Introducing G2.ai, the future of software buying.Try now
Inactive Profile: Need Admin Access?
No one has managed this profile for over a year.
If you work at Apozy, reclaim access to make changes.
Kasm Workspaces
Sponsored
Kasm Workspaces
Visit Website
Product Avatar Image
Apozy

By Apozy

Re-claim Profile

Re-claim your company’s G2 profile

This profile hasn’t been active for over a year.
If you work at Apozy, you can re-claim it to keep your company’s information up to date and make the most of your G2 presence.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Re-claim
0 out of 5 stars

How would you rate your experience with Apozy?

Kasm Workspaces
Sponsored
Kasm Workspaces
Visit Website
This product hasn't been reviewed yet! Be the first to share your experience.
Leave a Review

Apozy Reviews & Product Details

Apozy Media

Apozy Demo - Airlock Cloud
Airlock's cloud platform provides detailed incident information, user information, and logs all information pre-encrypted, providing data similiar to that of an SSL inspection proxy, without a proxy.
Apozy Demo - Airlock Blocks Fake Stripe
When Airlock identifies a malicious website, like this phishing attack, it sandboxes the page, preventing action and isolating the threat.
Apozy Demo - Airlock Protection Extension
Airlock is built on adblock, does not change user experience, and deploys in minutes an extension to Chrome, Firefox, and MS Edge.
Product Avatar Image

Have you used Apozy before?

Answer a few questions to help the Apozy community

Apozy Reviews (0)

G2 reviews are authentic and verified.

There are not enough reviews of Apozy for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Mimecast Advanced Email Security Logo
Mimecast Advanced Email Security
4.4
(315)
Mimecast Email Security with Targeted Threat Protection solution that offers comprehensive, multi-layered email security and content controls.
2
Authentic8 Silo for Research Logo
Authentic8 Silo for Research
4.6
(107)
The Silo Web Isolation Platform — a secure, cloud-native execution environment for all web-based activity — underpins two core products: Silo for Safe Access and Silo for Research. Silo for Safe Access is an isolated workspace that allows IT to manage use of the web regardless of the access details or the role of the user. The end user receives a familiar browsing environment via benign video display. Silo for Research leverages the same browsing experience, IT control and security but adds a powerhouse of capabilities and automated features purpose-built for online investigators. The solution gives them the control to manage how their digital fingerprint appears to visited websites during the course of investigations — whether they be for law enforcement, trust and safety, cybersecurity intelligence or other purposes. This way, investigators can blend in with the crowd and not give away their identity of intent to investigative targets, which could cause them to disinform, go into hiding or retaliate against the investigator or their organization.
3
Symantec Web Security Service Logo
Symantec Web Security Service
4.4
(120)
Symantec Web Security is a cloud based software that helps protect organization from compromised websites and malicious downloads and allows user to control, monitor and enforce Acceptable Use Policies for organizations users, whether on-premises or away from the office.
4
Cloudflare SSE & SASE Platform Logo
Cloudflare SSE & SASE Platform
4.6
(103)
Cloudflare Area 1 Security identifies and prevents advanced socially engineered attacks before they impact your enterprise.
5
Kasm Workspaces Logo
Kasm Workspaces
4.7
(47)
Workspaces is a modern, secure and cost-effective solution for remote browser isolation (RBI), containerized application streaming (CAS), virtualized desktop infrastructure (VDI) and desktop as a service (DaaS) that provides a remote desktop and remote work solution for your distributed workforce. The Workspaces platform provides enterprise-class orchestration, data loss prevention, and web streaming technology to enable the delivery of containerized workloads to your browser.
6
BitBrowser Logo
BitBrowser
4.8
(60)
BitBrowser is an undetectable browser that lets you easily create a unique and stable fingerprint for multiple accounts on any platform.
7
Citrix Secure Private Access Logo
Citrix Secure Private Access
4.5
(54)
Citrix Secure Browser is service protects the corporate network from browser-based attacks by isolating web browsing. It delivers consistent, secure remote access to internet hosted web applications with zero end-point configuration.
8
HP Wolf Enterprise Security Logo
HP Wolf Enterprise Security
4.5
(3)
Bromium has pioneered a completely new approach to defeat cyber attacks in real time and provide unmatched threat intelligence hardware-enforced isolation.
9
Symantec Web Isolation Logo
Symantec Web Isolation
4.5
(1)
Symantec Web Isolation executes web sessions away from endpoints, sending only safe rendering information to users' browsers thereby preventing any website delivered zero-day malware from reaching your devices.
10
Menlo Security Logo
Menlo Security
4.5
(10)
The Menlo Security Web Isolation Service protects enterprises from cyber attacks by isolating and executing all web content in the Menlo Security Isolation Platform, away from the endpoint, eliminating malware before it can reach user devices.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Apozy
View Alternatives