Introducing G2.ai, the future of software buying.Try now

Best Zero Trust Networking Software - Page 4

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Zero trust networking software is a type of network security and identity management solution used to implement the zero trust security model. As opposed to traditional network security systems, which provide a castle-and-moat system for granting access into a network, the zero trust model assumes every individual, both internal and external, is a potential threat until they are verified.

Companies have adopted the zero trust security model since decentralized business models and IT systems have made it significantly more complicated to ensure proper access controls are in place across multiple networks and physical locations. Zero trust networking solutions allow companies to continuously monitor network activity and user behavior to adapt authentication requirements on an individual basis. Verified individuals behaving abnormally or attempting to violate their permissions will be prompted to provide further authentication. Data is collected from access points, behaviors, and traffic logs to provide in-depth network security analytics capabilities.

Zero trust networking software utilizes similar authentication methods as risk-based authentication software, but is specifically for network access control. Risk-based authentication is more broad and its methods can be applied to accessing a network, application, database, or any other privileged information.

To qualify for inclusion in the Zero Trust Networking category, a product must:

Utilize adaptive authentication to continuously verify user permissions
Allow for network segmentation to simplify and broaden policy enforcement
Monitor traffic and user behavior for future inspection and analysis
Show More
Show Less

Featured Zero Trust Networking Software At A Glance

Free Plan Available:
SecureW2 JoinNow
Sponsored
Highest Performer:
Easiest to Use:
Show LessShow More
Highest Performer:
Easiest to Use:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
148 Listings in Zero Trust Networking Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Diode Collab™ is a decentralized, local-first collaboration tool that combines secure chat, file sharing, VPN-like access, and team coordination inside a private “Zone.” All communication and data sta

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 86% Small-Business
    • 14% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Diode Collab Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    3
    Ease of Use
    2
    Access Centralization
    1
    App Integration
    1
    Connectivity Stability
    1
    Cons
    Difficult Learning Curve
    1
    Process Delays
    1
    Usability Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Diode Collab features and usability ratings that predict user satisfaction
    10.0
    Quality of Support
    Average: 8.9
    9.0
    Ease of Use
    Average: 8.9
    9.0
    Ease of Admin
    Average: 8.8
    10.0
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Diode
    Year Founded
    2021
    HQ Location
    Sheridan, US
    LinkedIn® Page
    www.linkedin.com
    8 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Diode Collab™ is a decentralized, local-first collaboration tool that combines secure chat, file sharing, VPN-like access, and team coordination inside a private “Zone.” All communication and data sta

Users
No information available
Industries
No information available
Market Segment
  • 86% Small-Business
  • 14% Mid-Market
Diode Collab Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
3
Ease of Use
2
Access Centralization
1
App Integration
1
Connectivity Stability
1
Cons
Difficult Learning Curve
1
Process Delays
1
Usability Issues
1
Diode Collab features and usability ratings that predict user satisfaction
10.0
Quality of Support
Average: 8.9
9.0
Ease of Use
Average: 8.9
9.0
Ease of Admin
Average: 8.8
10.0
Application Security
Average: 8.9
Seller Details
Seller
Diode
Year Founded
2021
HQ Location
Sheridan, US
LinkedIn® Page
www.linkedin.com
8 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    UTunnel offers scalable Cloud VPN and Zero-Trust Network Access (ZTNA) solutions that enable secure connectivity and seamless remote access to your business network resources. With automated deploymen

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 71% Small-Business
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • UTunnel VPN and ZTNA Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    6
    Easy Setup
    5
    Setup Ease
    5
    Affordable
    4
    Pricing
    4
    Cons
    Complex Setup
    1
    Expensive
    1
    Firewall Issues
    1
    Installation Issues
    1
    Lack of Guidance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • UTunnel VPN and ZTNA features and usability ratings that predict user satisfaction
    9.4
    Quality of Support
    Average: 8.9
    9.6
    Ease of Use
    Average: 8.9
    9.6
    Ease of Admin
    Average: 8.8
    9.3
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2019
    HQ Location
    West Chester, Pennsylvania
    LinkedIn® Page
    www.linkedin.com
    5 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

