Introducing G2.ai, the future of software buying.Try now

Best Zero Trust Networking Software - Page 6

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Zero trust networking software is a type of network security and identity management solution used to implement the zero trust security model. As opposed to traditional network security systems, which provide a castle-and-moat system for granting access into a network, the zero trust model assumes every individual, both internal and external, is a potential threat until they are verified.

Companies have adopted the zero trust security model since decentralized business models and IT systems have made it significantly more complicated to ensure proper access controls are in place across multiple networks and physical locations. Zero trust networking solutions allow companies to continuously monitor network activity and user behavior to adapt authentication requirements on an individual basis. Verified individuals behaving abnormally or attempting to violate their permissions will be prompted to provide further authentication. Data is collected from access points, behaviors, and traffic logs to provide in-depth network security analytics capabilities.

Zero trust networking software utilizes similar authentication methods as risk-based authentication software, but is specifically for network access control. Risk-based authentication is more broad and its methods can be applied to accessing a network, application, database, or any other privileged information.

To qualify for inclusion in the Zero Trust Networking category, a product must:

Utilize adaptive authentication to continuously verify user permissions
Allow for network segmentation to simplify and broaden policy enforcement
Monitor traffic and user behavior for future inspection and analysis
Show More
Show Less

Featured Zero Trust Networking Software At A Glance

Free Plan Available:
SecureW2 JoinNow
Sponsored
Highest Performer:
Easiest to Use:
Show LessShow More
Highest Performer:
Easiest to Use:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Zero Trust Networking Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
148 Listings in Zero Trust Networking Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Proton VPN for Business is a secure, privacy-focused virtual private network solution tailored for organizations of all sizes. Developed by Proton, a Swiss company renowned for its commitment to digit

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Small-Business
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Proton VPN for Business Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    4
    Data Security
    3
    Features
    3
    Encryption
    2
    Privacy Protection
    2
    Cons
    Expensive
    3
    Limited Servers
    2
    Connection Issues
    1
    Lacking Features
    1
    Limited Security Access
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Proton VPN for Business features and usability ratings that predict user satisfaction
    8.9
    Quality of Support
    Average: 8.8
    9.0
    Ease of Use
    Average: 8.9
    6.7
    Ease of Admin
    Average: 8.8
    10.0
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Proton AG
    Year Founded
    2014
    HQ Location
    Plan-les-Ouates, Geneva, Switzerland
    Twitter
    @ProtonPrivacy
    346,143 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    633 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Proton VPN for Business is a secure, privacy-focused virtual private network solution tailored for organizations of all sizes. Developed by Proton, a Swiss company renowned for its commitment to digit

Users
No information available
Industries
No information available
Market Segment
  • 60% Small-Business
  • 40% Mid-Market
Proton VPN for Business Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
4
Data Security
3
Features
3
Encryption
2
Privacy Protection
2
Cons
Expensive
3
Limited Servers
2
Connection Issues
1
Lacking Features
1
Limited Security Access
1
Proton VPN for Business features and usability ratings that predict user satisfaction
8.9
Quality of Support
Average: 8.8
9.0
Ease of Use
Average: 8.9
6.7
Ease of Admin
Average: 8.8
10.0
Application Security
Average: 8.9
Seller Details
Seller
Proton AG
Year Founded
2014
HQ Location
Plan-les-Ouates, Geneva, Switzerland
Twitter
@ProtonPrivacy
346,143 Twitter followers
LinkedIn® Page
www.linkedin.com
633 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Scout Secured is a cybersecurity company headquartered in the United States, founded to protect the growing number of remote workers, small businesses, and home users from modern digital threats. As o

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Scout Secured features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    2 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Scout Secured is a cybersecurity company headquartered in the United States, founded to protect the growing number of remote workers, small businesses, and home users from modern digital threats. As o

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Scout Secured features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
2 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    VMware VeloCloud SASE, secured by Symantec, is a comprehensive cloud-delivered Secure Access Service Edge platform that integrates VMware's leading SD-WAN technology with Symantec's advanced Security

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 38% Mid-Market
    • 38% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • VeloCloud SASE features and usability ratings that predict user satisfaction
    8.9
    Quality of Support
    Average: 8.8
    9.1
    Ease of Use
    Average: 8.9
    8.9
    Ease of Admin
    Average: 8.8
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2004
    HQ Location
    Santa Clara, US
    Twitter
    @arista_channels
    2,469 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,311 employees on LinkedIn®
    Ownership
    NYSE:ANET
Product Description
How are these determined?Information
This description is provided by the seller.

