  # Best Zero Trust Networking Software - Page 3

  *By [Brandon Summers-Miller](https://research.g2.com/insights/author/brandon-summers-miller)*

   Zero trust networking software implements the zero trust security model, which assumes every user, internal or external, is a potential threat until verified. Unlike traditional castle-and-moat security systems, these solutions continuously monitor network activity and user behavior, adapting authentication requirements based on individual risk signals to enforce strict access controls across decentralized networks and locations.

### Core Capabilities of Zero Trust Networking Software

To qualify for inclusion in the Zero Trust Networking category, a product must:

- Utilize adaptive authentication to continuously verify user permissions
- Allow for network segmentation to simplify and broaden policy enforcement
- Monitor traffic and user behavior for ongoing inspection and analysis

### How Zero Trust Networking Software Differs from Other Tools

Zero trust networking software uses similar authentication methods to [risk-based authentication software](https://www.g2.com/categories/risk-based-authentication), but is specifically designed for network access control. Risk-based authentication applies broadly, to networks, applications, databases, and other privileged resources, while zero trust networking is purpose-built to enforce least-privilege access across network infrastructure, making it the preferred choice for organizations managing complex, distributed IT environments.

### Insights from G2 on Zero Trust Networking Software

Based on category trends on G2, continuous verification and behavioral monitoring stand out as the standout features driving adoption. Security teams from enterprises with distributed workforces note that zero trust networking is essential for managing access controls across multiple locations and cloud environments without relying on perimeter-based defenses.




  ## How Many Zero Trust Networking Software Products Does G2 Track?
**Total Products under this Category:** 153

  
## How Does G2 Rank Zero Trust Networking Software Products?

**Why You Can Trust G2's Software Rankings:**

- 30 Analysts and Data Experts
- 7,500+ Authentic Reviews
- 153+ Products
- Unbiased Rankings

G2's software rankings are built on verified user reviews, rigorous moderation, and a consistent research methodology maintained by a team of analysts and data experts. Each product is measured using the same transparent criteria, with no paid placement or vendor influence. While reviews reflect real user experiences, which can be subjective, they offer valuable insight into how software performs in the hands of professionals. Together, these inputs power the G2 Score, a standardized way to compare tools within every category.

  
## Top Zero Trust Networking Software at a Glance
| # | Product | Rating | Best For | What Users Say |
|---|---------|--------|----------|----------------|
| 1 | [Zscaler Private Access](https://www.g2.com/products/zscaler-private-access/reviews) | 4.4/5.0 (132 reviews) | App-level access without traditional VPNs | "[Zscaler Private Access: Stable, Secure VPN Alternative That Streamlines Daily Work](https://www.g2.com/survey_responses/zscaler-private-access-review-12629828)" |
| 2 | [Cisco Duo](https://www.g2.com/products/cisco-duo/reviews) | 4.5/5.0 (494 reviews) | MFA and trusted device access | "[Straightforward, Fast-to-Deploy MFA with Strong Security and Broad Compatibility](https://www.g2.com/survey_responses/cisco-duo-review-12817427)" |
| 3 | [Okta](https://www.g2.com/products/okta/reviews) | 4.5/5.0 (1,196 reviews) | SSO and identity-based access control | "[Intuitive UI, Easy Integrations, and Reliable Okta Uptime](https://www.g2.com/survey_responses/okta-review-12721974)" |
| 4 | [ThreatLocker Platform](https://www.g2.com/products/threatlocker-platform/reviews) | 4.8/5.0 (473 reviews) | Application control and default-deny security | "[Quiet, Reliable Security That Just Works in the Background](https://www.g2.com/survey_responses/threatlocker-platform-review-12665226)" |
| 5 | [FortiClient](https://www.g2.com/products/forticlient/reviews) | 4.4/5.0 (268 reviews) | Unified endpoint access and ZTNA client | "[Seamless and Reliable Security Management](https://www.g2.com/survey_responses/forticlient-review-12727398)" |
| 6 | [Palo Alto Networks IoT/OT Security](https://www.g2.com/products/palo-alto-networks-iot-ot-security/reviews) | 4.4/5.0 (117 reviews) | — | "[Palo Alto Networks IoT/OT Security – Intelligent Visibility with Real-World Impact](https://www.g2.com/survey_responses/palo-alto-networks-iot-ot-security-review-11913838)" |
| 7 | [Illumio](https://www.g2.com/products/illumio/reviews) | 4.6/5.0 (32 reviews) | Microsegmentation for data centers and servers | "[Illuminates Traffic for Enhanced Network Control](https://www.g2.com/survey_responses/illumio-review-12634132)" |
| 8 | [Netskope One Platform](https://www.g2.com/products/netskope-one-platform/reviews) | 4.4/5.0 (70 reviews) | Cloud and web traffic visibility | "[Practical and Reliable SSE Platform for Daily Enterprise Security Operations](https://www.g2.com/survey_responses/netskope-one-platform-review-12795571)" |
| 9 | [Cato SASE Cloud](https://www.g2.com/products/cato-networks-cato-sase-cloud/reviews) | 4.5/5.0 (80 reviews) | SASE with unified network and security controls | "[It’s very good and everything is in cloud](https://www.g2.com/survey_responses/cato-sase-cloud-review-11237657)" |
| 10 | [Absolute Secure Access](https://www.g2.com/products/absolute-secure-access/reviews) | 4.7/5.0 (224 reviews) | — | "[Effortless, Secure Remote Access with Minimal Interaction](https://www.g2.com/survey_responses/absolute-secure-access-review-6897638)" |

  
## Which Zero Trust Networking Software Is Best for Your Use Case?

- **Leader:** [Zscaler Private Access](https://www.g2.com/products/zscaler-private-access/reviews)
- **Highest Performer:** [GoodAccess](https://www.g2.com/products/goodaccess/reviews)
- **Easiest to Use:** [ThreatLocker Platform](https://www.g2.com/products/threatlocker-platform/reviews)
- **Top Trending:** [ThreatLocker Platform](https://www.g2.com/products/threatlocker-platform/reviews)
- **Best Free Software:** [ThreatLocker Platform](https://www.g2.com/products/threatlocker-platform/reviews)

  
## Which Type of Zero Trust Networking Software Tools Are You Looking For?
  - [Zero Trust Networking Software](https://www.g2.com/categories/zero-trust-networking) *(current)*
  - [Network Access Control Software](https://www.g2.com/categories/network-access-control-nac)
  - [Cloud Access Security Broker (CASB) Software](https://www.g2.com/categories/cloud-access-security-broker-casb)
  - [Software-Defined Perimeter (SDP) Software](https://www.g2.com/categories/software-defined-perimeter-sdp)
  - [Cloud Edge Security Software](https://www.g2.com/categories/cloud-edge-security)
  - [Secure Access Service Edge (SASE) Platforms](https://www.g2.com/categories/secure-access-service-edge-sase-platforms)
  - [Zero Trust Platforms](https://www.g2.com/categories/zero-trust-platforms)
  - [Secure Service Edge (SSE) Solutions](https://www.g2.com/categories/secure-service-edge-sse-solutions)

  
---

**Sponsored**

### SecureW2 JoinNow

SecureW2 is a cloud-native authentication solution designed to enhance security by eliminating credential compromise through its innovative JoinNow Platform. This platform combines Dynamic Public Key Infrastructure (PKI) and Cloud RADIUS to facilitate real-time trust validation and continuous authentication for users accessing networks and applications. Each access request initiates an identity-based risk assessment, which determines the issuance of certificates and the corresponding access privileges. Once access is granted, the system continuously validates the compliance of devices, ensuring that only verified entities maintain their authorization. The JoinNow Platform caters to a diverse range of users, including K-12 and higher education institutions, mid-market businesses, and global enterprises. By providing scalable and resilient authentication solutions, SecureW2 addresses the unique security needs of various sectors without placing an additional burden on IT teams. The platform&#39;s ability to seamlessly integrate with existing identity providers, such as Entra ID (formerly Azure AD), Okta, and Google Workspace, allows organizations to implement adaptive, passwordless authentication without the need for complex upgrades or disruptions. SecureW2 effectively tackles several prevalent security challenges. Credential compromise remains a significant concern, as traditional passwords and multi-factor authentication (MFA) can be vulnerable. By utilizing certificate-based authentication, SecureW2 eliminates these risks entirely. Additionally, the platform addresses high operational overhead associated with managing legacy security systems by automating certificate issuance, revocation, and lifecycle management. This automation not only saves IT resources but also enhances visibility and control, providing real-time insights into authentication processes. Key features of SecureW2 include its agentless architecture, which eliminates software bloat while ensuring secure and frictionless authentication. The extensive policy engine allows organizations to create customized policies that are automatically enforced both before and after authentication. Continuous authentication adapts in real time, validating access dynamically based on evolving security conditions. Furthermore, the platform’s interoperability ensures compatibility with any identity provider, mobile device management (MDM) system, and security stack, making it a versatile choice for organizations looking to enhance their security posture. In summary, SecureW2 redefines authentication for modern businesses by ensuring that every access request is trust-validated. Its scalable, lightweight design enables rapid deployment and effortless scaling, allowing organizations to maintain robust security without the complexities and costs typically associated with traditional authentication solutions.



[Visit website](https://www.g2.com/external_clickthroughs/record?secure%5Bad_program%5D=ppc&amp;secure%5Bad_slot%5D=category_product_list&amp;secure%5Bcategory_id%5D=1848&amp;secure%5Bdisplayable_resource_id%5D=1848&amp;secure%5Bdisplayable_resource_type%5D=Category&amp;secure%5Bmedium%5D=sponsored&amp;secure%5Bplacement_reason%5D=page_category&amp;secure%5Bplacement_resource_ids%5D%5B%5D=1848&amp;secure%5Bprioritized%5D=false&amp;secure%5Bproduct_id%5D=146605&amp;secure%5Bresource_id%5D=1848&amp;secure%5Bresource_type%5D=Category&amp;secure%5Bsource_type%5D=category_page&amp;secure%5Bsource_url%5D=https%3A%2F%2Fwww.g2.com%2Fcategories%2Fzero-trust-networking%2Fenterprise&amp;secure%5Btoken%5D=37f5c8cd28310187015cac1a20cfcba583639f5693a193c09f91a303d79c9568&amp;secure%5Burl%5D=https%3A%2F%2Fwww.securew2.com%2Fjoinnow-platform%3Futm_source%3Dg2%26utm_medium%3Dcpc%26utm_campaign%3Dcategory-listing&amp;secure%5Burl_type%5D=custom_url)

---

  
## Buyer Guide: Key Questions for Choosing Zero Trust Networking Software Software
  ### What does Zero Trust Networking software do?
  I define Zero Trust Networking software as an access-control layer for private applications, networks, devices, and workloads. It checks identity, device trust, policy, and context before a user or device reaches a resource. From what I see across G2 reviewer accounts, these platforms are used to narrow access through MFA, device posture checks, certificates, network segmentation, private app access, policy rules, and activity monitoring. Instead of giving users broad network entry through older VPN models, the software helps security teams grant access to specific resources under specific conditions.


  ### Why do businesses use Zero Trust Networking software?
  When I reviewed G2 sentiment in this category, the recurring pressure point was access risk. Remote work, contractor access, unmanaged devices, and exposed internal applications all made it harder for teams to trust network-level access alone.

From the patterns I evaluated, several outcomes show up consistently:

- Reviewers describe secure remote access as a core use case, especially for distributed teams and users working outside the office.
- Many appreciate MFA, 2FA, SSO, certificates, and posture checks because access decisions account for both the user and the device.
- Security teams use these tools to reduce broad VPN exposure, hide private applications, and limit movement across the network.
- Admins value logs, alerts, device visibility, and policy views because they make access activity easier to review.

