# Best Cloud Edge Security Software

  *By [Lauren Worth](https://research.g2.com/insights/author/lauren-worth)*

   Cloud edge security solutions provide companies with a cloud-delivered solution to securely access the internet, cloud-based applications, and business networks. The products are delivered using [SD-WAN](https://www.g2.com/categories/sd-wan) technology, which combines software-defined networking with a wide area network. This allows cloud edge security solutions to operate anywhere and combine security functions to protect all network activity.

Companies use these tools combine security functions of traditional tools such as [secure web gateways (SWG)](https://www.g2.com/categories/secure-web-gateways), [cloud access security brokers (CASB)](https://www.g2.com/categories/cloud-access-security-broker-casb), and [web application firewalls (WAF)](https://www.g2.com/categories/web-application-firewall-waf). This helps businesses and security teams create a single point of visibility for security policies, activities, and risks without forcing the user to interact with numerous tools or provide recurring authentication. The unified security solutions are designed to provide complete visibility across complex, hybrid environments. This simplifies work for administrators by using a single tool to classify, govern, and report on all user activity and network traffic without impacting end-user experiences. There is some direct relationship between cloud edge security tools and the other technologies mentioned above, but traditional CASB, WAF, and SWG products operate independently and do not provide the same level of visibility and accessibility across hybrid environments. The closest solution would be a [software-defined perimeter (SDP)](https://www.g2.com/categories/software-defined-perimeter-sdp), which provides unified network security but not unified access to cloud-based applications, networks, and web browsers.

To qualify for inclusion in the Cloud Edge Security category, a product must:

- Provide a single access point for SaaS applications, web browsers, and networks
- Centrally manage policies and risks across hybrid environments, networks, and applications
- Provide a virtual web application firewall as a service
- Unify incident management across hybrid environments





## Category Overview

**Total Products under this Category:** 32


## Trust & Credibility Stats

**Why You Can Trust G2's Software Rankings:**

- 30 Analysts and Data Experts
- 1,500+ Authentic Reviews
- 32+ Products
- Unbiased Rankings

G2's software rankings are built on verified user reviews, rigorous moderation, and a consistent research methodology maintained by a team of analysts and data experts. Each product is measured using the same transparent criteria, with no paid placement or vendor influence. While reviews reflect real user experiences, which can be subjective, they offer valuable insight into how software performs in the hands of professionals. Together, these inputs power the G2 Score, a standardized way to compare tools within every category.


## Best Cloud Edge Security Software At A Glance

- **Leader:** [Prisma Access](https://www.g2.com/products/prisma-access/reviews)
- **Highest Performer:** [Todyl Security Platform](https://www.g2.com/products/todyl-security-platform/reviews)
- **Easiest to Use:** [Cato SASE Cloud](https://www.g2.com/products/cato-networks-cato-sase-cloud/reviews)
- **Top Trending:** [Prisma Access](https://www.g2.com/products/prisma-access/reviews)
- **Best Free Software:** [Twingate](https://www.g2.com/products/twingate/reviews)


---

**Sponsored**

### GoodAccess

GoodAccess is a cybersecurity platform (SASE/SSE) that empowers medium-sized enterprises to easily implement Zero Trust Architecture (ZTA) in their infrastructure, regardless of its complexity or scale. By leveraging a Low-Code/No-Code approach, GoodAccess delivers a hardware-free, rapid deployment solution within hours or days, allowing companies to enhance their security without the need for in-house IT experts. Our platform ensures seamless integration with modern SaaS/cloud applications as well as legacy systems, protecting critical assets for remote and hybrid workforces. GoodAccess serves businesses with 50-5000 employees across diverse industries, particularly those adopting multi-cloud and SaaS environments. What does GoodAccess do? GoodAccess protects the customer’s infrastructure under one zero-trust umbrella, regardless of how complex, heterogeneous, or widespread it is. It is a good fit for companies supporting full-remote or hybrid modes of work using both company-issued and employees’ own devices. The low-code/no-code, cloud-based SASE platform allows medium-sized businesses to create and manage zero trust architecture easily. In today’s cybersecurity landscape, this is an essential part of any medium-sized organization’s security, and a highly effective enabler of regulatory compliance. The GoodAccess platform combines several latest technologies to tackle the most pressing cybersecurity challenges of today. ✅ Remote access and BYOD—Device security enforcement with device inventory and posture checks. ✅ Multi-factor authentication (MFA)---Unified MFA solution for all critical systems, including legacy applications. ✅ Identity-based access control (IAM/FwaaS)---Zero-Trust Architecture enabling control of all access by identity (SSO/SCIM). ✅ Network encryption and segmentation—Segmentation at maximum granularity radically reduces the attack surface. ✅ Full control and visibility—Security logs and reports from across the entire organization with SIEM integration. What makes GoodAccess unique? GoodAccess stands out by its usability-first design. It is an all-SaaS, zero-hardware platform that fits any infrastructure to deliver network-based Zero-Trust Architecture (SDP) without the need for an IT expert on staff. Our key uniquenesses include: ✅ Simplicity—Low-code/no-code/no-hardware platform for medium-sized organizations. ✅ Market-leading deployment time—GoodAccess takes hours to days to deploy. ✅ Infrastructure-agnostic—Deployable over any existing infrastructure. ✅ Easy management—No certified IT experts needed. ✅ Zero Trust on network layer—Allows for simple integration of legacy applications. ✅ Based in the EU—Ideal cybersecurity provider for NIS2 compliance. Interested in giving GoodAccess a shot? Book a Free Demo: https://calendar.goodaccess.com/meetings/eva-hisemova Start your Free Trial: https://app.goodaccess.com/free-trial/



[Visit website](https://www.g2.com/external_clickthroughs/record?secure%5Bad_program%5D=ppc&amp;secure%5Bad_slot%5D=category_product_list&amp;secure%5Bcategory_id%5D=2634&amp;secure%5Bdisplayable_resource_id%5D=1848&amp;secure%5Bdisplayable_resource_type%5D=Category&amp;secure%5Bmedium%5D=sponsored&amp;secure%5Bplacement_reason%5D=neighbor_category&amp;secure%5Bplacement_resource_ids%5D%5B%5D=1848&amp;secure%5Bprioritized%5D=false&amp;secure%5Bproduct_id%5D=130601&amp;secure%5Bresource_id%5D=2634&amp;secure%5Bresource_type%5D=Category&amp;secure%5Bsource_type%5D=category_page&amp;secure%5Bsource_url%5D=https%3A%2F%2Fwww.g2.com%2Fcategories%2Fcloud-edge-security&amp;secure%5Btoken%5D=20130a7dfe9da80f66ea9fbf64b93962c40ede93a2f6577c0e7de04b813c7771&amp;secure%5Burl%5D=https%3A%2F%2Fwww.goodaccess.com%2Flp%2Fenterprise-vpn&amp;secure%5Burl_type%5D=custom_url&amp;secure%5Bvisitor_segment%5D=180)

---

## Top-Rated Products (Ranked by G2 Score)
### 1. [Prisma Access](https://www.g2.com/products/prisma-access/reviews)
  Palo Alto Networks Prisma® Access protects the hybrid workforce with the superior security of ZTNA while providing exceptional user experiences from a simple, unified security product. Purpose-built in the cloud to secure at cloud scale, only Prisma Access protects all application traffic with best-in-class capabilities while securing both access and data to dramatically reduce the risk of a data breach. With a common policy framework and single-pane-of-glass management, Prisma Access secures today’s hybrid workforce without compromising performance, backed by industry-leading SLAs to ensure exceptional user experiences.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 72

