2026 Best Software Awards are here!See the list

Best Zero Trust Networking Software for Medium-Sized Businesses

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Products classified in the overall Zero Trust Networking category are similar in many regards and help companies of all sizes solve their business problems. However, medium-sized business features, pricing, setup, and installation differ from businesses of other sizes, which is why we match buyers to the right Medium-Sized Business Zero Trust Networking to fit their needs. Compare product ratings based on reviews from enterprise users or connect with one of G2's buying advisors to find the right solutions within the Medium-Sized Business Zero Trust Networking category.

In addition to qualifying for inclusion in the Zero Trust Networking Software category, to qualify for inclusion in the Medium-Sized Business Zero Trust Networking Software category, a product must have at least 10 reviews left by a reviewer from a medium-sized business.

Show More
Show Less

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

1 filter applied
Clear All
22 Listings in Zero Trust Networking Available
(493)4.5 out of 5
Optimized for quick response
6th Easiest To Use in Zero Trust Networking software
View top Consulting Services for Cisco Duo
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Duo stops identity-based threats and boosts workforce productivity. Our Continuous Identity Security solution provides the best access management experience across users, devices, and applications whi

    Users
    • Software Engineer
    • Consultant
    Industries
    • Information Technology and Services
    • Higher Education
    Market Segment
    • 41% Enterprise
    • 37% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cisco Duo Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    25
    Ease of Use
    22
    Authentication
    16
    Authentication Ease
    14
    Reliability
    12
    Cons
    Authentication Issues
    8
    Access Limitations
    7
    Complexity
    7
    Expensive
    7
    Internet Dependency
    7
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco Duo features and usability ratings that predict user satisfaction
    8.9
    Quality of Support
    Average: 8.8
    9.3
    Ease of Use
    Average: 8.9
    9.3
    Ease of Admin
    Average: 8.8
    9.4
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Company Website
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    721,631 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,386 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Duo stops identity-based threats and boosts workforce productivity. Our Continuous Identity Security solution provides the best access management experience across users, devices, and applications whi

Users
  • Software Engineer
  • Consultant
Industries
  • Information Technology and Services
  • Higher Education
Market Segment
  • 41% Enterprise
  • 37% Mid-Market
Cisco Duo Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
25
Ease of Use
22
Authentication
16
Authentication Ease
14
Reliability
12
Cons
Authentication Issues
8
Access Limitations
7
Complexity
7
Expensive
7
Internet Dependency
7
Cisco Duo features and usability ratings that predict user satisfaction
8.9
Quality of Support
Average: 8.8
9.3
Ease of Use
Average: 8.9
9.3
Ease of Admin
Average: 8.8
9.4
Application Security
Average: 8.9
Seller Details
Seller
Cisco
Company Website
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
721,631 Twitter followers
LinkedIn® Page
www.linkedin.com
95,386 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Zscaler Private Access (ZPA) is a cloud-based zero trust solution that securely connects users to private applications hosted in public clouds, data centers, or on-premises environments without relyin

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 46% Enterprise
    • 28% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Zscaler Private Access is a security tool that provides secure access to internal applications without using a traditional VPN.
    • Reviewers like the fast and reliable connection, the ease of use, and the enhanced security features that Zscaler Private Access offers.
    • Users mentioned that the initial setup can be complex and time-consuming, and troubleshooting issues can take longer than expected.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Zscaler Private Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    62
    Secure Access
    47
    Ease of Use
    45
    VPN Efficiency
    29
    Reliability
    21
    Cons
    Connection Issues
    22
    Slow Loading
    20
    Error Handling
    19
    Expensive
    18
    Slow Internet
    15
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Zscaler Private Access features and usability ratings that predict user satisfaction
    8.9
    Quality of Support
    Average: 8.8
    8.9
    Ease of Use
    Average: 8.9
    9.0
    Ease of Admin
    Average: 8.8
    9.2
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Zscaler
    Company Website
    Year Founded
    2008
    HQ Location
    San Jose, California
    Twitter
    @zscaler
    17,357 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    9,540 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Zscaler Private Access (ZPA) is a cloud-based zero trust solution that securely connects users to private applications hosted in public clouds, data centers, or on-premises environments without relyin