VMware VeloCloud SASE, secured by Symantec, is a comprehensive cloud-delivered Secure Access Service Edge platform that integrates VMware's leading SD-WAN technology with Symantec's advanced Security

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 38% Mid-Market
  • 38% Small-Business
VeloCloud SASE features and usability ratings that predict user satisfaction
8.9
Quality of Support
Average: 8.8
9.1
Ease of Use
Average: 8.9
8.9
Ease of Admin
Average: 8.8
0.0
No information available
Seller Details
Year Founded
2004
HQ Location
Santa Clara, US
Twitter
@arista_channels
2,469 Twitter followers
LinkedIn® Page
www.linkedin.com
5,311 employees on LinkedIn®
Ownership
NYSE:ANET
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Product Description: AWS Verified Access is a service that enables organizations to provide secure access to their corporate applications and resources without the need for a traditional VPN. By impl

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AWS Verified access features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    6.7
    Ease of Admin
    Average: 8.8
    6.7
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2006
    HQ Location
    Seattle, WA
    Twitter
    @awscloud
    2,217,364 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    143,584 employees on LinkedIn®
    Ownership
    NASDAQ: AMZN
Product Description
How are these determined?Information
This description is provided by the seller.

Product Description: AWS Verified Access is a service that enables organizations to provide secure access to their corporate applications and resources without the need for a traditional VPN. By impl

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
AWS Verified access features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
6.7
Ease of Admin
Average: 8.8
6.7
Application Security
Average: 8.9
Seller Details
Year Founded
2006
HQ Location
Seattle, WA
Twitter
@awscloud
2,217,364 Twitter followers
LinkedIn® Page
www.linkedin.com
143,584 employees on LinkedIn®
Ownership
NASDAQ: AMZN
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Make security pervasive throughout the network, not just at the perimeter. Attackers or malicious insiders will penetrate threat-centric defenses.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 200% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco Zero Trust network features and usability ratings that predict user satisfaction
    8.3
    Quality of Support
    Average: 8.8
    10.0
    Ease of Use
    Average: 8.9
    8.3
    Ease of Admin
    Average: 8.8
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    721,900 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,148 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Make security pervasive throughout the network, not just at the perimeter. Attackers or malicious insiders will penetrate threat-centric defenses.

Users
No information available
Industries
No information available
Market Segment
  • 200% Enterprise
Cisco Zero Trust network features and usability ratings that predict user satisfaction
8.3
Quality of Support
Average: 8.8
10.0
Ease of Use
Average: 8.9
8.3
Ease of Admin
Average: 8.8
0.0
No information available
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
721,900 Twitter followers
LinkedIn® Page
www.linkedin.com
95,148 employees on LinkedIn®
Ownership
NASDAQ:CSCO
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Securely connecting any user from any device​. Trusted access to any system on any network and platform.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 25% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cyolo features and usability ratings that predict user satisfaction
    5.6
    Quality of Support
    Average: 8.8
    7.2
    Ease of Use
    Average: 8.9
    9.2
    Ease of Admin
    Average: 8.8
    6.7
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cyolo
    Year Founded
    2020
    HQ Location
    Ramat Gan, IL
    LinkedIn® Page
    www.linkedin.com
    87 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Securely connecting any user from any device​. Trusted access to any system on any network and platform.

