Introducing G2.ai, the future of software buying.Try now

Best Zero Trust Networking Software - Page 2

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Zero trust networking software is a type of network security and identity management solution used to implement the zero trust security model. As opposed to traditional network security systems, which provide a castle-and-moat system for granting access into a network, the zero trust model assumes every individual, both internal and external, is a potential threat until they are verified.

Companies have adopted the zero trust security model since decentralized business models and IT systems have made it significantly more complicated to ensure proper access controls are in place across multiple networks and physical locations. Zero trust networking solutions allow companies to continuously monitor network activity and user behavior to adapt authentication requirements on an individual basis. Verified individuals behaving abnormally or attempting to violate their permissions will be prompted to provide further authentication. Data is collected from access points, behaviors, and traffic logs to provide in-depth network security analytics capabilities.

Zero trust networking software utilizes similar authentication methods as risk-based authentication software, but is specifically for network access control. Risk-based authentication is more broad and its methods can be applied to accessing a network, application, database, or any other privileged information.

To qualify for inclusion in the Zero Trust Networking category, a product must:

Utilize adaptive authentication to continuously verify user permissions
Allow for network segmentation to simplify and broaden policy enforcement
Monitor traffic and user behavior for future inspection and analysis
Show More
Show Less

Featured Zero Trust Networking Software At A Glance

Free Plan Available:
SecureW2 JoinNow
Sponsored
Highest Performer:
Easiest to Use:
Show LessShow More
Highest Performer:
Easiest to Use:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Zero Trust Networking Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
148 Listings in Zero Trust Networking Available
(45)4.5 out of 5
8th Easiest To Use in Zero Trust Networking software
View top Consulting Services for Palo Alto Networks Panorama
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Panorama network security management provides static rules and dynamic security updates in an ever-changing threat landscape. Reduce administrator workload and improve your overall security posture wi

    Users
    • Network Engineer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 53% Enterprise
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Palo Alto Networks Panorama Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Centralized Management
    2
    Features
    2
    Ease of Use
    1
    Security
    1
    User Interface
    1
    Cons
    Complex Setup
    1
    Difficult Learning Curve
    1
    Expensive
    1
    Poor Customer Support
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Palo Alto Networks Panorama features and usability ratings that predict user satisfaction
    8.5
    Quality of Support
    Average: 8.8
    8.8
    Ease of Use
    Average: 8.9
    9.0
    Ease of Admin
    Average: 8.8
    8.8
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    127,223 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    18,396 employees on LinkedIn®
    Ownership
    NYSE: PANW
Product Description
How are these determined?Information
This description is provided by the seller.

Panorama network security management provides static rules and dynamic security updates in an ever-changing threat landscape. Reduce administrator workload and improve your overall security posture wi

Users
  • Network Engineer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 53% Enterprise
  • 40% Mid-Market
Palo Alto Networks Panorama Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Centralized Management
2
Features
2
Ease of Use
1
Security
1
User Interface
1
Cons
Complex Setup
1
Difficult Learning Curve
1
Expensive
1
Poor Customer Support
1
Palo Alto Networks Panorama features and usability ratings that predict user satisfaction
8.5
Quality of Support
Average: 8.8
8.8
Ease of Use
Average: 8.9
9.0
Ease of Admin
Average: 8.8
8.8
Application Security
Average: 8.9
Seller Details
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
127,223 Twitter followers
LinkedIn® Page
www.linkedin.com
18,396 employees on LinkedIn®
Ownership
NYSE: PANW
(74)4.7 out of 5
Optimized for quick response
12th Easiest To Use in Zero Trust Networking software
Save to My Lists
Entry Level Price:Starting at $5.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Twingate is a secure remote access solution for an organization’s private applications, data, and environments, whether they are on-premise or in the cloud. Built to make the lives of DevOps teams, IT

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 51% Mid-Market
    • 43% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Twingate Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    9
    Security
    9
    Secure Access
    7
    Access Management
    6
    Easy Setup
    6
    Cons
    Performance Issues
    10
    Limited Customization
    5
    Complex Implementation
    4
    Complex Configuration
    3
    Lacking Features
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Twingate features and usability ratings that predict user satisfaction
    9.1
    Quality of Support
    Average: 8.8
    9.7
    Ease of Use
    Average: 8.9
    9.1
    Ease of Admin
    Average: 8.8
    8.7
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    HQ Location
    Redwood City, California
    Twitter
    @TwingateHQ
    2,334 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    75 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Twingate is a secure remote access solution for an organization’s private applications, data, and environments, whether they are on-premise or in the cloud. Built to make the lives of DevOps teams, IT