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 46% Enterprise
  • 28% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Zscaler Private Access is a security tool that provides secure access to internal applications without using a traditional VPN.
  • Reviewers like the fast and reliable connection, the ease of use, and the enhanced security features that Zscaler Private Access offers.
  • Users mentioned that the initial setup can be complex and time-consuming, and troubleshooting issues can take longer than expected.
Zscaler Private Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
62
Secure Access
47
Ease of Use
45
VPN Efficiency
29
Reliability
21
Cons
Connection Issues
22
Slow Loading
20
Error Handling
19
Expensive
18
Slow Internet
15
Zscaler Private Access features and usability ratings that predict user satisfaction
8.9
Quality of Support
Average: 8.8
8.9
Ease of Use
Average: 8.9
9.0
Ease of Admin
Average: 8.8
9.2
Application Security
Average: 8.9
Seller Details
Seller
Zscaler
Company Website
Year Founded
2008
HQ Location
San Jose, California
Twitter
@zscaler
17,357 Twitter followers
LinkedIn® Page
www.linkedin.com
9,540 employees on LinkedIn®
G2 Advertising
Sponsored
G2 Advertising
Get 2x conversion than Google Ads with G2 Advertising!
G2 Advertising places your product in premium positions on high-traffic pages and on targeted competitor pages to reach buyers at key comparison moments.
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ThreatLocker is a global leading Zero Trust Platform designed to empower organizations by providing them with the ability to control which applications are permitted to run on their networks. This sui

    Users
    • President
    • CEO
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 53% Small-Business
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ThreatLocker Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    93
    Threat Detection
    87
    Ease of Use
    76
    Security
    71
    Protection
    69
    Cons
    Learning Curve
    44
    Difficult Learning Curve
    30
    Difficult Configuration
    16
    Difficult Navigation
    14
    Training Required
    13
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatLocker Platform features and usability ratings that predict user satisfaction
    9.8
    Quality of Support
    Average: 8.8
    8.4
    Ease of Use
    Average: 8.9
    8.6
    Ease of Admin
    Average: 8.8
    8.1
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2017
    HQ Location
    Orlando, Florida, United States
    Twitter
    @ThreatLocker
    2,721 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    677 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ThreatLocker is a global leading Zero Trust Platform designed to empower organizations by providing them with the ability to control which applications are permitted to run on their networks. This sui

Users
  • President
  • CEO
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 53% Small-Business
  • 33% Mid-Market
ThreatLocker Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
93
Threat Detection
87
Ease of Use
76
Security
71
Protection
69
Cons
Learning Curve
44
Difficult Learning Curve
30
Difficult Configuration
16
Difficult Navigation
14
Training Required
13
ThreatLocker Platform features and usability ratings that predict user satisfaction
9.8
Quality of Support
Average: 8.8
8.4
Ease of Use
Average: 8.9
8.6
Ease of Admin
Average: 8.8
8.1
Application Security
Average: 8.9
Seller Details
Company Website
Year Founded
2017
HQ Location
Orlando, Florida, United States
Twitter
@ThreatLocker
2,721 Twitter followers
LinkedIn® Page
www.linkedin.com
677 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    What is Palo Alto Networks IoT/OT Security? Palo Alto Networks IoT/OT Security is a comprehensive solution delivering ML-powered visibility, prevention, and zero-trust enforcement in a single platf

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 35% Mid-Market
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Palo Alto Networks IoT/OT Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Threat Protection
    33
    Security
    30
    Ease of Use
    21
    Features
    20
    Monitoring
    18
    Cons
    Expensive
    29
    Complex Setup
    18
    Difficult Learning Curve
    16
    Difficult Configuration
    10
    Required Expertise
    9
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Palo Alto Networks IoT/OT Security features and usability ratings that predict user satisfaction
    8.3
    Quality of Support
    Average: 8.8
    8.2
    Ease of Use
    Average: 8.9
    8.5
    Ease of Admin
    Average: 8.8
    9.0
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    128,150 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    18,396 employees on LinkedIn®
    Ownership
    NYSE: PANW
Product Description
How are these determined?Information
This description is provided by the seller.

