Introducing G2.ai, the future of software buying.Try now

Best Zero Trust Networking Software - Page 2

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Zero trust networking software is a type of network security and identity management solution used to implement the zero trust security model. As opposed to traditional network security systems, which provide a castle-and-moat system for granting access into a network, the zero trust model assumes every individual, both internal and external, is a potential threat until they are verified.

Companies have adopted the zero trust security model since decentralized business models and IT systems have made it significantly more complicated to ensure proper access controls are in place across multiple networks and physical locations. Zero trust networking solutions allow companies to continuously monitor network activity and user behavior to adapt authentication requirements on an individual basis. Verified individuals behaving abnormally or attempting to violate their permissions will be prompted to provide further authentication. Data is collected from access points, behaviors, and traffic logs to provide in-depth network security analytics capabilities.

Zero trust networking software utilizes similar authentication methods as risk-based authentication software, but is specifically for network access control. Risk-based authentication is more broad and its methods can be applied to accessing a network, application, database, or any other privileged information.

To qualify for inclusion in the Zero Trust Networking category, a product must:

Utilize adaptive authentication to continuously verify user permissions
Allow for network segmentation to simplify and broaden policy enforcement
Monitor traffic and user behavior for future inspection and analysis
Show More
Show Less

Featured Zero Trust Networking Software At A Glance

Free Plan Available:
GoodAccess
Sponsored
Highest Performer:
Easiest to Use:
Show LessShow More
Highest Performer:
Easiest to Use:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
148 Listings in Zero Trust Networking Available
(45)4.5 out of 5
10th Easiest To Use in Zero Trust Networking software
View top Consulting Services for Palo Alto Networks Panorama
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Panorama network security management provides static rules and dynamic security updates in an ever-changing threat landscape. Reduce administrator workload and improve your overall security posture wi

    Users
    • Network Engineer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 53% Enterprise
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Palo Alto Networks Panorama Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Centralized Management
    2
    Features
    2
    Ease of Use
    1
    Security
    1
    User Interface
    1
    Cons
    Complex Setup
    1
    Difficult Learning Curve
    1
    Expensive
    1
    Poor Customer Support
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Palo Alto Networks Panorama features and usability ratings that predict user satisfaction
    8.5
    Quality of Support
    Average: 8.9
    8.8
    Ease of Use
    Average: 8.9
    9.0
    Ease of Admin
    Average: 8.8
    8.8
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    127,526 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    18,396 employees on LinkedIn®
    Ownership
    NYSE: PANW
Product Description
How are these determined?Information
This description is provided by the seller.

Panorama network security management provides static rules and dynamic security updates in an ever-changing threat landscape. Reduce administrator workload and improve your overall security posture wi

Users
  • Network Engineer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 53% Enterprise
  • 40% Mid-Market
Palo Alto Networks Panorama Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Centralized Management
2
Features
2
Ease of Use
1
Security
1
User Interface
1
Cons
Complex Setup
1
Difficult Learning Curve
1
Expensive
1
Poor Customer Support
1
Palo Alto Networks Panorama features and usability ratings that predict user satisfaction
8.5
Quality of Support
Average: 8.9
8.8
Ease of Use
Average: 8.9
9.0
Ease of Admin
Average: 8.8
8.8
Application Security
Average: 8.9
Seller Details
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
127,526 Twitter followers
LinkedIn® Page
www.linkedin.com
18,396 employees on LinkedIn®
Ownership
NYSE: PANW
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The internet is the new corporate network, leading organizations to transition to their network security to Secure Access Service Edge (SASE). However, current solutions break the user experience with