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 25% Mid-Market
Cyolo features and usability ratings that predict user satisfaction
5.6
Quality of Support
Average: 8.8
7.2
Ease of Use
Average: 8.9
9.2
Ease of Admin
Average: 8.8
6.7
Application Security
Average: 8.9
Seller Details
Seller
Cyolo
Year Founded
2020
HQ Location
Ramat Gan, IL
LinkedIn® Page
www.linkedin.com
87 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DefensX transforms any browser into a secure, zero-trust workspace—instantly. Our cloud-native extension delivers AI-powered phishing protection, browser-level DLP, and fine-grained data controls exac

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • DefensX Secure Enterprise Browser Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Solutions
    1
    Time-saving
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DefensX Secure Enterprise Browser features and usability ratings that predict user satisfaction
    10.0
    Quality of Support
    Average: 8.8
    8.3
    Ease of Use
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    DefensX
    Year Founded
    2020
    HQ Location
    New York, US
    LinkedIn® Page
    www.linkedin.com
    25 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

DefensX transforms any browser into a secure, zero-trust workspace—instantly. Our cloud-native extension delivers AI-powered phishing protection, browser-level DLP, and fine-grained data controls exac

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
DefensX Secure Enterprise Browser Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Solutions
1
Time-saving
1
Cons
This product has not yet received any negative sentiments.
DefensX Secure Enterprise Browser features and usability ratings that predict user satisfaction
10.0
Quality of Support
Average: 8.8
8.3
Ease of Use
Average: 8.9
0.0
No information available
0.0
No information available
Seller Details
Seller
DefensX
Year Founded
2020
HQ Location
New York, US
LinkedIn® Page
www.linkedin.com
25 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DxOdyssey is a Software-Defined Perimeter (SDP) network security solution built on patented technology that is a critical component to achieving a Zero Trust architecture. DxOdyssey enables highly ava

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DxOdyssey features and usability ratings that predict user satisfaction
    6.7
    Quality of Support
    Average: 8.8
    8.3
    Ease of Use
    Average: 8.9
    8.3
    Ease of Admin
    Average: 8.8
    8.3
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    DH2i
    Year Founded
    2010
    HQ Location
    Fort Collins, US
    Twitter
    @DH2i
    1,296 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    12 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

DxOdyssey is a Software-Defined Perimeter (SDP) network security solution built on patented technology that is a critical component to achieving a Zero Trust architecture. DxOdyssey enables highly ava

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
DxOdyssey features and usability ratings that predict user satisfaction
6.7
Quality of Support
Average: 8.8
8.3
Ease of Use
Average: 8.9
8.3
Ease of Admin
Average: 8.8
8.3
Application Security
Average: 8.9
Seller Details
Seller
DH2i
Year Founded
2010
HQ Location
Fort Collins, US
Twitter
@DH2i
1,296 Twitter followers
LinkedIn® Page
www.linkedin.com
12 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Enclave is a modern network segmentation platform that combines – access control, asset inventory, encryption and zero trust network access – to create a breakthrough microsegmentation solution that p

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Enclave features and usability ratings that predict user satisfaction
    10.0
    Quality of Support
    Average: 8.8
    10.0
    Ease of Use
    Average: 8.9
    10.0
    Ease of Admin
    Average: 8.8
    8.3
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    Worcester, US
    LinkedIn® Page
    www.linkedin.com
    40 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Enclave is a modern network segmentation platform that combines – access control, asset inventory, encryption and zero trust network access – to create a breakthrough microsegmentation solution that p

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Enclave features and usability ratings that predict user satisfaction
10.0
Quality of Support
Average: 8.8
10.0
Ease of Use
Average: 8.9
10.0
Ease of Admin
Average: 8.8
8.3
Application Security
Average: 8.9
Seller Details
Year Founded
2017
HQ Location
Worcester, US
LinkedIn® Page
www.linkedin.com
40 employees on LinkedIn®
(1)4.5 out of 5
View top Consulting Services for Google Cloud Context-Aware Access
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Manage access to apps and infrastructure based on a user's identity and context.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Google Cloud Context-Aware Access features and usability ratings that predict user satisfaction
    8.3
    Quality of Support
    Average: 8.8
    6.7
    Ease of Use
    Average: 8.9
    8.3
    Ease of Admin
    Average: 8.8
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Google
    Year Founded
    1998
    HQ Location
    Mountain View, CA
    Twitter
    @google
    31,497,617 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    325,307 employees on LinkedIn®
    Ownership
    NASDAQ:GOOG
Product Description
How are these determined?Information
This description is provided by the seller.

