Compare Absolute Secure Access and NordLayer

At a Glance
Absolute Secure Access
Absolute Secure Access
Star Rating
(225)4.7 out of 5
Market Segments
Mid-Market (62.1% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Get quote per user/month
Browse all 2 pricing plans
NordLayer
NordLayer
Star Rating
(127)4.3 out of 5
Market Segments
Small-Business (55.9% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Starting at $8.00 1 Users
Browse all 4 pricing plans

Absolute Secure Access vs NordLayer

When assessing the two solutions, reviewers found NordLayer easier to use, set up, and administer. However, reviewers preferred doing business with Absolute Secure Access overall.

  • Reviewers felt that Absolute Secure Access meets the needs of their business better than NordLayer.
  • When comparing quality of ongoing product support, reviewers felt that Absolute Secure Access is the preferred option.
  • For feature updates and roadmaps, our reviewers preferred the direction of Absolute Secure Access over NordLayer.
Pricing
Entry-Level Pricing
Absolute Secure Access
NetMotion Core
Get quote
per user/month
Browse all 2 pricing plans
NordLayer
Lite
Starting at $8.00
1 Users
Browse all 4 pricing plans
Free Trial
Absolute Secure Access
Free Trial is available
NordLayer
No trial information available
Ratings
Meets Requirements
9.4
194
8.9
110
Ease of Use
9.1
195
9.2
113
Ease of Setup
8.6
177
9.2
66
Ease of Admin
8.7
176
9.0
58
Quality of Support
9.3
185
8.5
100
Has the product been a good partner in doing business?
9.2
172
8.5
54
Product Direction (% positive)
8.5
190
8.4
103
Features by Category
Network Access Control (NAC)Hide 9 FeaturesShow 9 Features
Not enough data
9.6
6
Data
Not enough data
9.7
5
Not enough data
Not enough data
Not enough data
9.7
6
Network
Not enough data
9.4
6
Not enough data
9.7
5
Not enough data
Not enough data
Logistics
Not enough data
Feature Not Available
Not enough data
Not enough data
Not enough data
Feature Not Available
8.7
43
8.6
8
Network Management
8.7
36
8.6
7
8.5
37
Feature Not Available
8.8
37
7.7
5
8.0
31
8.7
5
Security
8.4
35
9.4
6
9.0
35
9.8
7
8.9
34
Feature Not Available
9.4
36
9.8
7
Identity Management
8.9
34
9.3
7
8.3
28
Feature Not Available
8.6
36
8.3
6
Generative AI
Feature Not Available
6.7
5
Feature Not Available
7.3
5
Not enough data
9.0
5
Administration
Not enough data
8.3
5
Not enough data
8.3
5
Not enough data
8.7
5
Not enough data
9.7
5
Agentic AI - Firewall Software
Not enough data
Not enough data
Not enough data
Not enough data
Functionality
Not enough data
10.0
5
Not enough data
8.3
5
Not enough data
9.0
5
Not enough data
9.0
5
Monitoring
Not enough data
9.3
5
Not enough data
Not enough data
Not enough data
9.3
5
Not enough data
9.3
5
Generative AI
Not enough data
Not enough data
Artificial Intelligence - Firewall
Not enough data
Not enough data
Identity and Access Management (IAM)Hide 18 FeaturesShow 18 Features
Not enough data
Not enough data
Functionality
Not enough data
Not enough data
Not enough data
Feature Not Available
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Type
Not enough data
Not enough data
Not enough data
Not enough data
Reporting
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Authentication & Authorization - Identity and Access Management (IAM)
Not enough data
Not enough data
Administration & Governance - Identity and Access Management (IAM)
Not enough data
Not enough data
Not enough data
Not enough data
Generative AI - Identity and Access Management (IAM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Software-Defined Perimeter (SDP)Hide 11 FeaturesShow 11 Features
9.2
17
Not enough data
Administration
9.2
16
Not enough data
9.1
15
Not enough data
9.4
16
Not enough data
Protection
9.3
16
Not enough data
8.9
17
Not enough data
9.3
17
Not enough data
9.3
17
Not enough data
Monitoring
9.4
14
Not enough data
Feature Not Available
Not enough data
9.3
12
Not enough data
9.0
14
Not enough data
Digital Employee Experience (DEX) ManagementHide 12 FeaturesShow 12 Features
7.6
12
Not enough data
Experience
7.8
9
Not enough data
7.9
7
Not enough data
Management
7.1
7
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
7.3
8
Not enough data
Feature Not Available
Not enough data
Performance
7.8
9
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
7.8
10
Not enough data
