2026 Best Software Awards are here!See the list

Best Zero Trust Platforms - Page 2

Preethica Furtado
PF
Researched and written by Preethica Furtado

Zero trust is a strategic security concept and framework built on the principle that no implicit trust is granted to entities, assets, user accounts, or digital assets or connections based solely on simple factors. Depending on the policy configuration, these factors include physical or network location, such as local area networks vs. the internet, or asset ownership, like enterprise or personally owned.

Zero trust policies require that all entities, whether in or outside the organization's network, be authenticated, authorized, and continuously validated for security configuration and posture before gaining or maintaining access to applications and data. It further requires that those entities be placed in isolated and managed segments within an infrastructure and that their access to assets or network enclaves is based on sessions and dependent on policy controls.

Zero trust platforms include broad features like identity and access management (IAM), device security, network security, data security, application security, visibility and analytics, automation and orchestration capabilities, integration and interoperability, and compliance and policy management.

To qualify for inclusion in the Zero Trust Platforms category, a product must:

Follow the principle of “never trust, always verify" by enabling granular permissions based on user roles, content, and policies
Enforce identity-based controls with strong authentication, such as single sign-on (SSO) and multi-factor authentication (MFA), before access is granted to workloads
Continuously evaluate trust by monitoring behaviour in security posture in real time
Offer zero-trust network access to ensure users can only reach authorized applications or resources
Show More
Show Less

Featured Zero Trust Platforms At A Glance

Free Plan Available:
GoodAccess
Sponsored
Best Free Software:
Show LessShow More
Best Free Software:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
25 Listings in Zero Trust Platforms Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Absolute Secure Access (formerly NetMotion by Absolute) is one of the company’s core product lines, which was added through the acquisition of NetMotion in July 2021. The product portfolio provides re

    Users
    • IT Director
    • System Administrator
    Industries
    • Law Enforcement
    • Government Administration
    Market Segment
    • 62% Mid-Market
    • 25% Enterprise
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Absolute is a VPN service that offers persistent connectivity, allowing users to switch between different networks without losing their connection.
    • Reviewers frequently mention the product's intelligent VPN connectivity, its ability to optimize network traffic for improved performance, and its comprehensive Insight tool for understanding client workflow.
    • Users reported that the initial setup and policy configuration can be complex, the user interface of the management console can feel outdated, and the licensing model can become complex depending on the specific features and scale of deployment.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Absolute Secure Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    18
    Customer Support
    11
    Secure Access
    11
    Reliability
    10
    VPN Efficiency
    10
    Cons
    Access Issues
    5
    Expensive
    5
    Complex Configuration
    4
    Complex Implementation
    4
    Integration Issues
    4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1993
    HQ Location
    British Columbia, Canada
    Twitter
    @absolutecorp
    3,923 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,239 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Absolute Secure Access (formerly NetMotion by Absolute) is one of the company’s core product lines, which was added through the acquisition of NetMotion in July 2021. The product portfolio provides re

Users
  • IT Director
  • System Administrator
Industries
  • Law Enforcement
  • Government Administration
Market Segment
  • 62% Mid-Market
  • 25% Enterprise
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Absolute is a VPN service that offers persistent connectivity, allowing users to switch between different networks without losing their connection.
  • Reviewers frequently mention the product's intelligent VPN connectivity, its ability to optimize network traffic for improved performance, and its comprehensive Insight tool for understanding client workflow.
  • Users reported that the initial setup and policy configuration can be complex, the user interface of the management console can feel outdated, and the licensing model can become complex depending on the specific features and scale of deployment.
Absolute Secure Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
18
Customer Support
11
Secure Access
11
Reliability
10
VPN Efficiency
10
Cons
Access Issues
5
Expensive
5
Complex Configuration
4
Complex Implementation
4
Integration Issues
4
Seller Details
Company Website
Year Founded
1993
HQ Location
British Columbia, Canada
Twitter
@absolutecorp
3,923 Twitter followers
LinkedIn® Page
www.linkedin.com
1,239 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Forcepoint Data Security Cloud delivers unified visibility, control, and protection for data across endpoints, web, SaaS, and private applications, powered by Forcepoint’s AI Mesh and Data Security Ev