What is Palo Alto Networks IoT/OT Security? Palo Alto Networks IoT/OT Security is a comprehensive solution delivering ML-powered visibility, prevention, and zero-trust enforcement in a single platf

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 35% Mid-Market
  • 33% Small-Business
Palo Alto Networks IoT/OT Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Threat Protection
33
Security
30
Ease of Use
21
Features
20
Monitoring
18
Cons
Expensive
29
Complex Setup
18
Difficult Learning Curve
16
Difficult Configuration
10
Required Expertise
9
Palo Alto Networks IoT/OT Security features and usability ratings that predict user satisfaction
8.3
Quality of Support
Average: 8.8
8.2
Ease of Use
Average: 8.9
8.5
Ease of Admin
Average: 8.8
9.0
Application Security
Average: 8.9
Seller Details
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
128,150 Twitter followers
LinkedIn® Page
www.linkedin.com
18,396 employees on LinkedIn®
Ownership
NYSE: PANW
(1,165)4.5 out of 5
4th Easiest To Use in Zero Trust Networking software
View top Consulting Services for Okta
Entry Level Price:$6.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Okta, Inc. is The World’s Identity Company™. We secure AI, machine, and human identity so everyone is free to safely use any technology. Our customer and workforce solutions empower businesses and dev

    Users
    • Software Engineer
    • Account Executive
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 50% Mid-Market
    • 39% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Okta Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    180
    Security
    130
    Single Sign-On
    102
    Easy Access
    100
    Authentication
    94
    Cons
    Authentication Issues
    66
    Login Issues
    44
    Frequent Authentication
    31
    Complex Setup
    28
    Expensive
    27
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Okta features and usability ratings that predict user satisfaction
    8.9
    Quality of Support
    Average: 8.8
    9.3
    Ease of Use
    Average: 8.9
    9.1
    Ease of Admin
    Average: 8.8
    9.2
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Okta
    Company Website
    Year Founded
    2009
    HQ Location
    San Francisco, California
    Twitter
    @okta
    42,625 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,230 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Okta, Inc. is The World’s Identity Company™. We secure AI, machine, and human identity so everyone is free to safely use any technology. Our customer and workforce solutions empower businesses and dev

Users
  • Software Engineer
  • Account Executive
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 50% Mid-Market
  • 39% Enterprise
Okta Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
180
Security
130
Single Sign-On
102
Easy Access
100
Authentication
94
Cons
Authentication Issues
66
Login Issues
44
Frequent Authentication
31
Complex Setup
28
Expensive
27
Okta features and usability ratings that predict user satisfaction
8.9
Quality of Support
Average: 8.8
9.3
Ease of Use
Average: 8.9
9.1
Ease of Admin
Average: 8.8
9.2
Application Security
Average: 8.9
Seller Details
Seller
Okta
Company Website
Year Founded
2009
HQ Location
San Francisco, California
Twitter
@okta
42,625 Twitter followers
LinkedIn® Page
www.linkedin.com
7,230 employees on LinkedIn®
(270)4.4 out of 5
12th Easiest To Use in Zero Trust Networking software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Integrated endpoint protection that provides automated next-generation threat protection, as well as visibility and control of your software and hardware inventory across the entire security fabric. I

    Users
    • Software Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 57% Mid-Market
    • 26% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • FortiClient Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    9
    Security
    7
    Cybersecurity Protection
    4
    Performance
    4
    Protection
    4
    Cons
    Connection Issues
    4
    Unstable Connection
    4
    Remote Access Issues
    3
    Delay Issues
    2
    Delays
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FortiClient features and usability ratings that predict user satisfaction
    8.7
    Quality of Support
    Average: 8.8
    9.0
    Ease of Use
    Average: 8.9
    9.0
    Ease of Admin
    Average: 8.8
    9.3
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortinet
    Year Founded
    2000
    HQ Location
    Sunnyvale, CA
    Twitter
    @Fortinet
    151,524 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    15,801 employees on LinkedIn®
    Ownership
    NASDAQ: FTNT
Product Description
How are these determined?Information
This description is provided by the seller.

Integrated endpoint protection that provides automated next-generation threat protection, as well as visibility and control of your software and hardware inventory across the entire security fabric. I

Users
  • Software Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 57% Mid-Market
  • 26% Enterprise
FortiClient Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
9
Security
7
Cybersecurity Protection
4
Performance
4
Protection
4
Cons
Connection Issues
4
Unstable Connection
4
Remote Access Issues
3
Delay Issues
2
Delays
2
FortiClient features and usability ratings that predict user satisfaction
8.7
Quality of Support
Average: 8.8
9.0
Ease of Use
Average: 8.9
9.0
Ease of Admin
Average: 8.8
9.3
Application Security
Average: 8.9
Seller Details
Seller
Fortinet
Year Founded
2000
HQ Location
Sunnyvale, CA
Twitter
@Fortinet
151,524 Twitter followers
LinkedIn® Page
www.linkedin.com
15,801 employees on LinkedIn®
Ownership
NASDAQ: FTNT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cloudflare One is a single-vendor secure access service edge (SASE) platform that converges security and networking services into a unified, global connectivity cloud. It replaces legacy, fragmented h

