Introducing G2.ai, the future of software buying.Try now

Best Zero Trust Networking Software - Page 5

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Zero trust networking software is a type of network security and identity management solution used to implement the zero trust security model. As opposed to traditional network security systems, which provide a castle-and-moat system for granting access into a network, the zero trust model assumes every individual, both internal and external, is a potential threat until they are verified.

Companies have adopted the zero trust security model since decentralized business models and IT systems have made it significantly more complicated to ensure proper access controls are in place across multiple networks and physical locations. Zero trust networking solutions allow companies to continuously monitor network activity and user behavior to adapt authentication requirements on an individual basis. Verified individuals behaving abnormally or attempting to violate their permissions will be prompted to provide further authentication. Data is collected from access points, behaviors, and traffic logs to provide in-depth network security analytics capabilities.

Zero trust networking software utilizes similar authentication methods as risk-based authentication software, but is specifically for network access control. Risk-based authentication is more broad and its methods can be applied to accessing a network, application, database, or any other privileged information.

To qualify for inclusion in the Zero Trust Networking category, a product must:

Utilize adaptive authentication to continuously verify user permissions
Allow for network segmentation to simplify and broaden policy enforcement
Monitor traffic and user behavior for future inspection and analysis
Show More
Show Less

Featured Zero Trust Networking Software At A Glance

Free Plan Available:
GoodAccess
Sponsored
Highest Performer:
Easiest to Use:
Show LessShow More
Highest Performer:
Easiest to Use:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Zero Trust Networking Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
148 Listings in Zero Trust Networking Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Forcepoint ONE ZTNA seamlessly extends zero trust to private apps in internal data centers and private clouds, securing remote access to private apps without the risks or costs associated with a VPN.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Forcepoint Zero Trust Network Access (ZTNA) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Forcepoint Zero Trust Network Access (ZTNA) features and usability ratings that predict user satisfaction
    8.3
    Quality of Support
    Average: 8.8
    8.9
    Ease of Use
    Average: 8.9
    9.2
    Ease of Admin
    Average: 8.8
    9.2
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1994
    HQ Location
    Austin, TX
    Twitter
    @Forcepointsec
    65,541 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,679 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Forcepoint ONE ZTNA seamlessly extends zero trust to private apps in internal data centers and private clouds, securing remote access to private apps without the risks or costs associated with a VPN.

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Mid-Market
Forcepoint Zero Trust Network Access (ZTNA) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
1
Cons
This product has not yet received any negative sentiments.
Forcepoint Zero Trust Network Access (ZTNA) features and usability ratings that predict user satisfaction
8.3
Quality of Support
Average: 8.8
8.9
Ease of Use
Average: 8.9
9.2
Ease of Admin
Average: 8.8
9.2
Application Security
Average: 8.9
Seller Details
Year Founded
1994
HQ Location
Austin, TX
Twitter
@Forcepointsec
65,541 Twitter followers
LinkedIn® Page
www.linkedin.com
1,679 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ivanti Neurons for Secure Access delivers centralized management and analytics from the cloud for Ivanti Connect Secure (ICS) VPN gateways. Its unified interface controls an entire ICS deployment, gre

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Ivanti Neurons for Secure Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Centralized Management
    1
    Cloud Services
    1
    Monitoring
    1
    Network Security
    1
    Notifications
    1
    Cons
    Connection Issues
    1
    Slow Internet
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Ivanti Neurons for Secure Access features and usability ratings that predict user satisfaction
    8.3
    Quality of Support
    Average: 8.8
    8.9
    Ease of Use
    Average: 8.9
    10.0
    Ease of Admin
    Average: 8.8
    10.0
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Ivanti
    Year Founded
    1985
    HQ Location
    South Jordan, UT
    Twitter
    @GoIvanti
    6,766 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,984 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Ivanti Neurons for Secure Access delivers centralized management and analytics from the cloud for Ivanti Connect Secure (ICS) VPN gateways. Its unified interface controls an entire ICS deployment, gre