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 49% Mid-Market
    • 37% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Check Point Harmony SASE is a cloud-based solution that integrates network security and secure remote access, simplifying management and reducing the need for multiple tools.
    • Users frequently mention the seamless integration of security and connectivity, the clear and consistent access policies, and the centralized management that saves time and effort.
    • Reviewers noted that the initial setup and policy configuration can be complex, especially for new users, and that the user interface, while powerful, sometimes requires extra clicks to access simple options.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point Harmony SASE Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    44
    Ease of Use
    37
    Secure Access
    33
    Protection
    24
    Reliability
    22
    Cons
    Complex Implementation
    26
    Complex Configuration
    23
    Complex Setup
    21
    Difficult Learning Curve
    16
    Expensive
    16
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point Harmony SASE features and usability ratings that predict user satisfaction
    9.0
    Quality of Support
    Average: 8.9
    9.1
    Ease of Use
    Average: 8.9
    8.9
    Ease of Admin
    Average: 8.8
    8.1
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    70,930 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,356 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The internet is the new corporate network, leading organizations to transition to their network security to Secure Access Service Edge (SASE). However, current solutions break the user experience with

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 49% Mid-Market
  • 37% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Check Point Harmony SASE is a cloud-based solution that integrates network security and secure remote access, simplifying management and reducing the need for multiple tools.
  • Users frequently mention the seamless integration of security and connectivity, the clear and consistent access policies, and the centralized management that saves time and effort.
  • Reviewers noted that the initial setup and policy configuration can be complex, especially for new users, and that the user interface, while powerful, sometimes requires extra clicks to access simple options.
Check Point Harmony SASE Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
44
Ease of Use
37
Secure Access
33
Protection
24
Reliability
22
Cons
Complex Implementation
26
Complex Configuration
23
Complex Setup
21
Difficult Learning Curve
16
Expensive
16
Check Point Harmony SASE features and usability ratings that predict user satisfaction
9.0
Quality of Support
Average: 8.9
9.1
Ease of Use
Average: 8.9
8.9
Ease of Admin
Average: 8.8
8.1
Application Security
Average: 8.9
Seller Details
Company Website
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
70,930 Twitter followers
LinkedIn® Page
www.linkedin.com
8,356 employees on LinkedIn®
G2 Advertising
Sponsored
G2 Advertising
Get 2x conversion than Google Ads with G2 Advertising!
G2 Advertising places your product in premium positions on high-traffic pages and on targeted competitor pages to reach buyers at key comparison moments.
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Palo Alto Networks Prisma® Access protects the hybrid workforce with the superior security of ZTNA while providing exceptional user experiences from a simple, unified security product. Purpose-built

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 45% Enterprise
    • 27% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Prisma Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    34
    Protection
    23
    Secure Access
    22
    Internet Security
    21
    Threat Protection
    21
    Cons
    Complex Setup
    20
    Complex Implementation
    19
    Complex Configuration
    17
    Expensive
    15
    Difficult Learning Curve
    11
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Prisma Access features and usability ratings that predict user satisfaction
    8.2
    Quality of Support
    Average: 8.9
    8.2
    Ease of Use
    Average: 8.9
    8.1
    Ease of Admin
    Average: 8.8
    8.6
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    127,526 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    18,396 employees on LinkedIn®
    Ownership
    NYSE: PANW
Product Description
How are these determined?Information
This description is provided by the seller.

Palo Alto Networks Prisma® Access protects the hybrid workforce with the superior security of ZTNA while providing exceptional user experiences from a simple, unified security product. Purpose-built

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 45% Enterprise
  • 27% Mid-Market
Prisma Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
34
Protection
23
Secure Access
22
Internet Security
21
Threat Protection
21
Cons
Complex Setup
20
Complex Implementation
19
Complex Configuration
17
Expensive
15
Difficult Learning Curve
11
Prisma Access features and usability ratings that predict user satisfaction
8.2
Quality of Support
Average: 8.9
8.2
Ease of Use
Average: 8.9
8.1
Ease of Admin
Average: 8.8
8.6
Application Security
Average: 8.9
Seller Details
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
127,526 Twitter followers
LinkedIn® Page
www.linkedin.com
18,396 employees on LinkedIn®
Ownership
NYSE: PANW
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CloudGuard Network Security is a comprehensive cloud security solution designed to protect public, private, and hybrid cloud environments from a wide array of cyber threats. This platform focuses on d