However, reviewers also point to setup effort, certificate handling, console complexity, offline access, reporting limits, pricing, and policy tuning as areas that need close evaluation.


  ### Who uses Zero Trust Networking software primarily?
  After analyzing G2 reviewer profiles, I found that Zero Trust Networking software serves teams that manage secure access, network control, and device trust.

- **Security administrators:** Define access policies, review authentication activity, and monitor risk signals.
- **Network engineers:** Manage segmentation, routing, certificates, private access paths, and traffic controls.
- **IT administrators:** Roll out MFA, manage users and devices, troubleshoot access, and support day-to-day connectivity.
- **Infrastructure teams:** Protect internal apps, servers, cloud environments, and hybrid access paths.
- **MSPs and consultants:** Deploy and manage zero trust controls across client environments.


  ### What types of Zero Trust Networking software should I consider?
  When I examined how reviewers describe the products in this category, Zero Trust Networking platforms generally cluster into a few groups:

- **Zero trust network access tools:** Built for private application access, remote users, identity checks, and reduced VPN exposure.
- **SASE and SSE platforms:** Combine secure access with web security, cloud app control, and policy enforcement.
- **MFA and identity access tools:** Focus on user verification, SSO, adaptive access, and login protection.
- **Network access control tools:** Manage certificates, device onboarding, wired or wireless access, and endpoint visibility.
- **Microsegmentation tools:** Limit lateral movement, map traffic, and contain breach spread.


  ### What are the core features to look for in Zero Trust Networking software?
  From the G2 review patterns I evaluated, the strongest tools tend to combine access control with usable administration.

- **Identity-based policies** with MFA, SSO, role rules, and conditional access.
- **Device posture checks,** endpoint visibility, certificates, and compliance status.
- **Private application access** that limits exposure of internal systems.
- **Network segmentation** or microsegmentation for containment.
- **Policy creation, policy testing, alerts,** access logs, and reporting.
- **Integrations** with identity providers, directories, endpoint tools, SIEM platforms, and cloud environments.
- **Admin controls** for user groups, fallback access, offline codes, and certificate handling.
- Stable client performance, clear setup steps, and support during rollout or access issues.


  ### What trends are shaping Zero Trust Networking software right now?
  From my analysis of recent reviewer discussions and current security guidance, several shifts are reshaping this category:

- **Resource-level access is replacing broad network access:** Security teams are granting access to specific applications and workloads rather than entire networks.
- **Device trust is becoming central to access decisions:** Posture checks, certificates, and endpoint compliance are now part of the access flow.
- **Microsegmentation is becoming more practical:** Teams are using smaller access zones to reduce lateral movement after a breach.
- **Zero trust rollouts are becoming phased programs:** Organizations are moving from broad strategy to step-by-step maturity plans.
- **Visibility and governance are getting more weight:** Access logs, policy controls, and cross-domain reporting are becoming core buying criteria.


  ### How should I choose Zero Trust Networking software?
  Based on the G2 review data I analyzed, I suggest choosing around the access risk your team needs to reduce first. For remote access, the strongest fit should handle private app access, MFA, device posture, client reliability, and user setup cleanly. Lateral movement concerns call for segmentation, traffic mapping, policy testing, and reporting. Identity and device-control gaps require closer review of SSO, certificates, posture checks, offline access, and admin workflows. I also advise weighing rollout effort, console usability, integrations, pricing, and support quality, since reviewers often connect those details with long-term success.



---

  ## What Are the Top-Rated Zero Trust Networking Software Products in 2026?
### 1. [Forescout Platform](https://www.g2.com/products/forescout-platform/reviews)
  **Average Rating:** 4.5/5.0
  **Total Reviews:** 15
  **Product Description:** Based in Silicon Valley, Forescout is your zero-trust partner. With 1000s of customers and decades of cyber leadership including threat research, Forescout has your back. Your journey to Universal Zero Trust Network Access starts with the Forescout 4D platform™: the only platform for UZTNA powered by agentic AI. Continuously identify, protect, and ensure the compliance of all assets – IT, IoT, IoMT and OT – regardless of location, automatically. Deliver cloud-native network security intelligence boosted by agentic workflows from the pioneer of traditional NAC. Shift from reactive firefighting to proactive risk management. Get continuous visibility into what’s actually exposed across every connected asset — managed or not, physical or virtual — then take control and automate compliance. The result? Priorities managed. Peace of mind.



### What Do G2 Reviewers Say About Forescout Platform?
*AI-generated summary from verified user reviews*

**Pros:**

- Users value Forescout Platform for its **comprehensive security** and ability to provide complete visibility across all devices.
- Users value the **instant discovery and classification** capabilities of Forescout, enhancing network security and management.
- Users value the **comprehensive visibility** Forescout provides for all IP-based devices in their network.
- Users value the **instant visibility** provided by Forescout, enabling effective management of all connected endpoints in the network.
- Users value the **customization options** of Forescout Platform, enabling tailored solutions for diverse network environments.

**Cons:**

- Users find the **implementation complex** due to dependencies, lack of documentation, and time-consuming tasks.
- Users struggle with **dependency issues** that complicate integration and support, making implementation and troubleshooting challenging.
- Users face **integration issues** with Forescout Platform, citing complex processes and poor documentation as major obstacles.
- Users report significant **performance issues** with Forescout Platform, including slow TAC support and complicated deployments.
- Users are frustrated with the **poor customer support** , experiencing slow TAC responses and inadequate solutions during critical issues.
  #### What Are Recent G2 Reviews of Forescout Platform?

**"[Complete Device Visibility with Powerful Automation and Integrations](https://www.g2.com/survey_responses/forescout-platform-review-10795997)"**

**Rating:** 4.5/5.0 stars
*— Sumit B.*

[Read full review](https://www.g2.com/survey_responses/forescout-platform-review-10795997)

---

**"[Flexible Platform That Simplifies Monitoring and Integration with your actual tools](https://www.g2.com/survey_responses/forescout-platform-review-12806544)"**

**Rating:** 5.0/5.0 stars
*— Verified User in Information Technology and Services*

[Read full review](https://www.g2.com/survey_responses/forescout-platform-review-12806544)

---

  #### What Are G2 Users Discussing About Forescout Platform?

- [What is Forescout Platform used for?](https://www.g2.com/discussions/what-is-forescout-platform-used-for)
### 2. [Ivanti Neurons for ZTA](https://www.g2.com/products/ivanti-neurons-for-zta/reviews)
  **Average Rating:** 4.6/5.0
  **Total Reviews:** 5
  **Product Description:** Ivanti Neurons for Zero Trust Access (nZTA) reduces unauthorized access risk by continuously verifying user and device posture at each request to prevent credential‑based compromise. Its software‑defined perimeter hides applications from the internet (“dark cloud”), removes discoverable attack surfaces, and limits lateral movement. Centralized policy orchestration enables rapid deployment without architectural changes, while direct‑to‑app access avoids traffic hair‑pinning to improve performance. nZTA provides consistent, secure access to private applications across on‑prem and cloud environments, supporting both modern and legacy estates.



### What Do G2 Reviewers Say About Ivanti Neurons for ZTA?
*AI-generated summary from verified user reviews*

**Pros:**

- Users value the **proactive monitoring** that enables timely alerts, enhancing IT operations and minimizing system downtime.
- Users appreciate the **proactive notifications** of Ivanti Neurons for ZTA, enabling timely actions for system outages.

**Cons:**

- Users find the **difficult learning curve** challenging, especially when lacking expertise in setup and integration of security tools.
- Users note that **required expertise** can complicate Ivanti Neurons for ZTA setup, especially for less experienced organizations.
  #### What Are Recent G2 Reviews of Ivanti Neurons for ZTA?

**"[Network Solution with Zero Trust principles.](https://www.g2.com/survey_responses/ivanti-neurons-for-zta-review-9105806)"**

**Rating:** 4.5/5.0 stars
*— Mithra K.*

[Read full review](https://www.g2.com/survey_responses/ivanti-neurons-for-zta-review-9105806)

---

**"[Feature Rich context-aware authentication tool](https://www.g2.com/survey_responses/ivanti-neurons-for-zta-review-10978419)"**

**Rating:** 5.0/5.0 stars
*— Verified User in Information Technology and Services*

[Read full review](https://www.g2.com/survey_responses/ivanti-neurons-for-zta-review-10978419)

---

### 3. [NetFoundry Network as a Service (NaaS)](https://www.g2.com/products/netfoundry-network-as-a-service-naas/reviews)
  **Average Rating:** 4.0/5.0
  **Total Reviews:** 8
  **Product Description:** IT wants to minimize the costs of managing network infrastructure, but needs control of secure, high performance networking. That&#39;s why NetFoundry reinvented NaaS to remove the telco, hardware and circuit handcuffs, and put IT in full control: ● IT centrally controls cloud orchestrated networking via your choice of web portal, APIs or your existing DevOps tools ● Global networking infrastructure managed by NetFoundry as NaaS - no SD-WAN controller, circuit or hardware deployments ● Use any network provider and works with any WAN, without disruption ● Zero Trust SASE ● At least 2x VPN performance for most apps, across the NetFoundry performance optimizing Fabric (controlled by you, with the infrastructure managed by NetFoundry as NaaS) ● The only NaaS which provides end-to-end security and performance via NetFoundry software for IoT devices, mobiles, IT devices and application embedded



### What Do G2 Reviewers Say About NetFoundry Network as a Service (NaaS)?
*AI-generated summary from verified user reviews*

**Pros:**

- Users appreciate the **simplified networking** offered by NetFoundry, enhancing deployment and management without traditional VPNs or hardware.
- Users appreciate the **simplified networking** of NetFoundry, enjoying secure and easy-to-manage connectivity without traditional VPNs.
- Users value the **deployment ease** of NetFoundry, appreciating its secure, zero-trust connectivity without traditional VPNs.
- Users appreciate the **simplified networking** of NetFoundry NaaS, enjoying secure and easy deployment without traditional VPNs.
- Users appreciate the **simplified networking** of NetFoundry, enjoying secure, zero-trust connectivity without traditional headaches.

  #### What Are Recent G2 Reviews of NetFoundry Network as a Service (NaaS)?

**"[Net foundry  network seamless secure solution for distributed teams](https://www.g2.com/survey_responses/netfoundry-network-as-a-service-naas-review-9684632)"**

**Rating:** 5.0/5.0 stars
*— Verified User in Information Technology and Services*

[Read full review](https://www.g2.com/survey_responses/netfoundry-network-as-a-service-naas-review-9684632)

---

**"[It&#39;s very helpful and good](https://www.g2.com/survey_responses/netfoundry-network-as-a-service-naas-review-10330124)"**

**Rating:** 5.0/5.0 stars
*— Shareen K.*

[Read full review](https://www.g2.com/survey_responses/netfoundry-network-as-a-service-naas-review-10330124)

---

### 4. [SonicWall Cloud Secure Edge](https://www.g2.com/products/sonicwall-cloud-secure-edge/reviews)
  **Average Rating:** 4.1/5.0
  **Total Reviews:** 10
  **Product Description:** SonicWall Cloud Secure Edge is a modern, cloud-native Security Service Edge (SSE) solution that addresses the limitations of legacy network appliances with a unified, scalable approach to secure access. It empowers organizations that consist of a variety of users (employees, contractors, third parties, etc.) to seamlessly and securely connect to both private and internet resources from any device or location. At the core of CSE are five key capabilities that work together to deliver comprehensive protection and simplified connectivity: Zero Trust Network Access (ZTNA) Enforces “never trust, always verify” by granting access based on user identity, device posture, and contextual risk. Only verified, compliant users and devices can connect to sensitive applications and data. Secure Web Gateway (SWG) Inspects and filters web traffic in real time to block phishing, malicious sites, and unsafe downloads. Protects remote and hybrid workforces by ensuring secure internet access everywhere. Cloud Access Security Broker (CASB) Provides visibility and control over SaaS applications, including shadow IT. Enforces policies to ensure compliance with organizational and regulatory standards. Firewall-as-a-Service (FWaaS) Extends next-generation firewall capabilities into the cloud, delivering advanced traffic inspection, intrusion prevention, and threat protection—without physical appliances. VPN-as-a-Service (VPNaaS) Delivers secure, high-performance remote access with modern tunneling protocols. Simplifies connectivity while improving scalability, speed, and user experience.