Users
No information available
Industries
No information available
Market Segment
  • 67% Enterprise
  • 33% Mid-Market
Ivanti Neurons for Secure Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Centralized Management
1
Cloud Services
1
Monitoring
1
Network Security
1
Notifications
1
Cons
Connection Issues
1
Slow Internet
1
Ivanti Neurons for Secure Access features and usability ratings that predict user satisfaction
8.3
Quality of Support
Average: 8.8
8.9
Ease of Use
Average: 8.9
10.0
Ease of Admin
Average: 8.8
10.0
Application Security
Average: 8.9
Seller Details
Seller
Ivanti
Year Founded
1985
HQ Location
South Jordan, UT
Twitter
@GoIvanti
6,766 Twitter followers
LinkedIn® Page
www.linkedin.com
2,984 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Pomerium is an open-source context-aware gateway for managing secure, identity aware access to applications and services. IT management teams can easily use Pomerium to provision access and ensure sec

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 42% Small-Business
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Pomerium Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    1
    Data Security
    1
    Deployment Ease
    1
    Ease of Use
    1
    Easy Access
    1
    Cons
    Difficult Learning
    1
    Difficult Learning Curve
    1
    Steep Learning Curve
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Pomerium features and usability ratings that predict user satisfaction
    9.8
    Quality of Support
    Average: 8.8
    9.2
    Ease of Use
    Average: 8.9
    9.4
    Ease of Admin
    Average: 8.8
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Pomerium
    HQ Location
    Los Angeles, US
    Twitter
    @pomerium_io
    321 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    19 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Pomerium is an open-source context-aware gateway for managing secure, identity aware access to applications and services. IT management teams can easily use Pomerium to provision access and ensure sec

Users
No information available
Industries
No information available
Market Segment
  • 42% Small-Business
  • 33% Mid-Market
Pomerium Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
1
Data Security
1
Deployment Ease
1
Ease of Use
1
Easy Access
1
Cons
Difficult Learning
1
Difficult Learning Curve
1
Steep Learning Curve
1
Pomerium features and usability ratings that predict user satisfaction
9.8
Quality of Support
Average: 8.8
9.2
Ease of Use
Average: 8.9
9.4
Ease of Admin
Average: 8.8
0.0
No information available
Seller Details
Seller
Pomerium
HQ Location
Los Angeles, US
Twitter
@pomerium_io
321 Twitter followers
LinkedIn® Page
www.linkedin.com
19 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    PureDome is a corporate VPN with integrated cybersecurity, secure remote team connectivity, and data access solutions. It allows businesses to safeguard assets and boost productivity through a central

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 74% Small-Business
    • 16% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • PureDome Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Authentication
    1
    Customer Support
    1
    Ease of Use
    1
    Integrations
    1
    Pricing
    1
    Cons
    Access Issues
    1
    Compatibility Issues
    1
    Login Issues
    1
    Website Blocking
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • PureDome features and usability ratings that predict user satisfaction
    9.0
    Quality of Support
    Average: 8.8
    9.4
    Ease of Use
    Average: 8.9
    9.1
    Ease of Admin
    Average: 8.8
    10.0
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2006
    HQ Location
    British Virgin Islands, VG
    Twitter
    @PureSquarecom
    110 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    187 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

PureDome is a corporate VPN with integrated cybersecurity, secure remote team connectivity, and data access solutions. It allows businesses to safeguard assets and boost productivity through a central