UTunnel offers scalable Cloud VPN and Zero-Trust Network Access (ZTNA) solutions that enable secure connectivity and seamless remote access to your business network resources. With automated deploymen

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 71% Small-Business
  • 25% Mid-Market
UTunnel VPN and ZTNA Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
6
Easy Setup
5
Setup Ease
5
Affordable
4
Pricing
4
Cons
Complex Setup
1
Expensive
1
Firewall Issues
1
Installation Issues
1
Lack of Guidance
1
UTunnel VPN and ZTNA features and usability ratings that predict user satisfaction
9.4
Quality of Support
Average: 8.9
9.6
Ease of Use
Average: 8.9
9.6
Ease of Admin
Average: 8.8
9.3
Application Security
Average: 8.9
Seller Details
Year Founded
2019
HQ Location
West Chester, Pennsylvania
LinkedIn® Page
www.linkedin.com
5 employees on LinkedIn®
G2 Advertising
Sponsored
G2 Advertising
Get 2x conversion than Google Ads with G2 Advertising!
G2 Advertising places your product in premium positions on high-traffic pages and on targeted competitor pages to reach buyers at key comparison moments.
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Avast Secure Private Access (SPA is a cloud-based solution designed to provide zero trust network access (ZTNA for modern workplaces. By replacing traditional VPNs, SPA offers secure, scalable, and se

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Avast Secure Private Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Easy Integrations
    1
    Features
    1
    Performance Efficiency
    1
    Security
    1
    Cons
    Expensive
    1
    Lacking Features
    1
    Limited Features
    1
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Avast Secure Private Access features and usability ratings that predict user satisfaction
    8.8
    Quality of Support
    Average: 8.9
    9.3
    Ease of Use
    Average: 8.9
    0.0
    No information available
    8.3
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2022
    HQ Location
    Tempe, Arizona
    Twitter
    @GenDigitalInc
    4,399 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,421 employees on LinkedIn®
    Ownership
    NASDAQ: GEN
Product Description
How are these determined?Information
This description is provided by the seller.

Avast Secure Private Access (SPA is a cloud-based solution designed to provide zero trust network access (ZTNA for modern workplaces. By replacing traditional VPNs, SPA offers secure, scalable, and se

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Mid-Market
Avast Secure Private Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Easy Integrations
1
Features
1
Performance Efficiency
1
Security
1
Cons
Expensive
1
Lacking Features
1
Limited Features
1
Slow Performance
1
Avast Secure Private Access features and usability ratings that predict user satisfaction
8.8
Quality of Support
Average: 8.9
9.3
Ease of Use
Average: 8.9
0.0
No information available
8.3
Application Security
Average: 8.9
Seller Details
Year Founded
2022
HQ Location
Tempe, Arizona
Twitter
@GenDigitalInc
4,399 Twitter followers
LinkedIn® Page
www.linkedin.com
3,421 employees on LinkedIn®
Ownership
NASDAQ: GEN
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ivanti Neurons for Zero Trust Access (ZTA) provides on-demand protected access to corporate applications on-premises, and on private and public clouds from any device, anywhere. ZTA automatically auth

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Ivanti Neurons for ZTA Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Monitoring
    1
    Notifications
    1
    Cons
    Difficult Learning Curve
    1
    Required Expertise
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Ivanti Neurons for ZTA features and usability ratings that predict user satisfaction
    8.9
    Quality of Support
    Average: 8.9
    9.4
    Ease of Use
    Average: 8.9
    8.9
    Ease of Admin
    Average: 8.8
    8.7
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Ivanti
    Year Founded
    1985
    HQ Location
    South Jordan, UT
    Twitter
    @GoIvanti
    6,761 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,990 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Ivanti Neurons for Zero Trust Access (ZTA) provides on-demand protected access to corporate applications on-premises, and on private and public clouds from any device, anywhere. ZTA automatically auth