**User Satisfaction Scores:**

- **Anomaly Detection:** 8.3/10 (Category avg: 8.4/10)
- **Cloud Application Brokerage:** 8.4/10 (Category avg: 8.6/10)
- **Policy Enforcement:** 8.5/10 (Category avg: 8.6/10)
- **Ease of Use:** 8.2/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Palo Alto Networks](https://www.g2.com/sellers/palo-alto-networks)
- **Year Founded:** 2005
- **HQ Location:** Santa Clara, CA
- **Twitter:** @PaloAltoNtwks (128,788 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/30086/ (21,355 employees on LinkedIn®)
- **Ownership:** NYSE: PANW

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 45% Enterprise, 27% Mid-Market


#### Pros & Cons

**Pros:**

- Security (34 reviews)
- Protection (23 reviews)
- Secure Access (22 reviews)
- Internet Security (21 reviews)
- Threat Protection (21 reviews)

**Cons:**

- Complex Setup (20 reviews)
- Complex Implementation (19 reviews)
- Complex Configuration (17 reviews)
- Expensive (15 reviews)
- Difficult Learning Curve (11 reviews)

### 2. [Cisco Umbrella](https://www.g2.com/products/cisco-umbrella/reviews)
  Cisco Umbrella simplifies cybersecurity and compliance by providing a converged set of capabilities in a single, cloud-native solution. Its combination of DNS-layer security, secure web gateway, CASB, and more delivers an end-to-end experience that delights customers. Processing over 600 billion internet requests per day and leveraging the world’s largest cyber threat intelligence team in Cisco Talos, Umbrella has achieved AV-TEST’s #1 security efficacy ranking multiple times. Whether you need to strengthen your current security stack or want to transition to a more SASE-based architecture, Umbrella empowers you to confidently meet today’s cloud security goals and embrace tomorrow’s opportunities.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 266

**User Satisfaction Scores:**

- **Anomaly Detection:** 9.0/10 (Category avg: 8.4/10)
- **Cloud Application Brokerage:** 8.8/10 (Category avg: 8.6/10)
- **Policy Enforcement:** 9.1/10 (Category avg: 8.6/10)
- **Ease of Use:** 8.6/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Cisco](https://www.g2.com/sellers/cisco)
- **Year Founded:** 1984
- **HQ Location:** San Jose, CA
- **Twitter:** @Cisco (721,495 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/cisco/ (95,742 employees on LinkedIn®)
- **Ownership:** NASDAQ:CSCO

**Reviewer Demographics:**
  - **Who Uses This:** Network Engineer, Software Developer
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 48% Mid-Market, 30% Enterprise


### 3. [Check Point SASE](https://www.g2.com/products/check-point-sase/reviews)
  The internet is the new corporate network, leading organizations to transition to their network security to Secure Access Service Edge (SASE). However, current solutions break the user experience with slow connections and complex management. Check Point SASE is a game-changing solution that delivers 10x faster internet security, SaaS Security, and full mesh Zero Trust Access and optimized SD-WAN performance—all with an emphasis on streamlined management. Combining innovative on-device and cloud-delivered network protections, Check Point SASE offers a local browsing experience with tighter security and privacy, and an identity-centric zero trust access policy that accommodates everyone: employees, BYOD and third parties. Its SD-WAN solution unifies industry-leading threat prevention with optimized connectivity, automated steering for over 10,000 applications and seamless link failover for uninterrupted web conferencing. Using Check Point SASE, business can build a secure corporate network over a private global backbone in less than an hour. The service is managed from a unified console and is backed by an award-winning global support team that has you covered 24/7.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 210

**User Satisfaction Scores:**

- **Anomaly Detection:** 7.8/10 (Category avg: 8.4/10)
- **Cloud Application Brokerage:** 8.2/10 (Category avg: 8.6/10)
- **Policy Enforcement:** 8.3/10 (Category avg: 8.6/10)
- **Ease of Use:** 9.0/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Check Point Software Technologies](https://www.g2.com/sellers/check-point-software-technologies)
- **Company Website:** https://www.checkpoint.com/
- **Year Founded:** 1993
- **HQ Location:** Redwood City, CA
- **Twitter:** @CheckPointSW (70,998 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/check-point-software-technologies/ (8,356 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 46% Mid-Market, 36% Small-Business


#### Pros & Cons

**Pros:**

- Security (46 reviews)
- Ease of Use (39 reviews)
- Secure Access (34 reviews)
- Protection (26 reviews)
- Reliability (25 reviews)

**Cons:**

- Complex Implementation (28 reviews)
- Complex Configuration (24 reviews)
- Complex Setup (22 reviews)
- Expensive (17 reviews)
- Learning Curve (17 reviews)

### 4. [Forcepoint Data Security Cloud](https://www.g2.com/products/forcepoint-data-security-cloud/reviews)
  Forcepoint Data Security Cloud delivers unified visibility, control, and protection for data across endpoints, web, SaaS, and private applications, powered by Forcepoint’s AI Mesh and Data Security Everywhere architecture. The platform integrates Data Loss Prevention (DLP), Cloud Access Security Broker (CASB), Secure Web Gateway (SWG), and Zero Trust Network Access (ZTNA) capabilities to help organizations prevent breaches, streamline compliance, and safely embrace AI and the cloud. Key capabilities include: • Unified data security across endpoints, web, cloud, and private apps • Distributed enforcement via endpoint, inline proxy, and API connectors • AI-driven data classification and adaptive risk protection • Industry-leading threat and data protection from one console • Seamless user experience with Zero Trust access and continuous monitoring Forcepoint Data Security Cloud simplifies and strengthens your security, delivering the freedom to work securely anywhere.


  **Average Rating:** 4.2/5.0
  **Total Reviews:** 100

**User Satisfaction Scores:**

- **Anomaly Detection:** 9.2/10 (Category avg: 8.4/10)
- **Cloud Application Brokerage:** 8.6/10 (Category avg: 8.6/10)
- **Policy Enforcement:** 9.3/10 (Category avg: 8.6/10)
- **Ease of Use:** 8.6/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Forcepoint](https://www.g2.com/sellers/forcepoint)
- **Year Founded:** 1994
- **HQ Location:** Austin, TX
- **Twitter:** @Forcepointsec (65,474 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/forcepoint/ (1,658 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 50% Enterprise, 38% Mid-Market


#### Pros & Cons

**Pros:**

- Features (7 reviews)
- Ease of Use (6 reviews)
- Security (6 reviews)
- Customer Support (5 reviews)
- Monitoring (5 reviews)

**Cons:**

- Complex Configuration (4 reviews)
- Expensive (4 reviews)
- Complexity (3 reviews)
- Complex Setup (3 reviews)
- Difficult Setup (3 reviews)

### 5. [Cato SASE Cloud](https://www.g2.com/products/cato-networks-cato-sase-cloud/reviews)
  Cato provides the world’s leading single-vendor SASE platform. Cato creates a seamless and elegant customer experience that effortlessly enables threat prevention, data protection, and timely incident detection and response. Using Cato, businesses easily replace costly and rigid legacy infrastructure with an open and modular SASE architecture based on SD-WAN, a purpose-built global cloud network, and an embedded cloud-native security stack


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 80

**User Satisfaction Scores:**

- **Anomaly Detection:** 8.2/10 (Category avg: 8.4/10)
- **Cloud Application Brokerage:** 8.5/10 (Category avg: 8.6/10)
- **Policy Enforcement:** 9.2/10 (Category avg: 8.6/10)
- **Ease of Use:** 9.1/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Cato Networks](https://www.g2.com/sellers/cato-networks)
- **Company Website:** https://www.catonetworks.com
- **Year Founded:** 2015
- **HQ Location:** Tel-Aviv, Israel
- **Twitter:** @CatoNetworks (12,673 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/3533853/ (1,479 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Financial Services
  - **Company Size:** 55% Mid-Market, 23% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (5 reviews)
- Customer Support (4 reviews)
- Reliability (4 reviews)
- Threat Protection (4 reviews)
- Deployment Ease (3 reviews)

