2026 Best Software Awards are here!See the list

Best Zero Trust Networking Software

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Zero trust networking software is a type of network security and identity management solution used to implement the zero trust security model. As opposed to traditional network security systems, which provide a castle-and-moat system for granting access into a network, the zero trust model assumes every individual, both internal and external, is a potential threat until they are verified.

Companies have adopted the zero trust security model since decentralized business models and IT systems have made it significantly more complicated to ensure proper access controls are in place across multiple networks and physical locations. Zero trust networking solutions allow companies to continuously monitor network activity and user behavior to adapt authentication requirements on an individual basis. Verified individuals behaving abnormally or attempting to violate their permissions will be prompted to provide further authentication. Data is collected from access points, behaviors, and traffic logs to provide in-depth network security analytics capabilities.

Zero trust networking software utilizes similar authentication methods as risk-based authentication software, but is specifically for network access control. Risk-based authentication is more broad and its methods can be applied to accessing a network, application, database, or any other privileged information.

To qualify for inclusion in the Zero Trust Networking category, a product must:

Utilize adaptive authentication to continuously verify user permissions
Allow for network segmentation to simplify and broaden policy enforcement
Monitor traffic and user behavior for future inspection and analysis
Show More
Show Less

Featured Zero Trust Networking Software At A Glance

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
150 Listings in Zero Trust Networking Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Zscaler Private Access (ZPA) is a cloud-based zero trust solution that securely connects users to private applications hosted in public clouds, data centers, or on-premises environments without relyin

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 46% Enterprise
    • 28% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Zscaler Private Access is a security tool that provides secure access to internal applications without using a traditional VPN.
    • Reviewers like the fast and reliable connection, the ease of use, and the enhanced security features that Zscaler Private Access offers.
    • Users mentioned that the initial setup can be complex and time-consuming, and troubleshooting issues can take longer than expected.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Zscaler Private Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    64
    Ease of Use
    53
    Secure Access
    49
    VPN Efficiency
    30
    Reliability
    25
    Cons
    Connection Issues
    24
    Error Handling
    21
    Slow Loading
    20
    Expensive
    18
    Slow Internet
    16
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Zscaler Private Access features and usability ratings that predict user satisfaction
    8.9
    Quality of Support
    Average: 8.9
    8.9
    Ease of Use
    Average: 8.9
    9.0
    Ease of Admin
    Average: 8.8
    9.2
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Zscaler
    Company Website
    Year Founded
    2008
    HQ Location
    San Jose, California
    Twitter
    @zscaler
    17,377 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    9,540 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Zscaler Private Access (ZPA) is a cloud-based zero trust solution that securely connects users to private applications hosted in public clouds, data centers, or on-premises environments without relyin

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 46% Enterprise
  • 28% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Zscaler Private Access is a security tool that provides secure access to internal applications without using a traditional VPN.
  • Reviewers like the fast and reliable connection, the ease of use, and the enhanced security features that Zscaler Private Access offers.
  • Users mentioned that the initial setup can be complex and time-consuming, and troubleshooting issues can take longer than expected.
Zscaler Private Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
64
Ease of Use
53
Secure Access
49
VPN Efficiency
30
Reliability
25
Cons
Connection Issues
24
Error Handling
21
Slow Loading
20
Expensive
18
Slow Internet
16
Zscaler Private Access features and usability ratings that predict user satisfaction
8.9
Quality of Support
Average: 8.9
8.9
Ease of Use
Average: 8.9
9.0
Ease of Admin
Average: 8.8
9.2
Application Security
Average: 8.9
Seller Details
Seller
Zscaler
Company Website
Year Founded
2008
HQ Location
San Jose, California
Twitter
@zscaler
17,377 Twitter followers
LinkedIn® Page
www.linkedin.com
9,540 employees on LinkedIn®
(495)4.5 out of 5
Optimized for quick response
4th Easiest To Use in Zero Trust Networking software
View top Consulting Services for Cisco Duo
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Duo stops identity-based threats and boosts workforce productivity. Our Continuous Identity Security solution provides the best access management experience across users, devices, and applications whi

