2026 Best Software Awards are here!See the list

Best Network Access Control Software - Page 2

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Network access control (NAC) software allows users to implement policies that control access to corporate infrastructure.

To qualify for inclusion in the Network Access Control category, a product must:

Allow users to implement policies for controlling access to their business’s infrastructure.
Enable users to protect their data from potential outside attacks.
Allow users to control access to their information from a central point.
Show More
Show Less

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
67 Listings in Network Access Control (NAC) Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Check Point Capsule Mobile Secure Workspace is a mobile security solution that establishes a secure, isolated corporate environment on personal devices, ensuring the protection of corporate data both

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 48% Enterprise
    • 29% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point Capsule Mobile Secure Workspace Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    2
    Easy Integrations
    1
    Malware Protection
    1
    Online Security
    1
    Performance Efficiency
    1
    Cons
    Performance Issues
    2
    Expensive
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point Capsule Mobile Secure Workspace features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 8.9
    8.3
    Security
    Average: 9.1
    9.2
    Data Protection
    Average: 9.0
    9.2
    Processes
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    70,997 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,356 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

Check Point Capsule Mobile Secure Workspace is a mobile security solution that establishes a secure, isolated corporate environment on personal devices, ensuring the protection of corporate data both

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 48% Enterprise
  • 29% Mid-Market
Check Point Capsule Mobile Secure Workspace Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
2
Easy Integrations
1
Malware Protection
1
Online Security
1
Performance Efficiency
1
Cons
Performance Issues
2
Expensive
1
Check Point Capsule Mobile Secure Workspace features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 8.9
8.3
Security
Average: 9.1
9.2
Data Protection
Average: 9.0
9.2
Processes
Average: 8.9
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
70,997 Twitter followers
LinkedIn® Page
www.linkedin.com
8,356 employees on LinkedIn®
Ownership
NASDAQ:CHKP
(94)4.4 out of 5
Optimized for quick response
11th Easiest To Use in Network Access Control (NAC) software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Genea Security is a cloud-native access control solution designed to provide IT and security teams with comprehensive oversight of access activities across global enterprises or building portfolios. T

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 60% Mid-Market
    • 21% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Genea is an access control solution that simplifies management and monitoring through a cloud-based platform.
    • Users frequently mention the ease of use, the ability to control mobile access from a computer, the user-friendly interface, and the efficient chat support that helps overcome initial installation hurdles.
    • Users mentioned issues with the software design when setting up holidays, the need to pay extra for Apple Watch key use, the loss of elevator control during transition, and the inability to edit the date and time when programming doors.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Genea Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    6
    Remote Access
    4
    Access
    3
    Simple
    3
    Access Control
    2
    Cons
    Performance Issues
    6
    Limited Features
    3
    Poor Customer Support
    2
    Access Issues
    1
    Communication Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Genea Security features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 8.9
    9.3
    Security
    Average: 9.1
    8.9
    Data Protection
    Average: 9.0
    8.8
    Processes
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Genea
    Company Website
    Year Founded
    2006
    HQ Location
    Irvine, CA
    Twitter
    @GetGenea
    780 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    195 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Genea Security is a cloud-native access control solution designed to provide IT and security teams with comprehensive oversight of access activities across global enterprises or building portfolios. T

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 60% Mid-Market
  • 21% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Genea is an access control solution that simplifies management and monitoring through a cloud-based platform.
  • Users frequently mention the ease of use, the ability to control mobile access from a computer, the user-friendly interface, and the efficient chat support that helps overcome initial installation hurdles.
  • Users mentioned issues with the software design when setting up holidays, the need to pay extra for Apple Watch key use, the loss of elevator control during transition, and the inability to edit the date and time when programming doors.
Genea Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
6
Remote Access
4
Access
3
Simple
3
Access Control
2
Cons
Performance Issues
6
Limited Features
3
Poor Customer Support
2
Access Issues
1
Communication Issues
1
Genea Security features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 8.9
9.3
Security
Average: 9.1
8.9
Data Protection
Average: 9.0
8.8
Processes
Average: 8.9
Seller Details
Seller
Genea
Company Website
Year Founded
2006
HQ Location
Irvine, CA
Twitter
@GetGenea
780 Twitter followers
LinkedIn® Page
www.linkedin.com
195 employees on LinkedIn®
G2 Advertising
Sponsored
G2 Advertising
Get 2x conversion than Google Ads with G2 Advertising!
G2 Advertising places your product in premium positions on high-traffic pages and on targeted competitor pages to reach buyers at key comparison moments.
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    F5® BIG-IP® Access Policy Manager® (APM) is an access management proxy solution managing global access to user's network, cloud providers, applications, and application programming interfaces (APIs).