**Cons:**

- Limited Features (3 reviews)
- Connection Issues (2 reviews)
- Expensive (2 reviews)
- Compatibility Issues (1 reviews)
- Expensive Licensing (1 reviews)

### 6. [Netskope One Platform](https://www.g2.com/products/netskope-one-platform/reviews)
  Netskope is the leader in cloud security — we help the world’s largest organizations take advantage of cloud and web without sacrificing security. Our Cloud XD™ technology targets and controls activities across any cloud service or website and customers get 360-degree data and threat protection that works everywhere. We call this smart cloud security.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 70

**User Satisfaction Scores:**

- **Anomaly Detection:** 8.2/10 (Category avg: 8.4/10)
- **Cloud Application Brokerage:** 8.9/10 (Category avg: 8.6/10)
- **Policy Enforcement:** 8.9/10 (Category avg: 8.6/10)
- **Ease of Use:** 8.5/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Netskope](https://www.g2.com/sellers/netskope)
- **Year Founded:** 2012
- **HQ Location:** Santa Clara, CA
- **Twitter:** @Netskope (11,283 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/3338050/ (3,281 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 58% Enterprise, 33% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (7 reviews)
- Security (6 reviews)
- Visibility (5 reviews)
- Easy Integrations (4 reviews)
- Efficiency (4 reviews)

**Cons:**

- Complex Configuration (5 reviews)
- Complex Implementation (4 reviews)
- Complexity (3 reviews)
- Difficult Learning (3 reviews)
- Difficult Learning Curve (3 reviews)

### 7. [Todyl Security Platform](https://www.g2.com/products/todyl-security-platform/reviews)
  Todyl empowers businesses of any size with a complete, end-to-end security program. The Todyl Security Platform converges SASE, SIEM, Endpoint Security, GRC, MXDR, and more into a cloud-native, single-agent platform purpose-built for MSPs, MSSPs, and Mid-Market IT professionals. Each module is designed to be deployed in a targeted, agile approach to meet any use case. When all modules are combined, our platform becomes a comprehensive security solution that is cloud-first, globally accessible, and features a highly intuitive interface. With Todyl, your security stack becomes one comprehensive, consolidated, and customizable platform, making security more intuitive and streamlined to combat modern threats. Our platform helps to eliminate the complexity, cost, and operational overhead traditional approaches to cybersecurity require, empowering teams with the capabilities they need to protect, detect, and respond to cyberattacks.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 96

**User Satisfaction Scores:**

- **Anomaly Detection:** 9.0/10 (Category avg: 8.4/10)
- **Cloud Application Brokerage:** 8.2/10 (Category avg: 8.6/10)
- **Policy Enforcement:** 8.9/10 (Category avg: 8.6/10)
- **Ease of Use:** 8.6/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Todyl](https://www.g2.com/sellers/todyl)
- **Company Website:** https://www.todyl.com/
- **Year Founded:** 2015
- **HQ Location:** Denver, CO
- **LinkedIn® Page:** https://www.linkedin.com/company/todylprotection (125 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Owner, President
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 73% Small-Business, 8% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (64 reviews)
- Customer Support (51 reviews)
- Features (41 reviews)
- Security (39 reviews)
- Deployment Ease (35 reviews)

**Cons:**

- Improvements Needed (21 reviews)
- Integration Issues (14 reviews)
- Inadequate Reporting (12 reviews)
- Limited Features (12 reviews)
- Poor Reporting (12 reviews)

### 8. [FortiSASE](https://www.g2.com/products/fortisase/reviews)
  FortiSASE is a cloud-delivered Secure Access Service Edge (SASE) solution designed to provide secure and seamless access to the internet, cloud services, and private applications for remote users. By integrating networking and security functionalities into a unified platform, FortiSASE ensures consistent protection and optimal performance across all user locations. Key Features and Functionality: - Unified Security Services: FortiSASE combines Secure Web Gateway (SWG), Universal Zero Trust Network Access (ZTNA), Cloud Access Security Broker (CASB), Firewall-as-a-Service (FWaaS), and Data Loss Prevention (DLP) into a single solution. - Flexible Connectivity Options: The solution offers adaptable deployment methods, including native SD-WAN integration, support for microbranches, agent-based and agentless access, and flexible point-of-presence (PoP) selection, catering to diverse organizational needs. - AI-Powered Threat Intelligence: Leveraging FortiGuard Labs, FortiSASE utilizes artificial intelligence to provide real-time threat intelligence, ensuring continuous updates with the latest attack information for proactive security measures. - Global Coverage and Scalability: With over 170 PoPs worldwide, FortiSASE delivers low-latency, high-performance connectivity, ensuring reliable and scalable access for users across various regions. Primary Value and User Solutions: FortiSASE addresses the challenges of securing a hybrid workforce by providing consistent, enterprise-grade security regardless of user location. It simplifies operations through unified management and policy enforcement, reducing complexity and operational overhead. By converging networking and security into a single platform, FortiSASE enhances user experience, ensures data protection, and supports compliance with regional data residency and sovereignty laws.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 16

**User Satisfaction Scores:**

- **Anomaly Detection:** 9.4/10 (Category avg: 8.4/10)
- **Cloud Application Brokerage:** 8.7/10 (Category avg: 8.6/10)
- **Policy Enforcement:** 8.9/10 (Category avg: 8.6/10)
- **Ease of Use:** 8.5/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Fortinet](https://www.g2.com/sellers/fortinet)
- **Year Founded:** 2000
- **HQ Location:** Sunnyvale, CA
- **Twitter:** @Fortinet (151,495 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/6460/ (16,112 employees on LinkedIn®)
- **Ownership:** NASDAQ: FTNT

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 56% Mid-Market, 28% Enterprise


#### Pros & Cons

**Pros:**

- Security (5 reviews)
- Threat Protection (5 reviews)
- Ease of Use (3 reviews)
- Secure Access (3 reviews)
- App Integration (2 reviews)

**Cons:**

- Difficult Learning Curve (2 reviews)
- Difficult Setup (2 reviews)
- Expensive (2 reviews)
- Complex Implementation (1 reviews)
- Complex Setup (1 reviews)

### 9. [Zscaler Private Access](https://www.g2.com/products/zscaler-private-access/reviews)
  Zscaler Private Access (ZPA) is a cloud-based zero trust solution that securely connects users to private applications hosted in public clouds, data centers, or on-premises environments without relying on traditional VPNs or exposing them to the internet. Built on the principles of zero trust, ZPA ensures that users are authenticated and authorized before granting access, providing application-specific access rather than exposing the network. With AI-powered segmentation and identity-based policies, ZPA minimizes the attack surface, makes applications invisible to the internet, and prevents lateral movement. By simplifying access, reducing IT complexity, and improving user experience, ZPA supports modern hybrid work while delivering unmatched scalability and performance. Key Features and Benefits: • Minimize the Attack Surface: Private applications are hidden behind the Zero Trust Exchange, making them invisible and unreachable. Users connect to apps, not the network. • Eliminate Lateral Movement: Least-privileged access allows one-to-one user-to-application connections, avoiding network-wide exposure. • Deliver Exceptional User Experience &amp; Boost Hybrid Workforce Productivity: Fast, direct access to apps via 160+ global points of presence ensures low latency and no backhauling, boosting productivity. • Accelerate Zero Trust Journey with AI-powered User-to-app Segmentation: AI/ML generates custom app segmentation recommendations, simplifying user-to-app segmentation. • Prevent Compromised Users, Insider Threats &amp; Advanced Attackers: Comprehensive protection for private apps with OWASP Top 10 prevention, inline inspection, advanced threat protection, and data loss prevention. • Extend Zero Trust to All Applications: Enable secure remote access for legacy network connected applications such as VOIP and server-to-client applications, and extranet applications hosted in business partner or vendor networks. • Ensure Business Continuity and High Availability: ZPA Private Service Edge caches policies for zero trust access during internet outages, allowing for secure connectivity and business continuity. • Reduce Cost &amp; Operational Complexity: Replaces legacy VPNs, simplifying management and cutting hardware and operational costs. Accelerate M&amp;A time-to-value without having to integrate networks.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 132

