Introducing G2.ai, the future of software buying.Try now

Best Network Access Control Software - Page 2

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Network access control (NAC) software allows users to implement policies that control access to corporate infrastructure.

To qualify for inclusion in the Network Access Control category, a product must:

Allow users to implement policies for controlling access to their business’s infrastructure.
Enable users to protect their data from potential outside attacks.
Allow users to control access to their information from a central point.
Show More
Show Less

Featured Network Access Control Software At A Glance

Free Plan Available:
SecureW2 JoinNow
Sponsored
Highest Performer:
Easiest to Use:
Top Trending:
Show LessShow More
Highest Performer:
Easiest to Use:
Top Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Network Access Control (NAC) Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
67 Listings in Network Access Control (NAC) Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Check Point Capsule is one seamless solution that addresses all your mobile security needs. Capsule protects your mobile devices from threats, provides a secure business environment for mobile device

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 48% Enterprise
    • 29% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point Capsule Mobile Secure Workspace Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    2
    Easy Integrations
    1
    Malware Protection
    1
    Online Security
    1
    Performance Efficiency
    1
    Cons
    Performance Issues
    2
    Expensive
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point Capsule Mobile Secure Workspace features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 8.9
    8.3
    Security
    Average: 9.1
    9.2
    Data Protection
    Average: 9.0
    9.2
    Processes
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    70,953 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,323 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

Check Point Capsule is one seamless solution that addresses all your mobile security needs. Capsule protects your mobile devices from threats, provides a secure business environment for mobile device

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 48% Enterprise
  • 29% Mid-Market
Check Point Capsule Mobile Secure Workspace Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
2
Easy Integrations
1
Malware Protection
1
Online Security
1
Performance Efficiency
1
Cons
Performance Issues
2
Expensive
1
Check Point Capsule Mobile Secure Workspace features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 8.9
8.3
Security
Average: 9.1
9.2
Data Protection
Average: 9.0
9.2
Processes
Average: 8.9
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
70,953 Twitter followers
LinkedIn® Page
www.linkedin.com
8,323 employees on LinkedIn®
Ownership
NASDAQ:CHKP
(94)4.4 out of 5
Optimized for quick response
10th Easiest To Use in Network Access Control (NAC) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Genea Security is a cloud-native access control solution designed to provide IT and security teams with comprehensive oversight of access activities across global enterprises or building portfolios. T

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 60% Mid-Market
    • 21% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Genea is an access control solution that simplifies management and monitoring through a cloud-based platform.
    • Users frequently mention the ease of use, the ability to control mobile access from a computer, the user-friendly interface, and the efficient chat support that helps overcome initial installation hurdles.
    • Users mentioned issues with the software design when setting up holidays, the need to pay extra for Apple Watch key use, the loss of elevator control during transition, and the inability to edit the date and time when programming doors.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Genea Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    6
    Remote Access
    4
    Access
    3
    Simple
    3
    Access Control
    2
    Cons
    Performance Issues
    6
    Limited Features
    3
    Poor Customer Support
    2
    Access Issues
    1
    Communication Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Genea Security features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 8.9
    9.3
    Security
    Average: 9.1
    8.9
    Data Protection
    Average: 9.0
    8.8
    Processes
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Genea
    Company Website
    Year Founded
    2006
    HQ Location
    Irvine, CA
    Twitter
    @GetGenea
    780 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    186 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Genea Security is a cloud-native access control solution designed to provide IT and security teams with comprehensive oversight of access activities across global enterprises or building portfolios. T

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 60% Mid-Market
  • 21% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Genea is an access control solution that simplifies management and monitoring through a cloud-based platform.
  • Users frequently mention the ease of use, the ability to control mobile access from a computer, the user-friendly interface, and the efficient chat support that helps overcome initial installation hurdles.
  • Users mentioned issues with the software design when setting up holidays, the need to pay extra for Apple Watch key use, the loss of elevator control during transition, and the inability to edit the date and time when programming doors.
Genea Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
6
Remote Access
4
Access
3
Simple
3
Access Control
2
Cons
Performance Issues
6
Limited Features
3
Poor Customer Support
2
Access Issues
1
Communication Issues
1
Genea Security features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 8.9
9.3
Security
Average: 9.1
8.9
Data Protection
Average: 9.0
8.8
Processes
Average: 8.9
Seller Details
Seller
Genea
Company Website
Year Founded
2006
HQ Location
Irvine, CA
Twitter
@GetGenea
780 Twitter followers
LinkedIn® Page
www.linkedin.com
186 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(72)4.0 out of 5
View top Consulting Services for Citrix Gateway
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Citrix Gateway is a customer-managed solution that can be deployed on premises or on any public cloud, such as AWS, Azure, or Google Cloud Platform.