    Users
    • Security Engineer
    • Network Engineer
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 42% Enterprise
    • 30% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point CloudGuard Network Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    34
    Threat Detection
    22
    Ease of Use
    21
    Threat Protection
    20
    Integrations
    18
    Cons
    Complexity
    19
    Difficult Learning
    16
    Difficult Setup
    15
    Expensive
    15
    Difficult Configuration
    14
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point CloudGuard Network Security features and usability ratings that predict user satisfaction
    8.9
    Quality of Support
    Average: 8.9
    8.7
    Ease of Use
    Average: 8.9
    8.8
    Ease of Admin
    Average: 8.8
    9.0
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    70,930 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,356 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CloudGuard Network Security is a comprehensive cloud security solution designed to protect public, private, and hybrid cloud environments from a wide array of cyber threats. This platform focuses on d

Users
  • Security Engineer
  • Network Engineer
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 42% Enterprise
  • 30% Mid-Market
Check Point CloudGuard Network Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
34
Threat Detection
22
Ease of Use
21
Threat Protection
20
Integrations
18
Cons
Complexity
19
Difficult Learning
16
Difficult Setup
15
Expensive
15
Difficult Configuration
14
Check Point CloudGuard Network Security features and usability ratings that predict user satisfaction
8.9
Quality of Support
Average: 8.9
8.7
Ease of Use
Average: 8.9
8.8
Ease of Admin
Average: 8.8
9.0
Application Security
Average: 8.9
Seller Details
Company Website
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
70,930 Twitter followers
LinkedIn® Page
www.linkedin.com
8,356 employees on LinkedIn®
(75)4.7 out of 5
Optimized for quick response
13th Easiest To Use in Zero Trust Networking software
Save to My Lists
Entry Level Price:Starting at $5.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Twingate is a secure remote access solution for an organization’s private applications, data, and environments, whether they are on-premise or in the cloud. Built to make the lives of DevOps teams, IT

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 52% Mid-Market
    • 43% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Twingate Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    9
    Security
    9
    Secure Access
    7
    Access Management
    6
    Easy Setup
    6
    Cons
    Performance Issues
    10
    Limited Customization
    5
    Complex Implementation
    4
    Complex Configuration
    3
    Lacking Features
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Twingate features and usability ratings that predict user satisfaction
    9.1
    Quality of Support
    Average: 8.9
    9.7
    Ease of Use
    Average: 8.9
    9.1
    Ease of Admin
    Average: 8.8
    8.8
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    HQ Location
    Redwood City, California
    Twitter
    @TwingateHQ
    2,388 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    78 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Twingate is a secure remote access solution for an organization’s private applications, data, and environments, whether they are on-premise or in the cloud. Built to make the lives of DevOps teams, IT

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 52% Mid-Market
  • 43% Small-Business
Twingate Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
9
Security
9
Secure Access
7
Access Management
6
Easy Setup
6
Cons
Performance Issues
10
Limited Customization
5
Complex Implementation
4
Complex Configuration
3
Lacking Features
3
Twingate features and usability ratings that predict user satisfaction
9.1
Quality of Support
Average: 8.9
9.7
Ease of Use
Average: 8.9
9.1
Ease of Admin
Average: 8.8
8.8
Application Security
Average: 8.9
Seller Details
Company Website
HQ Location
Redwood City, California
Twitter
@TwingateHQ
2,388 Twitter followers
LinkedIn® Page
www.linkedin.com
78 employees on LinkedIn®
(24)4.8 out of 5
Optimized for quick response
7th Easiest To Use in Zero Trust Networking software
Save to My Lists
Entry Level Price:Starting at $25.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Kitecyber is a comprehensive cybersecurity solution designed to protect endpoint devices, users, applications, and data for organizations of all sizes. Headquartered in the Bay Area, California, Kitec