**User Satisfaction Scores:**

- **Ease of Use:** 9.0/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Zscaler](https://www.g2.com/sellers/zscaler)
- **Company Website:** https://www.zscaler.com/
- **Year Founded:** 2008
- **HQ Location:** San Jose, California
- **Twitter:** @zscaler (17,530 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/234625/ (9,540 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 44% Enterprise, 29% Mid-Market


#### Pros & Cons

**Pros:**

- Security (64 reviews)
- Ease of Use (53 reviews)
- Secure Access (49 reviews)
- VPN Efficiency (30 reviews)
- Reliability (25 reviews)

**Cons:**

- Connection Issues (24 reviews)
- Error Handling (21 reviews)
- Slow Loading (20 reviews)
- Expensive (18 reviews)
- Slow Internet (16 reviews)

### 10. [Twingate](https://www.g2.com/products/twingate/reviews)
  Twingate is a secure remote access solution for an organization’s private applications, data, and environments, whether they are on-premise or in the cloud. Built to make the lives of DevOps teams, IT/infrastructure teams, and end users easier, it replaces outdated business VPNs which were not built to handle a world in which &quot;work from anywhere&quot; and cloud-based assets are increasingly the norm. Twingate’s modern zero trust-based approach to securing remote access focuses on improving security, while not compromising on usability and maintainability. Twingate distinguishes itself from other solutions in the following ways: - Software-only solution can be deployed alongside existing solutions in minutes, without requiring changes to existing infrastructure. - Enables least privilege access at the application level without requiring networks to be re-architected. - Centralized admin console, coupled with extensive logging capabilities, provides control and visibility over an enterprise’s entire network. - Scales up to support more users and resources without burdening IT teams with network segmentation projects or buying new hardware. - Client agents can be set up by users without IT support, are always on, and do not require user interaction once enabled. - User internet connectivity is improved due to split tunneling, no backhauling, and an intelligent client agent that handles authorization and routing activities on device.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 73

**User Satisfaction Scores:**

- **Anomaly Detection:** 7.1/10 (Category avg: 8.4/10)
- **Cloud Application Brokerage:** 10.0/10 (Category avg: 8.6/10)
- **Policy Enforcement:** 9.1/10 (Category avg: 8.6/10)
- **Ease of Use:** 9.7/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Twingate Inc.](https://www.g2.com/sellers/twingate-inc)
- **Company Website:** https://www.twingate.com
- **HQ Location:** Redwood City, California
- **Twitter:** @TwingateHQ (2,397 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/twingate/about (78 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 53% Mid-Market, 42% Small-Business


#### Pros & Cons

**Pros:**

- Security (9 reviews)
- Ease of Use (8 reviews)
- Secure Access (7 reviews)
- Access Management (6 reviews)
- Implementation Ease (6 reviews)

**Cons:**

- Performance Issues (9 reviews)
- Complex Configuration (3 reviews)
- Complex Implementation (3 reviews)
- Limited Customization (3 reviews)
- Update Issues (3 reviews)

### 11. [Zscaler Zero Trust Cloud](https://www.g2.com/products/zscaler-zero-trust-cloud/reviews)
  Zscaler global cloud delivers the entire gateway security stack as a service. By securely connecting users to their applications, regardless of device, location, or network, Zscaler is transforming enterprise security.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 37

**User Satisfaction Scores:**

- **Anomaly Detection:** 8.7/10 (Category avg: 8.4/10)
- **Cloud Application Brokerage:** 8.3/10 (Category avg: 8.6/10)
- **Policy Enforcement:** 8.3/10 (Category avg: 8.6/10)
- **Ease of Use:** 8.6/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Zscaler](https://www.g2.com/sellers/zscaler)
- **Year Founded:** 2008
- **HQ Location:** San Jose, California
- **Twitter:** @zscaler (17,530 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/234625/ (9,540 employees on LinkedIn®)
- **Ownership:** NASDAQ:ZS

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 52% Enterprise, 29% Small-Business


#### Pros & Cons

**Pros:**

- Security (5 reviews)
- Threat Detection (4 reviews)
- Ease of Use (3 reviews)
- Protection (3 reviews)
- Threat Protection (3 reviews)

**Cons:**

- Access Control (1 reviews)
- Complex Configuration (1 reviews)
- Complexity (1 reviews)
- Complex Setup (1 reviews)
- Difficult Configuration (1 reviews)

### 12. [Cloud Edge](https://www.g2.com/products/cloud-edge/reviews)
  Cloud Edge Unified threat management as a service for managed service providers


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 17

**User Satisfaction Scores:**

- **Anomaly Detection:** 7.9/10 (Category avg: 8.4/10)
- **Cloud Application Brokerage:** 8.1/10 (Category avg: 8.6/10)
- **Policy Enforcement:** 8.3/10 (Category avg: 8.6/10)
- **Ease of Use:** 8.8/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Trend Micro](https://www.g2.com/sellers/trend-micro)
- **Year Founded:** 1988
- **HQ Location:** Tokyo
- **LinkedIn® Page:** https://www.linkedin.com/company/4312/ (8,090 employees on LinkedIn®)
- **Ownership:** OTCMKTS:TMICY
- **Total Revenue (USD mm):** $1,515

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 47% Mid-Market, 41% Small-Business


### 13. [Fastly Next-Gen WAF](https://www.g2.com/products/fastly-next-gen-waf/reviews)
  The Fastly Next-Gen WAF provides advanced protection for your applications, APIs, and microservices, wherever they live, from a single unified solution. Built on Fastly’s proprietary SmartParse detection, it is highly effective at identifying and defending against advanced attacks without the false positives or constant rule tuning typically associated with common WAFs. Increase protection while keeping your overhead and risk of disruption low with Fastly’s Next-Gen WAF.


  **Average Rating:** 4.2/5.0
  **Total Reviews:** 29

**User Satisfaction Scores:**

- **Anomaly Detection:** 7.8/10 (Category avg: 8.4/10)
- **Cloud Application Brokerage:** 6.1/10 (Category avg: 8.6/10)
- **Policy Enforcement:** 7.8/10 (Category avg: 8.6/10)
- **Ease of Use:** 9.1/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Fastly](https://www.g2.com/sellers/fastly)
- **Year Founded:** 2011
- **HQ Location:** San Francisco, CA
- **Twitter:** @fastly (29,001 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/2602522/ (1,362 employees on LinkedIn®)
- **Ownership:** NYSE: FSLY

**Reviewer Demographics:**
  - **Top Industries:** Computer Software
  - **Company Size:** 50% Mid-Market, 37% Enterprise


#### Pros & Cons

**Pros:**

- Security (2 reviews)
- API Management (1 reviews)
- Cybersecurity (1 reviews)
- Ease of Use (1 reviews)
- Easy Integrations (1 reviews)

**Cons:**

- Expensive (1 reviews)
- Inflexible Pricing (1 reviews)