    Users
    No information available
    Industries
    • Information Technology and Services
    • Hospital & Health Care
    Market Segment
    • 57% Enterprise
    • 36% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Citrix Gateway Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    App Features
    2
    Easy to Access
    2
    Access Management
    1
    Ease of Use
    1
    Easy Access
    1
    Cons
    Error Handling
    1
    Internet Speed
    1
    Performance Issues
    1
    Setup Difficulties
    1
    Software Instability
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Citrix Gateway features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 8.9
    9.2
    Security
    Average: 9.1
    8.7
    Data Protection
    Average: 9.0
    9.1
    Processes
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Citrix
    Year Founded
    1989
    HQ Location
    Fort Lauderdale, FL
    Twitter
    @citrix
    199,519 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,296 employees on LinkedIn®
    Ownership
    NASDAQ:CTXS
Product Description
How are these determined?Information
This description is provided by the seller.

Citrix Gateway is a customer-managed solution that can be deployed on premises or on any public cloud, such as AWS, Azure, or Google Cloud Platform.

Users
No information available
Industries
  • Information Technology and Services
  • Hospital & Health Care
Market Segment
  • 57% Enterprise
  • 36% Mid-Market
Citrix Gateway Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
App Features
2
Easy to Access
2
Access Management
1
Ease of Use
1
Easy Access
1
Cons
Error Handling
1
Internet Speed
1
Performance Issues
1
Setup Difficulties
1
Software Instability
1
Citrix Gateway features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 8.9
9.2
Security
Average: 9.1
8.7
Data Protection
Average: 9.0
9.1
Processes
Average: 8.9
Seller Details
Seller
Citrix
Year Founded
1989
HQ Location
Fort Lauderdale, FL
Twitter
@citrix
199,519 Twitter followers
LinkedIn® Page
www.linkedin.com
4,296 employees on LinkedIn®
Ownership
NASDAQ:CTXS
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    UTunnel offers scalable Cloud VPN and Zero-Trust Network Access (ZTNA) solutions that enable secure connectivity and seamless remote access to your business network resources. With automated deploymen

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 71% Small-Business
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • UTunnel VPN and ZTNA Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    7
    Setup Ease
    6
    Easy Setup
    5
    Affordable
    4
    Pricing
    4
    Cons
    Complex Setup
    1
    Expensive
    1
    Firewall Issues
    1
    Installation Issues
    1
    Lack of Guidance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • UTunnel VPN and ZTNA features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 8.9
    9.8
    Security
    Average: 9.1
    9.4
    Data Protection
    Average: 9.0
    9.4
    Processes
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2019
    HQ Location
    West Chester, Pennsylvania
    LinkedIn® Page
    www.linkedin.com
    4 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

UTunnel offers scalable Cloud VPN and Zero-Trust Network Access (ZTNA) solutions that enable secure connectivity and seamless remote access to your business network resources. With automated deploymen

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 71% Small-Business
  • 25% Mid-Market
UTunnel VPN and ZTNA Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
7
Setup Ease
6
Easy Setup
5
Affordable
4
Pricing
4
Cons
Complex Setup
1
Expensive
1
Firewall Issues
1
Installation Issues
1
Lack of Guidance
1
UTunnel VPN and ZTNA features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 8.9
9.8
Security
Average: 9.1
9.4
Data Protection
Average: 9.0
9.4
Processes
Average: 8.9
Seller Details
Year Founded
2019
HQ Location
West Chester, Pennsylvania
LinkedIn® Page
www.linkedin.com
4 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    F5® BIG-IP® Access Policy Manager® (APM) is an access management proxy solution managing global access to user's network, cloud providers, applications, and application programming interfaces (APIs).

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 72% Enterprise
    • 22% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • F5 BIG-IP Access Policy Manager (APM) features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.9
    10.0
    Security
    Average: 9.1
    10.0
    Data Protection
    Average: 9.0
    10.0
    Processes
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    F5
    HQ Location
    Seattle, Washington
    Twitter
    @F5Networks
    1,395 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    6,153 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

F5® BIG-IP® Access Policy Manager® (APM) is an access management proxy solution managing global access to user's network, cloud providers, applications, and application programming interfaces (APIs).