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 50% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Forcepoint Data Security Cloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    6
    Security
    6
    Customer Support
    5
    Ease of Use
    5
    Implementation Ease
    4
    Cons
    Complex Configuration
    4
    Complexity
    3
    Expensive
    3
    Complex Setup
    2
    Difficult Setup
    2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1994
    HQ Location
    Austin, TX
    Twitter
    @Forcepointsec
    65,549 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,658 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Forcepoint Data Security Cloud delivers unified visibility, control, and protection for data across endpoints, web, SaaS, and private applications, powered by Forcepoint’s AI Mesh and Data Security Ev

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 50% Enterprise
  • 38% Mid-Market
Forcepoint Data Security Cloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
6
Security
6
Customer Support
5
Ease of Use
5
Implementation Ease
4
Cons
Complex Configuration
4
Complexity
3
Expensive
3
Complex Setup
2
Difficult Setup
2
Seller Details
Year Founded
1994
HQ Location
Austin, TX
Twitter
@Forcepointsec
65,549 Twitter followers
LinkedIn® Page
www.linkedin.com
1,658 employees on LinkedIn®
G2 Advertising
Sponsored
G2 Advertising
Get 2x conversion than Google Ads with G2 Advertising!
G2 Advertising places your product in premium positions on high-traffic pages and on targeted competitor pages to reach buyers at key comparison moments.
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    QueryPie is a leading all-in-one access governance platform founded in Silicon Valley, helping teams manage and secure access to databases, servers, Kubernetes, and internal web apps — now with powerf

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    QueryPie
    Year Founded
    2016
    HQ Location
    Seoul, KR
    Twitter
    @querypie
    86 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    64 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

QueryPie is a leading all-in-one access governance platform founded in Silicon Valley, helping teams manage and secure access to databases, servers, Kubernetes, and internal web apps — now with powerf

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Seller Details
Seller
QueryPie
Year Founded
2016
HQ Location
Seoul, KR
Twitter
@querypie
86 Twitter followers
LinkedIn® Page
www.linkedin.com
64 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BeyondCorp is a Zero Trust security framework modeled by Google that shifts access controls from the perimeter to individual devices and users. The end result allows employees to work securely from an

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Google
    Year Founded
    1998
    HQ Location
    Mountain View, CA
    Twitter
    @google
    31,726,776 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    325,935 employees on LinkedIn®
    Ownership
    NASDAQ:GOOG
Product Description
How are these determined?Information
This description is provided by the seller.

BeyondCorp is a Zero Trust security framework modeled by Google that shifts access controls from the perimeter to individual devices and users. The end result allows employees to work securely from an

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Seller Details
Seller
Google
Year Founded
1998
HQ Location
Mountain View, CA
Twitter
@google
31,726,776 Twitter followers
LinkedIn® Page
www.linkedin.com
325,935 employees on LinkedIn®
Ownership
NASDAQ:GOOG
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Bringing the power of hyperscaler technology to the enterprise, Cisco Hypershield is a groundbreaking security architecture designed to defend modern, AI-scale data centers.

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    721,592 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,386 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Bringing the power of hyperscaler technology to the enterprise, Cisco Hypershield is a groundbreaking security architecture designed to defend modern, AI-scale data centers.