### 14. [Zscaler Secure Access Service Edge (SASE)](https://www.g2.com/products/zscaler-secure-access-service-edge-sase/reviews)
  Zscaler’s Secure Access Service Edge (SASE) platform enables organizations to unify networking and security into a seamless, cloud-delivered, zero trust framework. Built on the world’s largest security cloud, Zscaler Zero Trust SASE provides organizations with the fastest, most secure, and most reliable approach to connecting users, devices, and locations to applications and information—anytime, anywhere. Redefining Networking and Security on a Zero Trust Foundation: Traditional networking solutions, like SD-WAN, struggle to meet today’s complex challenges, often increasing attack surfaces, enabling lateral threat movement, and adding unnecessary complexity to IT environments. Zscaler SASE addresses these challenges by integrating advanced networking capabilities with industry-leading security services. At its core, the framework enforces zero trust principles to adaptively secure connectivity for users, IoT/OT systems, workloads, and business partners—without the overhead of legacy hardware-based models. Key Capabilities of Zscaler SASE: • Zero Trust SD-WAN: Delivers secure and high-performance connectivity by auto-selecting optimal traffic routes to cloud applications, the internet, or data centers, eliminating unnecessary backhauling. • Secure Web Gateway (SWG): Protects users by inspecting and securing all web traffic, blocking malware, phishing, malicious downloads, and other incoming threats. • Cloud Access Security Broker (CASB): Extends control over SaaS and cloud apps, ensuring the safe and compliant use of cloud services. • Firewall as a Service (FWaaS): A scalable, cloud-delivered next-gen firewall that replaces legacy perimeter solutions to effectively block threats across all network layers. • Zero Trust Network Access (ZTNA): Provides secure, least-privileged application access without granting excessive trust or network visibility to users. • Digital Experience Management (DEM): Delivers AI-powered insights into application and network performance, enabling IT teams to optimize user experience proactively. The Advantages of Zero Trust SASE: • Unified Infrastructure for Simpler IT Management: Consolidate networking and security into a single-vendor SASE solution, reducing complexity and improving operational efficiency. • Enhanced Cyberthreat Protection: Apply inline protections such as data loss prevention (DLP), threat detection, and ransomware mitigation across all points of access. • Seamless User Experience: Enforce high-speed security policies closer to the user, eliminating latency and ensuring uninterrupted cloud access. • Reduction in Operational Costs: Eliminate the need for multiple point products and reduce reliance on expensive hardware solutions through a fully cloud-delivered framework. Use Cases Supported by Zscaler Zero Trust SASE: • Enable Secure Hybrid Workforces: Extend secure, zero trust connectivity to employees whether they are remote, on-site, or traveling. • Optimize Connectivity: Simplify network configurations by routing traffic directly to the most efficient path while ensuring uncompromised security. • Improve Threat Posture: Secure all traffic, ensure encrypted data inspection, and adapt defenses in real time to address evolving cyber threats. • Reduce Risk Across IoT/OT and Partner Ecosystems: Safeguard workforce, IoT/OT systems, and business partners across distributed environments with a unified, secure connectivity framework. Why Choose Zscaler SASE? Zscaler redefines SASE with the most comprehensive zero trust implementation in the industry. Built on the Zscaler Zero Trust Exchange™, the platform scales to meet the demands of the largest global enterprises by connecting over 160 points of presence worldwide. As an acknowledged leader in SASE innovation, Zscaler ensures that your organization can securely connect users, locations, and devices to mission-critical applications while improving agility, performance, and security. Embrace the future of secure networking with Zscaler Zero Trust SASE and transform your business operations into a seamless and secure digital-first environment.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 16

**User Satisfaction Scores:**

- **Anomaly Detection:** 8.5/10 (Category avg: 8.4/10)
- **Cloud Application Brokerage:** 9.1/10 (Category avg: 8.6/10)
- **Policy Enforcement:** 8.5/10 (Category avg: 8.6/10)
- **Ease of Use:** 9.3/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Zscaler](https://www.g2.com/sellers/zscaler)
- **Year Founded:** 2008
- **HQ Location:** San Jose, California
- **Twitter:** @zscaler (17,530 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/234625/ (9,540 employees on LinkedIn®)
- **Ownership:** NASDAQ:ZS

**Reviewer Demographics:**
  - **Company Size:** 69% Enterprise, 19% Small-Business


### 15. [VeloCloud SASE](https://www.g2.com/products/velocloud-sase/reviews)
  VMware VeloCloud SASE, secured by Symantec, is a comprehensive cloud-delivered Secure Access Service Edge platform that integrates VMware&#39;s leading SD-WAN technology with Symantec&#39;s advanced Security Service Edge capabilities. This unified solution offers enterprises reliable, efficient, and secure access to applications and data from any device and location, ensuring consistent protection across edge locations, applications, users, and devices. Key Features and Functionality: - Enhanced User Experience: VeloCloud SD-WAN automatically recognizes over 4,300 applications, optimizing network performance based on local conditions to ensure seamless user experiences without IT intervention. - Comprehensive Threat Detection and Response: Integration with Symantec&#39;s security enforcement points provides proactive network security, including advanced threat intelligence, deep file inspection, sandboxing, and web isolation technologies to protect against sophisticated threats. - Automation for Branch and Edge Connectivity: The solution enables direct forwarding of internet-bound traffic from branch or edge locations to the nearest Symantec Enterprise Cloud location, simplifying the addition of new sites and policy modifications. - Streamlined Management and AI-Enabled Operations: A cloud-delivered architecture reduces IT burdens related to scalability and lifecycle management. Centralized configuration through VMware Edge Cloud Orchestrator and AI-powered analytics provide valuable insights into user experience and security operations. Primary Value and Problem Solved: VeloCloud SASE addresses the challenges of managing and securing distributed enterprise environments by combining networking and security into a single, cloud-delivered service. It enhances security, improves user experience, simplifies management, and streamlines operations, enabling organizations to protect sensitive data, ensure uninterrupted operations, and mitigate potential risks across their distributed infrastructure.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 11

**User Satisfaction Scores:**

- **Anomaly Detection:** 8.6/10 (Category avg: 8.4/10)
- **Cloud Application Brokerage:** 9.2/10 (Category avg: 8.6/10)
- **Policy Enforcement:** 9.3/10 (Category avg: 8.6/10)
- **Ease of Use:** 9.1/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Arista Networks](https://www.g2.com/sellers/arista-networks-39d4d864-54b5-4f9b-bebc-dc5cf72757ca)
- **Year Founded:** 2004
- **HQ Location:** Santa Clara, US
- **Twitter:** @arista_channels (2,448 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/80069/ (5,422 employees on LinkedIn®)
- **Ownership:** NYSE:ANET

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 38% Small-Business, 38% Mid-Market


### 16. [Barracuda SecureEdge](https://www.g2.com/products/barracuda-secureedge/reviews)
  Barracuda’s cloud-first SASE platform enables businesses to control access to data from any device, anytime, anywhere, and allows security inspection and policy enforcement in the cloud, at the branch, or on the device. Barracuda SecureEdge delivers enterprise-grade security including Zero Trust Network Access (ZTNA), Firewall-as-a-Service, web security, and fully integrated office connectivity with Secure SD-WAN.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 15

**User Satisfaction Scores:**

- **Anomaly Detection:** 7.8/10 (Category avg: 8.4/10)
- **Cloud Application Brokerage:** 7.4/10 (Category avg: 8.6/10)
- **Policy Enforcement:** 8.6/10 (Category avg: 8.6/10)
- **Ease of Use:** 8.1/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Barracuda](https://www.g2.com/sellers/barracuda)
- **Year Founded:** 2002
- **HQ Location:** Campbell, CA
- **Twitter:** @Barracuda (15,238 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/barracuda-networks/ (2,229 employees on LinkedIn®)
- **Ownership:** Private

**Reviewer Demographics:**
  - **Company Size:** 73% Mid-Market, 13% Enterprise


### 17. [Webscale One](https://www.g2.com/products/webscale-one/reviews)
  Overview Webscale is the Cloud Platform for Modern Commerce, offering security, scalability, performance and automation for global brands. The Webscale SaaS platform leverages automation and DevOps protocols to simplify the deployment, management and maintenance of infrastructure in multi-cloud environments, including Amazon Web Services, Google Cloud Platform, and Microsoft Azure. Webscale powers thousands of B2C, B2B, and B2E ecommerce storefronts in twelve countries and eight of the Fortune 1000 businesses and has offices in Santa Clara, CA, Boulder, CO, San Antonio, TX, Bangalore, India and London, UK.