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • KiteCyber is a cybersecurity platform that provides device management, security controls, and compliance management features.
    • Users frequently mention the ease of installation, intuitive user interface, comprehensive security features, and the responsive and knowledgeable support team as key benefits of using KiteCyber.
    • Users experienced minor issues with certain features behaving unexpectedly, occasional delays in implementing high-priority action items, and a need for improvement in customization and reporting features.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Kitecyber Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    10
    Ease of Use
    9
    Features
    9
    Security
    7
    Reliability
    6
    Cons
    Limited Features
    2
    Process Delays
    2
    Usability Issues
    2
    Alert Issues
    1
    Difficult Configuration
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Kitecyber features and usability ratings that predict user satisfaction
    9.7
    Quality of Support
    Average: 8.9
    9.7
    Ease of Use
    Average: 8.9
    8.9
    Ease of Admin
    Average: 8.8
    9.5
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kitecyber
    Company Website
    Year Founded
    2022
    HQ Location
    Santa Clara, California, United States
    LinkedIn® Page
    www.linkedin.com
    12 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Kitecyber is a comprehensive cybersecurity solution designed to protect endpoint devices, users, applications, and data for organizations of all sizes. Headquartered in the Bay Area, California, Kitec

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • KiteCyber is a cybersecurity platform that provides device management, security controls, and compliance management features.
  • Users frequently mention the ease of installation, intuitive user interface, comprehensive security features, and the responsive and knowledgeable support team as key benefits of using KiteCyber.
  • Users experienced minor issues with certain features behaving unexpectedly, occasional delays in implementing high-priority action items, and a need for improvement in customization and reporting features.
Kitecyber Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
10
Ease of Use
9
Features
9
Security
7
Reliability
6
Cons
Limited Features
2
Process Delays
2
Usability Issues
2
Alert Issues
1
Difficult Configuration
1
Kitecyber features and usability ratings that predict user satisfaction
9.7
Quality of Support
Average: 8.9
9.7
Ease of Use
Average: 8.9
8.9
Ease of Admin
Average: 8.8
9.5
Application Security
Average: 8.9
Seller Details
Seller
Kitecyber
Company Website
Year Founded
2022
HQ Location
Santa Clara, California, United States
LinkedIn® Page
www.linkedin.com
12 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Enterprise Application Access is a unique cloud architecture that closes all inbound firewall ports, while ensuring that only authorized users and devices have access to the internal applications they

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 37% Enterprise
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Akamai Enterprise Application Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    1
    Ease of Use
    1
    Easy Access
    1
    Features
    1
    Security
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Akamai Enterprise Application Access features and usability ratings that predict user satisfaction
    8.0
    Quality of Support
    Average: 8.9
    8.3
    Ease of Use
    Average: 8.9
    8.9
    Ease of Admin
    Average: 8.8
    9.1
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1998
    HQ Location
    Cambridge, MA
    Twitter
    @Akamai
    115,523 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10,286 employees on LinkedIn®
    Ownership
    NASDAQ:AKAM
Product Description
How are these determined?Information
This description is provided by the seller.

Enterprise Application Access is a unique cloud architecture that closes all inbound firewall ports, while ensuring that only authorized users and devices have access to the internal applications they

Users
No information available
Industries
No information available
Market Segment
  • 37% Enterprise
  • 33% Small-Business
Akamai Enterprise Application Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
1
Ease of Use
1
Easy Access
1
Features
1
Security
1
Cons
This product has not yet received any negative sentiments.
Akamai Enterprise Application Access features and usability ratings that predict user satisfaction
8.0
Quality of Support
Average: 8.9
8.3
Ease of Use
Average: 8.9
8.9
Ease of Admin
Average: 8.8
9.1
Application Security
Average: 8.9
Seller Details
Year Founded
1998
HQ Location
Cambridge, MA
Twitter
@Akamai
115,523 Twitter followers
LinkedIn® Page
www.linkedin.com
10,286 employees on LinkedIn®
Ownership
NASDAQ:AKAM
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Strengthen Your Security with Check Point Gateways and Firewalls Check Point Hybrid Mesh Network Security is a comprehensive cybersecurity solution designed to protect networks from sophisticated