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
  • 33% Enterprise
Ivanti Neurons for ZTA Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Monitoring
1
Notifications
1
Cons
Difficult Learning Curve
1
Required Expertise
1
Ivanti Neurons for ZTA features and usability ratings that predict user satisfaction
8.9
Quality of Support
Average: 8.9
9.4
Ease of Use
Average: 8.9
8.9
Ease of Admin
Average: 8.8
8.7
Application Security
Average: 8.9
Seller Details
Seller
Ivanti
Year Founded
1985
HQ Location
South Jordan, UT
Twitter
@GoIvanti
6,761 Twitter followers
LinkedIn® Page
www.linkedin.com
2,990 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Menlo Security protects organizations from cyber threats that attack enterprise browsers. Menlo Security’s patented Cloud-Browser Security Platform scales to provide comprehensive protection across en

    Users
    No information available
    Industries
    • Banking
    • Financial Services
    Market Segment
    • 48% Enterprise
    • 24% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Menlo Security is a security platform that protects against modern web threats and zero-day attacks by isolating web content in the cloud, preventing threats from reaching the user's device.
    • Reviewers frequently mention the platform's ease of use, seamless integration with existing environments, strong visibility on web activity, simple policy configuration, and excellent customer support.
    • Reviewers mentioned occasional issues with website functionality due to browser isolation, challenges with debugging user-specific issues, and slowdowns in internet browsing sessions due to the Menlo Security proxy.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Menlo Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    4
    Ease of Use
    4
    Security
    4
    Features
    3
    Malware Protection
    3
    Cons
    Internet Connectivity
    2
    Slow Internet
    2
    Slow Internet Speed
    2
    Slow Performance
    2
    Access Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Menlo Security features and usability ratings that predict user satisfaction
    9.1
    Quality of Support
    Average: 8.9
    9.4
    Ease of Use
    Average: 8.9
    9.4
    Ease of Admin
    Average: 8.8
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2012
    HQ Location
    Mountain View, California, United States
    Twitter
    @menlosecurity
    16,988 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    445 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Menlo Security protects organizations from cyber threats that attack enterprise browsers. Menlo Security’s patented Cloud-Browser Security Platform scales to provide comprehensive protection across en

Users
No information available
Industries
  • Banking
  • Financial Services
Market Segment
  • 48% Enterprise
  • 24% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Menlo Security is a security platform that protects against modern web threats and zero-day attacks by isolating web content in the cloud, preventing threats from reaching the user's device.
  • Reviewers frequently mention the platform's ease of use, seamless integration with existing environments, strong visibility on web activity, simple policy configuration, and excellent customer support.
  • Reviewers mentioned occasional issues with website functionality due to browser isolation, challenges with debugging user-specific issues, and slowdowns in internet browsing sessions due to the Menlo Security proxy.
Menlo Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
4
Ease of Use
4
Security
4
Features
3
Malware Protection
3
Cons
Internet Connectivity
2
Slow Internet
2
Slow Internet Speed
2
Slow Performance
2
Access Issues
1
Menlo Security features and usability ratings that predict user satisfaction
9.1
Quality of Support
Average: 8.9
9.4
Ease of Use
Average: 8.9
9.4
Ease of Admin
Average: 8.8
0.0
No information available
Seller Details
Year Founded
2012
HQ Location
Mountain View, California, United States
Twitter
@menlosecurity
16,988 Twitter followers
LinkedIn® Page
www.linkedin.com
445 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Forescout Platform is a comprehensive cybersecurity solution designed to provide real-time visibility, control, and compliance across all connected devices within an organization's network. It con

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 53% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Forescout Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    4
    Internet Security
    3
    IP Addressing
    3
    Monitoring
    3
    Customization
    2
    Cons
    Complex Implementation
    2
    Dependency Issues
    2
    Integration Issues
    2
    Performance Issues
    2
    Poor Customer Support
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Forescout Platform features and usability ratings that predict user satisfaction
    7.7
    Quality of Support
    Average: 8.9
    9.2
    Ease of Use
    Average: 8.9
    8.0
    Ease of Admin
    Average: 8.8
    7.2
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2000
    HQ Location
    San Jose, CA
    Twitter
    @ForeScout
    23,201 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,215 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Forescout Platform is a comprehensive cybersecurity solution designed to provide real-time visibility, control, and compliance across all connected devices within an organization's network. It con