  **Average Rating:** 4.2/5.0
  **Total Reviews:** 16

**User Satisfaction Scores:**

- **Anomaly Detection:** 9.2/10 (Category avg: 8.4/10)
- **Cloud Application Brokerage:** 9.1/10 (Category avg: 8.6/10)
- **Policy Enforcement:** 9.1/10 (Category avg: 8.6/10)
- **Ease of Use:** 9.0/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Webscale](https://www.g2.com/sellers/webscale-8273b023-9836-43c4-9196-6ea6860cf24d)
- **Year Founded:** 2013
- **HQ Location:** Santa Clara, US
- **Twitter:** @WebscaleNet (1,348 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/2881983 (76 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 56% Small-Business, 38% Mid-Market


#### Pros & Cons

**Pros:**

- Features (7 reviews)
- Ease of Use (4 reviews)
- Cloud Services (3 reviews)
- Helpful (3 reviews)
- Cloud Compatibility (2 reviews)

**Cons:**

- Expensive (3 reviews)
- Complexity (2 reviews)
- Learning Curve (2 reviews)
- Pricing Issues (2 reviews)
- Complex Coding (1 reviews)

### 18. [Barracuda CloudGen Access](https://www.g2.com/products/barracuda-cloudgen-access/reviews)
  Barracuda CloudGen Access makes it easy to simplify compliance and secure third-party access to your systems, providing Zero Trust Access to all your apps and data from any device and location. Barracuda CloudGen Access provides employees and partners with access to corporate apps and cloud workloads without creating additional attack surfaces.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 18

**User Satisfaction Scores:**

- **Anomaly Detection:** 8.3/10 (Category avg: 8.4/10)
- **Cloud Application Brokerage:** 9.2/10 (Category avg: 8.6/10)
- **Policy Enforcement:** 7.9/10 (Category avg: 8.6/10)
- **Ease of Use:** 8.7/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Barracuda](https://www.g2.com/sellers/barracuda)
- **Year Founded:** 2002
- **HQ Location:** Campbell, CA
- **Twitter:** @Barracuda (15,238 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/barracuda-networks/ (2,229 employees on LinkedIn®)
- **Ownership:** Private

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 53% Mid-Market, 37% Small-Business


#### Pros & Cons

**Pros:**

- Affordable Pricing (2 reviews)
- Deployment Ease (2 reviews)
- Ease of Use (2 reviews)
- Security (2 reviews)
- App Integration (1 reviews)

**Cons:**

- Expensive (2 reviews)
- Complex Configuration (1 reviews)
- Complex Implementation (1 reviews)
- Difficult Learning (1 reviews)
- Difficult Navigation (1 reviews)

### 19. [Cloud Gateway](https://www.g2.com/products/cloud-gateway/reviews)
  Cloud Gateway is your one-stop shop for secure and simplified network management. It provides a single pane of glass view, giving you complete control and visibility over your entire network and security infrastructure.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 10

**User Satisfaction Scores:**

- **Anomaly Detection:** 8.6/10 (Category avg: 8.4/10)
- **Cloud Application Brokerage:** 9.0/10 (Category avg: 8.6/10)
- **Policy Enforcement:** 8.9/10 (Category avg: 8.6/10)
- **Ease of Use:** 9.3/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Cloudgateway](https://www.g2.com/sellers/cloudgateway)
- **Year Founded:** 2017
- **HQ Location:** London, England
- **Twitter:** @cloudgatewayltd (416 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/cloudgateway/ (45 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 40% Mid-Market, 30% Small-Business


### 20. [Adaptiv](https://www.g2.com/products/adaptiv/reviews)
  Adaptiv Networks provides amazingly simple, secure, and reliable cloud connectivity for customers who vaue who value simplicity, performance, and cost effectiveness. We offer a range of scalable SD-WAN connectivity and coud security solutions to fit the needs of single site businesses, hybrid workers, and multi-site enterprise organizations.


  **Average Rating:** 4.1/5.0
  **Total Reviews:** 10

**User Satisfaction Scores:**

- **Anomaly Detection:** 8.3/10 (Category avg: 8.4/10)
- **Cloud Application Brokerage:** 9.4/10 (Category avg: 8.6/10)
- **Policy Enforcement:** 8.9/10 (Category avg: 8.6/10)
- **Ease of Use:** 7.4/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Adaptiv](https://www.g2.com/sellers/adaptiv-d2f7ecc3-924a-44a6-beb1-47ab9544d913)
- **HQ Location:** Gatineau
- **LinkedIn® Page:** https://www.linkedin.com/company/adaptiv-networks/ (44 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 45% Mid-Market, 36% Small-Business


#### Pros & Cons

**Pros:**

- User Interface (4 reviews)
- Ease of Use (3 reviews)
- Automation (2 reviews)
- Efficiency (2 reviews)
- Features (2 reviews)

**Cons:**

- Complex Configuration (1 reviews)
- Complex Implementation (1 reviews)
- Difficult Configuration (1 reviews)
- Difficult Learning (1 reviews)
- Difficult Learning Curve (1 reviews)

### 21. [Skyhigh Security Service Edge](https://www.g2.com/products/skyhigh-security-service-edge/reviews)
  The Skyhigh Security Service Edge portfolio goes beyond data access and focuses on data use, allowing organizations to collaborate from any device and from anywhere without sacrificing security, while providing the visibility and control required to monitor and mitigate security risks. The Skyhigh Security Service Edge platform includes Skyhigh Secure Web Gateway, Skyhigh Cloud Access Security Broker, Skyhigh Private Access, and Skyhigh Cloud Native Application Protection Platform.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 12

**User Satisfaction Scores:**

- **Anomaly Detection:** 5.0/10 (Category avg: 8.4/10)
- **Cloud Application Brokerage:** 5.0/10 (Category avg: 8.6/10)
- **Policy Enforcement:** 4.2/10 (Category avg: 8.6/10)
- **Ease of Use:** 9.0/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Skyhigh Security](https://www.g2.com/sellers/skyhigh-security)
- **Year Founded:** 2022
- **HQ Location:** San Jose, CA
- **Twitter:** @skyhighsecurity (17,637 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/78449382 (721 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 33% Enterprise, 33% Mid-Market


#### Pros & Cons

**Pros:**

- Security (5 reviews)
- Data Security (4 reviews)
- Cloud Services (3 reviews)
- Data Protection (3 reviews)
- Easy Integrations (3 reviews)

**Cons:**

- Expensive (2 reviews)
- Complex Configuration (1 reviews)
- Complexity (1 reviews)
- Complex Setup (1 reviews)
- Dependency Issues (1 reviews)

### 22. [SonicWall Cloud Secure Edge](https://www.g2.com/products/sonicwall-cloud-secure-edge/reviews)
  SonicWall Cloud Secure Edge is a modern, cloud-native Security Service Edge (SSE) solution that addresses the limitations of legacy network appliances with a unified, scalable approach to secure access. It empowers organizations that consist of a variety of users (employees, contractors, third parties, etc.) to seamlessly and securely connect to both private and internet resources from any device or location. At the core of CSE are five key capabilities that work together to deliver comprehensive protection and simplified connectivity: Zero Trust Network Access (ZTNA) Enforces “never trust, always verify” by granting access based on user identity, device posture, and contextual risk. Only verified, compliant users and devices can connect to sensitive applications and data. Secure Web Gateway (SWG) Inspects and filters web traffic in real time to block phishing, malicious sites, and unsafe downloads. Protects remote and hybrid workforces by ensuring secure internet access everywhere. Cloud Access Security Broker (CASB) Provides visibility and control over SaaS applications, including shadow IT. Enforces policies to ensure compliance with organizational and regulatory standards. Firewall-as-a-Service (FWaaS) Extends next-generation firewall capabilities into the cloud, delivering advanced traffic inspection, intrusion prevention, and threat protection—without physical appliances. VPN-as-a-Service (VPNaaS) Delivers secure, high-performance remote access with modern tunneling protocols. Simplifies connectivity while improving scalability, speed, and user experience.