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
721,592 Twitter followers
LinkedIn® Page
www.linkedin.com
95,386 employees on LinkedIn®
Ownership
NASDAQ:CSCO
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Microsoft Entra Private Access is an identity-centric Zero Trust Network Access (ZTNA solution designed to provide secure and seamless connectivity to private applications and resources, regardless of

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    13,093,068 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    226,132 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Microsoft Entra Private Access is an identity-centric Zero Trust Network Access (ZTNA solution designed to provide secure and seamless connectivity to private applications and resources, regardless of

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
13,093,068 Twitter followers
LinkedIn® Page
www.linkedin.com
226,132 employees on LinkedIn®
Ownership
MSFT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Netzilo is an AI Detection and Response (AIDR) platform that secures AI agents, MCP-driven workflows, and autonomous systems. It provides real-time behavior analysis, policy enforcement, and Zero Trus

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Netzilo
    Year Founded
    2024
    HQ Location
    San Francisco, US
    LinkedIn® Page
    www.linkedin.com
    12 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Netzilo is an AI Detection and Response (AIDR) platform that secures AI agents, MCP-driven workflows, and autonomous systems. It provides real-time behavior analysis, policy enforcement, and Zero Trus

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Seller Details
Seller
Netzilo
Year Founded
2024
HQ Location
San Francisco, US
LinkedIn® Page
www.linkedin.com
12 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Singularity Identity is an identity threat detection and response (ITDR) solution that protects on-premises and cloud-hosted Active Directory domain controllers and domain-joined endpoints in real tim

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Mountain View, CA
    Twitter
    @SentinelOne
    57,217 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,171 employees on LinkedIn®
    Ownership
    NASDAQ: S
Product Description
How are these determined?Information
This description is provided by the seller.

Singularity Identity is an identity threat detection and response (ITDR) solution that protects on-premises and cloud-hosted Active Directory domain controllers and domain-joined endpoints in real tim

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
Seller Details
Year Founded
2013
HQ Location
Mountain View, CA
Twitter
@SentinelOne
57,217 Twitter followers
LinkedIn® Page
www.linkedin.com
3,171 employees on LinkedIn®
Ownership
NASDAQ: S
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Zscaler Zero Trust Device Segmentation is an agentless solution designed to isolate your devices (such as IoT, OT, and endpoint systems) without agents, upgrades, or downtime. By enforcing Zero Trus

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Zscaler
    Year Founded
    2008
    HQ Location
    San Jose, California
    Twitter
    @zscaler
    17,338 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    9,540 employees on LinkedIn®
    Ownership
    NASDAQ:ZS
Product Description
How are these determined?Information
This description is provided by the seller.

Zscaler Zero Trust Device Segmentation is an agentless solution designed to isolate your devices (such as IoT, OT, and endpoint systems) without agents, upgrades, or downtime. By enforcing Zero Trus

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Seller Details
Seller
Zscaler
Year Founded
2008
HQ Location
San Jose, California
Twitter
@zscaler
17,338 Twitter followers
LinkedIn® Page
www.linkedin.com
9,540 employees on LinkedIn®
Ownership
NASDAQ:ZS
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Zscaler Zero Trust Exchange is the first zero trust platform that protects critical data and applications from data breach in the hybrid cloud. Edgewise delivers a new control plane that is based on s

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 46% Enterprise
    • 31% Mid-Market
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Zscaler
    Year Founded
    2008
    HQ Location
    San Jose, California
    Twitter
    @zscaler
    17,338 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    9,540 employees on LinkedIn®
    Ownership
    NASDAQ:ZS
Product Description
How are these determined?Information
This description is provided by the seller.

Zscaler Zero Trust Exchange is the first zero trust platform that protects critical data and applications from data breach in the hybrid cloud. Edgewise delivers a new control plane that is based on s

Users
No information available
Industries
  • Computer Software
Market Segment
  • 46% Enterprise
  • 31% Mid-Market
Seller Details
Seller
Zscaler
Year Founded
2008
HQ Location
San Jose, California
Twitter
@zscaler
17,338 Twitter followers
LinkedIn® Page
www.linkedin.com
9,540 employees on LinkedIn®
Ownership
NASDAQ:ZS