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 51% Mid-Market
  • 43% Small-Business
Twingate Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
9
Security
9
Secure Access
7
Access Management
6
Easy Setup
6
Cons
Performance Issues
10
Limited Customization
5
Complex Implementation
4
Complex Configuration
3
Lacking Features
3
Twingate features and usability ratings that predict user satisfaction
9.1
Quality of Support
Average: 8.8
9.7
Ease of Use
Average: 8.9
9.1
Ease of Admin
Average: 8.8
8.7
Application Security
Average: 8.9
Seller Details
Company Website
HQ Location
Redwood City, California
Twitter
@TwingateHQ
2,334 Twitter followers
LinkedIn® Page
www.linkedin.com
75 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Check Point Identity Awareness provides granular visibility of users, groups and machines, providing unmatched application and access control through the creation of accurate, identity-based policies.

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 56% Enterprise
    • 41% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point Identity Awareness Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    4
    Seamless Implementation
    4
    Easy Integrations
    3
    Monitoring
    2
    Secure Access
    2
    Cons
    Complexity Issues
    2
    Complex Setup
    2
    Difficult Learning Curve
    1
    Integration Issues
    1
    Poor Interface Design
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point Identity Awareness features and usability ratings that predict user satisfaction
    8.1
    Quality of Support
    Average: 8.8
    8.4
    Ease of Use
    Average: 8.9
    8.9
    Ease of Admin
    Average: 8.8
    9.6
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    70,917 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,323 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

Check Point Identity Awareness provides granular visibility of users, groups and machines, providing unmatched application and access control through the creation of accurate, identity-based policies.

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 56% Enterprise
  • 41% Mid-Market
Check Point Identity Awareness Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
4
Seamless Implementation
4
Easy Integrations
3
Monitoring
2
Secure Access
2
Cons
Complexity Issues
2
Complex Setup
2
Difficult Learning Curve
1
Integration Issues
1
Poor Interface Design
1
Check Point Identity Awareness features and usability ratings that predict user satisfaction
8.1
Quality of Support
Average: 8.8
8.4
Ease of Use
Average: 8.9
8.9
Ease of Admin
Average: 8.8
9.6
Application Security
Average: 8.9
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
70,917 Twitter followers
LinkedIn® Page
www.linkedin.com
8,323 employees on LinkedIn®
Ownership
NASDAQ:CHKP
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Forcepoint Data Security Cloud delivers unified visibility, control, and protection for data across endpoints, web, SaaS, and private applications, powered by Forcepoint’s AI Mesh and Data Security Ev

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 50% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Forcepoint Data Security Cloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    6
    Security
    6
    Customer Support
    5
    Ease of Use
    5
    Implementation Ease
    4
    Cons
    Complex Configuration
    4
    Complexity
    3
    Expensive
    3
    Complex Setup
    2
    Difficult Setup
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Forcepoint Data Security Cloud features and usability ratings that predict user satisfaction
    8.2
    Quality of Support
    Average: 8.8
    8.6
    Ease of Use
    Average: 8.9
    9.0
    Ease of Admin
    Average: 8.8
    7.8
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1994
    HQ Location
    Austin, TX
    Twitter
    @Forcepointsec
    65,541 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,679 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Forcepoint Data Security Cloud delivers unified visibility, control, and protection for data across endpoints, web, SaaS, and private applications, powered by Forcepoint’s AI Mesh and Data Security Ev

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 50% Enterprise
  • 38% Mid-Market
Forcepoint Data Security Cloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
6
Security
6
Customer Support
5
Ease of Use
5
Implementation Ease
4
Cons
Complex Configuration
4
Complexity
3
Expensive
3
Complex Setup
2
Difficult Setup
2
Forcepoint Data Security Cloud features and usability ratings that predict user satisfaction
8.2
Quality of Support
Average: 8.8
8.6
Ease of Use
Average: 8.9
9.0
Ease of Admin
Average: 8.8
7.8
Application Security
Average: 8.9
Seller Details
Year Founded
1994
HQ Location
Austin, TX
Twitter
@Forcepointsec
65,541 Twitter followers
LinkedIn® Page
www.linkedin.com
1,679 employees on LinkedIn®
(45)4.7 out of 5
15th Easiest To Use in Zero Trust Networking software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Todyl empowers businesses of any size with a complete, end-to-end security program. The Todyl Security Platform converges SASE, SIEM, Endpoint Security, GRC, MXDR, and more into a cloud-native, singl