    Users
    • Software Engineer
    • Consultant
    Industries
    • Information Technology and Services
    • Higher Education
    Market Segment
    • 41% Enterprise
    • 37% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cisco Duo Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    71
    Security
    67
    Authentication
    46
    Easy Access
    46
    Authentication Ease
    40
    Cons
    Authentication Issues
    24
    Login Issues
    16
    Complexity
    15
    Notification Issues
    15
    Delay Issues
    14
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco Duo features and usability ratings that predict user satisfaction
    8.9
    Quality of Support
    Average: 8.9
    9.3
    Ease of Use
    Average: 8.9
    9.3
    Ease of Admin
    Average: 8.8
    9.4
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Company Website
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    721,514 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,386 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Duo stops identity-based threats and boosts workforce productivity. Our Continuous Identity Security solution provides the best access management experience across users, devices, and applications whi

Users
  • Software Engineer
  • Consultant
Industries
  • Information Technology and Services
  • Higher Education
Market Segment
  • 41% Enterprise
  • 37% Mid-Market
Cisco Duo Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
71
Security
67
Authentication
46
Easy Access
46
Authentication Ease
40
Cons
Authentication Issues
24
Login Issues
16
Complexity
15
Notification Issues
15
Delay Issues
14
Cisco Duo features and usability ratings that predict user satisfaction
8.9
Quality of Support
Average: 8.9
9.3
Ease of Use
Average: 8.9
9.3
Ease of Admin
Average: 8.8
9.4
Application Security
Average: 8.9
Seller Details
Seller
Cisco
Company Website
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
721,514 Twitter followers
LinkedIn® Page
www.linkedin.com
95,386 employees on LinkedIn®
G2 Advertising
Sponsored
G2 Advertising
Get 2x conversion than Google Ads with G2 Advertising!
G2 Advertising places your product in premium positions on high-traffic pages and on targeted competitor pages to reach buyers at key comparison moments.
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ThreatLocker is a global leading Zero Trust Platform designed to empower organizations by providing them with the ability to control which applications are permitted to run on their networks. This sui

    Users
    • President
    • CEO
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 53% Small-Business
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ThreatLocker Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    92
    Threat Detection
    87
    Ease of Use
    75
    Security
    71
    Protection
    69
    Cons
    Learning Curve
    44
    Difficult Learning Curve
    30
    Difficult Configuration
    16
    Difficult Navigation
    14
    Training Required
    13
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatLocker Platform features and usability ratings that predict user satisfaction
    9.7
    Quality of Support
    Average: 8.9
    8.3
    Ease of Use
    Average: 8.9
    8.6
    Ease of Admin
    Average: 8.8
    8.1
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2017
    HQ Location
    Orlando, Florida, United States
    Twitter
    @ThreatLocker
    2,732 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    677 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ThreatLocker is a global leading Zero Trust Platform designed to empower organizations by providing them with the ability to control which applications are permitted to run on their networks. This sui

Users
  • President
  • CEO
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 53% Small-Business
  • 33% Mid-Market
ThreatLocker Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
92
Threat Detection
87
Ease of Use
75
Security
71
Protection
69
Cons
Learning Curve
44
Difficult Learning Curve
30
Difficult Configuration
16
Difficult Navigation
14
Training Required
13
ThreatLocker Platform features and usability ratings that predict user satisfaction
9.7
Quality of Support
Average: 8.9
8.3
Ease of Use
Average: 8.9
8.6
Ease of Admin
Average: 8.8
8.1
Application Security
Average: 8.9
Seller Details
Company Website
Year Founded
2017
HQ Location
Orlando, Florida, United States
Twitter
@ThreatLocker
2,732 Twitter followers
LinkedIn® Page
www.linkedin.com
677 employees on LinkedIn®
(1,166)4.5 out of 5
5th Easiest To Use in Zero Trust Networking software
View top Consulting Services for Okta
Entry Level Price:$6.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Okta, Inc. is The World’s Identity Company™. We secure AI, machine, and human identity so everyone is free to safely use any technology. Our customer and workforce solutions empower businesses and dev

    Users
    • Software Engineer
    • Account Executive
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 50% Mid-Market
    • 39% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Okta Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    207
    Security
    158
    Authentication Security
    153
    Single Sign-On
    143
    Easy Access
    140
    Cons
    Authentication Issues
    77
    Login Issues
    64
    Expensive
    46
    Complex Setup
    44
    Frequent Authentication
    39
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Okta features and usability ratings that predict user satisfaction
    8.9
    Quality of Support
    Average: 8.9
    9.3
    Ease of Use
    Average: 8.9
    9.1
    Ease of Admin
    Average: 8.8
    9.2
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Okta
    Company Website
    Year Founded
    2009
    HQ Location
    San Francisco, California
    Twitter
    @okta
    42,638 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,230 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Okta, Inc. is The World’s Identity Company™. We secure AI, machine, and human identity so everyone is free to safely use any technology. Our customer and workforce solutions empower businesses and dev