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 37% Small-Business
    • 34% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cloudflare One (SASE) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    8
    Protection
    7
    Reliability
    7
    Security
    7
    User Interface
    6
    Cons
    Steep Learning Curve
    5
    Complexity
    4
    Difficult Learning
    4
    Difficult Learning Curve
    4
    Difficult Setup
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cloudflare One (SASE) features and usability ratings that predict user satisfaction
    9.2
    Quality of Support
    Average: 8.8
    9.1
    Ease of Use
    Average: 8.9
    9.1
    Ease of Admin
    Average: 8.8
    9.0
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2009
    HQ Location
    San Francisco, California
    Twitter
    @Cloudflare
    269,805 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    6,320 employees on LinkedIn®
    Ownership
    NYSE: NET
Product Description
How are these determined?Information
This description is provided by the seller.

Cloudflare One is a single-vendor secure access service edge (SASE) platform that converges security and networking services into a unified, global connectivity cloud. It replaces legacy, fragmented h

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 37% Small-Business
  • 34% Mid-Market
Cloudflare One (SASE) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
8
Protection
7
Reliability
7
Security
7
User Interface
6
Cons
Steep Learning Curve
5
Complexity
4
Difficult Learning
4
Difficult Learning Curve
4
Difficult Setup
4
Cloudflare One (SASE) features and usability ratings that predict user satisfaction
9.2
Quality of Support
Average: 8.8
9.1
Ease of Use
Average: 8.9
9.1
Ease of Admin
Average: 8.8
9.0
Application Security
Average: 8.9
Seller Details
Year Founded
2009
HQ Location
San Francisco, California
Twitter
@Cloudflare
269,805 Twitter followers
LinkedIn® Page
www.linkedin.com
6,320 employees on LinkedIn®
Ownership
NYSE: NET
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Forcepoint Data Security Cloud delivers unified visibility, control, and protection for data across endpoints, web, SaaS, and private applications, powered by Forcepoint’s AI Mesh and Data Security Ev

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 50% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Forcepoint Data Security Cloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    6
    Security
    6
    Customer Support
    5
    Ease of Use
    5
    Implementation Ease
    4
    Cons
    Complex Configuration
    4
    Complexity
    3
    Expensive
    3
    Complex Setup
    2
    Difficult Setup
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Forcepoint Data Security Cloud features and usability ratings that predict user satisfaction
    8.2
    Quality of Support
    Average: 8.8
    8.6
    Ease of Use
    Average: 8.9
    9.0
    Ease of Admin
    Average: 8.8
    7.8
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1994
    HQ Location
    Austin, TX
    Twitter
    @Forcepointsec
    65,556 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,658 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Forcepoint Data Security Cloud delivers unified visibility, control, and protection for data across endpoints, web, SaaS, and private applications, powered by Forcepoint’s AI Mesh and Data Security Ev

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 50% Enterprise
  • 38% Mid-Market
Forcepoint Data Security Cloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
6
Security
6
Customer Support
5
Ease of Use
5
Implementation Ease
4
Cons
Complex Configuration
4
Complexity
3
Expensive
3
Complex Setup
2
Difficult Setup
2
Forcepoint Data Security Cloud features and usability ratings that predict user satisfaction
8.2
Quality of Support
Average: 8.8
8.6
Ease of Use
Average: 8.9
9.0
Ease of Admin
Average: 8.8
7.8
Application Security
Average: 8.9
Seller Details
Year Founded
1994
HQ Location
Austin, TX
Twitter
@Forcepointsec
65,556 Twitter followers
LinkedIn® Page
www.linkedin.com
1,658 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The internet is the new corporate network, leading organizations to transition to their network security to Secure Access Service Edge (SASE). However, current solutions break the user experience with