### What Do G2 Reviewers Say About SonicWall Cloud Secure Edge?
*AI-generated summary from verified user reviews*

**Pros:**

- Users value the **robust security features** of SonicWall Cloud Secure Edge, ensuring protection against vulnerabilities and threats.
- Users value the **secure access** provided by SonicWall Cloud Secure Edge, enhancing protection against vulnerabilities and threats.
- Users appreciate the **threat protection** of SonicWall Cloud Secure Edge, effectively safeguarding organizations from vulnerabilities and risks.
- Users value the **robust authentication features** of SonicWall Cloud Secure Edge, enhancing their security and user experience.
- Users value the **accessible customer support** from SonicWall, especially for high priority issues requiring immediate attention.

**Cons:**

- Users experience significant **access issues** with SonicWall Cloud Secure Edge, hindering productivity and resource availability from remote locations.
- Users find the **cost effectiveness** of SonicWall Cloud Secure Edge lacking, leading to concerns over its overall value.
- Users encounter **integration issues** with SonicWall Cloud Secure Edge, leading to delays and frustration during implementation.
- Users highlight the need for improved **documentation and training content** for better utilization of SonicWall Cloud Secure Edge.
- Users experience **process delays** during implementation, leading to frustration and difficulties with integration.
  #### What Are Recent G2 Reviews of SonicWall Cloud Secure Edge?

**"[Secure access to edge and cloud with SonicWall](https://www.g2.com/survey_responses/sonicwall-cloud-secure-edge-review-9002158)"**

**Rating:** 4.5/5.0 stars
*— Pranav S.*

[Read full review](https://www.g2.com/survey_responses/sonicwall-cloud-secure-edge-review-9002158)

---

**"[Great Layer of Security](https://www.g2.com/survey_responses/sonicwall-cloud-secure-edge-review-8479066)"**

**Rating:** 5.0/5.0 stars
*— Amika L.*

[Read full review](https://www.g2.com/survey_responses/sonicwall-cloud-secure-edge-review-8479066)

---

  #### What Are G2 Users Discussing About SonicWall Cloud Secure Edge?

- [What is Banyan Security used for?](https://www.g2.com/discussions/what-is-banyan-security-used-for)
### 5. [Veritas Netbackup Flex Appliance Security](https://www.g2.com/products/veritas-netbackup-flex-appliance-security/reviews)
  **Average Rating:** 4.4/5.0
  **Total Reviews:** 13
  **Product Description:** Flex Appliance moves beyond hyperconverged architectures and provides a unified NetBackup environment by making it simple to protect all your workloads and scale without increasing your hardware footprint.



### What Do G2 Reviewers Say About Veritas Netbackup Flex Appliance Security?
*AI-generated summary from verified user reviews*

**Pros:**

- Users value the **robust security features** of Veritas Netbackup Flex Appliance, ensuring data protection and compliance.
- Users commend the **secure access features** of Veritas Netbackup Flex Appliance, enhancing user management and data protection.
- Users value the **centralized user and role management** of Veritas Netbackup Flex Appliance, enhancing security and administration efficiency.
- Users value the **immutable backup storage** of Veritas Netbackup Flex Appliance Security, ensuring robust protection against ransomware attacks.
- Users find the **ease of use** of Veritas Netbackup Flex Appliance Security enhances their overall management experience.

**Cons:**

- Users find the **complex configuration** daunting, leading to potential misconfigurations and vulnerabilities for new users.
- Users find the **complex setup** daunting, especially those who are not tech-savvy, impacting overall usability.
- Users find the **difficult configuration** of Veritas Netbackup Flex Appliance Security challenging and prone to misconfiguration risks.
- Users report a **difficult learning curve** , making it challenging for new users to fully understand the appliance&#39;s functionality.
- Users highlight a **difficult learning curve** , making the initial setup and understanding of features challenging for newcomers.
  #### What Are Recent G2 Reviews of Veritas Netbackup Flex Appliance Security?

**"[Netbackup Flex Appliance Security: A robust protection for sensitive data](https://www.g2.com/survey_responses/veritas-netbackup-flex-appliance-security-review-10370143)"**

**Rating:** 4.0/5.0 stars
*— Verified User in Dairy*

[Read full review](https://www.g2.com/survey_responses/veritas-netbackup-flex-appliance-security-review-10370143)

---

**"[Strong Security and Data Protection Features](https://www.g2.com/survey_responses/veritas-netbackup-flex-appliance-security-review-10406863)"**

**Rating:** 4.0/5.0 stars
*— Mehul L.*

[Read full review](https://www.g2.com/survey_responses/veritas-netbackup-flex-appliance-security-review-10406863)

---

  #### What Are G2 Users Discussing About Veritas Netbackup Flex Appliance Security?

- [What is Veritas Flex Appliance used for?](https://www.g2.com/discussions/what-is-veritas-flex-appliance-used-for)
### 6. [AWS Verified access](https://www.g2.com/products/amazon-web-services-aws-aws-verified-access/reviews)
  **Average Rating:** 4.6/5.0
  **Total Reviews:** 4
  **Product Description:** AWS Verified Access is a service that enables secure access to corporate applications and resources without the need for a VPN. By implementing fine-grained access policies based on user identity and device security status, it ensures that only authorized users and compliant devices can access sensitive applications and data. This approach enhances security by continuously validating each access request against predefined policies, thereby reducing the risk of unauthorized access and potential security breaches. Additionally, Verified Access simplifies the management of access policies by allowing administrators to group applications with similar security requirements and manage them from a single interface. Comprehensive logging of access attempts provides enhanced observability, enabling quick identification and resolution of security incidents. Key Features and Functionality: - Fine-Grained Access Policies: Define detailed access controls based on user identity and device security posture, ensuring that access is granted only when specific security requirements are met. - User Authentication: Integrates with AWS IAM Identity Center and supports third-party identity providers using SAML or OpenID Connect, facilitating seamless user authentication. - Device Posture Assessment: Collaborates with third-party device management services to assess the security and compliance state of user devices, adding an extra layer of security. - Simplified Access Management: Allows grouping of applications with similar security needs, enabling administrators to create and manage access policies efficiently from a centralized interface. - Comprehensive Logging and Visibility: Provides detailed logs of all access attempts, supporting integration with services like Amazon S3, CloudWatch Logs, and Kinesis Data Firehose for enhanced monitoring and incident response. - Support for HTTP and TCP Applications: Offers secure access to both web-based applications and non-web-based applications, such as databases and EC2 instances, over protocols like SSH, TCP, and RDP. Primary Value and Problem Solved: AWS Verified Access addresses the challenges associated with traditional VPN-based remote access solutions, which can be complex to manage and may not provide the granular security controls required in modern IT environments. By eliminating the need for a VPN, it streamlines the user experience, allowing secure access to corporate applications from anywhere. The service enhances security posture by enforcing zero trust principles, continuously verifying each access request against detailed policies based on user identity and device security status. This approach reduces the risk of unauthorized access and lateral movement within the network. Additionally, Verified Access simplifies security operations by providing a centralized platform for managing access policies and offers comprehensive logging for improved monitoring and compliance.



### What Do G2 Reviewers Say About AWS Verified access?
*AI-generated summary from verified user reviews*

**Pros:**

- Users appreciate the **zero-trust access approach** of AWS Verified Access, enhancing security through strict verification protocols.
- Users value the **secure access** provided by AWS Verified Access, ensuring thorough verification for every entry request.

**Cons:**

- Users find the **complex initial setup and policy management** of AWS Verified Access challenging and time-consuming.
- Users find the **difficult configuration** of AWS Verified Access can lead to confusion and testing challenges during setup.
- Users find the **difficult learning curve** of AWS Verified Access challenging due to complex setup and policy management.
- Users often face **integration issues** with AWS Verified Access due to complex setup and management of policies.
  #### What Are Recent G2 Reviews of AWS Verified access?

**"[AWS Verified access](https://www.g2.com/survey_responses/aws-verified-access-review-11782942)"**

**Rating:** 5.0/5.0 stars
*— Narender R.*

[Read full review](https://www.g2.com/survey_responses/aws-verified-access-review-11782942)

---

**"[Single sign on tool for application access](https://www.g2.com/survey_responses/aws-verified-access-review-9510227)"**

**Rating:** 4.5/5.0 stars
*— Vishal G.*

[Read full review](https://www.g2.com/survey_responses/aws-verified-access-review-9510227)

---

### 7. [CimTrak Integrity Suite](https://www.g2.com/products/cimtrak-integrity-suite/reviews)
  **Average Rating:** 4.8/5.0
  **Total Reviews:** 23
  **Product Description:** Cimcor is the leading provider of System Integrity Assurance with our award-winning CimTrak Integrity Suite that protects a wide range of physical, network, cloud, and virtual IT assets in real time. CimTrak provides detailed analysis, evidence, and automated workflows that enforce an unprecedented security posture, ensures operational availability, stops zero-day attacks, detects unexpected changes, and achieves and maintains continuous compliance in a simple and cost-effective manner.



### What Do G2 Reviewers Say About CimTrak Integrity Suite?
*AI-generated summary from verified user reviews*

**Pros:**

- Users find the **compliance checking feature** of CimTrak Integrity Suite particularly useful for their PCI Compliance needs.
- Users find the **compliance checking feature** of CimTrak Integrity Suite extremely useful and informative for PCI compliance.
- Users find CimTrak Integrity Suite&#39;s **ease of use** exceptional, enhancing their compliance management experience significantly.
- Users commend the **outstanding customer support** of CimTrak, highlighting the team&#39;s knowledge and availability.
- Users value the **real-time monitoring** of files and configurations, enhancing threat detection and response capability.

**Cons:**

- Users feel the **dashboard issues** in CimTrak Integrity Suite hinder the modernity and effectiveness of the interface.
- Users express frustration with the **update issues** and hope for a more streamlined upgrade process in CimTrak Integrity Suite.
- Users feel the **compliance issues** stem from dated UI and lackluster dashboards in the CimTrak Integrity Suite.
- Users find the **lack of guidance** during upgrades frustrating, preferring a more integrated upgrade process.
- Users find the **poor customer support** of CimTrak Integrity Suite frustrating, impacting their overall experience with the product.
  #### What Are Recent G2 Reviews of CimTrak Integrity Suite?