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 72% Enterprise
    • 22% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • F5 BIG-IP Access Policy Manager (APM) features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.9
    10.0
    Security
    Average: 9.1
    10.0
    Data Protection
    Average: 9.0
    10.0
    Processes
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    F5
    HQ Location
    Seattle, Washington
    Twitter
    @F5Networks
    1,393 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    6,155 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

F5® BIG-IP® Access Policy Manager® (APM) is an access management proxy solution managing global access to user's network, cloud providers, applications, and application programming interfaces (APIs).

Users
No information available
Industries
No information available
Market Segment
  • 72% Enterprise
  • 22% Mid-Market
F5 BIG-IP Access Policy Manager (APM) features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.9
10.0
Security
Average: 9.1
10.0
Data Protection
Average: 9.0
10.0
Processes
Average: 8.9
Seller Details
Seller
F5
HQ Location
Seattle, Washington
Twitter
@F5Networks
1,393 Twitter followers
LinkedIn® Page
www.linkedin.com
6,155 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    UTunnel offers scalable Cloud VPN and Zero-Trust Network Access (ZTNA) solutions that enable secure connectivity and seamless remote access to your business network resources. With automated deploymen

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 71% Small-Business
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • UTunnel VPN and ZTNA Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    6
    Easy Setup
    5
    Setup Ease
    5
    Affordable
    4
    Pricing
    4
    Cons
    Complex Setup
    1
    Expensive
    1
    Firewall Issues
    1
    Installation Issues
    1
    Lack of Guidance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • UTunnel VPN and ZTNA features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 8.9
    9.8
    Security
    Average: 9.1
    9.4
    Data Protection
    Average: 9.0
    9.4
    Processes
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2019
    HQ Location
    West Chester, Pennsylvania
    LinkedIn® Page
    www.linkedin.com
    5 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

UTunnel offers scalable Cloud VPN and Zero-Trust Network Access (ZTNA) solutions that enable secure connectivity and seamless remote access to your business network resources. With automated deploymen

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 71% Small-Business
  • 25% Mid-Market
UTunnel VPN and ZTNA Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
6
Easy Setup
5
Setup Ease
5
Affordable
4
Pricing
4
Cons
Complex Setup
1
Expensive
1
Firewall Issues
1
Installation Issues
1
Lack of Guidance
1
UTunnel VPN and ZTNA features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 8.9
9.8
Security
Average: 9.1
9.4
Data Protection
Average: 9.0
9.4
Processes
Average: 8.9
Seller Details
Year Founded
2019
HQ Location
West Chester, Pennsylvania
LinkedIn® Page
www.linkedin.com
5 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Endpoint visibility into on-premise and remote connection via PCS. Fingerprinting Methods: DHCP Fingerprinting (Helper Address or RSPAN port), MAC OUI, SNMP/SNMP Traps, CDP/LLDP, HTTP User Agent, Nmap

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 76% Enterprise
    • 21% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Ivanti NAC features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 8.9
    8.9
    Security
    Average: 9.1
    8.7
    Data Protection
    Average: 9.0
    8.8
    Processes
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Ivanti
    Year Founded
    1985
    HQ Location
    South Jordan, UT
    Twitter
    @GoIvanti
    6,786 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,990 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Endpoint visibility into on-premise and remote connection via PCS. Fingerprinting Methods: DHCP Fingerprinting (Helper Address or RSPAN port), MAC OUI, SNMP/SNMP Traps, CDP/LLDP, HTTP User Agent, Nmap

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 76% Enterprise
  • 21% Mid-Market
Ivanti NAC features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 8.9
8.9
Security
Average: 9.1
8.7
Data Protection
Average: 9.0
8.8
Processes
Average: 8.9
Seller Details
Seller
Ivanti
Year Founded
1985
HQ Location
South Jordan, UT
Twitter
@GoIvanti
6,786 Twitter followers
LinkedIn® Page
www.linkedin.com
2,990 employees on LinkedIn®
(33)4.8 out of 5
4th Easiest To Use in Network Access Control (NAC) software
Entry Level Price:Starting at $20.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    threatER is the leading preemptive cybersecurity platform for building and maintaining trust at scale. Our SaaS solution continuously learns from all available data, allowing you to gain better insigh