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 89% Small-Business
    • 11% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Todyl Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    15
    Customer Support
    12
    Features
    11
    Solutions
    8
    Easy Integrations
    7
    Cons
    Limited Features
    5
    Technical Issues
    4
    Difficult Setup
    3
    Improvements Needed
    3
    Lacking Features
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Todyl Security Platform features and usability ratings that predict user satisfaction
    9.5
    Quality of Support
    Average: 8.8
    8.5
    Ease of Use
    Average: 8.9
    8.7
    Ease of Admin
    Average: 8.8
    8.8
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Todyl
    Company Website
    Year Founded
    2015
    HQ Location
    Denver, CO
    LinkedIn® Page
    www.linkedin.com
    125 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Todyl empowers businesses of any size with a complete, end-to-end security program. The Todyl Security Platform converges SASE, SIEM, Endpoint Security, GRC, MXDR, and more into a cloud-native, singl

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 89% Small-Business
  • 11% Mid-Market
Todyl Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
15
Customer Support
12
Features
11
Solutions
8
Easy Integrations
7
Cons
Limited Features
5
Technical Issues
4
Difficult Setup
3
Improvements Needed
3
Lacking Features
3
Todyl Security Platform features and usability ratings that predict user satisfaction
9.5
Quality of Support
Average: 8.8
8.5
Ease of Use
Average: 8.9
8.7
Ease of Admin
Average: 8.8
8.8
Application Security
Average: 8.9
Seller Details
Seller
Todyl
Company Website
Year Founded
2015
HQ Location
Denver, CO
LinkedIn® Page
www.linkedin.com
125 employees on LinkedIn®
(24)4.8 out of 5
Optimized for quick response
5th Easiest To Use in Zero Trust Networking software
Save to My Lists
Entry Level Price:Starting at $25.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Kitecyber is a comprehensive cybersecurity solution designed to protect endpoint devices, users, applications, and data for organizations of all sizes. Headquartered in the Bay Area, California, Kitec

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • KiteCyber is a cybersecurity platform that provides device management, security controls, and compliance management features.
    • Users frequently mention the ease of installation, intuitive user interface, comprehensive security features, and the responsive and knowledgeable support team as key benefits of using KiteCyber.
    • Users experienced minor issues with certain features behaving unexpectedly, occasional delays in implementing high-priority action items, and a need for improvement in customization and reporting features.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Kitecyber Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    10
    Ease of Use
    9
    Features
    9
    Security
    7
    Reliability
    6
    Cons
    Limited Features
    2
    Process Delays
    2
    Usability Issues
    2
    Alert Issues
    1
    Difficult Configuration
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Kitecyber features and usability ratings that predict user satisfaction
    9.7
    Quality of Support
    Average: 8.8
    9.7
    Ease of Use
    Average: 8.9
    8.9
    Ease of Admin
    Average: 8.8
    9.5
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kitecyber
    Company Website
    Year Founded
    2022
    HQ Location
    Santa Clara, California, United States
    LinkedIn® Page
    www.linkedin.com
    17 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Kitecyber is a comprehensive cybersecurity solution designed to protect endpoint devices, users, applications, and data for organizations of all sizes. Headquartered in the Bay Area, California, Kitec

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • KiteCyber is a cybersecurity platform that provides device management, security controls, and compliance management features.
  • Users frequently mention the ease of installation, intuitive user interface, comprehensive security features, and the responsive and knowledgeable support team as key benefits of using KiteCyber.
  • Users experienced minor issues with certain features behaving unexpectedly, occasional delays in implementing high-priority action items, and a need for improvement in customization and reporting features.
Kitecyber Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
10
Ease of Use
9
Features
9
Security
7
Reliability
6
Cons
Limited Features
2
Process Delays
2
Usability Issues
2
Alert Issues
1
Difficult Configuration
1
Kitecyber features and usability ratings that predict user satisfaction
9.7
Quality of Support
Average: 8.8
9.7
Ease of Use
Average: 8.9
8.9
Ease of Admin
Average: 8.8
9.5
Application Security
Average: 8.9
Seller Details
Seller
Kitecyber
Company Website
Year Founded
2022
HQ Location
Santa Clara, California, United States
LinkedIn® Page
www.linkedin.com
17 employees on LinkedIn®
(94)4.4 out of 5
Optimized for quick response
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Portnox offers cloud-native zero trust access control and cybersecurity essentials that enable agile, resource-constrained IT teams to proactively address today’s most pressing security challenges: th