**"[Excellent Product Support](https://www.g2.com/survey_responses/cimtrak-integrity-suite-review-11203730)"**

**Rating:** 5.0/5.0 stars
*— Keenan L.*

[Read full review](https://www.g2.com/survey_responses/cimtrak-integrity-suite-review-11203730)

---

**"[It has been really helpful within my organisation](https://www.g2.com/survey_responses/cimtrak-integrity-suite-review-11532439)"**

**Rating:** 4.0/5.0 stars
*— Charles John L.*

[Read full review](https://www.g2.com/survey_responses/cimtrak-integrity-suite-review-11532439)

---

### 8. [Skyhigh Security Service Edge](https://www.g2.com/products/skyhigh-security-service-edge/reviews)
  **Average Rating:** 4.5/5.0
  **Total Reviews:** 12
  **Product Description:** The Skyhigh Security Service Edge portfolio goes beyond data access and focuses on data use, allowing organizations to collaborate from any device and from anywhere without sacrificing security, while providing the visibility and control required to monitor and mitigate security risks. The Skyhigh Security Service Edge platform includes Skyhigh Secure Web Gateway, Skyhigh Cloud Access Security Broker, Skyhigh Private Access, and Skyhigh Cloud Native Application Protection Platform.



### What Do G2 Reviewers Say About Skyhigh Security Service Edge?
*AI-generated summary from verified user reviews*

**Pros:**

- Users value the **advanced threat protection** features of Skyhigh Security Service Edge, enhancing their overall data security.
- Users value the **data security** of Skyhigh Security Service Edge, effectively safeguarding sensitive information and preventing leaks.
- Users appreciate the **advanced threat detection** and comprehensive protection offered by Skyhigh Security Service Edge&#39;s cloud services.
- Users value the **data protection capabilities** of Skyhigh Security Service Edge, ensuring secure and reliable information management.
- Users find **easy integrations** with various SaaS solutions, enhancing functionality and simplifying security management.

**Cons:**

- Users find the **pricing quite high** compared to similar products, affecting their overall experience.
- Users find the **complex configuration** of the Skyhigh Security Service Edge challenging and cumbersome to manage effectively.
- Users find the **management complexity** of Skyhigh Security Service Edge challenging, particularly with EPO console integration.
- Users find the **complex setup** of Skyhigh Security Service Edge from another Epo console challenging and cumbersome.
- Users express concerns about the **dependency on internet connectivity** , affecting performance and requiring robust infrastructure.
  #### What Are Recent G2 Reviews of Skyhigh Security Service Edge?

**"[Solid partner and platform](https://www.g2.com/survey_responses/skyhigh-security-service-edge-review-9196748)"**

**Rating:** 4.5/5.0 stars
*— Dan M.*

[Read full review](https://www.g2.com/survey_responses/skyhigh-security-service-edge-review-9196748)

---

**"[Amazing Skyhigh Security Service Edge - HQ](https://www.g2.com/survey_responses/skyhigh-security-service-edge-review-9187990)"**

**Rating:** 4.5/5.0 stars
*— Horacio Q.*

[Read full review](https://www.g2.com/survey_responses/skyhigh-security-service-edge-review-9187990)

---

### 9. [Surf Security Zero Trust Enterprise Browser](https://www.g2.com/products/surf-security-zero-trust-enterprise-browser/reviews)
  **Average Rating:** 4.9/5.0
  **Total Reviews:** 5
  **Product Description:** Founded in London, UK in 2022, SURF Security is an endpoint protection Browser-SASE (secure access service edge) cybersecurity company that has created the world’s first enterprise zero-trust browser and extension with security at its core. These two products capitalise on the rise of both the working-from-home phenomenon, and ‘software as a service’ or SaaS platforms that are used through a browser. SURF secures the browser itself, either replacing or augmenting consumer browsers such as Chrome, Edge, or Safari. This approach helps ensure compliance, defends organisations from breaches and protects users from social engineering attacks such as phishing—all on the user’s device.



### What Do G2 Reviewers Say About Surf Security Zero Trust Enterprise Browser?
*AI-generated summary from verified user reviews*

**Pros:**

- Users value the **robust security** of Surf Security&#39;s Enterprise Browser, ensuring seamless and protected browsing experiences.
- Users commend Surf Security for its **robust security features** , ensuring seamless browsing while minimizing risks and unauthorized access.
- Users find Surf Security&#39;s Zero Trust Enterprise Browser to be a **reliable and efficient solution** for enhanced security management.
- Users appreciate the **granular access control** of Surf Security&#39;s browser, enhancing security and user management across platforms.
- Users highlight the **ease of use** of Surf Security&#39;s browser, enjoying seamless security without complex setup.

**Cons:**

- Users find the **complex configuration** process could be simplified with more predefined templates for easier setup.
- Users find the **difficult configuration** process could be improved with more ready-made templates for ease of setup.
- Users find the **onboarding process challenging** , requiring careful planning and consideration for effective product usage.
- Users desire more **ready-made configuration options** in Surf Security, which could streamline the initial setup process.
- Users find **onboarding difficulties** with Surf Security Zero Trust Enterprise Browser, requiring careful planning and consideration.
  #### What Are Recent G2 Reviews of Surf Security Zero Trust Enterprise Browser?

**"[The Perfect Browser Security Solution for Organizations](https://www.g2.com/survey_responses/surf-security-zero-trust-enterprise-browser-review-10423380)"**

**Rating:** 5.0/5.0 stars
*— Verified User in Computer Software*

[Read full review](https://www.g2.com/survey_responses/surf-security-zero-trust-enterprise-browser-review-10423380)

---

**"[Easy, Reliable, and Secure](https://www.g2.com/survey_responses/surf-security-zero-trust-enterprise-browser-review-10265568)"**

**Rating:** 4.5/5.0 stars
*— Amir E.*

[Read full review](https://www.g2.com/survey_responses/surf-security-zero-trust-enterprise-browser-review-10265568)

---

### 10. [Symantec Secure Access Cloud](https://www.g2.com/products/symantec-secure-access-cloud/reviews)
  **Average Rating:** 4.7/5.0
  **Total Reviews:** 17
  **Product Description:** Symantec Secure Access Cloud is a SaaS solution that enables more secure and granular access management to any corporate resource hosted on-premises or in the cloud. It uses Zero Trust Access principles in delivering point-to-point connectivity without agents or appliances, eliminating network level threats.


  #### What Are Recent G2 Reviews of Symantec Secure Access Cloud?

**"[I will always bet on Symantec Secure Access Cloud](https://www.g2.com/survey_responses/symantec-secure-access-cloud-review-8361936)"**

**Rating:** 5.0/5.0 stars
*— Kooi S.*

[Read full review](https://www.g2.com/survey_responses/symantec-secure-access-cloud-review-8361936)

---

**"[Good secure access tool](https://www.g2.com/survey_responses/symantec-secure-access-cloud-review-8315847)"**

**Rating:** 5.0/5.0 stars
*— Verified User in Information Technology and Services*

[Read full review](https://www.g2.com/survey_responses/symantec-secure-access-cloud-review-8315847)

---

  #### What Are G2 Users Discussing About Symantec Secure Access Cloud?

- [What is Symantec Secure Access Cloud used for?](https://www.g2.com/discussions/what-is-symantec-secure-access-cloud-used-for)
### 11. [threatER](https://www.g2.com/products/threater/reviews)
  **Average Rating:** 4.8/5.0
  **Total Reviews:** 33
  **Product Description:** threatER is the leading preemptive cybersecurity platform for building and maintaining trust at scale. Our SaaS solution continuously learns from all available data, allowing you to gain better insights and extract more value from your security stack. threatER transforms your security stack into a smart, adaptive and automated prevention engine. With threatER you reduce risk, get more value from your security investments and reinforce trust across every connection without slowing down your business. Learn more at www.threater.com.



### What Do G2 Reviewers Say About threatER?
*AI-generated summary from verified user reviews*

**Pros:**

- Users find threatER’s **ease of use** and seamless integration significantly enhance their threat management experience.
- Users value the **performance efficiency** of threatER, effectively reducing load and enhancing security through seamless integration.
- Users value the **effective hands-off security** of threatER, appreciating its ease of administration and robust threat management capabilities.
- Users find **setup ease** with threatER exceptional, facilitating quick deployment and smooth transitions for efficient security management.
- Users value the **dynamic threat protection** of threatER, significantly reducing malicious traffic and enhancing security measures.

**Cons:**

- Users experience **performance issues** with slow report generation and complex log handling, impacting overall efficiency.
- Users face **compatibility issues** with threatER, limiting deployment options and lacking support for Entra SSO.
- Users experience **false positives** leading to unnecessary whitelisting and complicated management of threat lists.
- Users find the **overzealous threat lists** problematic, often blocking legitimate IPs and complicating domain management.
- Users face **access issues** due to lack of centralized log searching through the SaaS portal.
  #### What Are Recent G2 Reviews of threatER?

**"[Easy Setup, Effective Threat Blocking, and Insightful Reporting](https://www.g2.com/survey_responses/threater-review-12436916)"**

**Rating:** 5.0/5.0 stars
*— Michael T.*

[Read full review](https://www.g2.com/survey_responses/threater-review-12436916)

---

**"[Highly Effective at Blocking Malicious Traffic Before It Reaches Your Network](https://www.g2.com/survey_responses/threater-review-12436920)"**

**Rating:** 5.0/5.0 stars
*— Greg V.*

[Read full review](https://www.g2.com/survey_responses/threater-review-12436920)

---

### 12. [Adaptiv](https://www.g2.com/products/adaptiv/reviews)
  **Average Rating:** 4.1/5.0
  **Total Reviews:** 10
  **Product Description:** SC//Connect™ secure SD-WAN solutions are purpose-built for highly distributed environments, such as retail, restaurants, franchises, and multi‑site enterprises. It provides cloud-managed, secure, reliable connectivity across all locations using existing broadband, LTE/5G, and private circuits—without the complexity of legacy WAN architectures. Designed for IT teams and managed service providers, SC//Connect combines intelligent traffic steering, application-aware routing, and zero‑touch deployment into a single, easy-to-operate platform. With centralized orchestration, built-in security, and real-time visibility, SC//Connect ensures critical applications stay online—even when individual network links fail or degrade. Unlike traditional VPN and router-based approaches, SC//Connect is engineered for real‑world broadband conditions, including CGNAT environments and carrier-managed links. This allows organizations to deliver consistent performance, uptime, and security across hundreds or thousands of sites with minimal operational overhead. Key Capabilities 1. Application-Aware SD-WAN Automatically identify and prioritize business-critical traffic, including POS, VoIP, SaaS, and cloud applications. SC//Connect dynamically steers traffic across all available links to deliver the best possible performance at all times. 2. Link Aggregation and Resiliency Bond multiple connections (fiber, DSL, cable, LTE/5G) into a single virtual WAN, increasing bandwidth and resiliency. If one link degrades or fails, traffic is instantly rerouted with no user impact. 3. Zero-Touch Deployment Deploy new sites quickly without on-site IT expertise. Devices auto-provision and connect securely to the cloud controller as soon as they are powered on. 4. Secure Connectivity Without Traditional VPN Complexity Enable secure site-to-site and site-to-cloud communication without static IPs, inbound firewall rules, or complex VPN configurations—ideal for broadband and CGNAT environments. 5. Centralized Cloud Management Manage policies, traffic priorities, and site configurations from a single cloud-based dashboard with real-time performance metrics and diagnostics. 6. Designed for Distributed Scale Proven in large multi-site deployments, SC//Connect simplifies network operations while reducing downtime, support costs, and dependency on specialized networking skills.



### What Do G2 Reviewers Say About Adaptiv?
*AI-generated summary from verified user reviews*

**Pros:**

- Users value the **hassle-free user interface** of Adaptiv, enhancing productivity and simplifying complex tasks effortlessly.
- Users love the **hassle-free user interface** of Adaptiv, which simplifies complex tasks and enhances productivity.
- Users appreciate the **automation** capabilities of Adaptiv, enhancing efficiency and simplifying network administration for better performance.
- Users value the **seamless efficiency** of Adaptiv, enhancing productivity by automating tasks and optimizing workflows.
- Users love the **cutting-edge algorithms** of Adaptiv, automating tasks and significantly enhancing network management efficiency.