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 53% Enterprise
  • 33% Mid-Market
Forescout Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
4
Internet Security
3
IP Addressing
3
Monitoring
3
Customization
2
Cons
Complex Implementation
2
Dependency Issues
2
Integration Issues
2
Performance Issues
2
Poor Customer Support
2
Forescout Platform features and usability ratings that predict user satisfaction
7.7
Quality of Support
Average: 8.9
9.2
Ease of Use
Average: 8.9
8.0
Ease of Admin
Average: 8.8
7.2
Application Security
Average: 8.9
Seller Details
Year Founded
2000
HQ Location
San Jose, CA
Twitter
@ForeScout
23,201 Twitter followers
LinkedIn® Page
www.linkedin.com
1,215 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IT wants to minimize the costs of managing network infrastructure, but needs control of secure, high performance networking. That's why NetFoundry reinvented NaaS to remove the telco, hardware and cir

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 63% Enterprise
    • 25% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • NetFoundry Network as a Service (NaaS) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    App Integration
    1
    Centralized Management
    1
    Deployment Ease
    1
    Ease of Use
    1
    Management Ease
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • NetFoundry Network as a Service (NaaS) features and usability ratings that predict user satisfaction
    8.1
    Quality of Support
    Average: 8.9
    8.1
    Ease of Use
    Average: 8.9
    5.0
    Ease of Admin
    Average: 8.8
    10.0
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    Charlotte, NC
    Twitter
    @netfoundry
    1,456 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    76 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

IT wants to minimize the costs of managing network infrastructure, but needs control of secure, high performance networking. That's why NetFoundry reinvented NaaS to remove the telco, hardware and cir

Users
No information available
Industries
No information available
Market Segment
  • 63% Enterprise
  • 25% Small-Business
NetFoundry Network as a Service (NaaS) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
App Integration
1
Centralized Management
1
Deployment Ease
1
Ease of Use
1
Management Ease
1
Cons
This product has not yet received any negative sentiments.
NetFoundry Network as a Service (NaaS) features and usability ratings that predict user satisfaction
8.1
Quality of Support
Average: 8.9
8.1
Ease of Use
Average: 8.9
5.0
Ease of Admin
Average: 8.8
10.0
Application Security
Average: 8.9
Seller Details
Year Founded
2017
HQ Location
Charlotte, NC
Twitter
@netfoundry
1,456 Twitter followers
LinkedIn® Page
www.linkedin.com
76 employees on LinkedIn®
(10)4.1 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SonicWall Cloud Secure Edge is a modern, cloud-native Security Service Edge (SSE) solution that addresses the limitations of legacy network appliances with a unified, scalable approach to secure acces

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 30% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SonicWall Cloud Secure Edge Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    3
    Secure Access
    2
    Threat Protection
    2
    Authentication
    1
    Customer Support
    1
    Cons
    Access Issues
    1
    Expensive
    1
    Integration Issues
    1
    Poor Documentation
    1
    Process Delays
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SonicWall Cloud Secure Edge features and usability ratings that predict user satisfaction
    8.3
    Quality of Support
    Average: 8.9
    9.0
    Ease of Use
    Average: 8.9
    10.0
    Ease of Admin
    Average: 8.8
    8.8
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SonicWall
    Company Website
    Year Founded
    1991
    HQ Location
    Milpitas, CA
    Twitter
    @SonicWall
    29,374 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,972 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SonicWall Cloud Secure Edge is a modern, cloud-native Security Service Edge (SSE) solution that addresses the limitations of legacy network appliances with a unified, scalable approach to secure acces