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 49% Mid-Market
    • 35% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Check Point Harmony SASE is a cloud-based solution that combines network security and secure remote access into a single platform, providing secure connectivity for remote users and branch offices.
    • Reviewers frequently mention the seamless integration with existing tools, clear visibility into user activity, and the platform's ability to provide robust security without compromising performance or user experience.
    • Reviewers experienced complexity during the initial setup and policy configuration, a steep learning curve to understand all features, and occasional performance lags, especially in certain regions.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point SASE Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    44
    Ease of Use
    37
    Secure Access
    33
    Protection
    24
    Reliability
    22
    Cons
    Complex Implementation
    26
    Complex Configuration
    23
    Complex Setup
    21
    Difficult Learning Curve
    16
    Expensive
    16
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point SASE features and usability ratings that predict user satisfaction
    8.9
    Quality of Support
    Average: 8.8
    9.0
    Ease of Use
    Average: 8.9
    8.9
    Ease of Admin
    Average: 8.8
    8.1
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    70,997 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,356 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The internet is the new corporate network, leading organizations to transition to their network security to Secure Access Service Edge (SASE). However, current solutions break the user experience with

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 49% Mid-Market
  • 35% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Check Point Harmony SASE is a cloud-based solution that combines network security and secure remote access into a single platform, providing secure connectivity for remote users and branch offices.
  • Reviewers frequently mention the seamless integration with existing tools, clear visibility into user activity, and the platform's ability to provide robust security without compromising performance or user experience.
  • Reviewers experienced complexity during the initial setup and policy configuration, a steep learning curve to understand all features, and occasional performance lags, especially in certain regions.
Check Point SASE Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
44
Ease of Use
37
Secure Access
33
Protection
24
Reliability
22
Cons
Complex Implementation
26
Complex Configuration
23
Complex Setup
21
Difficult Learning Curve
16
Expensive
16
Check Point SASE features and usability ratings that predict user satisfaction
8.9
Quality of Support
Average: 8.8
9.0
Ease of Use
Average: 8.9
8.9
Ease of Admin
Average: 8.8
8.1
Application Security
Average: 8.9
Seller Details
Company Website
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
70,997 Twitter followers
LinkedIn® Page
www.linkedin.com
8,356 employees on LinkedIn®
(225)4.7 out of 5
Optimized for quick response
10th Easiest To Use in Zero Trust Networking software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Absolute Secure Access (formerly NetMotion by Absolute) is one of the company’s core product lines, which was added through the acquisition of NetMotion in July 2021. The product portfolio provides re

    Users
    • IT Director
    • System Administrator
    Industries
    • Law Enforcement
    • Government Administration
    Market Segment
    • 62% Mid-Market
    • 25% Enterprise
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Absolute is a VPN service that offers persistent connectivity, allowing users to switch between different networks without losing their connection.
    • Reviewers frequently mention the product's intelligent VPN connectivity, its ability to optimize network traffic for improved performance, and its comprehensive Insight tool for understanding client workflow.
    • Users reported that the initial setup and policy configuration can be complex, the user interface of the management console can feel outdated, and the licensing model can become complex depending on the specific features and scale of deployment.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Absolute Secure Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    18
    Customer Support
    11
    Secure Access
    11
    Reliability
    10
    VPN Efficiency
    10
    Cons
    Access Issues
    5
    Expensive
    5
    Complex Configuration
    4
    Complex Implementation
    4
    Integration Issues
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Absolute Secure Access features and usability ratings that predict user satisfaction
    9.3
    Quality of Support
    Average: 8.8
    9.1
    Ease of Use
    Average: 8.9
    8.7
    Ease of Admin
    Average: 8.8
    9.0
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1993
    HQ Location
    British Columbia, Canada
    Twitter
    @absolutecorp
    3,919 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,239 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Absolute Secure Access (formerly NetMotion by Absolute) is one of the company’s core product lines, which was added through the acquisition of NetMotion in July 2021. The product portfolio provides re