    Users
    • Network Security Engineer
    • Network Engineer
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 44% Mid-Market
    • 42% Enterprise
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Check Point Next Generation Firewall is a network security tool that provides threat prevention, visibility from logs and dashboards, and centralized policy management.
    • Users like the AI-powered threat detection, the ability to manage policies centrally, and the stable and dependable day-to-day protection that Check Point Next Generation Firewall offers.
    • Users experienced complexity in setup and ongoing management, particularly with licensing and enabling features, and some tasks can take longer than expected due to the interface and workflow learning curve.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point Next Generation Firewalls (NGFWs) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cybersecurity
    93
    Features
    82
    Threat Detection
    78
    Network Security
    70
    Centralized Management
    62
    Cons
    Expensive
    69
    Complexity
    49
    Slow Performance
    44
    Complex Setup
    42
    Learning Curve
    36
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point Next Generation Firewalls (NGFWs) features and usability ratings that predict user satisfaction
    8.3
    Quality of Support
    Average: 8.9
    8.5
    Ease of Use
    Average: 8.9
    8.6
    Ease of Admin
    Average: 8.8
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    70,930 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,356 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Strengthen Your Security with Check Point Gateways and Firewalls Check Point Hybrid Mesh Network Security is a comprehensive cybersecurity solution designed to protect networks from sophisticated

Users
  • Network Security Engineer
  • Network Engineer
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 44% Mid-Market
  • 42% Enterprise
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Check Point Next Generation Firewall is a network security tool that provides threat prevention, visibility from logs and dashboards, and centralized policy management.
  • Users like the AI-powered threat detection, the ability to manage policies centrally, and the stable and dependable day-to-day protection that Check Point Next Generation Firewall offers.
  • Users experienced complexity in setup and ongoing management, particularly with licensing and enabling features, and some tasks can take longer than expected due to the interface and workflow learning curve.
Check Point Next Generation Firewalls (NGFWs) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cybersecurity
93
Features
82
Threat Detection
78
Network Security
70
Centralized Management
62
Cons
Expensive
69
Complexity
49
Slow Performance
44
Complex Setup
42
Learning Curve
36
Check Point Next Generation Firewalls (NGFWs) features and usability ratings that predict user satisfaction
8.3
Quality of Support
Average: 8.9
8.5
Ease of Use
Average: 8.9
8.6
Ease of Admin
Average: 8.8
0.0
No information available
Seller Details
Company Website
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
70,930 Twitter followers
LinkedIn® Page
www.linkedin.com
8,356 employees on LinkedIn®
(108)4.4 out of 5
Optimized for quick response
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Portnox offers cloud-native zero trust access control and cybersecurity essentials that enable agile, resource-constrained IT teams to proactively address today’s most pressing security challenges: th

    Users
    • Network Engineer
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 39% Mid-Market
    • 37% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Portnox Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    16
    Customer Support
    10
    Implementation Ease
    10
    Setup Ease
    9
    Integrations
    8
    Cons
    Performance Issues
    8
    Connection Issues
    5
    Difficult Learning
    4
    Expensive
    4
    Poor Interface Design
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Portnox features and usability ratings that predict user satisfaction
    8.8
    Quality of Support
    Average: 8.9
    8.7
    Ease of Use
    Average: 8.9
    8.5
    Ease of Admin
    Average: 8.8
    7.5
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Portnox
    Company Website
    Year Founded
    2007
    HQ Location
    Austin, Texas
    Twitter
    @portnox
    826 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    99 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Portnox offers cloud-native zero trust access control and cybersecurity essentials that enable agile, resource-constrained IT teams to proactively address today’s most pressing security challenges: th

Users
  • Network Engineer
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 39% Mid-Market
  • 37% Enterprise
Portnox Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
16
Customer Support
10
Implementation Ease
10
Setup Ease
9
Integrations
8
Cons
Performance Issues
8
Connection Issues
5
Difficult Learning
4
Expensive
4
Poor Interface Design
4
Portnox features and usability ratings that predict user satisfaction
8.8
Quality of Support
Average: 8.9
8.7
Ease of Use
Average: 8.9
8.5
Ease of Admin
Average: 8.8
7.5
Application Security
Average: 8.9
Seller Details
Seller
Portnox
Company Website
Year Founded
2007
HQ Location
Austin, Texas
Twitter
@portnox
826 Twitter followers
LinkedIn® Page
www.linkedin.com
99 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Forcepoint Data Security Cloud delivers unified visibility, control, and protection for data across endpoints, web, SaaS, and private applications, powered by Forcepoint’s AI Mesh and Data Security Ev