Users
No information available
Industries
No information available
Market Segment
  • 72% Enterprise
  • 22% Mid-Market
F5 BIG-IP Access Policy Manager (APM) features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.9
10.0
Security
Average: 9.1
10.0
Data Protection
Average: 9.0
10.0
Processes
Average: 8.9
Seller Details
Seller
F5
HQ Location
Seattle, Washington
Twitter
@F5Networks
1,395 Twitter followers
LinkedIn® Page
www.linkedin.com
6,153 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Endpoint visibility into on-premise and remote connection via PCS. Fingerprinting Methods: DHCP Fingerprinting (Helper Address or RSPAN port), MAC OUI, SNMP/SNMP Traps, CDP/LLDP, HTTP User Agent, Nmap

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 76% Enterprise
    • 21% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Ivanti NAC features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 8.9
    8.9
    Security
    Average: 9.1
    8.7
    Data Protection
    Average: 9.0
    8.8
    Processes
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Ivanti
    Year Founded
    1985
    HQ Location
    South Jordan, UT
    Twitter
    @GoIvanti
    6,763 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,984 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Endpoint visibility into on-premise and remote connection via PCS. Fingerprinting Methods: DHCP Fingerprinting (Helper Address or RSPAN port), MAC OUI, SNMP/SNMP Traps, CDP/LLDP, HTTP User Agent, Nmap

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 76% Enterprise
  • 21% Mid-Market
Ivanti NAC features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 8.9
8.9
Security
Average: 9.1
8.7
Data Protection
Average: 9.0
8.8
Processes
Average: 8.9
Seller Details
Seller
Ivanti
Year Founded
1985
HQ Location
South Jordan, UT
Twitter
@GoIvanti
6,763 Twitter followers
LinkedIn® Page
www.linkedin.com
2,984 employees on LinkedIn®
(26)4.8 out of 5
4th Easiest To Use in Network Access Control (NAC) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    threatER is the leading preemptive cybersecurity platform for building and maintaining trust at scale. Our SaaS solution continuously learns from all available data, allowing you to gain better insigh

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 62% Mid-Market
    • 27% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • threatER features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 8.9
    9.7
    Security
    Average: 9.1
    9.7
    Data Protection
    Average: 9.0
    8.8
    Processes
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    threatER
    HQ Location
    Tysons, Virginia
    LinkedIn® Page
    www.linkedin.com
    26 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

threatER is the leading preemptive cybersecurity platform for building and maintaining trust at scale. Our SaaS solution continuously learns from all available data, allowing you to gain better insigh

Users
No information available
Industries
No information available
Market Segment
  • 62% Mid-Market
  • 27% Enterprise
threatER features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 8.9
9.7
Security
Average: 9.1
9.7
Data Protection
Average: 9.0
8.8
Processes
Average: 8.9
Seller Details
Seller
threatER
HQ Location
Tysons, Virginia
LinkedIn® Page
www.linkedin.com
26 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Zero-Trust Access (ZTA), an approach that considers all entities untrusted by default, is rapidly becoming the industry standard and being mandated by regulatory bodies including governments. Leveragi

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 43% Mid-Market
    • 36% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • MetaAccess features and usability ratings that predict user satisfaction
    5.8
    Has the product been a good partner in doing business?
    Average: 8.9
    7.1
    Security
    Average: 9.1
    7.8
    Data Protection
    Average: 9.0
    7.8
    Processes
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OPSWAT
    Year Founded
    2002
    HQ Location
    Tampa, Florida
    Twitter
    @OPSWAT
    7,222 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,045 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Zero-Trust Access (ZTA), an approach that considers all entities untrusted by default, is rapidly becoming the industry standard and being mandated by regulatory bodies including governments. Leveragi

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 43% Mid-Market
  • 36% Enterprise
MetaAccess features and usability ratings that predict user satisfaction
5.8
Has the product been a good partner in doing business?
Average: 8.9
7.1
Security
Average: 9.1
7.8
Data Protection
Average: 9.0
7.8
Processes
Average: 8.9
Seller Details
Seller
OPSWAT
Year Founded
2002
HQ Location
Tampa, Florida
Twitter
@OPSWAT
7,222 Twitter followers
LinkedIn® Page
www.linkedin.com
1,045 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Lit Protocol is a decentralized key management network designed to provide secure, programmable signing and encryption capabilities for developers. By leveraging threshold cryptography and trusted exe