Users
No information available
Industries
  • Computer Software
Market Segment
  • 74% Small-Business
  • 16% Enterprise
PureDome Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Authentication
1
Customer Support
1
Ease of Use
1
Integrations
1
Pricing
1
Cons
Access Issues
1
Compatibility Issues
1
Login Issues
1
Website Blocking
1
PureDome features and usability ratings that predict user satisfaction
9.0
Quality of Support
Average: 8.8
9.4
Ease of Use
Average: 8.9
9.1
Ease of Admin
Average: 8.8
10.0
Application Security
Average: 8.9
Seller Details
Year Founded
2006
HQ Location
British Virgin Islands, VG
Twitter
@PureSquarecom
110 Twitter followers
LinkedIn® Page
www.linkedin.com
187 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The remote.it Virtual Private Internet allows removal of global IP addresses and open ports, leaving a zero attack surface, while simultaneously solving the scarcity of global IPv4 addresses.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Remote.It Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Remote Access
    2
    Ease of Use
    1
    Easy Access
    1
    Reliability
    1
    Remote Management
    1
    Cons
    Difficulty
    2
    Needs Improvement
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Remote.It features and usability ratings that predict user satisfaction
    9.4
    Quality of Support
    Average: 8.8
    8.3
    Ease of Use
    Average: 8.9
    8.3
    Ease of Admin
    Average: 8.8
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2009
    HQ Location
    Palo Alto, US
    LinkedIn® Page
    www.linkedin.com
    14 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The remote.it Virtual Private Internet allows removal of global IP addresses and open ports, leaving a zero attack surface, while simultaneously solving the scarcity of global IPv4 addresses.

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Enterprise
Remote.It Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Remote Access
2
Ease of Use
1
Easy Access
1
Reliability
1
Remote Management
1
Cons
Difficulty
2
Needs Improvement
1
Remote.It features and usability ratings that predict user satisfaction
9.4
Quality of Support
Average: 8.8
8.3
Ease of Use
Average: 8.9
8.3
Ease of Admin
Average: 8.8
0.0
No information available
Seller Details
Year Founded
2009
HQ Location
Palo Alto, US
LinkedIn® Page
www.linkedin.com
14 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    threatER is the leading preemptive cybersecurity platform for building and maintaining trust at scale. Our SaaS solution continuously learns from all available data, allowing you to gain better insigh

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 62% Mid-Market
    • 27% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • threatER features and usability ratings that predict user satisfaction
    9.6
    Quality of Support
    Average: 8.8
    9.5
    Ease of Use
    Average: 8.9
    9.5
    Ease of Admin
    Average: 8.8
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    threatER
    HQ Location
    Tysons, Virginia
    LinkedIn® Page
    www.linkedin.com
    26 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

threatER is the leading preemptive cybersecurity platform for building and maintaining trust at scale. Our SaaS solution continuously learns from all available data, allowing you to gain better insigh

Users
No information available
Industries
No information available
Market Segment
  • 62% Mid-Market
  • 27% Enterprise
threatER features and usability ratings that predict user satisfaction
9.6
Quality of Support
Average: 8.8
9.5
Ease of Use
Average: 8.9
9.5
Ease of Admin
Average: 8.8
0.0
No information available
Seller Details
Seller
threatER
HQ Location
Tysons, Virginia
LinkedIn® Page
www.linkedin.com
26 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Versa SASE is a cloud-native, multi-tenant, multi-service software for a software defined network.

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 46% Enterprise
    • 46% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Versa SASE Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Efficiency
    1
    Reliability
    1
    Security
    1
    Speed
    1
    Cons
    Connection Issues
    1
    Performance Issues
    1
    Technical Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Versa SASE features and usability ratings that predict user satisfaction
    8.7
    Quality of Support
    Average: 8.8
    8.8
    Ease of Use
    Average: 8.9
    9.3
    Ease of Admin
    Average: 8.8
    9.2
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2012
    HQ Location
    Santa Clara
    Twitter
    @versanetworks
    27,977 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    832 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Versa SASE is a cloud-native, multi-tenant, multi-service software for a software defined network.