Users
  • Software Engineer
  • Account Executive
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 50% Mid-Market
  • 39% Enterprise
Okta Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
207
Security
158
Authentication Security
153
Single Sign-On
143
Easy Access
140
Cons
Authentication Issues
77
Login Issues
64
Expensive
46
Complex Setup
44
Frequent Authentication
39
Okta features and usability ratings that predict user satisfaction
8.9
Quality of Support
Average: 8.9
9.3
Ease of Use
Average: 8.9
9.1
Ease of Admin
Average: 8.8
9.2
Application Security
Average: 8.9
Seller Details
Seller
Okta
Company Website
Year Founded
2009
HQ Location
San Francisco, California
Twitter
@okta
42,638 Twitter followers
LinkedIn® Page
www.linkedin.com
7,230 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    What is Palo Alto Networks IoT/OT Security? Palo Alto Networks IoT/OT Security is a comprehensive solution delivering ML-powered visibility, prevention, and zero-trust enforcement in a single platf

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 35% Mid-Market
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Palo Alto Networks IoT/OT Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Threat Protection
    32
    Security
    29
    Ease of Use
    21
    Features
    21
    Monitoring
    18
    Cons
    Expensive
    27
    Complex Setup
    16
    Difficult Learning Curve
    16
    Difficult Configuration
    10
    Required Expertise
    9
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Palo Alto Networks IoT/OT Security features and usability ratings that predict user satisfaction
    8.3
    Quality of Support
    Average: 8.9
    8.2
    Ease of Use
    Average: 8.9
    8.5
    Ease of Admin
    Average: 8.8
    9.0
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    128,238 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    18,396 employees on LinkedIn®
    Ownership
    NYSE: PANW
Product Description
How are these determined?Information
This description is provided by the seller.

What is Palo Alto Networks IoT/OT Security? Palo Alto Networks IoT/OT Security is a comprehensive solution delivering ML-powered visibility, prevention, and zero-trust enforcement in a single platf

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 35% Mid-Market
  • 33% Small-Business
Palo Alto Networks IoT/OT Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Threat Protection
32
Security
29
Ease of Use
21
Features
21
Monitoring
18
Cons
Expensive
27
Complex Setup
16
Difficult Learning Curve
16
Difficult Configuration
10
Required Expertise
9
Palo Alto Networks IoT/OT Security features and usability ratings that predict user satisfaction
8.3
Quality of Support
Average: 8.9
8.2
Ease of Use
Average: 8.9
8.5
Ease of Admin
Average: 8.8
9.0
Application Security
Average: 8.9
Seller Details
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
128,238 Twitter followers
LinkedIn® Page
www.linkedin.com
18,396 employees on LinkedIn®
Ownership
NYSE: PANW
(271)4.4 out of 5
13th Easiest To Use in Zero Trust Networking software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Integrated endpoint protection that provides automated next-generation threat protection, as well as visibility and control of your software and hardware inventory across the entire security fabric. I

    Users
    • Software Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 58% Mid-Market
    • 26% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • FortiClient Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    40
    Security
    38
    VPN Efficiency
    31
    Connectivity
    25
    Reliability
    24
    Cons
    Unstable Connection
    21
    Slow Performance
    20
    Connection Issues
    19
    Remote Access Issues
    16
    Update Issues
    13
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FortiClient features and usability ratings that predict user satisfaction
    8.7
    Quality of Support
    Average: 8.9
    9.0
    Ease of Use
    Average: 8.9
    9.0
    Ease of Admin
    Average: 8.8
    9.3
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortinet
    Year Founded
    2000
    HQ Location
    Sunnyvale, CA
    Twitter
    @Fortinet
    151,547 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    15,801 employees on LinkedIn®
    Ownership
    NASDAQ: FTNT
Product Description
How are these determined?Information
This description is provided by the seller.

