.9
9.6
Security
Average: 9.1
9.8
Data Protection
Average: 9.0
9.6
Processes
Average: 8.9
Seller Details
Seller
SonicWall
Year Founded
1991
HQ Location
Milpitas, CA
Twitter
@SonicWall
29,415 Twitter followers
LinkedIn® Page
www.linkedin.com
1,987 employees on LinkedIn®
(26)4.8 out of 5
4th Easiest To Use in Network Access Control (NAC) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    threatER is the leading preemptive cybersecurity platform for building and maintaining trust at scale. Our SaaS solution continuously learns from all available data, allowing you to gain better insigh

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 62% Mid-Market
    • 27% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • threatER features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 8.9
    9.7
    Security
    Average: 9.1
    9.7
    Data Protection
    Average: 9.0
    8.8
    Processes
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    threatER
    HQ Location
    Tysons, Virginia
    LinkedIn® Page
    www.linkedin.com
    26 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

threatER is the leading preemptive cybersecurity platform for building and maintaining trust at scale. Our SaaS solution continuously learns from all available data, allowing you to gain better insigh

Users
No information available
Industries
No information available
Market Segment
  • 62% Mid-Market
  • 27% Enterprise
threatER features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 8.9
9.7
Security
Average: 9.1
9.7
Data Protection
Average: 9.0
8.8
Processes
Average: 8.9
Seller Details
Seller
threatER
HQ Location
Tysons, Virginia
LinkedIn® Page
www.linkedin.com
26 employees on LinkedIn®