Introducing G2.ai, the future of software buying.Try now
Product Avatar Image
AWS Vertrified Access

By Amazon Web Services (AWS)

Unclaimed Profile

Claim your company’s G2 profile

Claiming this profile confirms that you work at AWS Vertrified Access and allows you to manage how it appears on G2.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Claim Now
4.7 out of 5 stars
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with AWS Vertrified Access?

AWS Vertrified Access Reviews & Product Details

Value at a Glance

Averages based on real user reviews.

Time to Implement

4 months

Return on Investment

21 months

AWS Vertrified Access Integrations

(2)
Integration information sourced from real user reviews.
Product Avatar Image

Have you used AWS Vertrified Access before?

Answer a few questions to help the AWS Vertrified Access community

AWS Vertrified Access Reviews (35)

Reviews

AWS Vertrified Access Reviews (35)

4.7
35 reviews

Pros & Cons

Generated from real user reviews
View All Pros and Cons
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Rene M.
RM
Solution Architect
Outsourcing/Offshoring
Mid-Market (51-1000 emp.)
"Clean, Scalable App-Level Access Control with AWS Verified Access"
What do you like best about AWS Vertrified Access?

AWS Verified Access enforces access based on user identity and device context, rather than relying on network location. Compared with legacy VPN approaches that often grant broader network access than necessary, this can significantly reduce risk.

It’s especially well-suited for protecting web applications, including internal dashboards, admin panels, and other private apps hosted behind AWS resources such as Application Load Balancers. Overall, it feels clean and scalable, and it’s clearly purpose-built for application-level access control. Review collected by and hosted on G2.com.

What do you dislike about AWS Vertrified Access?

Not a general replacement for every VPN use case

Verified Access is best suited for HTTP/HTTPS applications, and it doesn’t fully address scenarios that require raw network access or other non-web workloads (for example, SSH or direct database access) unless you add additional tooling.

Device posture requirements depend on environment maturity

To get the most out of Verified Access, organizations generally need strong identity foundations and solid device management (MDM) already in place. Without that level of maturity, deployments can feel constrained and may not deliver the same breadth of coverage you’d expect from more fully developed Zero Trust / enterprise ZTNA approaches. Review collected by and hosted on G2.com.

Ahmad R.
AR
RPA Developer
Small-Business (50 or fewer emp.)
"Strong Zero-Trust Security Without VPN, but Setup and Costs Can Be Challenging"
What do you like best about AWS Vertrified Access?

What I value most about AWS Verified Access is its zero-trust security approach, which eliminates the need for a VPN yet still provides comprehensive access controls based on both identity and device for corporate applications. I also find that it integrates seamlessly with AWS IAM and third-party identity providers. Review collected by and hosted on G2.com.

What do you dislike about AWS Vertrified Access?

Some users report that AWS Verified Access can be difficult to set up initially, as there is a learning curve involved in configuring policies and integrating with third-party identity providers. Additionally, the platform may present certain limitations in terms of protocol support, and costs can rise considerably when deploying at a larger scale. Review collected by and hosted on G2.com.

Verified User in Computer Software
UC
Enterprise (> 1000 emp.)
"Secure, Identity-Aware Access Without Traditional Network Complexity"
What do you like best about AWS Vertrified Access?

AWS Verified Access stands out for its strong, zero-trust, identity-aware approach to application access. I appreciate that it removes the need for traditional VPNs and instead makes access decisions based on user identity, device posture, and overall security context. Its tight integration with AWS IAM Identity Center and other AWS services helps keep policy enforcement consistent, centralized, and scalable. Once it’s configured properly, access control feels dependable and meaningfully improves security without getting in the way of end-user productivity. Review collected by and hosted on G2.com.

What do you dislike about AWS Vertrified Access?

The initial setup and learning curve can be challenging, especially for teams that are new to zero-trust architectures or more advanced IAM policies. While the documentation is improving, it still takes time to fully understand the policy logic and the right troubleshooting steps. Cost visibility and pricing complexity can also be a concern, particularly for smaller teams or for environments where usage fluctuates. Review collected by and hosted on G2.com.

AS
Senior System Engineer
Mid-Market (51-1000 emp.)
"Secure, Flexible Access Without VPN Hassles—But Setup Can Be Complex"
What do you like best about AWS Vertrified Access?

AVA enabled secure access to applications without requiring a traditional VPN. That means fewer client-install headaches and less user friction.

It supports integration with identity providers and device posture/trust provides, which means you don't always need to build everything from scratch.

Since access policies apply every time a user tries to connect AVA becomes a daily operational tool rather than something set and forget.

AVA offers fine grained access policies, you can define access based on user identity. device posture, location etc. Review collected by and hosted on G2.com.

What do you dislike about AWS Vertrified Access?

While AWS verified access simplifies user access compared to VPNs, the initial setup can be quite complex.

Much of the configuration still depends on AWS CLI orJSON policy editing, with limiting graphical management tools. Review collected by and hosted on G2.com.

NR
IT Manager
Mid-Market (51-1000 emp.)
"AWS Vertrified Access"
What do you like best about AWS Vertrified Access?

VPN-less Secure Access (Native AWS Zero Trust)

One of the standout features is that Verified Access allows you to provide secure access to internal applications and services without requiring a traditional VPN.