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Lit Protocol features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 8.9
    9.2
    Security
    Average: 9.1
    10.0
    Data Protection
    Average: 9.0
    7.5
    Processes
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    N/A
    Twitter
    @LitProtocol
    96,126 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    16 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Lit Protocol is a decentralized key management network designed to provide secure, programmable signing and encryption capabilities for developers. By leveraging threshold cryptography and trusted exe

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Lit Protocol features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 8.9
9.2
Security
Average: 9.1
10.0
Data Protection
Average: 9.0
7.5
Processes
Average: 8.9
Seller Details
HQ Location
N/A
Twitter
@LitProtocol
96,126 Twitter followers
LinkedIn® Page
www.linkedin.com
16 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    This is the next generation of on-premise security. Give your teams full oversight and control through a centralized, browser-based video security and access control management platform, complete with

    Users
    • Associate
    Industries
    • Retail
    Market Segment
    • 50% Mid-Market
    • 25% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Avigilon Unity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Documentation
    1
    Ease of Use
    1
    Easy Setup
    1
    Setup Ease
    1
    Cons
    Limited Features
    1
    Missing Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Avigilon Unity features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Avigilon
    Year Founded
    2004
    HQ Location
    Vancouver, BC
    Twitter
    @Avigilon
    8,134 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    403 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

This is the next generation of on-premise security. Give your teams full oversight and control through a centralized, browser-based video security and access control management platform, complete with

Users
  • Associate
Industries
  • Retail
Market Segment
  • 50% Mid-Market
  • 25% Enterprise
Avigilon Unity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Documentation
1
Ease of Use
1
Easy Setup
1
Setup Ease
1
Cons
Limited Features
1
Missing Features
1
Avigilon Unity features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 8.9
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Avigilon
Year Founded
2004
HQ Location
Vancouver, BC
Twitter
@Avigilon
8,134 Twitter followers
LinkedIn® Page
www.linkedin.com
403 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Automate and secure your network in a so simple way that anyone can do it

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 40% Small-Business
    • 30% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LOKI features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Security
    Average: 9.1
    9.4
    Data Protection
    Average: 9.0
    7.8
    Processes
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    LOKI
    Year Founded
    2017
    HQ Location
    Vilnius, LT
    LinkedIn® Page
    www.linkedin.com
    4 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Automate and secure your network in a so simple way that anyone can do it

Users
No information available
Industries
No information available
Market Segment
  • 40% Small-Business
  • 30% Enterprise
LOKI features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Security
Average: 9.1
9.4
Data Protection
Average: 9.0
7.8
Processes
Average: 8.9
Seller Details
Seller
LOKI
Year Founded
2017
HQ Location
Vilnius, LT
LinkedIn® Page
www.linkedin.com
4 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cyber Security Management features centralized management control across all networks and cloud environments, increasing operational efficiency and lowering the complexity of managing your security.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 53% Enterprise
    • 47% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point Quantum Titan Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cybersecurity
    3
    Efficiency
    3
    Performance Efficiency
    3
    Protection
    3
    Centralized Management
    2
    Cons
    Device Management
    2
    Performance Issues
    2
    Slow Performance
    2
    Poor Interface Design
    1
    Security Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point Quantum Titan features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 8.9
    10.0
    Security
    Average: 9.1
    8.9
    Data Protection
    Average: 9.0
    9.2
    Processes
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    70,953 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,323 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

Cyber Security Management features centralized management control across all networks and cloud environments, increasing operational efficiency and lowering the complexity of managing your security.

Users
No information available
Industries
No information available
Market Segment
  • 53% Enterprise
  • 47% Mid-Market
Check Point Quantum Titan Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cybersecurity
3
Efficiency
3
Performance Efficiency
3
Protection
3
Centralized Management
2
Cons
Device Management
2
Performance Issues
2
Slow Performance
2
Poor Interface Design
1
Security Issues
1
Check Point Quantum Titan features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 8.9
10.0
Security
Average: 9.1
8.9
Data Protection
Average: 9.0
9.2
Processes
Average: 8.9
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
70,953 Twitter followers
LinkedIn® Page
www.linkedin.com
8,323 employees on LinkedIn®
Ownership
NASDAQ:CHKP
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Flex Appliance moves beyond hyperconverged architectures and provides a unified NetBackup environment by making it simple to protect all your workloads and scale without increasing your hardware footp