Users
  • IT Director
  • System Administrator
Industries
  • Law Enforcement
  • Government Administration
Market Segment
  • 62% Mid-Market
  • 25% Enterprise
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Absolute is a VPN service that offers persistent connectivity, allowing users to switch between different networks without losing their connection.
  • Reviewers frequently mention the product's intelligent VPN connectivity, its ability to optimize network traffic for improved performance, and its comprehensive Insight tool for understanding client workflow.
  • Users reported that the initial setup and policy configuration can be complex, the user interface of the management console can feel outdated, and the licensing model can become complex depending on the specific features and scale of deployment.
Absolute Secure Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
18
Customer Support
11
Secure Access
11
Reliability
10
VPN Efficiency
10
Cons
Access Issues
5
Expensive
5
Complex Configuration
4
Complex Implementation
4
Integration Issues
4
Absolute Secure Access features and usability ratings that predict user satisfaction
9.3
Quality of Support
Average: 8.8
9.1
Ease of Use
Average: 8.9
8.7
Ease of Admin
Average: 8.8
9.0
Application Security
Average: 8.9
Seller Details
Company Website
Year Founded
1993
HQ Location
British Columbia, Canada
Twitter
@absolutecorp
3,919 Twitter followers
LinkedIn® Page
www.linkedin.com
1,239 employees on LinkedIn®
(162)4.7 out of 5
3rd Easiest To Use in Zero Trust Networking software
Entry Level Price:Starting at $7.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    GoodAccess is a cybersecurity platform (SASE/SSE) that empowers medium-sized enterprises to easily implement Zero Trust Architecture (ZTA) in their infrastructure, regardless of its complexity or scal

    Users
    • CTO
    • CEO
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 77% Small-Business
    • 23% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • GoodAccess is a VPN solution that provides secure remote access and network security for businesses.
    • Reviewers like the simplicity of use, secure remote access, dependable network security, easy traffic monitoring, access control management, user onboarding, and the zero-trust security model that guarantees data safety.
    • Reviewers mentioned that new users may find the initial setup and configuration complicated, there is room for improvement in the documentation of some advanced settings, and the client sometimes disconnects requiring re-authentication.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • GoodAccess Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    77
    VPN Services
    47
    Reliability
    45
    Customer Support
    41
    Easy Setup
    32
    Cons
    Expensive
    23
    Connection Issues
    16
    Access Issues
    8
    Limited Location Options
    8
    Connectivity Issues
    7
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • GoodAccess features and usability ratings that predict user satisfaction
    9.3
    Quality of Support
    Average: 8.8
    9.5
    Ease of Use
    Average: 8.9
    9.4
    Ease of Admin
    Average: 8.8
    8.8
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2009
    HQ Location
    Usti nad Labem, Czech Republic, Europe
    LinkedIn® Page
    www.linkedin.com
    25 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

GoodAccess is a cybersecurity platform (SASE/SSE) that empowers medium-sized enterprises to easily implement Zero Trust Architecture (ZTA) in their infrastructure, regardless of its complexity or scal

Users
  • CTO
  • CEO
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 77% Small-Business
  • 23% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • GoodAccess is a VPN solution that provides secure remote access and network security for businesses.
  • Reviewers like the simplicity of use, secure remote access, dependable network security, easy traffic monitoring, access control management, user onboarding, and the zero-trust security model that guarantees data safety.
  • Reviewers mentioned that new users may find the initial setup and configuration complicated, there is room for improvement in the documentation of some advanced settings, and the client sometimes disconnects requiring re-authentication.
GoodAccess Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
77
VPN Services
47
Reliability
45
Customer Support
41
Easy Setup
32
Cons
Expensive
23
Connection Issues
16
Access Issues
8
Limited Location Options
8
Connectivity Issues
7
GoodAccess features and usability ratings that predict user satisfaction
9.3
Quality of Support
Average: 8.8
9.5
Ease of Use
Average: 8.9
9.4
Ease of Admin
Average: 8.8
8.8
Application Security
Average: 8.9
Seller Details
Company Website
Year Founded
2009
HQ Location
Usti nad Labem, Czech Republic, Europe
LinkedIn® Page
www.linkedin.com
25 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SecureW2 is a cloud-native authentication solution designed to enhance security by eliminating credential compromise through its innovative JoinNow Platform. This platform combines Dynamic Public Key

    Users
    No information available
    Industries
    • Primary/Secondary Education
    • Computer Software
    Market Segment
    • 53% Mid-Market
    • 42% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SecureW2 JoinNow Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    24
    Ease of Use
    20
    Setup Ease
    19
    Security
    17
    Reliability
    16
    Cons
    Performance Issues
    13
    Difficult Learning Curve
    6
    Expensive
    6
    Poor Documentation
    6
    Difficult Configuration
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SecureW2 JoinNow features and usability ratings that predict user satisfaction
    9.5
    Quality of Support
    Average: 8.8
    8.5
    Ease of Use
    Average: 8.9
    8.8
    Ease of Admin
    Average: 8.8
    8.8
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SecureW2
    Company Website
    Year Founded
    2014
    HQ Location
    Seattle, US
    Twitter
    @SecureW2
    86 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    118 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SecureW2 is a cloud-native authentication solution designed to enhance security by eliminating credential compromise through its innovative JoinNow Platform. This platform combines Dynamic Public Key