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 46% Enterprise
  • 46% Mid-Market
Versa SASE Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Efficiency
1
Reliability
1
Security
1
Speed
1
Cons
Connection Issues
1
Performance Issues
1
Technical Issues
1
Versa SASE features and usability ratings that predict user satisfaction
8.7
Quality of Support
Average: 8.8
8.8
Ease of Use
Average: 8.9
9.3
Ease of Admin
Average: 8.8
9.2
Application Security
Average: 8.9
Seller Details
Year Founded
2012
HQ Location
Santa Clara
Twitter
@versanetworks
27,977 Twitter followers
LinkedIn® Page
www.linkedin.com
832 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Xiid has introduced an innovative and exclusive Zero Knowledge Network (ZKN) Architecture that is revolutionizing enterprise network security. Xiid's Zero Knowledge Networking (ZKN) is a novel securit

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Xiid Zero Knowledge Networking Architecture features and usability ratings that predict user satisfaction
    10.0
    Quality of Support
    Average: 8.8
    9.4
    Ease of Use
    Average: 8.9
    9.4
    Ease of Admin
    Average: 8.8
    9.4
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Xiid
    Year Founded
    2018
    HQ Location
    Las Vegas, US
    LinkedIn® Page
    www.linkedin.com
    22 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Xiid has introduced an innovative and exclusive Zero Knowledge Network (ZKN) Architecture that is revolutionizing enterprise network security. Xiid's Zero Knowledge Networking (ZKN) is a novel securit

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Mid-Market
Xiid Zero Knowledge Networking Architecture features and usability ratings that predict user satisfaction
10.0
Quality of Support
Average: 8.8
9.4
Ease of Use
Average: 8.9
9.4
Ease of Admin
Average: 8.8
9.4
Application Security
Average: 8.9
Seller Details
Seller
Xiid
Year Founded
2018
HQ Location
Las Vegas, US
LinkedIn® Page
www.linkedin.com
22 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BeyondCorp is a Zero Trust security framework modeled by Google that shifts access controls from the perimeter to individual devices and users. The end result allows employees to work securely from an

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BeyondCorp features and usability ratings that predict user satisfaction
    10.0
    Quality of Support
    Average: 8.8
    10.0
    Ease of Use
    Average: 8.9
    10.0
    Ease of Admin
    Average: 8.8
    9.2
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Google
    Year Founded
    1998
    HQ Location
    Mountain View, CA
    Twitter
    @google
    31,497,617 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    325,307 employees on LinkedIn®
    Ownership
    NASDAQ:GOOG
Product Description
How are these determined?Information
This description is provided by the seller.

BeyondCorp is a Zero Trust security framework modeled by Google that shifts access controls from the perimeter to individual devices and users. The end result allows employees to work securely from an

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
BeyondCorp features and usability ratings that predict user satisfaction
10.0
Quality of Support
Average: 8.8
10.0
Ease of Use
Average: 8.9
10.0
Ease of Admin
Average: 8.8
9.2
Application Security
Average: 8.9
Seller Details
Seller
Google
Year Founded
1998
HQ Location
Mountain View, CA
Twitter
@google
31,497,617 Twitter followers
LinkedIn® Page
www.linkedin.com
325,307 employees on LinkedIn®
Ownership
NASDAQ:GOOG
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Secure your workloads, users and critical assets from zero-day and advanced persistent threats in minutes

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ColorTokens Xtended ZeroTrust Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Intuitive
    1
    User Interface
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ColorTokens Xtended ZeroTrust Security Platform features and usability ratings that predict user satisfaction
    8.3
    Quality of Support
    Average: 8.8
    8.3
    Ease of Use
    Average: 8.9
    0.0
    No information available
    10.0
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    San Jose, California, United States
    Twitter
    @ColorTokensInc
    428 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    280 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Secure your workloads, users and critical assets from zero-day and advanced persistent threats in minutes