**Cons:**

- Users experience a **complex configuration** process that can be time-consuming and demands technical expertise for effective setup.
- Users find the **complex implementation** of Adaptiv challenging, often needing extra time and support to get started.
- Users find the **difficult configuration** of Adaptiv challenging, often needing extra time and support for setup.
- Users face a **difficult learning curve** with Adaptiv, needing extra time and support to navigate its features.
- Users find the **difficult learning curve** of Adaptiv challenging, especially those who are not tech-savvy.
  #### What Are Recent G2 Reviews of Adaptiv?

**"[Incredibly powerful software with endless tailoring options.](https://www.g2.com/survey_responses/adaptiv-review-8247423)"**

**Rating:** 4.0/5.0 stars
*— Patrick B.*

[Read full review](https://www.g2.com/survey_responses/adaptiv-review-8247423)

---

**"[Adaptive Network Technology: Dynamic Connectivity](https://www.g2.com/survey_responses/adaptiv-review-12710730)"**

**Rating:** 5.0/5.0 stars
*— Vikas S.*

[Read full review](https://www.g2.com/survey_responses/adaptiv-review-12710730)

---

### 13. [Forcepoint Zero Trust Network Access (ZTNA)](https://www.g2.com/products/forcepoint-zero-trust-network-access-ztna/reviews)
  **Average Rating:** 4.8/5.0
  **Total Reviews:** 3
  **Product Description:** Forcepoint ONE ZTNA seamlessly extends zero trust to private apps in internal data centers and private clouds, securing remote access to private apps without the risks or costs associated with a VPN. Forcepoint ONE ZTNA controls private app access and keep data safe, while providing a seamless user experience, whether in the office or on the go and from any device. Easily implement zero trust policies, continuously verify remote workers, and grant access to only the private apps people need — even from BYOD and unmanaged devices.​



### What Do G2 Reviewers Say About Forcepoint Zero Trust Network Access (ZTNA)?
*AI-generated summary from verified user reviews*

**Pros:**

- Users value the **strong access control** and DLP features of Forcepoint ZTNA for enhanced security on the cloud.

  #### What Are Recent G2 Reviews of Forcepoint Zero Trust Network Access (ZTNA)?

**"[great product with enterprise features](https://www.g2.com/survey_responses/forcepoint-zero-trust-network-access-ztna-review-11128771)"**

**Rating:** 5.0/5.0 stars
*— ganapathi h.*

[Read full review](https://www.g2.com/survey_responses/forcepoint-zero-trust-network-access-ztna-review-11128771)

---

**"[Redefining Security in a Connected World](https://www.g2.com/survey_responses/forcepoint-zero-trust-network-access-ztna-review-9444642)"**

**Rating:** 5.0/5.0 stars
*— Mohammeds S.*

[Read full review](https://www.g2.com/survey_responses/forcepoint-zero-trust-network-access-ztna-review-9444642)

---

### 14. [iboss](https://www.g2.com/products/iboss/reviews)
  **Average Rating:** 4.0/5.0
  **Total Reviews:** 15
  **Product Description:** iboss is a leading Zero Trust Secure Access Service Edge (SASE) cloud security platform that consolidates network and security technologies into a single cloud-based service. By integrating VPN, Secure Web Gateway (SWG), SD-WAN, branch firewalls, Browser Isolation, and Cloud Access Security Broker (CASB) capabilities, iboss replaces legacy solutions to enhance security, reduce complexity, and lower costs. Utilizing Zero Trust Network Access (ZTNA), iboss grants users access only to the applications they need based on their identity, minimizing risks of breaches and data loss. As a unified network and security service with a single-pane-of-glass management console, iboss empowers organizations to enhance security, improve user experience, and support a distributed workforce in today&#39;s evolving digital landscape. Leveraging a purpose-built cloud architecture backed by 230+ issued and pending patents and more than 100 points of presence globally, iboss processes over 150 billion transactions daily, blocking 4 billion threats per day. More than 4,000 global enterprises trust the iboss platform to support their modern workforces, including a large number of Fortune 50 companies. iboss was named a Leader in the IDC MarketScape for Worldwide ZTNA, one of the Top 25 Cybersecurity Companies by The Software Report, one of the 25 highest-rated Private Cloud Computing Companies to work for by Battery Ventures, CRN’s top 20 Coolest Cloud Security Companies, and is one of Inc.’s 2024 Best Workplaces. To learn more, visit http://www.iboss.com


  #### What Are Recent G2 Reviews of iboss?

**"[Security Without Complications with Zero Trust](https://www.g2.com/survey_responses/iboss-review-12459556)"**

**Rating:** 4.5/5.0 stars
*— Carlos O.*

[Read full review](https://www.g2.com/survey_responses/iboss-review-12459556)

---

**"[one of the best cloud security](https://www.g2.com/survey_responses/iboss-review-9684045)"**

**Rating:** 4.5/5.0 stars
*— Joffrey G.*

[Read full review](https://www.g2.com/survey_responses/iboss-review-9684045)

---

  #### What Are G2 Users Discussing About iboss?

- [Why do schools use iboss?](https://www.g2.com/discussions/why-do-schools-use-iboss)
- [What is wrong with iboss?](https://www.g2.com/discussions/what-is-wrong-with-iboss)
- [How do I bypass iboss on a school computer?](https://www.g2.com/discussions/how-do-i-bypass-iboss-on-a-school-computer) - 1 comment
### 15. [Ivanti Neurons for Secure Access](https://www.g2.com/products/ivanti-neurons-for-secure-access/reviews)
  **Average Rating:** 4.7/5.0
  **Total Reviews:** 3
  **Product Description:** Ivanti Neurons for Secure Access (nSA) is a unified platform that seamlessly integrates Ivanti Connect Secure and Ivanti Neurons for Zero Trust Access, providing centralized management and analytics across diverse secure‑access deployments. It reduces operational risk by consolidating configuration, policy updates, logging, and lifecycle management into a single cloud‑delivered interface. Automated remediation and user‑behavior analytics identify anomalous or non‑compliant activity, while one‑click upgrades and cross‑gateway visibility streamline administration thereby strengthening control, improving reliability, and enhancing security at scale.



### What Do G2 Reviewers Say About Ivanti Neurons for Secure Access?
*AI-generated summary from verified user reviews*

**Pros:**

- Users value the **centralized management** of Secure Access for its efficiency in monitoring and enhancing security measures.
- Users value the **secure and centrally managed VPN** offered by Ivanti Neurons for Secure Access, enhancing their security posture.
- Users value the **centralized monitoring** of Ivanti Neurons for Secure Access, enhancing security and streamlining management processes.
- Users value the **secure VPN management** of Ivanti Neurons, appreciating its centralized control and firewall capabilities.
- Users value the **centralized management** of Ivanti Neurons for Secure Access, enhancing security through streamlined monitoring and procedures.

**Cons:**

- Users experience **connection issues** as it can be slow to establish a secure connection and requires manual cache clearing.
- Users experience occasional **slow internet** issues, including delays in establishing secure connections and needing to clear cache.
  #### What Are Recent G2 Reviews of Ivanti Neurons for Secure Access?

**"[Centralized management is provided by Secure Access](https://www.g2.com/survey_responses/ivanti-neurons-for-secure-access-review-11206175)"**

**Rating:** 5.0/5.0 stars
*— Zafar U.*

[Read full review](https://www.g2.com/survey_responses/ivanti-neurons-for-secure-access-review-11206175)

---

**"[Ivanti Neurons: Redefining secure access for the hybrid workforce](https://www.g2.com/survey_responses/ivanti-neurons-for-secure-access-review-11193392)"**

**Rating:** 5.0/5.0 stars
*— shilpa g.*

[Read full review](https://www.g2.com/survey_responses/ivanti-neurons-for-secure-access-review-11193392)

---

### 16. [Pomerium](https://www.g2.com/products/pomerium/reviews)
  **Average Rating:** 4.8/5.0
  **Total Reviews:** 12
  **Product Description:** Pomerium is an open-source context-aware gateway for managing secure, identity aware access to applications and services. IT management teams can easily use Pomerium to provision access and ensure security for all users without sacrificing productivity, resulting in better end user experiences. Visit us at https://www.pomerium.com/



### What Do G2 Reviewers Say About Pomerium?
*AI-generated summary from verified user reviews*

**Pros:**

- Users value the **responsive customer support** of Pomerium, enhancing their overall experience and satisfaction with the product.
- Users value Pomerium for its **effective data security** , preventing leaks and ensuring secure communication with clients.
- Users find Pomerium offers **deployment ease** , facilitating quick implementation and integration with existing company software.
- Users find Pomerium **easy to use** , appreciating its quick setup and seamless integration with existing company software.
- Users find Pomerium offers **easy access** with quick setup and seamless integration, enhancing secure data communication.

**Cons:**

- Users find Pomerium&#39;s interface **difficult to understand** , particularly as they are new to the application.
- Users find the **difficult learning curve** of Pomerium challenging, especially as they familiarize themselves with the application.
- Users find the **steep learning curve** of Pomerium challenging, especially as they are new to the application.
  #### What Are Recent G2 Reviews of Pomerium?

**"[Lead Software Engineer](https://www.g2.com/survey_responses/pomerium-review-9379895)"**

**Rating:** 5.0/5.0 stars
*— Marek L.*

[Read full review](https://www.g2.com/survey_responses/pomerium-review-9379895)

---

**"[Best Corporate Data Security](https://www.g2.com/survey_responses/pomerium-review-10604873)"**

**Rating:** 4.5/5.0 stars
*— ABHAY S.*

[Read full review](https://www.g2.com/survey_responses/pomerium-review-10604873)

---

### 17. [PureDome](https://www.g2.com/products/purevpn-puredome/reviews)
  **Average Rating:** 4.5/5.0
  **Total Reviews:** 37
  **Product Description:** PureDome is a corporate VPN with integrated cybersecurity, secure remote team connectivity, and data access solutions. It allows businesses to safeguard assets and boost productivity through a centralized platform. Moreover, PureDome’s intuitive dashboard lets businesses effectively manage their teams and employees operating on their corporate network, create groups, and control permissions through a unified point of administration. It offers various features and functionalities, including Wireguard protocol, cloud-based gateways, remote access capabilities, data access control, and dedicated IPs for individual users and teams. Benefits: Increased security Ease of deployment Multilayered protection Tailored VPN solution Prevents unauthorized access



### What Do G2 Reviewers Say About PureDome?
*AI-generated summary from verified user reviews*

**Pros:**

- Users find PureDome incredibly **easy to use and set up** , benefiting from seamless integration and excellent support.
- Users appreciate the **exceptional customer support** of PureDome, making setup and usage smooth and hassle-free.
- Users value the **reliability** of PureDome, ensuring secure access to company resources while traveling.
- Users highlight the **implementation ease** of PureDome, making it accessible for both admin and user sides.
- Users value the **easy integration** of PureDome with Google Chrome, enhancing access to company resources on the go.

**Cons:**

- Users experience **connection issues** with PureDome, facing disconnections that disrupt their workflow and productivity.
- Users report experiencing **connectivity issues** with PureDome, leading to disconnections during important tasks.
  #### What Are Recent G2 Reviews of PureDome?

