Introducing G2.ai, the future of software buying.Try now

Best Software-Defined Perimeter (SDP) Software - Page 4

Lauren Worth
LW
Researched and written by Lauren Worth

Software-defined perimeter (SDP) products are a specific type of network security solution which focus on network segmentation and user authentication. SDP itself is an architecture designed to allow access on a need-to-know basis, meaning every device and user must be verified before accessing either the network as a whole or specific systems and applications within a network. Unlike traditional network access controllers that utilize a lock and key approach, SDP segments networks by application use and analyzes user access permissions at a granular level across the network. SDP administrators can also customize and automate highly specific network security policies while enforcing them continuously.

Companies adopt SDP solutions because traditional network protection ecosystems are insufficient. If a hacker or unauthorized user obtains access to a traditional network, it’s uncertain what they can access. SDP, on the other hand, analyzes each access request at the application level, compares it to the user’s privileges, then grants or denies access. This verification process occurs continuously, increasing visibility into user behaviors and privileges.

SDP solutions differ from virtual private networks (VPN) because VPNs simply provide a barrier to network entry: an easy target for hackers. SDP, on the other hand, provides continuous authentication functionality and visibility into traffic and network activity. There is some overlap between zero-trust security solutions and SDP products as some SDP solutions utilize the zero-trust approach to continuous verification, simply hiding services, applications, networks, and devices until requests are verified. Still, SDP solutions help build specific network architectures that can be used to leverage the technology and increase the efficacy of zero-trust security solutions.

To qualify for inclusion in the Software-Defined Perimeter (SDP) category, a product must:

Provide adaptive, granular network segmentation functionality
Provide on-demand access to services, networks, and applications upon verification
Continuously monitor activity and verify network access requests
Show More
Show Less

Featured Software-Defined Perimeter (SDP) Software At A Glance

Free Plan Available:
GoodAccess
Sponsored
Leader:
Highest Performer:
Easiest to Use:
Top Trending:
Show LessShow More
Highest Performer:
Easiest to Use:
Top Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Software-Defined Perimeter (SDP) Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
49 Listings in Software-Defined Perimeter (SDP) Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Protector Air is focused on protecting individual sessions and the transactions within those sessions. Protector Web further protects the web server with enterprise-grade web application security and

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • TrustedKnight Protector Web features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2010
    HQ Location
    Annapolis , US
    Twitter
    @trustedknight
    164 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Protector Air is focused on protecting individual sessions and the transactions within those sessions. Protector Web further protects the web server with enterprise-grade web application security and

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
TrustedKnight Protector Web features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2010
HQ Location
Annapolis , US
Twitter
@trustedknight
164 Twitter followers
LinkedIn® Page
www.linkedin.com
7 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Software Defined Perimeter acts as your bouncer, allowing only approved users to access network resources. It authenticates identities and devices, letting you “hide” enterprise apps and resources fro

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Verizon Software Defined Perimeter features and usability ratings that predict user satisfaction
    8.3
    Ease of Use
    Average: 9.2
    8.3
    Quality of Support
    Average: 8.9
    9.2
    Has the product been a good partner in doing business?
    Average: 8.7
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Basking Ridge, NJ
    Twitter
    @VerizonEnterpr
    6 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    16,405 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Software Defined Perimeter acts as your bouncer, allowing only approved users to access network resources. It authenticates identities and devices, letting you “hide” enterprise apps and resources fro

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Small-Business
Verizon Software Defined Perimeter features and usability ratings that predict user satisfaction
8.3
Ease of Use
Average: 9.2
8.3
Quality of Support
Average: 8.9
9.2
Has the product been a good partner in doing business?
Average: 8.7
0.0
No information available
Seller Details
Year Founded
1988
HQ Location
Basking Ridge, NJ
Twitter
@VerizonEnterpr
6 Twitter followers
LinkedIn® Page
www.linkedin.com
16,405 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Virtual SD-Edge is an open, highly secure, virtualized router designed to enhance cloud connectivity for enterprises and managed service providers . It offers comprehensive WAN and firewall functions

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Virtual SD-Edge (Open Secure Routing) features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1999
    HQ Location
    Santa Clara, California, United States
    Twitter
    @IPInfusion
    1,112 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    501 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Virtual SD-Edge is an open, highly secure, virtualized router designed to enhance cloud connectivity for enterprises and managed service providers . It offers comprehensive WAN and firewall functions

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Virtual SD-Edge (Open Secure Routing) features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1999
HQ Location
Santa Clara, California, United States
Twitter
@IPInfusion
1,112 Twitter followers
LinkedIn® Page
www.linkedin.com
501 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    VNS3:turret is a secure, redundant network with integrated dataflow and compliance tools.

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • VNS3:turret features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2008
    HQ Location
    Chicago, US
    Twitter
    @cohesivenet
    1,440 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    19 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

VNS3:turret is a secure, redundant network with integrated dataflow and compliance tools.

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
VNS3:turret features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2008
HQ Location
Chicago, US
Twitter
@cohesivenet
1,440 Twitter followers
LinkedIn® Page
www.linkedin.com
19 employees on LinkedIn®