Integrated endpoint protection that provides automated next-generation threat protection, as well as visibility and control of your software and hardware inventory across the entire security fabric. I

Users
  • Software Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 58% Mid-Market
  • 26% Enterprise
FortiClient Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
40
Security
38
VPN Efficiency
31
Connectivity
25
Reliability
24
Cons
Unstable Connection
21
Slow Performance
20
Connection Issues
19
Remote Access Issues
16
Update Issues
13
FortiClient features and usability ratings that predict user satisfaction
8.7
Quality of Support
Average: 8.9
9.0
Ease of Use
Average: 8.9
9.0
Ease of Admin
Average: 8.8
9.3
Application Security
Average: 8.9
Seller Details
Seller
Fortinet
Year Founded
2000
HQ Location
Sunnyvale, CA
Twitter
@Fortinet
151,547 Twitter followers
LinkedIn® Page
www.linkedin.com
15,801 employees on LinkedIn®
Ownership
NASDAQ: FTNT
(162)4.7 out of 5
3rd Easiest To Use in Zero Trust Networking software
Entry Level Price:Starting at $7.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    GoodAccess is a cybersecurity platform (SASE/SSE) that empowers medium-sized enterprises to easily implement Zero Trust Architecture (ZTA) in their infrastructure, regardless of its complexity or scal

    Users
    • CTO
    • CEO
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 77% Small-Business
    • 23% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • GoodAccess is a VPN solution that provides secure remote access and network security for businesses.
    • Reviewers like the simplicity of use, secure remote access, dependable network security, easy traffic monitoring, access control management, user onboarding, and the zero-trust security model that guarantees data safety.
    • Reviewers mentioned that new users may find the initial setup and configuration complicated, there is room for improvement in the documentation of some advanced settings, and the client sometimes disconnects requiring re-authentication.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • GoodAccess Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    79
    VPN Services
    47
    Reliability
    46
    Customer Support
    41
    Easy Setup
    34
    Cons
    Expensive
    23
    Connection Issues
    16
    Access Issues
    8
    Limited Location Options
    8
    Connectivity Issues
    7
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • GoodAccess features and usability ratings that predict user satisfaction
    9.3
    Quality of Support
    Average: 8.9
    9.5
    Ease of Use
    Average: 8.9
    9.4
    Ease of Admin
    Average: 8.8
    8.8
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2009
    HQ Location
    Usti nad Labem, Czech Republic, Europe
    LinkedIn® Page
    www.linkedin.com
    25 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

GoodAccess is a cybersecurity platform (SASE/SSE) that empowers medium-sized enterprises to easily implement Zero Trust Architecture (ZTA) in their infrastructure, regardless of its complexity or scal

Users
  • CTO
  • CEO
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 77% Small-Business
  • 23% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • GoodAccess is a VPN solution that provides secure remote access and network security for businesses.
  • Reviewers like the simplicity of use, secure remote access, dependable network security, easy traffic monitoring, access control management, user onboarding, and the zero-trust security model that guarantees data safety.
  • Reviewers mentioned that new users may find the initial setup and configuration complicated, there is room for improvement in the documentation of some advanced settings, and the client sometimes disconnects requiring re-authentication.
GoodAccess Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
79
VPN Services
47
Reliability
46
Customer Support
41
Easy Setup
34
Cons
Expensive
23
Connection Issues
16
Access Issues
8
Limited Location Options
8
Connectivity Issues
7
GoodAccess features and usability ratings that predict user satisfaction
9.3
Quality of Support
Average: 8.9
9.5
Ease of Use
Average: 8.9
9.4
Ease of Admin
Average: 8.8
8.8
Application Security
Average: 8.9
Seller Details
Company Website
Year Founded
2009
HQ Location
Usti nad Labem, Czech Republic, Europe
LinkedIn® Page
www.linkedin.com
25 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    FortiSASE is a cloud-delivered Secure Access Service Edge (SASE) solution designed to provide secure and seamless access to the internet, cloud services, and private applications for remote users. By

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 56% Mid-Market
    • 28% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • FortiSASE Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    5
    Threat Protection
    5
    Ease of Use
    3
    Secure Access
    3
    App Integration
    2
    Cons
    Difficult Learning Curve
    2
    Difficult Setup
    2
    Expensive
    2
    Complex Implementation
    1
    Complex Setup
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FortiSASE features and usability ratings that predict user satisfaction
    8.7
    Quality of Support
    Average: 8.9
    8.5
    Ease of Use
    Average: 8.9
    9.2
    Ease of Admin
    Average: 8.8
    8.7
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortinet
    Year Founded
    2000
    HQ Location
    Sunnyvale, CA
    Twitter
    @Fortinet
    151,547 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    15,801 employees on LinkedIn®
    Ownership
    NASDAQ: FTNT
Product Description
How are these determined?Information
This description is provided by the seller.