Users
No information available
Industries
  • Primary/Secondary Education
  • Computer Software
Market Segment
  • 53% Mid-Market
  • 42% Enterprise
SecureW2 JoinNow Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
24
Ease of Use
20
Setup Ease
19
Security
17
Reliability
16
Cons
Performance Issues
13
Difficult Learning Curve
6
Expensive
6
Poor Documentation
6
Difficult Configuration
5
SecureW2 JoinNow features and usability ratings that predict user satisfaction
9.5
Quality of Support
Average: 8.8
8.5
Ease of Use
Average: 8.9
8.8
Ease of Admin
Average: 8.8
8.8
Application Security
Average: 8.9
Seller Details
Seller
SecureW2
Company Website
Year Founded
2014
HQ Location
Seattle, US
Twitter
@SecureW2
86 Twitter followers
LinkedIn® Page
www.linkedin.com
118 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Strengthen Your Security with Check Point Gateways and Firewalls Check Point Hybrid Mesh Network Security is a comprehensive cybersecurity solution designed to protect networks from sophisticated

    Users
    • Network Security Engineer
    • Network Engineer
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 44% Mid-Market
    • 42% Enterprise
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Check Point Next Generation Firewalls (NGFWs) is a network security solution that combines advanced threat prevention, application control, and deep packet inspection in a single, unified platform.
    • Users frequently mention the product's robust security features, high performance, and the convenience of its centralized management console, SmartConsole, which simplifies policy configuration and monitoring.
    • Reviewers mentioned the high initial cost, complexity of the licensing model, steep learning curve for new administrators, and occasional slow performance in the management console as drawbacks.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point Next Generation Firewalls (NGFWs) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cybersecurity
    94
    Features
    83
    Threat Detection
    79
    Network Security
    71
    Centralized Management
    63
    Cons
    Expensive
    69
    Complexity
    50
    Slow Performance
    45
    Complex Setup
    43
    Learning Curve
    37
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point Next Generation Firewalls (NGFWs) features and usability ratings that predict user satisfaction
    8.3
    Quality of Support
    Average: 8.8
    8.5
    Ease of Use
    Average: 8.9
    8.6
    Ease of Admin
    Average: 8.8
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    70,997 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,356 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Strengthen Your Security with Check Point Gateways and Firewalls Check Point Hybrid Mesh Network Security is a comprehensive cybersecurity solution designed to protect networks from sophisticated

Users
  • Network Security Engineer
  • Network Engineer
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 44% Mid-Market
  • 42% Enterprise
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Check Point Next Generation Firewalls (NGFWs) is a network security solution that combines advanced threat prevention, application control, and deep packet inspection in a single, unified platform.
  • Users frequently mention the product's robust security features, high performance, and the convenience of its centralized management console, SmartConsole, which simplifies policy configuration and monitoring.
  • Reviewers mentioned the high initial cost, complexity of the licensing model, steep learning curve for new administrators, and occasional slow performance in the management console as drawbacks.
Check Point Next Generation Firewalls (NGFWs) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cybersecurity
94
Features
83
Threat Detection
79
Network Security
71
Centralized Management
63
Cons
Expensive
69
Complexity
50
Slow Performance
45
Complex Setup
43
Learning Curve
37
Check Point Next Generation Firewalls (NGFWs) features and usability ratings that predict user satisfaction
8.3
Quality of Support
Average: 8.8
8.5
Ease of Use
Average: 8.9
8.6
Ease of Admin
Average: 8.8
0.0
No information available
Seller Details
Company Website
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
70,997 Twitter followers
LinkedIn® Page
www.linkedin.com
8,356 employees on LinkedIn®
(31)4.8 out of 5
Optimized for quick response
5th Easiest To Use in Zero Trust Networking software
Entry Level Price:Starting at $25.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Kitecyber is a comprehensive cybersecurity solution designed to protect endpoint devices, users, applications, and data for organizations of all sizes. Headquartered in the Bay Area, California, Kitec