    Users
    • Network Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 41% Enterprise
    • 36% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Portnox Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    14
    Customer Support
    8
    Implementation Ease
    8
    Integrations
    8
    Easy Integrations
    7
    Cons
    Performance Issues
    7
    Connection Issues
    3
    Expensive
    3
    Limited Functionality
    3
    Software Bugs
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Portnox features and usability ratings that predict user satisfaction
    8.8
    Quality of Support
    Average: 8.8
    8.8
    Ease of Use
    Average: 8.9
    8.5
    Ease of Admin
    Average: 8.8
    7.5
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Portnox
    Company Website
    Year Founded
    2007
    HQ Location
    Austin, Texas
    Twitter
    @portnox
    828 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    100 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Portnox offers cloud-native zero trust access control and cybersecurity essentials that enable agile, resource-constrained IT teams to proactively address today’s most pressing security challenges: th

Users
  • Network Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 41% Enterprise
  • 36% Mid-Market
Portnox Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
14
Customer Support
8
Implementation Ease
8
Integrations
8
Easy Integrations
7
Cons
Performance Issues
7
Connection Issues
3
Expensive
3
Limited Functionality
3
Software Bugs
3
Portnox features and usability ratings that predict user satisfaction
8.8
Quality of Support
Average: 8.8
8.8
Ease of Use
Average: 8.9
8.5
Ease of Admin
Average: 8.8
7.5
Application Security
Average: 8.9
Seller Details
Seller
Portnox
Company Website
Year Founded
2007
HQ Location
Austin, Texas
Twitter
@portnox
828 Twitter followers
LinkedIn® Page
www.linkedin.com
100 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SecureW2 is a cloud-native authentication solution designed to enhance security by eliminating credential compromise through its innovative JoinNow Platform. This platform combines Dynamic Public Key

    Users
    No information available
    Industries
    • Primary/Secondary Education
    • Computer Software
    Market Segment
    • 53% Mid-Market
    • 42% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SecureW2 JoinNow Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    20
    Ease of Use
    17
    Security
    17
    Setup Ease
    15
    Authentication
    13
    Cons
    Performance Issues
    13
    Expensive
    6
    Difficult Configuration
    5
    Difficult Learning Curve
    5
    Poor Documentation
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SecureW2 JoinNow features and usability ratings that predict user satisfaction
    9.4
    Quality of Support
    Average: 8.8
    8.5
    Ease of Use
    Average: 8.9
    8.8
    Ease of Admin
    Average: 8.8
    8.8
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SecureW2
    Company Website
    Year Founded
    2014
    HQ Location
    Seattle, US
    Twitter
    @SecureW2
    86 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    115 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SecureW2 is a cloud-native authentication solution designed to enhance security by eliminating credential compromise through its innovative JoinNow Platform. This platform combines Dynamic Public Key

Users
No information available
Industries
  • Primary/Secondary Education
  • Computer Software
Market Segment
  • 53% Mid-Market
  • 42% Enterprise
SecureW2 JoinNow Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
20
Ease of Use
17
Security
17
Setup Ease
15
Authentication
13
Cons
Performance Issues
13
Expensive
6
Difficult Configuration
5
Difficult Learning Curve
5
Poor Documentation
5
SecureW2 JoinNow features and usability ratings that predict user satisfaction
9.4
Quality of Support
Average: 8.8
8.5
Ease of Use
Average: 8.9
8.8
Ease of Admin
Average: 8.8
8.8
Application Security
Average: 8.9
Seller Details
Seller
SecureW2
Company Website
Year Founded
2014
HQ Location
Seattle, US
Twitter
@SecureW2
86 Twitter followers
LinkedIn® Page
www.linkedin.com
115 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CloudConnexa®, powered by OpenVPN, is the leader in delivering premium, enterprise-grade network security accessible to businesses of all sizes. Easy to set up and simple to deploy, CloudConnexa's clo