FortiSASE is a cloud-delivered Secure Access Service Edge (SASE) solution designed to provide secure and seamless access to the internet, cloud services, and private applications for remote users. By

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 56% Mid-Market
  • 28% Enterprise
FortiSASE Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
5
Threat Protection
5
Ease of Use
3
Secure Access
3
App Integration
2
Cons
Difficult Learning Curve
2
Difficult Setup
2
Expensive
2
Complex Implementation
1
Complex Setup
1
FortiSASE features and usability ratings that predict user satisfaction
8.7
Quality of Support
Average: 8.9
8.5
Ease of Use
Average: 8.9
9.2
Ease of Admin
Average: 8.8
8.7
Application Security
Average: 8.9
Seller Details
Seller
Fortinet
Year Founded
2000
HQ Location
Sunnyvale, CA
Twitter
@Fortinet
151,547 Twitter followers
LinkedIn® Page
www.linkedin.com
15,801 employees on LinkedIn®
Ownership
NASDAQ: FTNT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Netskope is the leader in cloud security — we help the world’s largest organizations take advantage of cloud and web without sacrificing security. Our Cloud XD™ technology targets and controls activit

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 60% Enterprise
    • 31% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Netskope One Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    7
    Security
    6
    Visibility
    5
    Easy Integrations
    4
    Efficiency
    4
    Cons
    Complex Configuration
    5
    Complex Implementation
    4
    Complexity
    3
    Difficult Learning
    3
    Difficult Learning Curve
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Netskope One Platform features and usability ratings that predict user satisfaction
    8.5
    Quality of Support
    Average: 8.9
    8.5
    Ease of Use
    Average: 8.9
    9.0
    Ease of Admin
    Average: 8.8
    8.6
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Netskope
    Year Founded
    2012
    HQ Location
    Santa Clara, CA
    Twitter
    @Netskope
    11,282 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,131 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Netskope is the leader in cloud security — we help the world’s largest organizations take advantage of cloud and web without sacrificing security. Our Cloud XD™ technology targets and controls activit

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 60% Enterprise
  • 31% Mid-Market
Netskope One Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
7
Security
6
Visibility
5
Easy Integrations
4
Efficiency
4
Cons
Complex Configuration
5
Complex Implementation
4
Complexity
3
Difficult Learning
3
Difficult Learning Curve
3
Netskope One Platform features and usability ratings that predict user satisfaction
8.5
Quality of Support
Average: 8.9
8.5
Ease of Use
Average: 8.9
9.0
Ease of Admin
Average: 8.8
8.6
Application Security
Average: 8.9
Seller Details
Seller
Netskope
Year Founded
2012
HQ Location
Santa Clara, CA
Twitter
@Netskope
11,282 Twitter followers
LinkedIn® Page
www.linkedin.com
3,131 employees on LinkedIn®
(225)4.7 out of 5
Optimized for quick response
10th Easiest To Use in Zero Trust Networking software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Absolute Secure Access (formerly NetMotion by Absolute) is one of the company’s core product lines, which was added through the acquisition of NetMotion in July 2021. The product portfolio provides re

    Users
    • IT Director
    • System Administrator
    Industries
    • Law Enforcement
    • Government Administration
    Market Segment
    • 62% Mid-Market
    • 25% Enterprise
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Absolute is a VPN service that offers persistent connectivity, allowing users to switch between different networks without losing their connection.
    • Reviewers frequently mention the product's intelligent VPN connectivity, its ability to optimize network traffic for improved performance, and its comprehensive Insight tool for understanding client workflow.
    • Users reported that the initial setup and policy configuration can be complex, the user interface of the management console can feel outdated, and the licensing model can become complex depending on the specific features and scale of deployment.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Absolute Secure Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    10
    Connectivity Stability
    7
    Secure Access
    7
    VPN Efficiency
    7
    Security
    6
    Cons
    Access Issues
    3
    Complex Configuration
    3
    Complex Implementation
    3
    Expensive
    3
    Integration Issues
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Absolute Secure Access features and usability ratings that predict user satisfaction
    9.3
    Quality of Support
    Average: 8.9
    9.1
    Ease of Use
    Average: 8.9
    8.7
    Ease of Admin
    Average: 8.8
    9.0
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1993
    HQ Location
    British Columbia, Canada
    Twitter
    @absolutecorp
    3,916 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,239 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Absolute Secure Access (formerly NetMotion by Absolute) is one of the company’s core product lines, which was added through the acquisition of NetMotion in July 2021. The product portfolio provides re