**"[PureDome sets an example of what customer support should be.](https://www.g2.com/survey_responses/puredome-review-8847489)"**

**Rating:** 5.0/5.0 stars
*— Nick P.*

[Read full review](https://www.g2.com/survey_responses/puredome-review-8847489)

---

**"[One of the best VPN that I used.](https://www.g2.com/survey_responses/puredome-review-9934270)"**

**Rating:** 5.0/5.0 stars
*— Eman Francis J.*

[Read full review](https://www.g2.com/survey_responses/puredome-review-9934270)

---

### 18. [Remote.It](https://www.g2.com/products/remote-it/reviews)
  **Average Rating:** 4.5/5.0
  **Total Reviews:** 3
  **Product Description:** The remote.it Virtual Private Internet allows removal of global IP addresses and open ports, leaving a zero attack surface, while simultaneously solving the scarcity of global IPv4 addresses.



### What Do G2 Reviewers Say About Remote.It?
*AI-generated summary from verified user reviews*

**Pros:**

- Users appreciate the **convenient and secure remote access** offered by Remote.it for managing devices effortlessly.
- Users find the **ease of use** of Remote.It impressive, enabling quick setups and remote access for teams.
- Users appreciate the **easy access** to multiple devices and fast remote connections, enhancing team collaboration.
- Users appreciate the **reliability** of Remote.it, ensuring secure access when traditional methods fail.
- Users appreciate the **convenience and security** of Remote.It for effective remote device management without relying on traditional VPNs.

**Cons:**

- Users find the **setup and management complex** , suggesting improvements for a more user-friendly experience.
- Users find that **readability of remote addresses** needs improvement, along with a clearer understanding of software configurations.
  #### What Are Recent G2 Reviews of Remote.It?

**"[The perfect software to enhance remote connections](https://www.g2.com/survey_responses/remote-it-review-8530227)"**

**Rating:** 5.0/5.0 stars
*— ARJUN V.*

[Read full review](https://www.g2.com/survey_responses/remote-it-review-8530227)

---

**"[Secure and reliable remote access solution!](https://www.g2.com/survey_responses/remote-it-review-9566199)"**

**Rating:** 4.0/5.0 stars
*— Verified User in Information Technology and Services*

[Read full review](https://www.g2.com/survey_responses/remote-it-review-9566199)

---

  #### What Are G2 Users Discussing About Remote.It?

- [What is remote.it used for?](https://www.g2.com/discussions/what-is-remote-it-used-for) - 1 comment
### 19. [Scout Secured](https://www.g2.com/products/scout-secured/reviews)
  **Average Rating:** 4.8/5.0
  **Total Reviews:** 3
  **Product Description:** Scout Secured is a cybersecurity software platform designed to help organizations and individuals secure remote devices and networks outside traditional corporate environments. It&#39;s a network security and monitoring solution that protects remote workers, small businesses, and home networks through centralized traffic control, threat detection, and visibility. The platform primarily serves small teams, distributed organizations, IT administrators, and security-conscious people who need reliable network protection without managing a full enterprise security stack. Common scenarios include securing remote employees, protecting home offices, monitoring outbound network traffic, and cutting down exposure to malicious domains and network-based threats. How does it work? Scout Secured operates as an always-on security layer, routing traffic through a protected network environment where activity gets filtered, inspected, and logged. Users handle everything through one interface that shows connected devices, lets them apply policies, and presents security alerts. No juggling multiple tools. Core capabilities include secure VPN connectivity that routes device and network traffic through a protected environment, DNS filtering to block malicious or high-risk domains, intrusion detection and prevention systems that identify suspicious network activity, device visibility features for tracking connected systems and their behavior, and threat alerting that surfaces notable security events and indicators. The platform builds on established security practices like encryption, access control, and continuous monitoring. These principles run throughout its networking and inspection components. Third-party cybersecurity labs have independently evaluated Scout Secured, and it&#39;s currently deployed by customers across multiple industries. Where does Scout Secured fit? It works well in environments where traditional enterprise security tools prove too complex, costly, or operationally heavy. Think scenarios with limited security staffing, heavy reliance on remote connectivity, or a need for centralized visibility across distributed locations. The focus on network-level protection and straightforward deployment means users get practical security for modern work and home environments without managing an extensive or fragmented toolset.



### What Do G2 Reviewers Say About Scout Secured?
*AI-generated summary from verified user reviews*

**Pros:**

- Users praise the **excellent customer support** of Scout Secured, quickly resolving issues for a seamless experience.
- Users appreciate the **ease of use** of Scout Secured, enjoying hassle-free setup and effective password management across devices.
- Users appreciate the **easy access** provided by Scout Secured, enabling seamless synchronization across devices, enhancing business security.
- Users find the **setup ease** of Scout Secured remarkable, enjoying quick configuration and reliable support during installation.

**Cons:**

- Users report **poor customer support** , facing delays in assistance which hampers their experience with Scout Secured.
  #### What Are Recent G2 Reviews of Scout Secured?

**"[Seamless Password Management, Stellar Support](https://www.g2.com/survey_responses/scout-secured-review-12339889)"**

**Rating:** 5.0/5.0 stars
*— Nick S.*

[Read full review](https://www.g2.com/survey_responses/scout-secured-review-12339889)

---

**"[Scout Secured: Simple and Effective.](https://www.g2.com/survey_responses/scout-secured-review-11075475)"**

**Rating:** 4.5/5.0 stars
*— Emmet S.*

[Read full review](https://www.g2.com/survey_responses/scout-secured-review-11075475)

---

### 20. [Versa SASE](https://www.g2.com/products/versa-networks-versa-sase/reviews)
  **Average Rating:** 4.7/5.0
  **Total Reviews:** 10
  **Product Description:** Versa SASE is a cloud-native, multi-tenant, multi-service software for a software defined network.



### What Do G2 Reviewers Say About Versa SASE?
*AI-generated summary from verified user reviews*

**Pros:**

- Users find Versa SASE to be **fast and easy to use** , greatly enhancing their remote work experience.
- Users value the **efficiency** of Versa SASE, highlighting its speed and ease for remote IT work.
- Users highlight the **reliability** of Versa SASE, which greatly supports their remote work needs in IT firms.
- Users value the **high security and reliability** of Versa SASE, enhancing their remote work experience significantly.
- Users appreciate the **speed and ease of use** of Versa SASE, enhancing their remote work experience significantly.

**Cons:**

- Users often face **connection issues** with Versa SASE, leading to crashes and disconnections during browsing.
- Users experience troubling **performance issues** with Versa SASE, such as crashes and frequent disconnections while browsing.
- Users report frequent **technical issues** , such as crashes and disconnections during browser access, impacting usability.
  #### What Are Recent G2 Reviews of Versa SASE?

**"[Easy and Fast](https://www.g2.com/survey_responses/versa-sase-review-11507771)"**

**Rating:** 4.5/5.0 stars
*— Kunal M.*

[Read full review](https://www.g2.com/survey_responses/versa-sase-review-11507771)

---

**"[One of the best tool for secure access](https://www.g2.com/survey_responses/versa-sase-review-8988798)"**

**Rating:** 4.5/5.0 stars
*— Pranav S.*

[Read full review](https://www.g2.com/survey_responses/versa-sase-review-8988798)

---

### 21. [Xiid Zero Knowledge Networking Architecture](https://www.g2.com/products/xiid-zero-knowledge-networking-architecture/reviews)
  **Average Rating:** 5.0/5.0
  **Total Reviews:** 3
  **Product Description:** Xiid has introduced an innovative and exclusive Zero Knowledge Network (ZKN) Architecture that is revolutionizing enterprise network security. Xiid&#39;s Zero Knowledge Networking (ZKN) is a novel security framework that overlays and safeguards your existing network. It enhances the principles of Zero Trust by incorporating Zero Knowledge Proofs to provide secure data exchange and access to resources without revealing any sensitive information about the data itself to third parties. Xiid’s proprietary software eliminates potential attack surfaces while providing credential-less access to remote machines, data, and applications, ensuring complete data confidentiality and offering unmatched protection and peace of mind.​ ​ Xiid&#39;s Zero Knowledge Networking technology proactively reduces the attack surface of your enterprise by exceeding Zero Trust. It harnesses the advantages of Zero Trust, such as least-privilege access, continuous verification and authentication, and continuous monitoring of network traffic, user activity, and device behavior, as well as facilitates network and resource segmentation. Additionally, through the power of Zero Knowledge Networking, Xiid enables credential-less authentication, secures all traffic with multiple layers of encryption, and eliminates the need for 3rd party data replication or open inbound ports, delivering the strongest network security on the market.​ Experience the benefits of fortified security and enhanced functionality while reducing costs and risks for your organization.


  #### What Are Recent G2 Reviews of Xiid Zero Knowledge Networking Architecture?

**"[Filling the liquid security and encryption gaps in a COTS product world.](https://www.g2.com/survey_responses/xiid-zero-knowledge-networking-architecture-review-8392663)"**

**Rating:** 5.0/5.0 stars
*— Verified User in Consulting*

[Read full review](https://www.g2.com/survey_responses/xiid-zero-knowledge-networking-architecture-review-8392663)

---

**"[The best technology at the best price](https://www.g2.com/survey_responses/xiid-zero-knowledge-networking-architecture-review-8432512)"**

**Rating:** 5.0/5.0 stars
*— massimiliano g.*

[Read full review](https://www.g2.com/survey_responses/xiid-zero-knowledge-networking-architecture-review-8432512)

---

### 22. [BeyondCorp](https://www.g2.com/products/beyondcorp/reviews)
  **Average Rating:** 4.3/5.0
  **Total Reviews:** 2
  **Product Description:** BeyondCorp is a Zero Trust security framework modeled by Google that shifts access controls from the perimeter to individual devices and users. The end result allows employees to work securely from any location without the need for a traditional VPN.


  #### What Are Recent G2 Reviews of BeyondCorp?

**"[best network converet into cloud](https://www.g2.com/survey_responses/beyondcorp-review-7858050)"**

**Rating:** 4.5/5.0 stars
*— HARSHAL S.*

[Read full review](https://www.g2.com/survey_responses/beyondcorp-review-7858050)

---

**"[BeyondCorp I like its function](https://www.g2.com/survey_responses/beyondcorp-review-7859113)"**

**Rating:** 4.0/5.0 stars
*— Scott S.*

[Read full review](https://www.g2.com/survey_responses/beyondcorp-review-7859113)

---

### 23. [ColorTokens Xtended ZeroTrust Security Platform](https://www.g2.com/products/colortokens-xtended-zerotrust-security-platform/reviews)
  **Average Rating:** 4.0/5.0
  **Total Reviews:** 2
  **Product Description:** Secure your workloads, users and critical assets from zero-day and advanced persistent threats in minutes


  #### What Are Recent G2 Reviews of ColorTokens Xtended ZeroTrust Security Platform?

**"[Excellent Product to Manage and Control Firewall](https://www.g2.com/survey_responses/colortokens-xtended-zerotrust-security-platform-review-8925710)"**

**Rating:** 4.0/5.0 stars
*— Rojen C.*

[Read full review](https://www.g2.com/survey_responses/colortokens-xtended-zerotrust-security-platform-review-8925710)

---

**"[Xtended Review](https://www.g2.com/survey_responses/colortokens-xtended-zerotrust-security-platform-review-10064767)"**

**Rating:** 4.0/5.0 stars
*— Verified User in Online Media*

[Read full review](https://www.g2.com/survey_responses/colortokens-xtended-zerotrust-security-platform-review-10064767)