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 30% Small-Business
SonicWall Cloud Secure Edge Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
3
Secure Access
2
Threat Protection
2
Authentication
1
Customer Support
1
Cons
Access Issues
1
Expensive
1
Integration Issues
1
Poor Documentation
1
Process Delays
1
SonicWall Cloud Secure Edge features and usability ratings that predict user satisfaction
8.3
Quality of Support
Average: 8.9
9.0
Ease of Use
Average: 8.9
10.0
Ease of Admin
Average: 8.8
8.8
Application Security
Average: 8.9
Seller Details
Seller
SonicWall
Company Website
Year Founded
1991
HQ Location
Milpitas, CA
Twitter
@SonicWall
29,374 Twitter followers
LinkedIn® Page
www.linkedin.com
1,972 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Flex Appliance moves beyond hyperconverged architectures and provides a unified NetBackup environment by making it simple to protect all your workloads and scale without increasing your hardware footp

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 38% Mid-Market
    • 31% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Veritas Netbackup Flex Appliance Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    5
    Secure Access
    4
    Access Management
    3
    Data Security
    2
    Ease of Use
    2
    Cons
    Complexity
    2
    Complex Setup
    2
    Difficult Configuration
    2
    Difficult Learning
    2
    Difficult Learning Curve
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Veritas Netbackup Flex Appliance Security features and usability ratings that predict user satisfaction
    8.3
    Quality of Support
    Average: 8.9
    8.7
    Ease of Use
    Average: 8.9
    9.2
    Ease of Admin
    Average: 8.8
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cohesity
    Year Founded
    2013
    HQ Location
    San Jose, CA
    Twitter
    @Cohesity
    29,396 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,684 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Flex Appliance moves beyond hyperconverged architectures and provides a unified NetBackup environment by making it simple to protect all your workloads and scale without increasing your hardware footp

Users
No information available
Industries
No information available
Market Segment
  • 38% Mid-Market
  • 31% Enterprise
Veritas Netbackup Flex Appliance Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
5
Secure Access
4
Access Management
3
Data Security
2
Ease of Use
2
Cons
Complexity
2
Complex Setup
2
Difficult Configuration
2
Difficult Learning
2
Difficult Learning Curve
2
Veritas Netbackup Flex Appliance Security features and usability ratings that predict user satisfaction
8.3
Quality of Support
Average: 8.9
8.7
Ease of Use
Average: 8.9
9.2
Ease of Admin
Average: 8.8
0.0
No information available
Seller Details
Seller
Cohesity
Year Founded
2013
HQ Location
San Jose, CA
Twitter
@Cohesity
29,396 Twitter followers
LinkedIn® Page
www.linkedin.com
7,684 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AWS Verified Access is a service that enables secure access to corporate applications and resources without the need for a VPN. By implementing fine-grained access policies based on user identity and

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • AWS Verified access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Authentication
    1
    Secure Access
    1
    Cons
    Access Issues
    1
    Difficult Configuration
    1
    Difficult Learning Curve
    1
    Integration Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AWS Verified access features and usability ratings that predict user satisfaction
    8.3
    Quality of Support
    Average: 8.9
    9.6
    Ease of Use
    Average: 8.9
    8.3
    Ease of Admin
    Average: 8.8
    10.0
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2006
    HQ Location
    Seattle, WA
    Twitter
    @awscloud
    2,218,572 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    152,002 employees on LinkedIn®
    Ownership
    NASDAQ: AMZN
Product Description
How are these determined?Information
This description is provided by the seller.

AWS Verified Access is a service that enables secure access to corporate applications and resources without the need for a VPN. By implementing fine-grained access policies based on user identity and