Users
  • IT Director
  • System Administrator
Industries
  • Law Enforcement
  • Government Administration
Market Segment
  • 62% Mid-Market
  • 25% Enterprise
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Absolute is a VPN service that offers persistent connectivity, allowing users to switch between different networks without losing their connection.
  • Reviewers frequently mention the product's intelligent VPN connectivity, its ability to optimize network traffic for improved performance, and its comprehensive Insight tool for understanding client workflow.
  • Users reported that the initial setup and policy configuration can be complex, the user interface of the management console can feel outdated, and the licensing model can become complex depending on the specific features and scale of deployment.
Absolute Secure Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
10
Connectivity Stability
7
Secure Access
7
VPN Efficiency
7
Security
6
Cons
Access Issues
3
Complex Configuration
3
Complex Implementation
3
Expensive
3
Integration Issues
3
Absolute Secure Access features and usability ratings that predict user satisfaction
9.3
Quality of Support
Average: 8.9
9.1
Ease of Use
Average: 8.9
8.7
Ease of Admin
Average: 8.8
9.0
Application Security
Average: 8.9
Seller Details
Company Website
Year Founded
1993
HQ Location
British Columbia, Canada
Twitter
@absolutecorp
3,916 Twitter followers
LinkedIn® Page
www.linkedin.com
1,239 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cloudflare One is a single-vendor secure access service edge (SASE) platform that converges security and networking services into a unified, global connectivity cloud. It replaces legacy, fragmented h

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 37% Small-Business
    • 34% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cloudflare One (SASE) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    8
    Protection
    7
    Reliability
    7
    Security
    7
    User Interface
    6
    Cons
    Steep Learning Curve
    5
    Complexity
    4
    Difficult Learning
    4
    Difficult Learning Curve
    4
    Difficult Setup
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cloudflare One (SASE) features and usability ratings that predict user satisfaction
    9.2
    Quality of Support
    Average: 8.9
    9.1
    Ease of Use
    Average: 8.9
    9.1
    Ease of Admin
    Average: 8.8
    9.0
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2009
    HQ Location
    San Francisco, California
    Twitter
    @Cloudflare
    270,535 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    6,320 employees on LinkedIn®
    Ownership
    NYSE: NET
Product Description
How are these determined?Information
This description is provided by the seller.

Cloudflare One is a single-vendor secure access service edge (SASE) platform that converges security and networking services into a unified, global connectivity cloud. It replaces legacy, fragmented h

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 37% Small-Business
  • 34% Mid-Market
Cloudflare One (SASE) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
8
Protection
7
Reliability
7
Security
7
User Interface
6
Cons
Steep Learning Curve
5
Complexity
4
Difficult Learning
4
Difficult Learning Curve
4
Difficult Setup
4
Cloudflare One (SASE) features and usability ratings that predict user satisfaction
9.2
Quality of Support
Average: 8.9
9.1
Ease of Use
Average: 8.9
9.1
Ease of Admin
Average: 8.8
9.0
Application Security
Average: 8.9
Seller Details
Year Founded
2009
HQ Location
San Francisco, California
Twitter
@Cloudflare
270,535 Twitter followers
LinkedIn® Page
www.linkedin.com
6,320 employees on LinkedIn®
Ownership
NYSE: NET
(82)4.5 out of 5
Optimized for quick response
11th Easiest To Use in Zero Trust Networking software
View top Consulting Services for Cato SASE Cloud
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cato provides the world’s leading single-vendor SASE platform. Cato creates a seamless and elegant customer experience that effortlessly enables threat prevention, data protection, and timely incident