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 38% Mid-Market
    • 31% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Veritas Netbackup Flex Appliance Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    5
    Secure Access
    4
    Access Management
    3
    Data Security
    2
    Ease of Use
    2
    Cons
    Complexity
    2
    Complex Setup
    2
    Difficult Configuration
    2
    Difficult Learning
    2
    Difficult Learning Curve
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Veritas Netbackup Flex Appliance Security features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 8.9
    8.3
    Security
    Average: 9.1
    8.3
    Data Protection
    Average: 9.0
    10.0
    Processes
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cohesity
    Year Founded
    2013
    HQ Location
    San Jose, CA
    Twitter
    @Cohesity
    29,462 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,691 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Flex Appliance moves beyond hyperconverged architectures and provides a unified NetBackup environment by making it simple to protect all your workloads and scale without increasing your hardware footp

Users
No information available
Industries
No information available
Market Segment
  • 38% Mid-Market
  • 31% Small-Business
Veritas Netbackup Flex Appliance Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
5
Secure Access
4
Access Management
3
Data Security
2
Ease of Use
2
Cons
Complexity
2
Complex Setup
2
Difficult Configuration
2
Difficult Learning
2
Difficult Learning Curve
2
Veritas Netbackup Flex Appliance Security features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 8.9
8.3
Security
Average: 9.1
8.3
Data Protection
Average: 9.0
10.0
Processes
Average: 8.9
Seller Details
Seller
Cohesity
Year Founded
2013
HQ Location
San Jose, CA
Twitter
@Cohesity
29,462 Twitter followers
LinkedIn® Page
www.linkedin.com
7,691 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    NACVIEW is a Network Access Control solution. It allows to control endpoints and identities that try to access the network - wired and wireless, including VPN connections. Thanks to the combination

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 40% Mid-Market
    • 40% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • NACVIEW Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Implementation Ease
    1
    Integrations
    1
    Security
    1
    Cons
    Performance Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • NACVIEW features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 8.9
    10.0
    Security
    Average: 9.1
    9.4
    Data Protection
    Average: 9.0
    8.3
    Processes
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    NACVIEW
    Year Founded
    2012
    HQ Location
    Poznan, PL
    Twitter
    @NACVIEW1
    19 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    11 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

NACVIEW is a Network Access Control solution. It allows to control endpoints and identities that try to access the network - wired and wireless, including VPN connections. Thanks to the combination

Users
No information available
Industries
No information available
Market Segment
  • 40% Mid-Market
  • 40% Small-Business
NACVIEW Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Implementation Ease
1
Integrations
1
Security
1
Cons
Performance Issues
1
NACVIEW features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 8.9
10.0
Security
Average: 9.1
9.4
Data Protection
Average: 9.0
8.3
Processes
Average: 8.9
Seller Details
Seller
NACVIEW
Year Founded
2012
HQ Location
Poznan, PL
Twitter
@NACVIEW1
19 Twitter followers
LinkedIn® Page
www.linkedin.com
11 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Auconet BICS delivers a fresh, efficient approach to control complex networks. Trusted by global enterprises with a strategic vision for their infrastructure management: Lower TCO. Constant availabili

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Enterprise
    • 25% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Auconet Business Infrastructure Control Solution (BICS) features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 8.9
    9.4
    Security
    Average: 9.1
    8.9
    Data Protection
    Average: 9.0
    8.9
    Processes
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Auconet
    Year Founded
    1998
    HQ Location
    Berlin, DE
    Twitter
    @AUCONETde
    9 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Auconet BICS delivers a fresh, efficient approach to control complex networks. Trusted by global enterprises with a strategic vision for their infrastructure management: Lower TCO. Constant availabili

Users
No information available
Industries
No information available
Market Segment
  • 75% Enterprise
  • 25% Mid-Market
Auconet Business Infrastructure Control Solution (BICS) features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 8.9
9.4
Security
Average: 9.1
8.9
Data Protection
Average: 9.0
8.9
Processes
Average: 8.9
Seller Details
Seller
Auconet
Year Founded
1998
HQ Location
Berlin, DE
Twitter
@AUCONETde
9 Twitter followers
LinkedIn® Page
www.linkedin.com
5 employees on LinkedIn®