  **Average Rating:** 4.1/5.0
  **Total Reviews:** 10

**User Satisfaction Scores:**

- **Anomaly Detection:** 8.8/10 (Category avg: 8.4/10)
- **Cloud Application Brokerage:** 7.9/10 (Category avg: 8.6/10)
- **Policy Enforcement:** 7.5/10 (Category avg: 8.6/10)
- **Ease of Use:** 9.0/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [SonicWall](https://www.g2.com/sellers/sonicwall)
- **Company Website:** https://www.sonicwall.com/
- **Year Founded:** 1991
- **HQ Location:** Milpitas, CA
- **Twitter:** @SonicWall (29,322 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/4926/ (1,951 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 50% Mid-Market, 30% Small-Business


#### Pros & Cons

**Pros:**

- Security (3 reviews)
- Secure Access (2 reviews)
- Threat Protection (2 reviews)
- Authentication (1 reviews)
- Customer Support (1 reviews)

**Cons:**

- Access Issues (1 reviews)
- Expensive (1 reviews)
- Integration Issues (1 reviews)
- Poor Documentation (1 reviews)
- Process Delays (1 reviews)

### 23. [HPE Aruba Networking SSE](https://www.g2.com/products/hpe-aruba-networking-sse/reviews)
  Atmos is a modern Security Service Edge (SSE) platform powered by Axis. Atmos securely connects users to the business resources needed in order to get work done, regardless of application, device, or location. The platform artfully integrates ZTNA, SWG, CASB and Digital Experience monitoring into a single cloud-delivered platform, with one easy to use pane of glass to manage it all. With +350 cloud edges running across Amazon Web Services Global Accelerator, Google Cloud Platform, and Oracle networks, the Atmos platform helps security, networking, and IT leaders enable employees, partners, and customers to securely access business data - without the pitfalls of network-centric solutions or application limitations that every other zero trust service faces. Atmos sits inline, supporting all ports and protocols while inspecting all traffic. With agent and agentless support, Atmos brokers an orchestra of surgical, one-to-one, least-privileged connections based on identity and policy, and performs vital end user experience monitoring to track connections (hop-by-hop) and empower IT to pinpoint issues. Experience work in harmony with Atmos by Axis.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 13

**User Satisfaction Scores:**

- **Anomaly Detection:** 10.0/10 (Category avg: 8.4/10)
- **Cloud Application Brokerage:** 10.0/10 (Category avg: 8.6/10)
- **Policy Enforcement:** 9.2/10 (Category avg: 8.6/10)
- **Ease of Use:** 9.6/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [HP Development Company](https://www.g2.com/sellers/hp-development-company)
- **Year Founded:** 1939
- **HQ Location:** Palo Alto, CA
- **Twitter:** @HPE (91,958 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/1025/ (85,438 employees on LinkedIn®)
- **Ownership:** NYSE: HPQ

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 38% Enterprise, 38% Mid-Market


### 24. [Cloudflare One (SASE)](https://www.g2.com/products/cloudflare-one-sase/reviews)
  Cloudflare One is a single-vendor secure access service edge (SASE) platform that converges security and networking services into a unified, global connectivity cloud. It replaces legacy, fragmented hardware and first-generation SASE solutions with a composable, programmable architecture. Cloudflare One connects and protects an organization&#39;s workforce, AI agents, and infrastructure. Learn more at https://www.cloudflare.com/sase/ Designed for agility, it enables teams to: - Accelerate safe AI adoption with granular visibility, control, and AI agent governance. - Modernize remote access by replacing clunky VPNs with zero trust access. - Block email phishing attacks with flexible, SASE-native email security. - Protect web traffic for remote users and branch offices with lightweight DNS filtering. - Deploy “coffee shop networking” with a light branch, heavy cloud approach.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 101

**User Satisfaction Scores:**

- **Anomaly Detection:** 9.4/10 (Category avg: 8.4/10)
- **Cloud Application Brokerage:** 8.3/10 (Category avg: 8.6/10)
- **Policy Enforcement:** 9.4/10 (Category avg: 8.6/10)
- **Ease of Use:** 9.1/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Cloudflare, Inc.](https://www.g2.com/sellers/cloudflare-inc)
- **Year Founded:** 2009
- **HQ Location:** San Francisco, California
- **Twitter:** @Cloudflare (279,070 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/407222/ (6,898 employees on LinkedIn®)
- **Ownership:** NYSE: NET

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 37% Small-Business, 34% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (8 reviews)
- Protection (7 reviews)
- Reliability (7 reviews)
- Security (7 reviews)
- User Interface (6 reviews)

**Cons:**

- Steep Learning Curve (5 reviews)
- Complexity (4 reviews)
- Difficult Learning (4 reviews)
- Difficult Learning Curve (4 reviews)
- Difficult Setup (4 reviews)

### 25. [Grip Security](https://www.g2.com/products/grip-security/reviews)
  Grip brings the industry’s most comprehensive visibility across all enterprise SaaS applications--known or unknown for apps, users, and their basic interactions with extreme accuracy to minimize false positives. Armed with deep visibility, Grip secures all SaaS application access regardless of device or location as well as mapping data flows to enforce security policies and prevent data loss across the entire SaaS portfolio. Finally, Grip complements any CASB deployment. With nominal resourcing, incremental deployment and no performance degradation, deploying Grip will complement your forward or reverse proxy SaaS solutions. Grip fills the hole left by today’s CASBs by providing comprehensive visibility, governance and data loss prevention to help enterprises painlessly secure a burgeoning and chaotic SaaS ecosystem. Grip secures SaaS from the edge with an endpoint-centric approach. The Grip client brings an endpoint-centric approach that gives enterprises an unprecedented SaaS security layer while remaining SaaS agnostic. Like VPN which is the only method to access networks remotely, Grip’s endpoint-centric approach becomes the only way to access your SaaS.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 5

**User Satisfaction Scores:**

- **Anomaly Detection:** 7.5/10 (Category avg: 8.4/10)
- **Cloud Application Brokerage:** 10.0/10 (Category avg: 8.6/10)
- **Policy Enforcement:** 9.2/10 (Category avg: 8.6/10)
- **Ease of Use:** 8.3/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Grip Security](https://www.g2.com/sellers/grip-security)
- **Year Founded:** 2021
- **HQ Location:** Boston, US
- **LinkedIn® Page:** https://www.linkedin.com/company/grip-security (145 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 40% Enterprise, 40% Small-Business




## Parent Category

[Cloud Security Software](https://www.g2.com/categories/cloud-security)



## Related Categories

- [Zero Trust Networking Software](https://www.g2.com/categories/zero-trust-networking)
- [Cloud Access Security Broker (CASB) Software](https://www.g2.com/categories/cloud-access-security-broker-casb)
- [Secure Service Edge (SSE) Solutions](https://www.g2.com/categories/secure-service-edge-sse-solutions)



---

## Buyer Guide

### What You Should Know About Cloud Edge Security Software

### What is Cloud Edge Security Software?

Cloud edge security software provides enterprises with a cloud-delivered solution to securely access the internet and cloud-based applications that run at the cloud edge or where compute capabilities are run closer to end devices. The software is delivered using software-defined wide area network (SD-WAN) technology. This allows cloud edge security solutions to operate anywhere and combine security functions to protect all network activity.