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 55% Mid-Market
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • threatER Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Malware Protection
    1
    Network Security
    1
    Protection
    1
    Security
    1
    Cons
    Connection Issues
    1
    False Positives
    1
    Performance Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • threatER features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 8.9
    9.7
    Security
    Average: 9.1
    9.7
    Data Protection
    Average: 9.0
    8.8
    Processes
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    threatER
    Company Website
    HQ Location
    Tysons, Virginia
    LinkedIn® Page
    www.linkedin.com
    28 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

threatER is the leading preemptive cybersecurity platform for building and maintaining trust at scale. Our SaaS solution continuously learns from all available data, allowing you to gain better insigh

Users
No information available
Industries
No information available
Market Segment
  • 55% Mid-Market
  • 33% Enterprise
threatER Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Malware Protection
1
Network Security
1
Protection
1
Security
1
Cons
Connection Issues
1
False Positives
1
Performance Issues
1
threatER features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 8.9
9.7
Security
Average: 9.1
9.7
Data Protection
Average: 9.0
8.8
Processes
Average: 8.9
Seller Details
Seller
threatER
Company Website
HQ Location
Tysons, Virginia
LinkedIn® Page
www.linkedin.com
28 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Zero-Trust Access (ZTA), an approach that considers all entities untrusted by default, is rapidly becoming the industry standard and being mandated by regulatory bodies including governments. Leveragi

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 43% Mid-Market
    • 36% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • MetaAccess features and usability ratings that predict user satisfaction
    5.8
    Has the product been a good partner in doing business?
    Average: 8.9
    7.1
    Security
    Average: 9.1
    7.8
    Data Protection
    Average: 9.0
    7.8
    Processes
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OPSWAT
    Year Founded
    2002
    HQ Location
    Tampa, Florida
    Twitter
    @OPSWAT
    7,243 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,124 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Zero-Trust Access (ZTA), an approach that considers all entities untrusted by default, is rapidly becoming the industry standard and being mandated by regulatory bodies including governments. Leveragi

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 43% Mid-Market
  • 36% Enterprise
MetaAccess features and usability ratings that predict user satisfaction
5.8
Has the product been a good partner in doing business?
Average: 8.9
7.1
Security
Average: 9.1
7.8
Data Protection
Average: 9.0
7.8
Processes
Average: 8.9
Seller Details
Seller
OPSWAT
Year Founded
2002
HQ Location
Tampa, Florida
Twitter
@OPSWAT
7,243 Twitter followers
LinkedIn® Page
www.linkedin.com
1,124 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Lit Protocol is a decentralized key management network designed to provide secure, programmable signing and encryption capabilities for developers. By leveraging threshold cryptography and trusted exe

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Lit Protocol features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 8.9
    9.2
    Security
    Average: 9.1
    10.0
    Data Protection
    Average: 9.0
    7.5
    Processes
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    N/A
    Twitter
    @LitProtocol
    93,637 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    11 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Lit Protocol is a decentralized key management network designed to provide secure, programmable signing and encryption capabilities for developers. By leveraging threshold cryptography and trusted exe

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Lit Protocol features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 8.9
9.2
Security
Average: 9.1
10.0
Data Protection
Average: 9.0
7.5
Processes
Average: 8.9
Seller Details
HQ Location
N/A
Twitter
@LitProtocol
93,637 Twitter followers
LinkedIn® Page
www.linkedin.com
11 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Appgate SDP is a leading Zero Trust Network Access solution that simplifies and strengthens access controls for all users, devices, and workloads. We deliver secure access for complex and hybrid enter

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 53% Enterprise
    • 32% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Appgate SDP Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    10
    Customer Support
    7
    Ease of Use
    7
    Network Security
    6
    Reliability
    6
    Cons
    Performance Issues
    6
    Complex Setup
    4
    Connection Issues
    2
    Connectivity Issues
    2
    Difficult Configuration
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Appgate SDP features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 8.9
    10.0
    Security
    Average: 9.1
    8.6
    Data Protection
    Average: 9.0
    7.5
    Processes
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Appgate
    Year Founded
    2020
    HQ Location
    Coral Gables, US
    Twitter
    @AppgateSecurity
    1,158 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    377 employees on LinkedIn®
    Ownership
    OTC: APGT
Product Description
How are these determined?Information
This description is provided by the seller.