Users
No information available
Industries
No information available
Market Segment
  • 75% Enterprise
  • 25% Mid-Market
AWS Verified access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Authentication
1
Secure Access
1
Cons
Access Issues
1
Difficult Configuration
1
Difficult Learning Curve
1
Integration Issues
1
AWS Verified access features and usability ratings that predict user satisfaction
8.3
Quality of Support
Average: 8.9
9.6
Ease of Use
Average: 8.9
8.3
Ease of Admin
Average: 8.8
10.0
Application Security
Average: 8.9
Seller Details
Year Founded
2006
HQ Location
Seattle, WA
Twitter
@awscloud
2,218,572 Twitter followers
LinkedIn® Page
www.linkedin.com
152,002 employees on LinkedIn®
Ownership
NASDAQ: AMZN
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cimcor is the leading provider of System Integrity Assurance with our award-winning CimTrak Integrity Suite that protects a wide range of physical, network, cloud, and virtual IT assets in real time.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CimTrak Integrity Suite Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Compliance
    4
    Compliance Management
    4
    Ease of Use
    4
    Customer Support
    3
    Monitoring
    3
    Cons
    Compliance Issues
    2
    Dashboard Issues
    2
    Update Issues
    2
    Compliance Difficulty
    1
    Improvement Needed
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CimTrak Integrity Suite features and usability ratings that predict user satisfaction
    9.9
    Quality of Support
    Average: 8.9
    9.0
    Ease of Use
    Average: 8.9
    9.2
    Ease of Admin
    Average: 8.8
    9.4
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cimcor
    Company Website
    Year Founded
    1997
    HQ Location
    Merrillville, Indiana, United States
    Twitter
    @cimtrak
    2,211 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    29 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cimcor is the leading provider of System Integrity Assurance with our award-winning CimTrak Integrity Suite that protects a wide range of physical, network, cloud, and virtual IT assets in real time.

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 33% Mid-Market
CimTrak Integrity Suite Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Compliance
4
Compliance Management
4
Ease of Use
4
Customer Support
3
Monitoring
3
Cons
Compliance Issues
2
Dashboard Issues
2
Update Issues
2
Compliance Difficulty
1
Improvement Needed
1
CimTrak Integrity Suite features and usability ratings that predict user satisfaction
9.9
Quality of Support
Average: 8.9
9.0
Ease of Use
Average: 8.9
9.2
Ease of Admin
Average: 8.8
9.4
Application Security
Average: 8.9
Seller Details
Seller
Cimcor
Company Website
Year Founded
1997
HQ Location
Merrillville, Indiana, United States
Twitter
@cimtrak
2,211 Twitter followers
LinkedIn® Page
www.linkedin.com
29 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Skyhigh Security Service Edge portfolio goes beyond data access and focuses on data use, allowing organizations to collaborate from any device and from anywhere without sacrificing security, while

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 33% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Skyhigh Security Service Edge Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    5
    Data Security
    4
    Cloud Services
    3
    Data Protection
    3
    Easy Integrations
    3
    Cons
    Expensive
    2
    Complex Configuration
    1
    Complexity
    1
    Complex Setup
    1
    Dependency Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Skyhigh Security Service Edge features and usability ratings that predict user satisfaction
    8.5
    Quality of Support
    Average: 8.9
    9.0
    Ease of Use
    Average: 8.9
    8.3
    Ease of Admin
    Average: 8.8
    10.0
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2022
    HQ Location
    San Jose, CA
    Twitter
    @skyhighsecurity
    17,690 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    709 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Skyhigh Security Service Edge portfolio goes beyond data access and focuses on data use, allowing organizations to collaborate from any device and from anywhere without sacrificing security, while

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 33% Enterprise
  • 33% Mid-Market
Skyhigh Security Service Edge Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
5
Data Security
4
Cloud Services
3
Data Protection
3
Easy Integrations
3
Cons
Expensive
2
Complex Configuration
1
Complexity
1
Complex Setup
1
Dependency Issues
1
Skyhigh Security Service Edge features and usability ratings that predict user satisfaction
8.5
Quality of Support
Average: 8.9
9.0
Ease of Use
Average: 8.9
8.3
Ease of Admin
Average: 8.8
10.0
Application Security
Average: 8.9
Seller Details
Year Founded
2022
HQ Location
San Jose, CA
Twitter
@skyhighsecurity
17,690 Twitter followers
LinkedIn® Page
www.linkedin.com
709 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Founded in London, UK in 2022, SURF Security is an endpoint protection Browser-SASE (secure access service edge) cybersecurity company that has created the world’s first enterprise zero-trust browser