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 50% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Forcepoint Data Security Cloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    6
    Security
    6
    Customer Support
    5
    Ease of Use
    5
    Implementation Ease
    4
    Cons
    Complex Configuration
    4
    Complexity
    3
    Expensive
    3
    Complex Setup
    2
    Difficult Setup
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Forcepoint Data Security Cloud features and usability ratings that predict user satisfaction
    8.2
    Quality of Support
    Average: 8.9
    8.6
    Ease of Use
    Average: 8.9
    9.0
    Ease of Admin
    Average: 8.8
    7.8
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1994
    HQ Location
    Austin, TX
    Twitter
    @Forcepointsec
    65,525 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,658 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Forcepoint Data Security Cloud delivers unified visibility, control, and protection for data across endpoints, web, SaaS, and private applications, powered by Forcepoint’s AI Mesh and Data Security Ev

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 50% Enterprise
  • 38% Mid-Market
Forcepoint Data Security Cloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
6
Security
6
Customer Support
5
Ease of Use
5
Implementation Ease
4
Cons
Complex Configuration
4
Complexity
3
Expensive
3
Complex Setup
2
Difficult Setup
2
Forcepoint Data Security Cloud features and usability ratings that predict user satisfaction
8.2
Quality of Support
Average: 8.9
8.6
Ease of Use
Average: 8.9
9.0
Ease of Admin
Average: 8.8
7.8
Application Security
Average: 8.9
Seller Details
Year Founded
1994
HQ Location
Austin, TX
Twitter
@Forcepointsec
65,525 Twitter followers
LinkedIn® Page
www.linkedin.com
1,658 employees on LinkedIn®
(60)4.4 out of 5
View top Consulting Services for Citrix Workspace
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Citrix Workspace Essentials provides a comprehensive, zero-trust approach to deliver secure and contextual access to corporate internal web apps, SaaS, and virtual applications. With Citrix Workspace

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 68% Enterprise
    • 27% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Citrix Workspace Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    6
    Ease of Use
    4
    Remote Work
    4
    Secure Access
    4
    Internet Security
    3
    Cons
    Slow Loading
    3
    Slow Performance
    3
    Complex Configuration
    2
    Complex Setup
    2
    Connection Issues
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Citrix Workspace features and usability ratings that predict user satisfaction
    8.6
    Quality of Support
    Average: 8.9
    8.7
    Ease of Use
    Average: 8.9
    8.6
    Ease of Admin
    Average: 8.8
    8.6
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Citrix
    Year Founded
    1989
    HQ Location
    Fort Lauderdale, FL
    Twitter
    @citrix
    199,022 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,262 employees on LinkedIn®
    Ownership
    NASDAQ:CTXS
Product Description
How are these determined?Information
This description is provided by the seller.

Citrix Workspace Essentials provides a comprehensive, zero-trust approach to deliver secure and contextual access to corporate internal web apps, SaaS, and virtual applications. With Citrix Workspace

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 68% Enterprise
  • 27% Mid-Market
Citrix Workspace Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
6
Ease of Use
4
Remote Work
4
Secure Access
4
Internet Security
3
Cons
Slow Loading
3
Slow Performance
3
Complex Configuration
2
Complex Setup
2
Connection Issues
2
Citrix Workspace features and usability ratings that predict user satisfaction
8.6
Quality of Support
Average: 8.9
8.7
Ease of Use
Average: 8.9
8.6
Ease of Admin
Average: 8.8
8.6
Application Security
Average: 8.9
Seller Details
Seller
Citrix
Year Founded
1989
HQ Location
Fort Lauderdale, FL
Twitter
@citrix
199,022 Twitter followers
LinkedIn® Page
www.linkedin.com
4,262 employees on LinkedIn®
Ownership
NASDAQ:CTXS
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SecureW2 is a cloud-native authentication solution designed to enhance security by eliminating credential compromise through its innovative JoinNow Platform. This platform combines Dynamic Public Key