    Users
    • CTO
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 47% Mid-Market
    • 47% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • OpenVPN CloudConnexa is a product that provides secure connectivity and network management for remote teams and devices.
    • Users frequently mention the ease of use, robust security features, and the ability to manage and monitor activity from a centralized cloud platform as key benefits of OpenVPN CloudConnexa.
    • Reviewers mentioned that the product can be complex to set up for non-technical users, has occasional latency issues when connecting from distant locations, and is considered expensive for smaller teams.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • OpenVPN CloudConnexa Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    20
    Customer Support
    14
    Reliability
    13
    Integrations
    11
    Access
    10
    Cons
    Connection Issues
    7
    Connectivity Issues
    7
    Expensive
    6
    Login Issues
    5
    Required Expertise
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OpenVPN CloudConnexa features and usability ratings that predict user satisfaction
    8.9
    Quality of Support
    Average: 8.8
    9.0
    Ease of Use
    Average: 8.9
    9.0
    Ease of Admin
    Average: 8.8
    8.1
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OpenVPN
    Company Website
    Year Founded
    2002
    HQ Location
    Pleasanton, CA
    Twitter
    @OpenVPN
    20,228 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    162 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CloudConnexa®, powered by OpenVPN, is the leader in delivering premium, enterprise-grade network security accessible to businesses of all sizes. Easy to set up and simple to deploy, CloudConnexa's clo

Users
  • CTO
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 47% Mid-Market
  • 47% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • OpenVPN CloudConnexa is a product that provides secure connectivity and network management for remote teams and devices.
  • Users frequently mention the ease of use, robust security features, and the ability to manage and monitor activity from a centralized cloud platform as key benefits of OpenVPN CloudConnexa.
  • Reviewers mentioned that the product can be complex to set up for non-technical users, has occasional latency issues when connecting from distant locations, and is considered expensive for smaller teams.
OpenVPN CloudConnexa Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
20
Customer Support
14
Reliability
13
Integrations
11
Access
10
Cons
Connection Issues
7
Connectivity Issues
7
Expensive
6
Login Issues
5
Required Expertise
5
OpenVPN CloudConnexa features and usability ratings that predict user satisfaction
8.9
Quality of Support
Average: 8.8
9.0
Ease of Use
Average: 8.9
9.0
Ease of Admin
Average: 8.8
8.1
Application Security
Average: 8.9
Seller Details
Seller
OpenVPN
Company Website
Year Founded
2002
HQ Location
Pleasanton, CA
Twitter
@OpenVPN
20,228 Twitter followers
LinkedIn® Page
www.linkedin.com
162 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Powered by XGen security, Trend Micro Network Defense goes beyond next-gen IPS to provide a blend of cross-generational techniques that apply the right technology at the right time to deliver integrat

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 47% Enterprise
    • 41% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trend Vision One - XDR for Networks features and usability ratings that predict user satisfaction
    8.6
    Quality of Support
    Average: 8.8
    8.7
    Ease of Use
    Average: 8.9
    7.7
    Ease of Admin
    Average: 8.8
    9.3
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Tokyo
    Twitter
    @trendmicro
    111,953 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,862 employees on LinkedIn®
    Ownership
    OTCMKTS:TMICY
Product Description
How are these determined?Information
This description is provided by the seller.

Powered by XGen security, Trend Micro Network Defense goes beyond next-gen IPS to provide a blend of cross-generational techniques that apply the right technology at the right time to deliver integrat

Users
No information available
Industries
No information available
Market Segment
  • 47% Enterprise
  • 41% Mid-Market
Trend Vision One - XDR for Networks features and usability ratings that predict user satisfaction
8.6
Quality of Support
Average: 8.8
8.7
Ease of Use
Average: 8.9
7.7
Ease of Admin
Average: 8.8
9.3
Application Security
Average: 8.9
Seller Details
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
111,953 Twitter followers
LinkedIn® Page
www.linkedin.com
7,862 employees on LinkedIn®
Ownership
OTCMKTS:TMICY
(87)4.3 out of 5
6th Easiest To Use in Zero Trust Networking software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ivanti Connect Secure provides a seamless, cost-effective SSL VPN solution for remote and mobile users from any web-enabled device to corporate resources— anytime, anywhere.