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 56% Mid-Market
    • 23% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cato SASE Cloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    5
    Customer Support
    4
    Reliability
    4
    Threat Protection
    4
    Deployment Ease
    3
    Cons
    Limited Features
    3
    Connection Issues
    2
    Expensive
    2
    Compatibility Issues
    1
    Expensive Licensing
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cato SASE Cloud features and usability ratings that predict user satisfaction
    8.9
    Quality of Support
    Average: 8.9
    9.1
    Ease of Use
    Average: 8.9
    8.9
    Ease of Admin
    Average: 8.8
    9.3
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2015
    HQ Location
    Tel-Aviv, Israel
    Twitter
    @CatoNetworks
    12,686 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,479 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cato provides the world’s leading single-vendor SASE platform. Cato creates a seamless and elegant customer experience that effortlessly enables threat prevention, data protection, and timely incident

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 56% Mid-Market
  • 23% Enterprise
Cato SASE Cloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
5
Customer Support
4
Reliability
4
Threat Protection
4
Deployment Ease
3
Cons
Limited Features
3
Connection Issues
2
Expensive
2
Compatibility Issues
1
Expensive Licensing
1
Cato SASE Cloud features and usability ratings that predict user satisfaction
8.9
Quality of Support
Average: 8.9
9.1
Ease of Use
Average: 8.9
8.9
Ease of Admin
Average: 8.8
9.3
Application Security
Average: 8.9
Seller Details
Company Website
Year Founded
2015
HQ Location
Tel-Aviv, Israel
Twitter
@CatoNetworks
12,686 Twitter followers
LinkedIn® Page
www.linkedin.com
1,479 employees on LinkedIn®
(45)4.5 out of 5
9th Easiest To Use in Zero Trust Networking software
View top Consulting Services for Palo Alto Networks Panorama
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Panorama network security management provides static rules and dynamic security updates in an ever-changing threat landscape. Reduce administrator workload and improve your overall security posture wi

    Users
    • Network Engineer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 53% Enterprise
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Palo Alto Networks Panorama Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Centralized Management
    2
    Features
    2
    Ease of Use
    1
    Security
    1
    User Interface
    1
    Cons
    Complex Setup
    1
    Difficult Learning Curve
    1
    Expensive
    1
    Poor Customer Support
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Palo Alto Networks Panorama features and usability ratings that predict user satisfaction
    8.5
    Quality of Support
    Average: 8.9
    8.8
    Ease of Use
    Average: 8.9
    9.0
    Ease of Admin
    Average: 8.8
    8.8
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    128,238 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    18,396 employees on LinkedIn®
    Ownership
    NYSE: PANW
Product Description
How are these determined?Information
This description is provided by the seller.

Panorama network security management provides static rules and dynamic security updates in an ever-changing threat landscape. Reduce administrator workload and improve your overall security posture wi

Users
  • Network Engineer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 53% Enterprise
  • 40% Mid-Market
Palo Alto Networks Panorama Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Centralized Management
2
Features
2
Ease of Use
1
Security
1
User Interface
1
Cons
Complex Setup
1
Difficult Learning Curve
1
Expensive
1
Poor Customer Support
1
Palo Alto Networks Panorama features and usability ratings that predict user satisfaction
8.5
Quality of Support
Average: 8.9
8.8
Ease of Use
Average: 8.9
9.0
Ease of Admin
Average: 8.8
8.8
Application Security
Average: 8.9
Seller Details
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
128,238 Twitter followers
LinkedIn® Page
www.linkedin.com
18,396 employees on LinkedIn®
Ownership
NYSE: PANW
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

     Illumio Zero Trust Segmentation is the first platform for breach containment. Visualize all communication between workloads and devices, set granular segmentation policies to control communications,

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 48% Enterprise
    • 35% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Illumio Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    9
    Security
    5
    Centralized Management
    3
    Implementation Ease
    3
    Installation Ease
    3
    Cons
    Difficult Learning Curve
    2
    Integration Issues
    2
    Compatibility Issues
    1
    Difficult Learning
    1
    Expensive
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Illumio features and usability ratings that predict user satisfaction
    9.4
    Quality of Support
    Average: 8.9
    9.2
    Ease of Use
    Average: 8.9
    9.4
    Ease of Admin
    Average: 8.8
    8.3
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Illumio
    Company Website
    Year Founded
    2013
    HQ Location
    Sunnyvale, California
    Twitter
    @illumio
    3,413 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    854 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