Appgate SDP is a leading Zero Trust Network Access solution that simplifies and strengthens access controls for all users, devices, and workloads. We deliver secure access for complex and hybrid enter

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 53% Enterprise
  • 32% Mid-Market
Appgate SDP Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
10
Customer Support
7
Ease of Use
7
Network Security
6
Reliability
6
Cons
Performance Issues
6
Complex Setup
4
Connection Issues
2
Connectivity Issues
2
Difficult Configuration
2
Appgate SDP features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 8.9
10.0
Security
Average: 9.1
8.6
Data Protection
Average: 9.0
7.5
Processes
Average: 8.9
Seller Details
Seller
Appgate
Year Founded
2020
HQ Location
Coral Gables, US
Twitter
@AppgateSecurity
1,158 Twitter followers
LinkedIn® Page
www.linkedin.com
377 employees on LinkedIn®
Ownership
OTC: APGT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    This is the next generation of on-premise security. Give your teams full oversight and control through a centralized, browser-based video security and access control management platform, complete with

    Users
    • Associate
    Industries
    • Retail
    Market Segment
    • 50% Mid-Market
    • 25% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Avigilon Unity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Documentation
    1
    Ease of Use
    1
    Easy Setup
    1
    Setup Ease
    1
    Cons
    Limited Features
    1
    Missing Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Avigilon Unity features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Avigilon
    Year Founded
    2004
    HQ Location
    Vancouver, BC
    Twitter
    @Avigilon
    8,131 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    393 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

This is the next generation of on-premise security. Give your teams full oversight and control through a centralized, browser-based video security and access control management platform, complete with

Users
  • Associate
Industries
  • Retail
Market Segment
  • 50% Mid-Market
  • 25% Enterprise
Avigilon Unity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Documentation
1
Ease of Use
1
Easy Setup
1
Setup Ease
1
Cons
Limited Features
1
Missing Features
1
Avigilon Unity features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Avigilon
Year Founded
2004
HQ Location
Vancouver, BC
Twitter
@Avigilon
8,131 Twitter followers
LinkedIn® Page
www.linkedin.com
393 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Automate and secure your network in a so simple way that anyone can do it

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 40% Small-Business
    • 30% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LOKI features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Security
    Average: 9.1
    9.4
    Data Protection
    Average: 9.0
    7.8
    Processes
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    LOKI
    Year Founded
    2017
    HQ Location
    Vilnius, LT
    LinkedIn® Page
    www.linkedin.com
    4 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Automate and secure your network in a so simple way that anyone can do it

Users
No information available
Industries
No information available
Market Segment
  • 40% Small-Business
  • 30% Enterprise
LOKI features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Security
Average: 9.1
9.4
Data Protection
Average: 9.0
7.8
Processes
Average: 8.9
Seller Details
Seller
LOKI
Year Founded
2017
HQ Location
Vilnius, LT
LinkedIn® Page
www.linkedin.com
4 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Check Point Quantum Titan is an advanced cybersecurity platform designed to provide comprehensive protection across on-premises, cloud, and IoT environments. By integrating artificial intelligence (AI

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 53% Enterprise
    • 47% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point Quantum Titan Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cybersecurity
    4
    Efficiency
    4
    Performance Efficiency
    4
    Protection
    4
    Reliability
    3
    Cons
    Performance Issues
    3
    Device Management
    2
    Slow Performance
    2
    Complexity
    1
    Integration Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point Quantum Titan features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 8.9
    10.0
    Security
    Average: 9.1
    8.9
    Data Protection
    Average: 9.0
    9.2
    Processes
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    70,997 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,356 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

Check Point Quantum Titan is an advanced cybersecurity platform designed to provide comprehensive protection across on-premises, cloud, and IoT environments. By integrating artificial intelligence (AI

Users
No information available
Industries
No information available
Market Segment
  • 53% Enterprise
  • 47% Mid-Market
Check Point Quantum Titan Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cybersecurity
4
Efficiency
4
Performance Efficiency
4
Protection
4
Reliability
3
Cons
Performance Issues
3
Device Management
2
Slow Performance
2
Complexity
1
Integration Issues
1
Check Point Quantum Titan features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 8.9
10.0
Security
Average: 9.1
8.9
Data Protection
Average: 9.0
9.2
Processes
Average: 8.9
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
70,997 Twitter followers
LinkedIn® Page
www.linkedin.com
8,356 employees on LinkedIn®
Ownership
NASDAQ:CHKP
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Flex Appliance moves beyond hyperconverged architectures and provides a unified NetBackup environment by making it simple to protect all your workloads and scale without increasing your hardware footp