Feature Not Available
Not enough data
Not enough data
Not enough data
Web Content and Traffic Filtering - Secure Web Gateways
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Data Protection and Loss Prevention - Secure Web Gateways
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Access Control and Authentication - Secure Web Gateways
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Performance and Management - Secure Web Gateways
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Secure Access Service Edge (SASE) PlatformsHide 12 FeaturesShow 12 Features
Not enough data
Not enough data
Components - Secure Access Service Edge (SASE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Artificial Intelligence - Secure Access Service Edge (SASE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Secure Access Service Edge (SASE) Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity and Access Management - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Data Security - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Application Visibility - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Reporting and Policies - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Secure Service Edge (SSE) SolutionsHide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Components - Secure Service Edge (SSE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Artificial Intelligence -Secure Service Edge (SSE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Secure Service Edge (SSE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
8.6
164
8.6
92
Usage
8.9
142
8.9
83
8.7
143
8.6
77
Feature Not Available
8.4
44
8.8
146
8.4
81
Feature Not Available
8.6
74
8.5
116
8.8
81
8.5
116
8.7
77
Miscellaneous
8.8
145
8.3
70
Feature Not Available
Feature Not Available
7.7
108
Feature Not Available
Categories
Categories
Shared Categories
Absolute Secure Access
Absolute Secure Access
NordLayer
NordLayer
Absolute Secure Access and NordLayer are categorized as Business VPN and Zero Trust Networking
Reviews
Reviewers' Company Size
Absolute Secure Access
Absolute Secure Access
Small-Business(50 or fewer emp.)
12.5%
Mid-Market(51-1000 emp.)
62.1%
Enterprise(> 1000 emp.)
25.4%
NordLayer
NordLayer
Small-Business(50 or fewer emp.)
55.9%
Mid-Market(51-1000 emp.)
33.9%
Enterprise(> 1000 emp.)
10.2%
Reviewers' Industry
Absolute Secure Access
Absolute Secure Access
Law Enforcement
23.2%
Government Administration
22.3%
Public Safety
15.6%
Utilities
7.6%
Legal Services
4.0%
Other
27.2%
NordLayer
NordLayer
Computer Software
17.3%
Information Technology and Services
11.8%
Internet
5.5%
Financial Services
5.5%
Marketing and Advertising
5.5%
Other
54.3%
Alternatives
Absolute Secure Access
Absolute Secure Access Alternatives
Zscaler Internet Access
Zscaler Internet Access
Add Zscaler Internet Access
Check Point SASE
Check Point SASE
Add Check Point SASE
Cisco Duo
Cisco Duo
Add Cisco Duo
OpenVPN CloudConnexa
OpenVPN CloudConnexa
Add OpenVPN CloudConnexa
NordLayer
NordLayer Alternatives
Check Point SASE
Check Point SASE
Add Check Point SASE
Okta
Okta
Add Okta
Cisco Duo
Cisco Duo
Add Cisco Duo
Sophos Firewall
Sophos Firewall
Add Sophos Firewall
Discussions
Absolute Secure Access
Absolute Secure Access Discussions
What is NetMotion used for?
3 Comments
Robert R.
RR
Resilient VPN client. We use it in squad cars. Read more
What are the top 3 things that you would change or improve about this product?
3 Comments
JR
1. Update videos on YouTube. 2. Marketing campaign to target Police Agencies where it could be integrated easily 3. Market to schools which could benefit...Read more
Is NetMotion a VPN?
2 Comments
Steven P.
SP
It is a "Mobile" VPN Solution that provides Zero trust to Network Resources.Read more
NordLayer
NordLayer Discussions
What is NordLayer used for?
1 Comment
Laima M.
LM
NordLayer helps organizations of all sizes enhance their internet security and modernize network and resource access with technical improvements aligning...Read more
How has NordLayer improved your network security, and what features do you rely on?
1 Comment
Michel R.
MR
- Encrypted data with AES-256 for secure transmission - Implemented Zero Trust Network Access to reduce internal threats - Provided safe remote access...Read more
Monty the Mongoose crying
NordLayer has no more discussions with answers