Manage access to apps and infrastructure based on a user's identity and context.

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Google Cloud Context-Aware Access features and usability ratings that predict user satisfaction
8.3
Quality of Support
Average: 8.8
6.7
Ease of Use
Average: 8.9
8.3
Ease of Admin
Average: 8.8
0.0
No information available
Seller Details
Seller
Google
Year Founded
1998
HQ Location
Mountain View, CA
Twitter
@google
31,497,617 Twitter followers
LinkedIn® Page
www.linkedin.com
325,307 employees on LinkedIn®
Ownership
NASDAQ:GOOG
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Hypori revolutionizes secure access to enterprise data, enabling organizations to embrace Bring Your Own Device (BYOD) without compromising security or user privacy. With Hypori’s innovative virtual w

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Hypori Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Easy Setup
    1
    Monitoring
    1
    Setup Ease
    1
    Cons
    Laggy Performance
    1
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Hypori features and usability ratings that predict user satisfaction
    8.3
    Quality of Support
    Average: 8.8
    8.3
    Ease of Use
    Average: 8.9
    0.0
    No information available
    10.0
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Hypori
    Year Founded
    2021
    HQ Location
    Reston, Virginia, United States
    LinkedIn® Page
    www.linkedin.com
    126 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Hypori revolutionizes secure access to enterprise data, enabling organizations to embrace Bring Your Own Device (BYOD) without compromising security or user privacy. With Hypori’s innovative virtual w

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Hypori Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Easy Setup
1
Monitoring
1
Setup Ease
1
Cons
Laggy Performance
1
Slow Performance
1
Hypori features and usability ratings that predict user satisfaction
8.3
Quality of Support
Average: 8.8
8.3
Ease of Use
Average: 8.9
0.0
No information available
10.0
Application Security
Average: 8.9
Seller Details
Seller
Hypori
Year Founded
2021
HQ Location
Reston, Virginia, United States
LinkedIn® Page
www.linkedin.com
126 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Menlo Security protects organizations from cyber threats that attack enterprise browsers. Menlo Security’s patented Cloud-Browser Security Platform scales to provide comprehensive protection across en

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Enterprise
    • 25% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Menlo Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cybersecurity
    1
    Malware Protection
    1
    Protection
    1
    Security
    1
    Threat Protection
    1
    Cons
    Complex Configuration
    1
    Dependency Issues
    1
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Menlo Security features and usability ratings that predict user satisfaction
    10.0
    Quality of Support
    Average: 8.8
    8.3
    Ease of Use
    Average: 8.9
    8.3
    Ease of Admin
    Average: 8.8
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2012
    HQ Location
    Mountain View, California, United States
    Twitter
    @menlosecurity
    17,013 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    437 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Menlo Security protects organizations from cyber threats that attack enterprise browsers. Menlo Security’s patented Cloud-Browser Security Platform scales to provide comprehensive protection across en

Users
No information available
Industries
No information available
Market Segment
  • 75% Enterprise
  • 25% Small-Business
Menlo Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cybersecurity
1
Malware Protection
1
Protection
1
Security
1
Threat Protection
1
Cons
Complex Configuration
1
Dependency Issues
1
Slow Performance
1
Menlo Security features and usability ratings that predict user satisfaction
10.0
Quality of Support
Average: 8.8
8.3
Ease of Use
Average: 8.9
8.3
Ease of Admin
Average: 8.8
0.0
No information available
Seller Details
Year Founded
2012
HQ Location
Mountain View, California, United States
Twitter
@menlosecurity
17,013 Twitter followers
LinkedIn® Page
www.linkedin.com
437 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    MicroZAccess is a Smart Zero Trust Network Access (ZTNA 2.0), an alternative to VPN that securely authenticates the user and seamlessly connects the device to the Cloud through reliable, high perform

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • MicroZAccess features and usability ratings that predict user satisfaction
    6.7
    Quality of Support
    Average: 8.8
    8.3
    Ease of Use
    Average: 8.9
    0.0
    No information available
    10.0
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    Chennai, IN
    LinkedIn® Page
    www.linkedin.com
    14 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