    Users
    No information available
    Industries
    • Primary/Secondary Education
    • Computer Software
    Market Segment
    • 53% Mid-Market
    • 42% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SecureW2 JoinNow Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    24
    Ease of Use
    20
    Setup Ease
    19
    Security
    17
    Reliability
    16
    Cons
    Performance Issues
    13
    Difficult Learning Curve
    6
    Expensive
    6
    Poor Documentation
    6
    Difficult Configuration
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SecureW2 JoinNow features and usability ratings that predict user satisfaction
    9.5
    Quality of Support
    Average: 8.9
    8.5
    Ease of Use
    Average: 8.9
    8.8
    Ease of Admin
    Average: 8.8
    8.8
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SecureW2
    Company Website
    Year Founded
    2014
    HQ Location
    Seattle, US
    Twitter
    @SecureW2
    85 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    118 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SecureW2 is a cloud-native authentication solution designed to enhance security by eliminating credential compromise through its innovative JoinNow Platform. This platform combines Dynamic Public Key

Users
No information available
Industries
  • Primary/Secondary Education
  • Computer Software
Market Segment
  • 53% Mid-Market
  • 42% Enterprise
SecureW2 JoinNow Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
24
Ease of Use
20
Setup Ease
19
Security
17
Reliability
16
Cons
Performance Issues
13
Difficult Learning Curve
6
Expensive
6
Poor Documentation
6
Difficult Configuration
5
SecureW2 JoinNow features and usability ratings that predict user satisfaction
9.5
Quality of Support
Average: 8.9
8.5
Ease of Use
Average: 8.9
8.8
Ease of Admin
Average: 8.8
8.8
Application Security
Average: 8.9
Seller Details
Seller
SecureW2
Company Website
Year Founded
2014
HQ Location
Seattle, US
Twitter
@SecureW2
85 Twitter followers
LinkedIn® Page
www.linkedin.com
118 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CloudConnexa®, powered by OpenVPN, is the leader in delivering premium, enterprise-grade network security accessible to businesses of all sizes. Easy to set up and simple to deploy, CloudConnexa's clo

    Users
    • CTO
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 47% Mid-Market
    • 47% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • OpenVPN CloudConnexa is a cloud-managed VPN solution that simplifies secure private networking by connecting users, servers, and cloud resources without the need for infrastructure maintenance.
    • Reviewers like the strong security model, centralized dashboard for managing users, connections, and access rules, and the convenience of the cloud-managed approach, which allows for easy connection of services across different clouds.
    • Users mentioned that advanced networking concepts still require learning, the user interface could be more intuitive, pricing can be a concern for large teams, and debugging connectivity issues can require patience.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • OpenVPN CloudConnexa Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    19
    Customer Support
    14
    Access
    11
    Reliability
    11
    Secure Access
    11
    Cons
    Connection Issues
    7
    Expensive
    7
    Connectivity Issues
    5
    Login Issues
    5
    Required Expertise
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OpenVPN CloudConnexa features and usability ratings that predict user satisfaction
    8.9
    Quality of Support
    Average: 8.9
    9.0
    Ease of Use
    Average: 8.9
    9.0
    Ease of Admin
    Average: 8.8
    8.1
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OpenVPN
    Company Website
    Year Founded
    2002
    HQ Location
    Pleasanton, CA
    Twitter
    @OpenVPN
    20,208 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    182 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CloudConnexa®, powered by OpenVPN, is the leader in delivering premium, enterprise-grade network security accessible to businesses of all sizes. Easy to set up and simple to deploy, CloudConnexa's clo