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 52% Mid-Market
    • 48% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • KiteCyber is a cybersecurity platform that provides device management, security controls, and compliance management features.
    • Users frequently mention the ease of installation, intuitive user interface, comprehensive security features, and the responsive and knowledgeable support team as key benefits of using KiteCyber.
    • Users experienced minor issues with certain features behaving unexpectedly, occasional delays in implementing high-priority action items, and a need for improvement in customization and reporting features.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Kitecyber Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    10
    Ease of Use
    9
    Features
    9
    Security
    7
    Reliability
    6
    Cons
    Limited Features
    2
    Process Delays
    2
    Usability Issues
    2
    Alert Issues
    1
    Difficult Configuration
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Kitecyber features and usability ratings that predict user satisfaction
    9.8
    Quality of Support
    Average: 8.8
    9.7
    Ease of Use
    Average: 8.9
    9.1
    Ease of Admin
    Average: 8.8
    9.5
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kitecyber
    Company Website
    Year Founded
    2022
    HQ Location
    Santa Clara, California, United States
    LinkedIn® Page
    www.linkedin.com
    12 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Kitecyber is a comprehensive cybersecurity solution designed to protect endpoint devices, users, applications, and data for organizations of all sizes. Headquartered in the Bay Area, California, Kitec

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 52% Mid-Market
  • 48% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • KiteCyber is a cybersecurity platform that provides device management, security controls, and compliance management features.
  • Users frequently mention the ease of installation, intuitive user interface, comprehensive security features, and the responsive and knowledgeable support team as key benefits of using KiteCyber.
  • Users experienced minor issues with certain features behaving unexpectedly, occasional delays in implementing high-priority action items, and a need for improvement in customization and reporting features.
Kitecyber Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
10
Ease of Use
9
Features
9
Security
7
Reliability
6
Cons
Limited Features
2
Process Delays
2
Usability Issues
2
Alert Issues
1
Difficult Configuration
1
Kitecyber features and usability ratings that predict user satisfaction
9.8
Quality of Support
Average: 8.8
9.7
Ease of Use
Average: 8.9
9.1
Ease of Admin
Average: 8.8
9.5
Application Security
Average: 8.9
Seller Details
Seller
Kitecyber
Company Website
Year Founded
2022
HQ Location
Santa Clara, California, United States
LinkedIn® Page
www.linkedin.com
12 employees on LinkedIn®
(108)4.4 out of 5
Optimized for quick response
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Portnox offers cloud-native zero trust access control and cybersecurity essentials that enable agile, resource-constrained IT teams to proactively address today’s most pressing security challenges: th

    Users
    • Network Engineer
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 39% Mid-Market
    • 37% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Portnox Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    16
    Customer Support
    10
    Implementation Ease
    10
    Setup Ease
    9
    Integrations
    8
    Cons
    Performance Issues
    8
    Connection Issues
    5
    Difficult Learning
    4
    Expensive
    4
    Poor Interface Design
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Portnox features and usability ratings that predict user satisfaction
    8.8
    Quality of Support
    Average: 8.8
    8.7
    Ease of Use
    Average: 8.9
    8.5
    Ease of Admin
    Average: 8.8
    7.5
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Portnox
    Company Website
    Year Founded
    2007
    HQ Location
    Austin, Texas
    Twitter
    @portnox
    828 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    99 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Portnox offers cloud-native zero trust access control and cybersecurity essentials that enable agile, resource-constrained IT teams to proactively address today’s most pressing security challenges: th

Users
  • Network Engineer
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 39% Mid-Market
  • 37% Enterprise
Portnox Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
16
Customer Support
10
Implementation Ease
10
Setup Ease
9
Integrations
8
Cons
Performance Issues
8
Connection Issues
5
Difficult Learning
4
Expensive
4
Poor Interface Design
4
Portnox features and usability ratings that predict user satisfaction
8.8
Quality of Support
Average: 8.8
8.7
Ease of Use
Average: 8.9
8.5
Ease of Admin
Average: 8.8
7.5
Application Security
Average: 8.9
Seller Details
Seller
Portnox
Company Website
Year Founded
2007
HQ Location
Austin, Texas
Twitter
@portnox
828 Twitter followers
LinkedIn® Page
www.linkedin.com
99 employees on LinkedIn®