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
ColorTokens Xtended ZeroTrust Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Intuitive
1
User Interface
1
Cons
This product has not yet received any negative sentiments.
ColorTokens Xtended ZeroTrust Security Platform features and usability ratings that predict user satisfaction
8.3
Quality of Support
Average: 8.8
8.3
Ease of Use
Average: 8.9
0.0
No information available
10.0
Application Security
Average: 8.9
Seller Details
Year Founded
2015
HQ Location
San Jose, California, United States
Twitter
@ColorTokensInc
428 Twitter followers
LinkedIn® Page
www.linkedin.com
280 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CyberArk Identity Overview CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 49% Enterprise
    • 49% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CyberArk Workforce Identity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    14
    Access Management
    6
    Intuitive
    6
    Customer Support
    5
    Access Control
    4
    Cons
    Missing Features
    4
    Integration Issues
    2
    Lack of Automation
    2
    Lack of Features
    2
    Browser Extension Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CyberArk Workforce Identity features and usability ratings that predict user satisfaction
    9.0
    Quality of Support
    Average: 8.8
    8.8
    Ease of Use
    Average: 8.9
    8.6
    Ease of Admin
    Average: 8.8
    10.0
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CyberArk
    Year Founded
    1999
    HQ Location
    Newton, MA
    Twitter
    @CyberArk
    17,642 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,948 employees on LinkedIn®
    Ownership
    NASDAQ:CYBR
Product Description
How are these determined?Information
This description is provided by the seller.

CyberArk Identity Overview CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 49% Enterprise
  • 49% Mid-Market
CyberArk Workforce Identity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
14
Access Management
6
Intuitive
6
Customer Support
5
Access Control
4
Cons
Missing Features
4
Integration Issues
2
Lack of Automation
2
Lack of Features
2
Browser Extension Issues
1
CyberArk Workforce Identity features and usability ratings that predict user satisfaction
9.0
Quality of Support
Average: 8.8
8.8
Ease of Use
Average: 8.9
8.6
Ease of Admin
Average: 8.8
10.0
Application Security
Average: 8.9
Seller Details
Seller
CyberArk
Year Founded
1999
HQ Location
Newton, MA
Twitter
@CyberArk
17,642 Twitter followers
LinkedIn® Page
www.linkedin.com
4,948 employees on LinkedIn®
Ownership
NASDAQ:CYBR
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Customer-inspired, future-ready technology goes into every PowerEdge server, offering exceptional performance for small-business offices to enterprise hyperscale environments.

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Dell Security features and usability ratings that predict user satisfaction
    8.3
    Quality of Support
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1984
    HQ Location
    Round Rock, TX
    Twitter
    @Dell
    794,531 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    132,992 employees on LinkedIn®
    Ownership
    NYSE: DELL
Product Description
How are these determined?Information
This description is provided by the seller.

Customer-inspired, future-ready technology goes into every PowerEdge server, offering exceptional performance for small-business offices to enterprise hyperscale environments.

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Dell Security features and usability ratings that predict user satisfaction
8.3
Quality of Support
Average: 8.8
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1984
HQ Location
Round Rock, TX
Twitter
@Dell
794,531 Twitter followers
LinkedIn® Page
www.linkedin.com
132,992 employees on LinkedIn®
Ownership
NYSE: DELL
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    iboss is a leading Zero Trust Secure Access Service Edge (SASE) cloud security platform that consolidates network and security technologies into a single cloud-based service. By integrating VPN, Secur

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 47% Mid-Market
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • iboss Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cloud Security
    1
    Features
    1
    Network Security
    1
    Secure Access
    1
    Security
    1
    Cons
    Access Issues
    1
    Expensive
    1
    Expensive Licensing
    1
    Login Issues
    1
    Slow Internet
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • iboss features and usability ratings that predict user satisfaction
    8.2
    Quality of Support
    Average: 8.8
    7.9
    Ease of Use
    Average: 8.9
    7.2
    Ease of Admin
    Average: 8.8
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    iboss
    Year Founded
    2003
    HQ Location
    Boston, MA
    Twitter
    @iboss
    44 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    347 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

iboss is a leading Zero Trust Secure Access Service Edge (SASE) cloud security platform that consolidates network and security technologies into a single cloud-based service. By integrating VPN, Secur