---

### 24. [CyberArk Workforce Identity](https://www.g2.com/products/cyberark-workforce-identity/reviews)
  **Average Rating:** 4.5/5.0
  **Total Reviews:** 126
  **Product Description:** CyberArk Identity Overview CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and Identity Management solutions in a single offering. Workforce Access capabilities include single sign-on, multi-factor authentication, session security, and credential management. Identity Management capabilities include lifecycle management, identity orchestration, and identity governance. With CyberArk Identity, organizations can secure workforce access to applications, endpoints, and infrastructure and protect themselves from the leading cause of data breaches – compromised credentials. CyberArk Identity is part of the CyberArk Identity Security Platform. Built for the dynamic enterprise, CyberArk Identity Security Platform secures access for any identity to any resource or environment from anywhere using any device. The CyberArk Identity Security Platform enables operational efficiencies with a single admin portal, streamlines meeting compliance requirements with unified audit capabilities, and delivers Identity Security Intelligence for continuous identity threat detection and protection. Workforce Access solutions: • CyberArk Single Sign-On (SSO) is an easy-to-manage solution for one-click access to your cloud, mobile, and legacy apps. CyberArk SSO enables a secure and frictionless sign-in experience for both internal and external users that adjusts based on risk. • CyberArk App Gateway is an add-on to our Single Sign-On solution that enables VPN-less access to legacy applications. It allows companies to set up per-application, per-user access to individual legacy applications hosted on-premises. • CyberArk Adaptive Multi-Factor Authentication (MFA) helps strengthen security and prevent attacks involving compromised credentials by requiring users to present multiple forms of evidence to gain access to your applications. Unlike traditional MFA solutions, CyberArk Adaptive MFA uses AI-powered behavioral analytics and contextual information to determine which authentication factors to apply to a particular user in a specific situation. • CyberArk Secure Web Sessions is a cloud-based service that enables organizations to monitor, record, and audit end-user activity within high-risk and high-value web applications. Security and compliance specialists can use Secure Web Sessions to search recorded sessions using free text input and quickly filter events by users, dates, and actions. • CyberArk Workforce Password Management is an enterprise-focused password manager providing a user-friendly solution to store business application credentials in a centralized vault and securely share them with other users in the organization. Identity Management Services: • CyberArk Identity Lifecycle Management provides an easy way to route application access requests, create application accounts, manage entitlements for those accounts, and revoke access when necessary. • CyberArk Identity Flows is an identity orchestration solution that improves security, efficiency, and productivity by automating identity data and events. With Identity Flows, organizations can orchestrate complex identity management processes and synchronize identity data across diverse applications, directory stores, and repositories. • CyberArk Identity Compliance solution continuously discovers access, streamlines access certifications, and provides comprehensive identity analytics. Identity Compliance automates manually intensive, error-prone administrative processes, ensuring all workforce and privileged access rights are properly assigned and continually certified across enterprises.



### What Do G2 Reviewers Say About CyberArk Workforce Identity?
*AI-generated summary from verified user reviews*

**Pros:**

- Users appreciate the **ease of use** of CyberArk Workforce Identity, highlighted by its intuitive UI and streamlined processes.
- Users love the **efficient user access reviews** and modern UI of CyberArk Workforce Identity, streamlining access management.
- Users praise the **intuitive design** of CyberArk Workforce Identity, enhancing usability across diverse teams and improving security.
- Users highlight the **responsiveness and friendliness of customer support** , making interactions smooth and efficient.
- Users appreciate the **efficient access review capabilities** of CyberArk Workforce Identity, enhancing monitoring and management for authorized users.

**Cons:**

- Users feel the **missing integrations** limit functionality, with inconsistent dashboard capabilities and data access across platforms.
- Users find **integration issues** challenging, with limited platform support and cumbersome manual processes affecting productivity.
- Users desire **more automation** in CyberArk Workforce Identity, as manual processes hinder efficiency and integration.
- Users feel the product lacks **integrations and customization options** , limiting functionality with certain legacy platforms.
- Users find it frustrating that **some processes remain manual** , hindering integration with applications unable to use the extension.
  #### What Are Recent G2 Reviews of CyberArk Workforce Identity?

**"[Fast User-Device Linking, Needs Installation Speed Boost](https://www.g2.com/survey_responses/cyberark-workforce-identity-review-12700425)"**

**Rating:** 4.0/5.0 stars
*— Dominika T.*

[Read full review](https://www.g2.com/survey_responses/cyberark-workforce-identity-review-12700425)

---

**"[The way Access Reviews should be!](https://www.g2.com/survey_responses/cyberark-workforce-identity-review-8369131)"**

**Rating:** 5.0/5.0 stars
*— kam n.*

[Read full review](https://www.g2.com/survey_responses/cyberark-workforce-identity-review-8369131)

---

  #### What Are G2 Users Discussing About CyberArk Workforce Identity?

- [What are the benefits and drawbacks of using CyberArk Identity for identity and access management?](https://www.g2.com/discussions/what-are-the-benefits-and-drawbacks-of-using-cyberark-identity-for-identity-and-access-management)
### 25. [Dell Security](https://www.g2.com/products/dell-security/reviews)
  **Average Rating:** 4.3/5.0
  **Total Reviews:** 2
  **Product Description:** Customer-inspired, future-ready technology goes into every PowerEdge server, offering exceptional performance for small-business offices to enterprise hyperscale environments.


  #### What Are Recent G2 Reviews of Dell Security?

**"[Security peace of mind!](https://www.g2.com/survey_responses/dell-security-review-1442077)"**

**Rating:** 4.5/5.0 stars
*— Paul C.*

[Read full review](https://www.g2.com/survey_responses/dell-security-review-1442077)

---

**"[Experts on hand](https://www.g2.com/survey_responses/dell-security-review-4422307)"**

**Rating:** 4.0/5.0 stars
*— Verified User*

[Read full review](https://www.g2.com/survey_responses/dell-security-review-4422307)

---


    ## What Is Zero Trust Networking Software?
  [Zero Trust Architecture Software](https://www.g2.com/categories/zero-trust-architecture)
  ## What Software Categories Are Similar to Zero Trust Networking Software?
    - [Network Access Control Software](https://www.g2.com/categories/network-access-control-nac)
    - [Cloud Access Security Broker (CASB) Software](https://www.g2.com/categories/cloud-access-security-broker-casb)
    - [Software-Defined Perimeter (SDP) Software](https://www.g2.com/categories/software-defined-perimeter-sdp)
    - [Cloud Edge Security Software](https://www.g2.com/categories/cloud-edge-security)
    - [Secure Access Service Edge (SASE) Platforms](https://www.g2.com/categories/secure-access-service-edge-sase-platforms)
    - [Zero Trust Platforms](https://www.g2.com/categories/zero-trust-platforms)
    - [Secure Service Edge (SSE) Solutions](https://www.g2.com/categories/secure-service-edge-sse-solutions)

  
---

## How Do You Choose the Right Zero Trust Networking Software?

### What You Should Know About Zero Trust Networking Software

### **Zero Trust Networking Software Buying Insights at a Glance**

[Zero trust networking software](https://www.g2.com/categories/zero-trust-networking) enforces the principle of &quot;never trust, always verify&quot; by authenticating every access request, limiting lateral movement, and maintaining granular control over network resources. Instead of treating network perimeters as secure boundaries, these platforms assume breach and verify each connection attempt, whether from users, devices, or applications, before granting access. The result is a security architecture that feels more like continuous authentication and less like traditional perimeter defense.

Zero trust networking software has become central to modern cybersecurity strategies. Security teams rely on these platforms to implement application whitelisting, control network access without VPNs, enforce least-privilege policies, and maintain visibility across endpoints. In practice, the best zero trust networking software acts as the connective layer between identity management, endpoint security, and network access control workflows.

Based on G2 review data, users rate zero trust networking software strongly overall. Zero trust network products in the category have an average star rating of 4.60/5 and an average likelihood to recommend of 9.20/10. Ease-of-use metrics trend high across the category, with 6.32/7 for Ease of Use, 6.27/7 for Ease of Setup, and 6.38/7 for Quality of Support. These scores suggest that most security teams are able to adopt zero trust software relatively quickly once policies are configured.

The biggest buying pattern that appears across reviews is that teams evaluating zero trust network solutions are trying to balance two priorities at once: implementing comprehensive security controls and maintaining operational efficiency. Strong platforms typically succeed by combining application control, network segmentation, and user-friendly policy management that reduces manual oversight.

Common use cases include endpoint protection through application allow listing that blocks unauthorized software execution, secure remote access enabling users to connect to resources without traditional VPNs, lateral movement prevention restricting network traffic between systems, privilege management controlling admin rights and elevation requests, threat detection identifying malicious activity before execution, and compliance enforcement maintaining audit trails and access controls. Finance teams also rely on these platforms for DNS filtering, conditional access policies tied to device posture, and microsegmentation that isolates critical assets from the broader network.

Pricing for zero trust network companies usually scales with the number of protected endpoints, the number of enabled feature modules, managed detection and response services, and integration complexity. Entry-level plans typically start with basic application control and network filtering, while enterprise zero trust networking software offers advanced threat prevention, 24/7 SOC support, and zero trust network access (ZTNA) capabilities.

**Top 5 FAQs from zero trust networking software buyers**

- How do zero trust networking solutions balance security controls with user productivity?
- What deployment models do zero trust platforms support for hybrid and remote workforces?
- How well do zero trust network security tools integrate with existing [identity and endpoint management systems](https://www.g2.com/categories/endpoint-management)?
- What level of visibility and reporting do zero trust providers offer for compliance auditing?
- How do zero trust software platforms handle legacy applications that can&#39;t support modern authentication?

G2&#39;s top-rated zero trust networking software, based on verified reviews, includes [Zscaler Private Access,](https://www.g2.com/products/zscaler-private-access/reviews) [Palo Alto Networks IoT/OT Security](https://www.g2.com/products/palo-alto-networks-iot-ot-security/reviews), [Okta](https://www.g2.com/products/okta/reviews), [ThreatLocker Platform](https://www.g2.com/products/threatlocker-platform/reviews), and [Cisco Duo](https://www.g2.com/products/cisco-duo/reviews).

### What are the top-reviewed budgeting and forecasting software on G2?

[Zscaler Private Access](https://www.g2.com/products/zscaler-private-access/reviews)

- Number of Reviews: 85
- Satisfaction: 96
- Market Presence: 97
- G2 Score: 96

[Palo Alto Networks IoT/OT Security](https://www.g2.com/products/palo-alto-networks-iot-ot-security/reviews)

- Number of Reviews: 62
- Satisfaction: 91
- Market Presence: 82
- G2 Score: 86

[Okta](https://www.g2.com/products/okta/reviews)

- Number of Reviews: 186
- Satisfaction: 72
- Market Presence: 91
- G2 Score: 81

[ThreatLocker Platform](https://www.g2.com/products/threatlocker-platform/reviews)

- Number of Reviews: 89
- Satisfaction: 97
- Market Presence: 60
- G2 Score: 79

[Cisco Duo](https://www.g2.com/products/cisco-duo/reviews)

- Number of Reviews: 44
- Satisfaction: 68
- Market Presence: 69
- G2 Score: 69

Satisfaction reflects how users rate their experience with the product based on review signals such as usability, support, and likelihood to recommend. ([Source 2](https://www.g2.com/reports))

Market Presence represents a product&#39;s market footprint based on company size, user adoption, and product growth indicators. ([Source 2](https://www.g2.com/reports))

G2 Score combines Satisfaction and Market Presence to create a category-level ranking that enables direct product comparison. ([Source 2](https://www.g2.com/reports))

Learn more about how G2 calculates these scores. ([Source 1](https://documentation.g2.com/docs/research-scoring-methodologies))

### What I Often See in Zero Trust Networking Software

#### Pros: What I See Users Consistently Appreciating

- **Zero trust architecture prevents unauthorized application execution through default-deny policies**