    Users
    No information available
    Industries
    • Information Technology and Services
    • Banking
    Market Segment
    • 70% Enterprise
    • 23% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Ivanti Connect Secure features and usability ratings that predict user satisfaction
    8.7
    Quality of Support
    Average: 8.8
    9.3
    Ease of Use
    Average: 8.9
    9.2
    Ease of Admin
    Average: 8.8
    9.2
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Ivanti
    Year Founded
    1985
    HQ Location
    South Jordan, UT
    Twitter
    @GoIvanti
    6,766 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,984 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Ivanti Connect Secure provides a seamless, cost-effective SSL VPN solution for remote and mobile users from any web-enabled device to corporate resources— anytime, anywhere.

Users
No information available
Industries
  • Information Technology and Services
  • Banking
Market Segment
  • 70% Enterprise
  • 23% Mid-Market
Ivanti Connect Secure features and usability ratings that predict user satisfaction
8.7
Quality of Support
Average: 8.8
9.3
Ease of Use
Average: 8.9
9.2
Ease of Admin
Average: 8.8
9.2
Application Security
Average: 8.9
Seller Details
Seller
Ivanti
Year Founded
1985
HQ Location
South Jordan, UT
Twitter
@GoIvanti
6,766 Twitter followers
LinkedIn® Page
www.linkedin.com
2,984 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Azure ExpressRoute lets you extend your on-premises networks into the Microsoft cloud over a private connection facilitated by a connectivity provider. ExpressRoute allows you to establish connections

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 43% Enterprise
    • 36% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Azure ExpressRoute features and usability ratings that predict user satisfaction
    7.5
    Quality of Support
    Average: 8.8
    8.6
    Ease of Use
    Average: 8.9
    6.7
    Ease of Admin
    Average: 8.8
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    13,133,301 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    220,934 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Azure ExpressRoute lets you extend your on-premises networks into the Microsoft cloud over a private connection facilitated by a connectivity provider. ExpressRoute allows you to establish connections

Users
No information available
Industries
No information available
Market Segment
  • 43% Enterprise
  • 36% Mid-Market
Azure ExpressRoute features and usability ratings that predict user satisfaction
7.5
Quality of Support
Average: 8.8
8.6
Ease of Use
Average: 8.9
6.7
Ease of Admin
Average: 8.8
0.0
No information available
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
13,133,301 Twitter followers
LinkedIn® Page
www.linkedin.com
220,934 employees on LinkedIn®
Ownership
MSFT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Check Point Harmony Connect redefines SASE by making it easy to access corporate applications, SaaS and the internet for any user or branch, from any device, without compromising on security. Built to

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 41% Small-Business
    • 32% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point CloudGuard Harmony Connect (CloudGuard Connect) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    5
    Performance Efficiency
    3
    Access Centralization
    1
    Centralized Management
    1
    Customer Support
    1
    Cons
    Difficult Configuration
    2
    Difficult Learning Curve
    2
    Complex Setup
    1
    Connection Issues
    1
    Dependency Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point CloudGuard Harmony Connect (CloudGuard Connect) features and usability ratings that predict user satisfaction
    8.4
    Quality of Support
    Average: 8.8
    8.8
    Ease of Use
    Average: 8.9
    9.2
    Ease of Admin
    Average: 8.8
    8.8
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    70,917 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,323 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

Check Point Harmony Connect redefines SASE by making it easy to access corporate applications, SaaS and the internet for any user or branch, from any device, without compromising on security. Built to

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 41% Small-Business
  • 32% Mid-Market
Check Point CloudGuard Harmony Connect (CloudGuard Connect) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
5
Performance Efficiency
3
Access Centralization
1
Centralized Management
1
Customer Support
1
Cons
Difficult Configuration
2
Difficult Learning Curve
2
Complex Setup
1
Connection Issues
1
Dependency Issues
1
Check Point CloudGuard Harmony Connect (CloudGuard Connect) features and usability ratings that predict user satisfaction
8.4
Quality of Support
Average: 8.8
8.8
Ease of Use
Average: 8.9
9.2
Ease of Admin
Average: 8.8
8.8
Application Security
Average: 8.9
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
70,917 Twitter followers
LinkedIn® Page
www.linkedin.com
8,323 employees on LinkedIn®
Ownership
NASDAQ:CHKP
(12)4.7 out of 5
View top Consulting Services for Zscaler Zero Trust Exchange
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Zscaler Zero Trust Exchange is the first zero trust platform that protects critical data and applications from data breach in the hybrid cloud. Edgewise delivers a new control plane that is based on s

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 42% Enterprise
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Zscaler Zero Trust Exchange features and usability ratings that predict user satisfaction
    9.7
    Quality of Support
    Average: 8.8
    9.2
    Ease of Use
    Average: 8.9
    10.0
    Ease of Admin
    Average: 8.8
    8.8
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Zscaler
    Year Founded
    2008
    HQ Location
    San Jose, California
    Twitter
    @zscaler
    17,072 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    9,410 employees on LinkedIn®
    Ownership
    NASDAQ:ZS
Product Description
How are these determined?Information
This description is provided by the seller.