This simplifies user workflows (fewer VPN client issues) and reduces the surface area of VPN-related problems.

Real-Time, Request-by-Request Evaluation (Granular Control)

Verified Access doesn’t grant blanket access once and forget it. Every application request is evaluated against the policy at the moment of the request, based on trust data (identity, device posture, etc.) Review collected by and hosted on G2.com.

What do you dislike about AWS Vertrified Access?

Resource / Quota Limits

AWS imposes default quotas (limits) on how many Verified Access resources (instances, endpoints, groups, trust providers) you can have per region.

60-Second HTTP Idle Timeout

For HTTP/HTTPS traffic, if a request takes longer than 60 seconds, the client sees an HTTP 504 (gateway timeout). Review collected by and hosted on G2.com.

Leonardo M.
LM
CTO
Small-Business (50 or fewer emp.)
"Promising idea with strong security base but not yet simple to manage"
What do you like best about AWS Vertrified Access?

This solution centralizes zero-trust access in a straightforward manner, eliminating the need for VPNs or complicated reverse proxies. Its integration with IAM Identity Center and policy management provides strong control. The added security visibility through CloudWatch and GuardDuty is another advantage. For organizations already heavily invested in AWS, it helps consolidate everything within a single environment. Terraform integration is also available. Review collected by and hosted on G2.com.

What do you dislike about AWS Vertrified Access?

Setting it up is a heavy process, and ongoing maintenance can be confusing. The documentation lacks clarity and often presumes users already have a strong grasp of AWS networking and identity systems. Review collected by and hosted on G2.com.

I
marketing
Small-Business (50 or fewer emp.)
"Secure and modern way to manage internal access"
What do you like best about AWS Vertrified Access?

I like that it remove the need of a VPN while still keeping everything secure. It’s simple to control who can access what, and it works great with the rest of AWS tools we already use. The performance is good and the access policies are easy to customize once you learn how it works. Review collected by and hosted on G2.com.

What do you dislike about AWS Vertrified Access?

The configuration at the start was a bit confusing, especially the policies and integrations. The documentation is complete but sometimes too technical, so it takes a bit of time to get comfortable with it. Review collected by and hosted on G2.com.

Rui R.
RR
CSO
Small-Business (50 or fewer emp.)
"Reliable way to secure access without too much complexity"
What do you like best about AWS Vertrified Access?

What I like the most is how it manage secure access for our internal systems without needing a traditional VPN setup. It make the process smoother and more user friendly, and we can easily control who access what. The integration with other AWS tools is also very helpful for managing everything in one place. Review collected by and hosted on G2.com.

What do you dislike about AWS Vertrified Access?

The setup was not so simple at first. It takes some time to understand the policies and how they interact with other AWS services. Also, the documentation could be more clear for people that are not AWS experts. Review collected by and hosted on G2.com.

Sanjay S.
SS
Software Development
Mid-Market (51-1000 emp.)
"Revolutionizing Secure Access with Zero-Trust Simplicity"
What do you like best about AWS Vertrified Access?

1. Zero-trust access without a VPN

You can provide users secure access to private applications without requiring a traditional VPN. This reduces complexity and removes the bottlenecks and security risks that VPNs often introduce

2. Fine-grained, continuous policy evaluation

Access isn’t granted just because someone authenticated once. Verified Access continuously evaluates policies based on identity, device posture, security signals, and context, resulting in stronger, adaptive security

3. Easy integration with identity providers (IdPs)

It plugs into existing IdPs like Okta, Azure AD, and others. This means organizations don’t need to change their existing authentication ecosystem to adopt zero trust

4. Access per-application - not network-wide

Instead of giving a user broad network access, Verified Access exposes only specific internal applications. This drastically reduces the attack surface Review collected by and hosted on G2.com.

What do you dislike about AWS Vertrified Access?

1. Still relatively new and evolving

2. Complex initial setup

3. Limited device posture tooling without 3rd-party integrations

4. Policy writing can be challenging Review collected by and hosted on G2.com.

João S.
JS
IT
Telecommunications
Small-Business (50 or fewer emp.)
"Reliable way to secure access for remote users"
What do you like best about AWS Vertrified Access?

I like that it makes managing secure connections much easier without having to rely on VPNs. It gives clear visibility on who is accessing what, and it integrates well with other AWS tools we already use. It feels very stable and trusted for controlling user access. Review collected by and hosted on G2.com.

What do you dislike about AWS Vertrified Access?

Setting it up for the first time was a bit complicated, and the documentation could be more clear in some parts. Also, for smaller teams it can feel a bit overkill since there are many configuration options. Review collected by and hosted on G2.com.

No Discussions for This Product Yet

Be the first to ask a question and get answers from real users and experts.

Start a discussion

Pricing Insights

Averages based on real user reviews.

Time to Implement

4 months

Return on Investment

21 months

Perceived Cost

$$$$$
AWS Vertrified Access Features
User provisioning
Password manager
Single Sign-on
On-premises solution
Cloud-solution
Tracking
Reporting
Access & Permission Change Reporting
Adaptive & Contextual Access Control
Product Avatar Image
AWS Vertrified Access
View Alternatives