_“I like the application control aspect of ThreatLocker Platform and the fact that it uses a Zero Trust method to prevent unknown execution or installation of software. With the application control, I get a wealth of information about what application is trying to run, where it’s running from, and what the application can do, such as talk to the internet or access other files. The zero trust method gives me full control, ensuring no application will run in my environment unless I approve of it first. I would say the initial setup, based on learning through their University, is pretty seamless, and ThreatLocker has an amazing team that helps make the process easier.”_ - [Dino L](https://www.g2.com/products/threatlocker-platform/reviews/threatlocker-platform-review-12457885)., ThreatLocker Platform Review

- **Secure network access eliminating traditional VPN dependencies for remote users**

_“I appreciate how Zscaler Private Access secures remote connectivity for our hybrid workforce without the need for traditional VPNs, enabling safe access to internal applications from any location. I am impressed by the product&#39;s ability to noticeably reduce latency and enhance the overall user experience, all while upholding a robust security posture and compliance standards. Setting it up has been straightforward for me, thanks to the clear documentation and the support of an active community.&amp;nbsp;_

_I also value how users can connect directly to the specific applications they require, without exposing the entire network. The solution is lightweight and fast, removing the hassle of managing VPNs and their often sluggish tunnels. The admin console offers excellent visibility, and integration with identity providers like Azure is seamless. I find the cost of Zscaler Private Access to be reasonable and attractive, particularly for enterprises, and I appreciate its recognition as a market leader.”_ - [Ritik S.](https://www.g2.com/products/zscaler-private-access/reviews/zscaler-private-access-review-11829562), Zscaler Private Access Review

- **Application whitelisting stops malware before it runs on endpoints**

_“I really like the strict application control and the ease of managing the ThreatLocker Platform. It ensures that only authorized applications can run, and the interface makes managing the application whitelist straightforward. The platform provides a solid and secure operation. Additionally, discovery and policy enforcement were easy, allowing for a quick standard of service.”_ - [Mark A.](https://www.g2.com/products/threatlocker-platform/reviews/threatlocker-platform-review-12437773), ThreatLocker Platform Review

#### Cons: Where I See Many Platforms Falling Short

- **Complex policy configuration requiring extensive planning during initial deployment**

_“The initial setup and implementation can be a bit complex and time-consuming, especially for first-time users. Sometimes troubleshooting issues takes longer than expected. Also, the pricing feels on the higher side and some advanced features require additional configuration knowledge. Improving documentation and simplifying setup would make it easier for new teams.”_ - [Deepak S.](https://www.g2.com/products/zscaler-private-access/reviews/zscaler-private-access-review-10788884), Zscaler Private Access Review

- **Steep learning curve navigating advanced features across multiple security modules**

“While the core functionality is strong, the initial learning curve for configuring risk-based policies and understanding the ML-driven device classification can be a bit steep, especially for teams new to OT environments. Additionally, the product documentation could be more detailed regarding troubleshooting advanced detection scenarios. Pricing can also become a concern for smaller organizations with hybrid networks, particularly when scaling to multiple remote sites or factories.” - [Verified User in Information Technology and Services](https://www.g2.com/products/palo-alto-networks-iot-ot-security/reviews/palo-alto-networks-iot-ot-security-review-11276520), Palo Alto Networks IoT/OT Security Review

### My Expert Takeaway on Zero Trust Networking Software in 2026

Review data suggests that zero trust networking software performs particularly well in areas that tend to drive long-term product adoption. The category averages 4.60 out of 5 stars, paired with a 9.20 out of 10 likelihood-to-recommend score, which indicates that most security teams see meaningful value from these platforms once they become part of the security workflow.

Where I see the biggest difference between average and high-performing security teams is how they use these tools beyond basic endpoint protection. The most successful teams treat zero trust software as a comprehensive security framework, not just as an application blocker. They actively leverage network control features, implement conditional access policies based on device posture, and use unified audit capabilities to track threats across their environment. That approach helps maintain stronger security postures and reduces time-to-detection when incidents occur.

I also notice stronger adoption patterns in industries where security threats are particularly intense, such as information technology services, computer and network security, healthcare, and financial services. In those environments, security teams often need to protect against sophisticated attacks while maintaining user productivity. Zero trust networking systems make it easier to enforce strict controls without losing visibility into endpoint activity.

Another clear trend in the data is that ease of deployment and support strongly influence adoption. Products with the highest recommendation scores tend to combine powerful security capabilities with learning modes that allow gradual rollout across organizations. Metrics like Ease of Setup (6.27/7) and Quality of Support (6.38/7) reinforce the idea that most teams can implement these platforms without significant operational friction, especially when vendors provide proactive engineering support.

If I were advising a team evaluating the best zero trust networking software, I would focus on three things early in the buying process: how easily security teams can configure policies without disrupting legitimate workflows, how effectively the platform provides visibility into blocked threats and access attempts, and how well it integrates with existing identity and endpoint management tools. The tools that perform best in those areas usually become foundational infrastructure for modern security operations.

### Zero Trust Networking Software FAQs

#### **What are the best zero trust network security tools?**

Zero trust network security requires comprehensive controls that combine identity verification, application control, and network segmentation. Top-rated zero trust network tools on G2 include:

- [Zscaler Private Access](https://www.g2.com/products/zscaler-private-access/reviews) **:** Cloud-native ZTNA platform for secure application access without VPNs.
- [Palo Alto Networks IoT/OT Security](https://www.g2.com/products/palo-alto-networks-iot-ot-security/reviews) **:** Advanced threat prevention and network security for enterprise environments.
- [Okta](https://www.g2.com/products/okta/reviews) **:** Identity-centric zero trust with adaptive authentication and access management.
- [ThreatLocker Platform](https://www.g2.com/products/threatlocker-platform/reviews) **:** Application allowlisting and endpoint protection with zero trust principles.
- [Cisco Duo](https://www.g2.com/products/cisco-duo/reviews) **:** Multi-factor authentication and device trust for secure access control.

#### **Which zero trust providers offer the strongest enterprise cybersecurity features?**

Enterprise teams need platforms that support large deployments, advanced policies, and centralized management. [Top enterprise zero trust networking software](https://www.g2.com/categories/zero-trust-networking/enterprise) options on G2 include:

- [Zscaler Private Access](https://www.g2.com/products/zscaler-private-access/reviews) **:** Cloud-native ZTNA platform designed for enterprise-scale secure access.
- [ThreatLocker Platform](https://www.g2.com/products/threatlocker-platform/reviews) **:** Enterprise-ready zero trust with application control and network segmentation.
- [Cisco Duo](https://www.g2.com/products/cisco-duo/reviews) **:** Widely deployed multi-factor authentication and zero trust access for enterprises.
- [Okta](https://www.g2.com/products/okta/reviews) **:** Identity-centric zero trust with enterprise SSO and adaptive authentication.
- [Prisma Access](https://www.g2.com/products/prisma-access/reviews) **:** Comprehensive [SASE platform](https://www.g2.com/categories/secure-access-service-edge-sase-platforms) with zero trust network access for large organizations.

#### **What are the top zero trust network solutions for small businesses?**

Small businesses typically need affordable, easy-to-deploy solutions with strong security fundamentals. [Top small business zero trust network options](https://www.g2.com/categories/zero-trust-networking/small-business) on G2 include:

- [ThreatLocker Platform](https://www.g2.com/products/threatlocker-platform/reviews) **:** Accessible zero trust security with manageable deployment for small teams.
- [Todyl Security Platform](https://www.g2.com/products/todyl-security-platform/reviews) **:** All-in-one security platform designed for small to mid-sized businesses.
- [Cisco Duo](https://www.g2.com/products/cisco-duo/reviews) **:** Simple multi-factor authentication and device trust for small organizations.
- [Check Point SASE](https://www.g2.com/products/check-point-sase/reviews) **:** Scalable SASE solution starting with small deployments.
- [GoodAccess](https://www.g2.com/products/goodaccess/reviews) **:** Zero trust network access built for smaller organizations and distributed teams.

#### **Which zero trust product should we use for network security?**

Network safety requires internal segmentation, access controls, and threat detection. Best products on G2 include:

- [ThreatLocker Platform](https://www.g2.com/products/threatlocker-platform/reviews) **:** Network control and application security for comprehensive protection.
- [Zscaler Private Access](https://www.g2.com/products/zscaler-private-access/reviews) **:** Cloud-based network security with zero trust access controls.
- [Check Point SASE](https://www.g2.com/products/check-point-sase/reviews) **:** Network security with zero trust segmentation and threat prevention.
- [Palo Alto Networks IoT/OT Security](https://www.g2.com/products/palo-alto-networks-iot-ot-security/reviews) **:** Advanced network security for IoT and operational technology.
- [FortiClient](https://www.g2.com/products/forticlient/reviews) **:** Network security with zero trust access for distributed environments.

#### **What zero trust solution is best for securing office networks?**

Office network security requires endpoint protection, internal segmentation, and access controls. Best solutions on G2 include:

- [ThreatLocker Platform](https://www.g2.com/products/threatlocker-platform/reviews) **:** Office endpoint and network security with application control.
- [Cisco Duo](https://www.g2.com/products/cisco-duo/reviews) **:** Secure access to office resources with multi-factor authentication.
- [Check Point SASE](https://www.g2.com/products/check-point-sase/reviews) **:** Office network security with zero trust segmentation.
- [FortiClient](https://www.g2.com/products/forticlient/reviews) **:** Comprehensive endpoint and network security for office environments.
- [Zscaler Private Access](https://www.g2.com/products/zscaler-private-access/reviews) **:** Secure access to office applications without traditional VPNs.

#### **What&#39;s the best zero trust platform for cloud services and SaaS environments?**

Cloud-first zero trust requires seamless integration with SaaS applications and remote access capabilities. Best platforms on G2 include:

- [Zscaler Private Access](https://www.g2.com/products/zscaler-private-access/reviews) **:** Purpose-built for cloud services with zero trust network access.
- [Cisco Duo](https://www.g2.com/products/cisco-duo/reviews) **:** Strong SaaS integration for secure authentication and device trust.
- [Check Point SASE](https://www.g2.com/products/check-point-sase/reviews) **:** Cloud-delivered SASE with zero trust for distributed environments.
- [ThreatLocker Platform](https://www.g2.com/products/threatlocker-platform/reviews) **:** Supports cloud deployment with application and network control.
- [FortiClient](https://www.g2.com/products/forticlient/reviews) **:** Integrates zero trust access with cloud-based security services.

#### **Which zero trust solution is best for securing remote access without VPNs?**

Zero Trust Network Access (ZTNA) eliminates VPN complexity while maintaining secure connections. Best tools on G2 include:

- [Zscaler Private Access](https://www.g2.com/products/zscaler-private-access/reviews) **:** Leading ZTNA platform for VPN-less secure access to applications.
- [ThreatLocker Platform](https://www.g2.com/products/threatlocker-platform/reviews) **:** Network control features enabling secure access without traditional VPNs.
- [Check Point SASE](https://www.g2.com/products/check-point-sase/reviews) **:** SASE platform with integrated ZTNA for remote workforce access.
- [Cisco Duo](https://www.g2.com/products/cisco-duo/reviews) **:** Secure access gateway offering a VPN alternative with zero-trust principles.
- [Kitecyber](https://www.g2.com/products/kitecyber/reviews) **:** Zero trust network access for remote users without VPN infrastructure.

### Sources

1. [G2 Research Scoring Methodologies](https://documentation.g2.com/docs/research-scoring-methodologies)
2. [G2 Market Presence Score Overview](https://www.g2.com/reports)

Researched By: [Brandon Summers-Miller](https://research.g2.com/insights/author/brandon-summers-miller)

Last updated on: March 15, 2026



    