Users
No information available
Industries
No information available
Market Segment
  • 47% Mid-Market
  • 33% Small-Business
iboss Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cloud Security
1
Features
1
Network Security
1
Secure Access
1
Security
1
Cons
Access Issues
1
Expensive
1
Expensive Licensing
1
Login Issues
1
Slow Internet
1
iboss features and usability ratings that predict user satisfaction
8.2
Quality of Support
Average: 8.8
7.9
Ease of Use
Average: 8.9
7.2
Ease of Admin
Average: 8.8
0.0
No information available
Seller Details
Seller
iboss
Year Founded
2003
HQ Location
Boston, MA
Twitter
@iboss
44 Twitter followers
LinkedIn® Page
www.linkedin.com
347 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Invisily is a Zero Trust Network Access platform that supports a broad range of deployment scenarios without the technical debt of existing competing solutions. It offers several unique capabilities s

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Invisily Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Installation Ease
    1
    Secure Access
    1
    Security
    1
    Cons
    Access Issues
    1
    Connection Issues
    1
    Integration Issues
    1
    Slow Internet
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Invisily features and usability ratings that predict user satisfaction
    9.2
    Quality of Support
    Average: 8.8
    9.2
    Ease of Use
    Average: 8.9
    0.0
    No information available
    8.3
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Invisily
    Twitter
    @invisily_ztna
    3 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Invisily is a Zero Trust Network Access platform that supports a broad range of deployment scenarios without the technical debt of existing competing solutions. It offers several unique capabilities s

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Small-Business
Invisily Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Installation Ease
1
Secure Access
1
Security
1
Cons
Access Issues
1
Connection Issues
1
Integration Issues
1
Slow Internet
1
Invisily features and usability ratings that predict user satisfaction
9.2
Quality of Support
Average: 8.8
9.2
Ease of Use
Average: 8.9
0.0
No information available
8.3
Application Security
Average: 8.9
Seller Details
Seller
Invisily
Twitter
@invisily_ztna
3 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    FireMon Policy Manager is a comprehensive firewall policy management platform that helps organizations quickly adapt to change, manage risk, and achieve continuous compliance. By standardizing and

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Policy Manager Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Easy Access
    1
    Easy Integrations
    1
    Features
    1
    Integrations
    1
    Cons
    Performance Issues
    1
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Policy Manager features and usability ratings that predict user satisfaction
    8.5
    Quality of Support
    Average: 8.8
    9.4
    Ease of Use
    Average: 8.9
    8.3
    Ease of Admin
    Average: 8.8
    5.0
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    FireMon
    Year Founded
    2004
    HQ Location
    Overland Park, KS
    Twitter
    @FireMon
    2,457 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    252 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

FireMon Policy Manager is a comprehensive firewall policy management platform that helps organizations quickly adapt to change, manage risk, and achieve continuous compliance. By standardizing and

Users
No information available
Industries
No information available
Market Segment
  • 67% Enterprise
  • 33% Mid-Market
Policy Manager Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Easy Access
1
Easy Integrations
1
Features
1
Integrations
1
Cons
Performance Issues
1
Slow Performance
1
Policy Manager features and usability ratings that predict user satisfaction
8.5
Quality of Support
Average: 8.8
9.4
Ease of Use
Average: 8.9
8.3
Ease of Admin
Average: 8.8
5.0
Application Security
Average: 8.9
Seller Details
Seller
FireMon
Year Founded
2004
HQ Location
Overland Park, KS
Twitter
@FireMon
2,457 Twitter followers
LinkedIn® Page
www.linkedin.com
252 employees on LinkedIn®