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 38% Mid-Market
    • 31% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Veritas Netbackup Flex Appliance Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    5
    Secure Access
    4
    Access Management
    3
    Data Security
    2
    Ease of Use
    2
    Cons
    Complexity
    2
    Complex Setup
    2
    Difficult Configuration
    2
    Difficult Learning
    2
    Difficult Learning Curve
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Veritas Netbackup Flex Appliance Security features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 8.9
    8.3
    Security
    Average: 9.1
    8.3
    Data Protection
    Average: 9.0
    10.0
    Processes
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cohesity
    Year Founded
    2013
    HQ Location
    San Jose, CA
    Twitter
    @Cohesity
    29,376 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,684 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Flex Appliance moves beyond hyperconverged architectures and provides a unified NetBackup environment by making it simple to protect all your workloads and scale without increasing your hardware footp

Users
No information available
Industries
No information available
Market Segment
  • 38% Mid-Market
  • 31% Small-Business
Veritas Netbackup Flex Appliance Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
5
Secure Access
4
Access Management
3
Data Security
2
Ease of Use
2
Cons
Complexity
2
Complex Setup
2
Difficult Configuration
2
Difficult Learning
2
Difficult Learning Curve
2
Veritas Netbackup Flex Appliance Security features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 8.9
8.3
Security
Average: 9.1
8.3
Data Protection
Average: 9.0
10.0
Processes
Average: 8.9
Seller Details
Seller
Cohesity
Year Founded
2013
HQ Location
San Jose, CA
Twitter
@Cohesity
29,376 Twitter followers
LinkedIn® Page
www.linkedin.com
7,684 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    NACVIEW is a Network Access Control solution. It allows to control endpoints and identities that try to access the network - wired and wireless, including VPN connections. Thanks to the combination

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 40% Mid-Market
    • 40% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • NACVIEW features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 8.9
    10.0
    Security
    Average: 9.1
    9.4
    Data Protection
    Average: 9.0
    8.3
    Processes
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    NACVIEW
    Year Founded
    2012
    HQ Location
    Poznan, PL
    Twitter
    @NACVIEW1
    19 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    11 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

NACVIEW is a Network Access Control solution. It allows to control endpoints and identities that try to access the network - wired and wireless, including VPN connections. Thanks to the combination

Users
No information available
Industries
No information available
Market Segment
  • 40% Mid-Market
  • 40% Small-Business
NACVIEW features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 8.9
10.0
Security
Average: 9.1
9.4
Data Protection
Average: 9.0
8.3
Processes
Average: 8.9
Seller Details
Seller
NACVIEW
Year Founded
2012
HQ Location
Poznan, PL
Twitter
@NACVIEW1
19 Twitter followers
LinkedIn® Page
www.linkedin.com
11 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Auconet BICS delivers a fresh, efficient approach to control complex networks. Trusted by global enterprises with a strategic vision for their infrastructure management: Lower TCO. Constant availabili

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Enterprise
    • 25% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Auconet Business Infrastructure Control Solution (BICS) features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 8.9
    9.4
    Security
    Average: 9.1
    8.9
    Data Protection
    Average: 9.0
    8.9
    Processes
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Auconet
    Year Founded
    1998
    HQ Location
    Berlin, DE
    Twitter
    @AUCONETde
    9 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Auconet BICS delivers a fresh, efficient approach to control complex networks. Trusted by global enterprises with a strategic vision for their infrastructure management: Lower TCO. Constant availabili

Users
No information available
Industries
No information available
Market Segment
  • 75% Enterprise
  • 25% Mid-Market
Auconet Business Infrastructure Control Solution (BICS) features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 8.9
9.4
Security
Average: 9.1
8.9
Data Protection
Average: 9.0
8.9
Processes
Average: 8.9
Seller Details
Seller
Auconet
Year Founded
1998
HQ Location
Berlin, DE
Twitter
@AUCONETde
9 Twitter followers
LinkedIn® Page
www.linkedin.com
5 employees on LinkedIn®