### What Are the Common Features of Cloud Edge Security?

To address the need for cloud edge security software, many organizations are turning to [secure access service edge (SASE) platforms](https://www.g2.com/categories/secure-access-service-edge-sase-platforms), which converge SD-WAN capabilities with network security functions as a cloud-delivered service.

**SASE framework:** The SASE framework includes capabilities such as [cloud access security broker (CASB) software](https://www.g2.com/categories/cloud-access-security-broker-casb), [zero-trust networking software](https://www.g2.com/categories/zero-trust-networking), and firewall as a service (FWaaS) —all available in a single cloud-delivered service model that simplifies IT.

**SASE architecture:** SASE architecture also enables companies to return networking and security to the cloud where the applications and data are located. It helps ensure secure access regardless of device location. It provides a set of best practices to secure applications and data in an era where work happens everywhere, and users are the new network perimeter.

### What are the Benefits of Cloud Edge Security Software?

There are several benefits to using cloud edge security software, as mentioned below.

**Secures data:** A major advantage of cloud edge security platforms is that it helps secure the data already being processed at the cloud edge. The sheer volume of data produced by devices at the edge connecting to the internet requires vastly more processing.&amp;nbsp;

**Secures real-time transactions:** Edge computing moves processing and storage resources closer to the source of cloud data to manage loads. However, the movement of data from the cloud to the edge makes it very vulnerable to attacks. Cloud edge security software helps secure real-time edge data transactions that might take place in the Internet of Things (IoT), such as smart applications in retail or manufacturing. These tools make these transactions more secure and reliable.

**Secures endpoints:** Examples of cloud edge security software capabilities include web filtering, anti-malware, intrusion prevention systems (IPS), and next-generation firewalls that permit or deny traffic based on IP addresses. These functionalities are often built into the organization&#39;s SD-WAN. Effective cloud edge security software enables IT to secure all edge endpoints or devices easily.&amp;nbsp;

### Who Uses Cloud Edge Security Software?

**IT and cybersecurity staff:** IT and cybersecurity staff use cloud edge security tools to securely monitor the data traffic at the cloud edge, ensuring safe B2C and B2B transactions. Securing these transactions keeps intruders from attacking these otherwise vulnerable internet transactions, which may be numerous in volume.

**Industries** : As enterprises move cloud capabilities across the WAN to users at the edge, industries such as healthcare and finance have more burden to protect sensitive data that comes with strict compliance requirements. Cloud edge security software can prioritize important security fundamentals such as encryption for data stored locally and in transit between the network core and edge computing devices.

### Challenges with Cloud Edge Security Software?

There are some challenges IT teams can encounter with cloud edge security software.

**Potential design flaws:** With edge computing comes devices that can take virtually any form, from micro-data centers at remote locations, or a vast array of IoT devices. An example is the rapid shift to hybrid work models in response to the global pandemic, where millions of distributed remote offices and BYOD devices suddenly had to be managed simultaneously.

However, the design of these edge devices prioritizes functionality and connectivity over security. A poorly designed cloud edge security software approach by buyers does not secure the edge and makes it vulnerable to zero-day threats.

**Increased cybersecurity risks:** Edge computing increases the risk of cybersecurity threats entering the corporate network. Deploying hundreds of edge computing devices creates hundreds of potential entry points for security attacks and breaches. Cloud edge security solutions must have a 360-degree view of the attack surface and provide a built-in security stack to protect against zero-day threats, malware, and other vulnerabilities at the point of access.&amp;nbsp;

### How to Buy Cloud Edge Security Software

#### Requirements Gathering (RFI/RFP) for Cloud Edge Security Software

If an organization is just starting and looking to purchase cloud edge security software, g2.com can help select the best one.

Most business pain points might be related to all the manual work that must be completed. If the company is large and has a lot of networks, data, or devices in its organization, it may need to shop for cloud edge security platforms that can grow with its organization. Users should think about the pain points in security to help create a checklist of criteria. Additionally, the buyer must determine the number of employees who will need to use the cloud edge security software and if they currently have the skills to administer it.&amp;nbsp;

Taking a holistic overview of the business and identifying pain points can help the team springboard into creating a checklist of criteria. The checklist serves as a detailed guide that includes both necessary and nice-to-have features, including budget features, number of users, integrations, security staff skills, cloud or on-premises solutions, and more.

Depending on the deployment scope, it might be helpful to produce an RFI, a one-page list with a few bullet points describing what is needed from cloud edge security software.

#### Compare Cloud Edge Security Software Products

**Create a long list**

Vendor evaluations are essential to the software buying process, from meeting the business functionality needs to implementation. For ease of comparison, after all demos are complete, it helps to prepare a consistent list of questions regarding specific needs and concerns to ask each vendor.

**Create a short list**

From the long list of vendors, it is helpful to narrow down the list of vendors and come up with a shorter list of contenders, preferably no more than three to five. With this list, businesses can produce a matrix to compare the features and pricing of the various solutions.

**Conduct demos**

To ensure the comparison is comprehensive, the user should demo each solution on the short list with the same use cases. This will allow the business to evaluate like for like and see how each vendor stacks up against the competition.&amp;nbsp;

#### Selection of Cloud Edge Security Software

**Choose a selection team**

Before getting started, creating a winning team that will work together throughout the entire process, from identifying pain points to implementation, is crucial. The software selection team should consist of organization members with the right interest, skills, and time to participate in this process. A good starting point is to aim for three to five people who fill roles such as the main decision maker, project manager, process owner, system owner, or staffing subject matter expert, as well as a technical lead, head administrator, or security administrator. The vendor selection team may be smaller in smaller companies, with fewer participants multitasking and taking on more responsibilities.

**Compare notes**

The selection team should compare notes, facts, and figures noted during the process, such as costs, security capabilities, and alert and incident response times.

**Negotiation**

Just because something is written on a company’s pricing page does not mean it&#39;s final. It is crucial to open up a conversation regarding pricing and licensing. For example, the vendor may be willing to give a discount for multi-year contracts or for recommending the product to others.

**Final decision**

After this stage, and before going all in, it is recommended to roll out a test run or pilot program to test adoption with a small sample size of users. If the tool is well used and well received, the buyer can be confident that the selection was correct. If not, it might be time to go back to the drawing board.

### What does Cloud Edge Security Software cost?

Cloud edge security software is considered a long-term investment. This means there must be a careful evaluation of vendors, and the software should be tailored to each organization&#39;s specific requirements. Once cloud edge security software is purchased, deployed, and integrated into an organization’s security system, the cost could be high, so the evaluation stage of selecting the right tool is crucial. The notion of rip-and-replace cost can be high. The cloud edge security software vendor chosen should continue to provide support for the platform with flexibility and open integration. Pricing can be pay-as-you-go, and costs may also vary depending if cloud edge security is self-managed or fully managed.

#### Return on Investment (ROI)

Organizations decide to purchase cloud edge security software with some type of return on investment (ROI). As they want to recoup the money spent on the software, it is critical to understand the costs that will be saved in terms of efficiency. In the long run, the investment must be worth preventing the downtime and loss of revenue that would be caused by a security breach.