Users
  • CTO
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 47% Mid-Market
  • 47% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • OpenVPN CloudConnexa is a cloud-managed VPN solution that simplifies secure private networking by connecting users, servers, and cloud resources without the need for infrastructure maintenance.
  • Reviewers like the strong security model, centralized dashboard for managing users, connections, and access rules, and the convenience of the cloud-managed approach, which allows for easy connection of services across different clouds.
  • Users mentioned that advanced networking concepts still require learning, the user interface could be more intuitive, pricing can be a concern for large teams, and debugging connectivity issues can require patience.
OpenVPN CloudConnexa Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
19
Customer Support
14
Access
11
Reliability
11
Secure Access
11
Cons
Connection Issues
7
Expensive
7
Connectivity Issues
5
Login Issues
5
Required Expertise
5
OpenVPN CloudConnexa features and usability ratings that predict user satisfaction
8.9
Quality of Support
Average: 8.9
9.0
Ease of Use
Average: 8.9
9.0
Ease of Admin
Average: 8.8
8.1
Application Security
Average: 8.9
Seller Details
Seller
OpenVPN
Company Website
Year Founded
2002
HQ Location
Pleasanton, CA
Twitter
@OpenVPN
20,208 Twitter followers
LinkedIn® Page
www.linkedin.com
182 employees on LinkedIn®
(87)4.3 out of 5
8th Easiest To Use in Zero Trust Networking software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ivanti Connect Secure provides a seamless, cost-effective SSL VPN solution for remote and mobile users from any web-enabled device to corporate resources— anytime, anywhere.

    Users
    No information available
    Industries
    • Information Technology and Services
    • Banking
    Market Segment
    • 70% Enterprise
    • 23% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Ivanti Connect Secure features and usability ratings that predict user satisfaction
    8.7
    Quality of Support
    Average: 8.9
    9.3
    Ease of Use
    Average: 8.9
    9.2
    Ease of Admin
    Average: 8.8
    9.2
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Ivanti
    Year Founded
    1985
    HQ Location
    South Jordan, UT
    Twitter
    @GoIvanti
    6,761 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,990 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Ivanti Connect Secure provides a seamless, cost-effective SSL VPN solution for remote and mobile users from any web-enabled device to corporate resources— anytime, anywhere.

Users
No information available
Industries
  • Information Technology and Services
  • Banking
Market Segment
  • 70% Enterprise
  • 23% Mid-Market
Ivanti Connect Secure features and usability ratings that predict user satisfaction
8.7
Quality of Support
Average: 8.9
9.3
Ease of Use
Average: 8.9
9.2
Ease of Admin
Average: 8.8
9.2
Application Security
Average: 8.9
Seller Details
Seller
Ivanti
Year Founded
1985
HQ Location
South Jordan, UT
Twitter
@GoIvanti
6,761 Twitter followers
LinkedIn® Page
www.linkedin.com
2,990 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Powered by XGen security, Trend Micro Network Defense goes beyond next-gen IPS to provide a blend of cross-generational techniques that apply the right technology at the right time to deliver integrat

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 47% Enterprise
    • 41% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trend Vision One - XDR for Networks features and usability ratings that predict user satisfaction
    8.6
    Quality of Support
    Average: 8.9
    8.7
    Ease of Use
    Average: 8.9
    7.7
    Ease of Admin
    Average: 8.8
    9.3
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Tokyo
    LinkedIn® Page
    www.linkedin.com
    7,862 employees on LinkedIn®
    Ownership
    OTCMKTS:TMICY
    Total Revenue (USD mm)
    $1,515
Product Description
How are these determined?Information
This description is provided by the seller.

Powered by XGen security, Trend Micro Network Defense goes beyond next-gen IPS to provide a blend of cross-generational techniques that apply the right technology at the right time to deliver integrat

Users
No information available
Industries
No information available
Market Segment
  • 47% Enterprise
  • 41% Mid-Market
Trend Vision One - XDR for Networks features and usability ratings that predict user satisfaction
8.6
Quality of Support
Average: 8.9
8.7
Ease of Use
Average: 8.9
7.7
Ease of Admin
Average: 8.8
9.3
Application Security
Average: 8.9
Seller Details
Year Founded
1988
HQ Location
Tokyo
LinkedIn® Page
www.linkedin.com
7,862 employees on LinkedIn®
Ownership
OTCMKTS:TMICY
Total Revenue (USD mm)
$1,515