Zscaler Zero Trust Exchange is the first zero trust platform that protects critical data and applications from data breach in the hybrid cloud. Edgewise delivers a new control plane that is based on s

Users
No information available
Industries
  • Computer Software
Market Segment
  • 42% Enterprise
  • 33% Mid-Market
Zscaler Zero Trust Exchange features and usability ratings that predict user satisfaction
9.7
Quality of Support
Average: 8.8
9.2
Ease of Use
Average: 8.9
10.0
Ease of Admin
Average: 8.8
8.8
Application Security
Average: 8.9
Seller Details
Seller
Zscaler
Year Founded
2008
HQ Location
San Jose, California
Twitter
@zscaler
17,072 Twitter followers
LinkedIn® Page
www.linkedin.com
9,410 employees on LinkedIn®
Ownership
NASDAQ:ZS
(477)4.4 out of 5
Optimized for quick response
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BetterCloud is a comprehensive SaaS management platform designed to assist IT teams in effectively managing and optimizing their software-as-a-service (SaaS) applications. This solution focuses on aut

    Users
    • IT Manager
    • Systems Administrator
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 60% Mid-Market
    • 28% Enterprise
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • BetterCloud is a tool that detects risky file sharing and offers solutions, while also providing features for bulk-creation and update of accounts, automation of repetitive IT tasks, and visibility into user access.
    • Users like the tool's ability to automate tasks, streamline workflows, provide visibility into user access, and offer efficient customer support, with some users finding it particularly useful for Google Drive audits and SaaS management.
    • Reviewers experienced issues with setting up complex automation workflows, found the interface overwhelming initially, wished for more granular filters within workflows, and found the price too high for the features offered.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BetterCloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    45
    Ease of Use
    38
    Onboarding
    31
    Features
    26
    Time-saving
    26
    Cons
    Limited Features
    28
    Missing Features
    19
    Integration Issues
    18
    Access Limitations
    13
    Lacking Features
    13
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BetterCloud features and usability ratings that predict user satisfaction
    9.1
    Quality of Support
    Average: 8.8
    8.7
    Ease of Use
    Average: 8.9
    8.9
    Ease of Admin
    Average: 8.8
    8.7
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2011
    HQ Location
    New York
    Twitter
    @BetterCloud
    11,176 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    153 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

BetterCloud is a comprehensive SaaS management platform designed to assist IT teams in effectively managing and optimizing their software-as-a-service (SaaS) applications. This solution focuses on aut

Users
  • IT Manager
  • Systems Administrator
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 60% Mid-Market
  • 28% Enterprise
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • BetterCloud is a tool that detects risky file sharing and offers solutions, while also providing features for bulk-creation and update of accounts, automation of repetitive IT tasks, and visibility into user access.
  • Users like the tool's ability to automate tasks, streamline workflows, provide visibility into user access, and offer efficient customer support, with some users finding it particularly useful for Google Drive audits and SaaS management.
  • Reviewers experienced issues with setting up complex automation workflows, found the interface overwhelming initially, wished for more granular filters within workflows, and found the price too high for the features offered.
BetterCloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
45
Ease of Use
38
Onboarding
31
Features
26
Time-saving
26
Cons
Limited Features
28
Missing Features
19
Integration Issues
18
Access Limitations
13
Lacking Features
13
BetterCloud features and usability ratings that predict user satisfaction
9.1
Quality of Support
Average: 8.8
8.7
Ease of Use
Average: 8.9
8.9
Ease of Admin
Average: 8.8
8.7
Application Security
Average: 8.9
Seller Details
Company Website
Year Founded
2011
HQ Location
New York
Twitter
@BetterCloud
11,176 Twitter followers
LinkedIn® Page
www.linkedin.com
153 employees on LinkedIn®