MicroZAccess is a Smart Zero Trust Network Access (ZTNA 2.0), an alternative to VPN that securely authenticates the user and seamlessly connects the device to the Cloud through reliable, high perform

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
MicroZAccess features and usability ratings that predict user satisfaction
6.7
Quality of Support
Average: 8.8
8.3
Ease of Use
Average: 8.9
0.0
No information available
10.0
Application Security
Average: 8.9
Seller Details
Year Founded
2016
HQ Location
Chennai, IN
LinkedIn® Page
www.linkedin.com
14 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    NetBird is an open-source Zero Trust Networking platform designed by engineers, for engineers. NetBird makes it radically simple to deploy secure private networks for modern organizations. Built on

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • NetBird Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Device Connectivity
    1
    Ease of Connection
    1
    Easy Installation
    1
    Easy Setup
    1
    Implementation Ease
    1
    Cons
    Lack of Features
    1
    Lack of Guidance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • NetBird features and usability ratings that predict user satisfaction
    8.3
    Quality of Support
    Average: 8.8
    10.0
    Ease of Use
    Average: 8.9
    10.0
    Ease of Admin
    Average: 8.8
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    NetBird
    Year Founded
    2022
    HQ Location
    Berlin, DE
    Twitter
    @netbird
    1,554 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    11 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

NetBird is an open-source Zero Trust Networking platform designed by engineers, for engineers. NetBird makes it radically simple to deploy secure private networks for modern organizations. Built on

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
NetBird Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Device Connectivity
1
Ease of Connection
1
Easy Installation
1
Easy Setup
1
Implementation Ease
1
Cons
Lack of Features
1
Lack of Guidance
1
NetBird features and usability ratings that predict user satisfaction
8.3
Quality of Support
Average: 8.8
10.0
Ease of Use
Average: 8.9
10.0
Ease of Admin
Average: 8.8
0.0
No information available
Seller Details
Seller
NetBird
Year Founded
2022
HQ Location
Berlin, DE
Twitter
@netbird
1,554 Twitter followers
LinkedIn® Page
www.linkedin.com
11 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    More security shouldn’t mean more obstacles. Since 2005, SecureAuth has helped leading companies simplify identity and access management for customers and employees—creating experiences that are as we

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 55% Enterprise
    • 27% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SecureAuth: Customer Identity Access Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Authentication
    6
    Ease of Use
    5
    Security
    5
    Customer Support
    4
    Security Authentication
    4
    Cons
    Poor Interface Design
    5
    Complexity
    4
    Complex Setup
    4
    Missing Features
    4
    Complex Administration
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SecureAuth: Customer Identity Access Management features and usability ratings that predict user satisfaction
    8.8
    Quality of Support
    Average: 8.8
    7.9
    Ease of Use
    Average: 8.9
    6.9
    Ease of Admin
    Average: 8.8
    10.0
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2005
    HQ Location
    Irvine, CA
    Twitter
    @SecureAuth
    8,633 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    151 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

More security shouldn’t mean more obstacles. Since 2005, SecureAuth has helped leading companies simplify identity and access management for customers and employees—creating experiences that are as we

Users
No information available
Industries
No information available
Market Segment
  • 55% Enterprise
  • 27% Small-Business
SecureAuth: Customer Identity Access Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Authentication
6
Ease of Use
5
Security
5
Customer Support
4
Security Authentication
4
Cons
Poor Interface Design
5
Complexity
4
Complex Setup
4
Missing Features
4
Complex Administration
3
SecureAuth: Customer Identity Access Management features and usability ratings that predict user satisfaction
8.8
Quality of Support
Average: 8.8
7.9
Ease of Use
Average: 8.9
6.9
Ease of Admin
Average: 8.8
10.0
Application Security
Average: 8.9
Seller Details
Company Website
Year Founded
2005
HQ Location
Irvine, CA
Twitter
@SecureAuth
8,633 Twitter followers
LinkedIn® Page
www.linkedin.com
151 employees on LinkedIn®