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 40% Enterprise
    • 40% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Surf Security Zero Trust Enterprise Browser Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    4
    Security Features
    4
    Reliability
    3
    Access Control
    2
    Ease of Use
    2
    Cons
    Complex Configuration
    1
    Difficult Configuration
    1
    Learning Curve
    1
    Limited Customization
    1
    Onboarding Difficulties
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Surf Security Zero Trust Enterprise Browser features and usability ratings that predict user satisfaction
    9.6
    Quality of Support
    Average: 8.9
    10.0
    Ease of Use
    Average: 8.9
    10.0
    Ease of Admin
    Average: 8.8
    10.0
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2021
    HQ Location
    London, GB
    LinkedIn® Page
    www.linkedin.com
    33 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Founded in London, UK in 2022, SURF Security is an endpoint protection Browser-SASE (secure access service edge) cybersecurity company that has created the world’s first enterprise zero-trust browser

Users
No information available
Industries
No information available
Market Segment
  • 40% Enterprise
  • 40% Small-Business
Surf Security Zero Trust Enterprise Browser Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
4
Security Features
4
Reliability
3
Access Control
2
Ease of Use
2
Cons
Complex Configuration
1
Difficult Configuration
1
Learning Curve
1
Limited Customization
1
Onboarding Difficulties
1
Surf Security Zero Trust Enterprise Browser features and usability ratings that predict user satisfaction
9.6
Quality of Support
Average: 8.9
10.0
Ease of Use
Average: 8.9
10.0
Ease of Admin
Average: 8.8
10.0
Application Security
Average: 8.9
Seller Details
Year Founded
2021
HQ Location
London, GB
LinkedIn® Page
www.linkedin.com
33 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Symantec Secure Access Cloud is a SaaS solution that enables more secure and granular access management to any corporate resource hosted on-premises or in the cloud. It uses Zero Trust Access principl

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 67% Mid-Market
    • 28% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Symantec Secure Access Cloud features and usability ratings that predict user satisfaction
    9.4
    Quality of Support
    Average: 8.9
    9.4
    Ease of Use
    Average: 8.9
    8.9
    Ease of Admin
    Average: 8.8
    8.8
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    62,269 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    55,707 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

Symantec Secure Access Cloud is a SaaS solution that enables more secure and granular access management to any corporate resource hosted on-premises or in the cloud. It uses Zero Trust Access principl

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 67% Mid-Market
  • 28% Enterprise
Symantec Secure Access Cloud features and usability ratings that predict user satisfaction
9.4
Quality of Support
Average: 8.9
9.4
Ease of Use
Average: 8.9
8.9
Ease of Admin
Average: 8.8
8.8
Application Security
Average: 8.9
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
62,269 Twitter followers
LinkedIn® Page
www.linkedin.com
55,707 employees on LinkedIn®
Ownership
NASDAQ: CA
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    threatER is the leading preemptive cybersecurity platform for building and maintaining trust at scale. Our SaaS solution continuously learns from all available data, allowing you to gain better insigh

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 61% Mid-Market
    • 29% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • threatER Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Malware Protection
    1
    Network Security
    1
    Protection
    1
    Security
    1
    Cons
    Connection Issues
    1
    False Positives
    1
    Performance Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • threatER features and usability ratings that predict user satisfaction
    9.7
    Quality of Support
    Average: 8.9
    9.5
    Ease of Use
    Average: 8.9
    9.5
    Ease of Admin
    Average: 8.8
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    threatER
    Company Website
    HQ Location
    Tysons, Virginia
    LinkedIn® Page
    www.linkedin.com
    28 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

threatER is the leading preemptive cybersecurity platform for building and maintaining trust at scale. Our SaaS solution continuously learns from all available data, allowing you to gain better insigh

Users
No information available
Industries
No information available
Market Segment
  • 61% Mid-Market
  • 29% Enterprise
threatER Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Malware Protection
1
Network Security
1
Protection
1
Security
1
Cons
Connection Issues
1
False Positives
1
Performance Issues
1
threatER features and usability ratings that predict user satisfaction
9.7
Quality of Support
Average: 8.9
9.5
Ease of Use
Average: 8.9
9.5
Ease of Admin
Average: 8.8
0.0
No information available
Seller Details
Seller
threatER
Company Website
HQ Location
Tysons, Virginia
LinkedIn® Page
www.linkedin.com
28 employees on LinkedIn®