 Illumio Zero Trust Segmentation is the first platform for breach containment. Visualize all communication between workloads and devices, set granular segmentation policies to control communications,

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 48% Enterprise
  • 35% Mid-Market
Illumio Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
9
Security
5
Centralized Management
3
Implementation Ease
3
Installation Ease
3
Cons
Difficult Learning Curve
2
Integration Issues
2
Compatibility Issues
1
Difficult Learning
1
Expensive
1
Illumio features and usability ratings that predict user satisfaction
9.4
Quality of Support
Average: 8.9
9.2
Ease of Use
Average: 8.9
9.4
Ease of Admin
Average: 8.8
8.3
Application Security
Average: 8.9
Seller Details
Seller
Illumio
Company Website
Year Founded
2013
HQ Location
Sunnyvale, California
Twitter
@illumio
3,413 Twitter followers
LinkedIn® Page
www.linkedin.com
854 employees on LinkedIn®
(34)4.8 out of 5
7th Easiest To Use in Zero Trust Networking software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Appgate SDP is a leading Zero Trust Network Access solution that simplifies and strengthens access controls for all users, devices, and workloads. We deliver secure access for complex and hybrid enter

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 53% Enterprise
    • 32% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Appgate SDP Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    10
    Customer Support
    7
    Ease of Use
    6
    Network Security
    6
    Reliability
    6
    Cons
    Performance Issues
    6
    Complex Setup
    4
    Connection Issues
    2
    Connectivity Issues
    2
    Difficult Configuration
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Appgate SDP features and usability ratings that predict user satisfaction
    9.2
    Quality of Support
    Average: 8.9
    9.4
    Ease of Use
    Average: 8.9
    9.5
    Ease of Admin
    Average: 8.8
    9.6
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Appgate
    Year Founded
    2020
    HQ Location
    Coral Gables, US
    Twitter
    @AppgateSecurity
    1,156 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    377 employees on LinkedIn®
    Ownership
    OTC: APGT
Product Description
How are these determined?Information
This description is provided by the seller.

Appgate SDP is a leading Zero Trust Network Access solution that simplifies and strengthens access controls for all users, devices, and workloads. We deliver secure access for complex and hybrid enter

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 53% Enterprise
  • 32% Mid-Market
Appgate SDP Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
10
Customer Support
7
Ease of Use
6
Network Security
6
Reliability
6
Cons
Performance Issues
6
Complex Setup
4
Connection Issues
2
Connectivity Issues
2
Difficult Configuration
2
Appgate SDP features and usability ratings that predict user satisfaction
9.2
Quality of Support
Average: 8.9
9.4
Ease of Use
Average: 8.9
9.5
Ease of Admin
Average: 8.8
9.6
Application Security
Average: 8.9
Seller Details
Seller
Appgate
Year Founded
2020
HQ Location
Coral Gables, US
Twitter
@AppgateSecurity
1,156 Twitter followers
LinkedIn® Page
www.linkedin.com
377 employees on LinkedIn®
Ownership
OTC: APGT

Learn More About Zero Trust Networking Software

Zero Trust Networking Software Buying Insights at a Glance

Zero trust networking software enforces the principle of "never trust, always verify" by authenticating every access request, limiting lateral movement, and maintaining granular control over network resources. Instead of treating network perimeters as secure boundaries, these platforms assume breach and verify each connection attempt, whether from users, devices, or applications, before granting access. The result is a security architecture that feels more like continuous authentication and less like traditional perimeter defense.

Zero trust networking software has become central to modern cybersecurity strategies. Security teams rely on these platforms to implement application whitelisting, control network access without VPNs, enforce least-privilege policies, and maintain visibility across endpoints. In practice, the best zero trust networking software acts as the connective layer between identity management, endpoint security, and network access control workflows.

Based on G2 review data, users rate zero trust networking software strongly overall. Zero trust network products in the category have an average star rating of 4.60/5 and an average likelihood to recommend of 9.20/10. Ease-of-use metrics trend high across the category, with 6.32/7 for Ease of Use, 6.27/7 for Ease of Setup, and 6.38/7 for Quality of Support. These scores suggest that most security teams are able to adopt zero trust software relatively quickly once policies are configured.

The biggest buying pattern that appears across reviews is that teams evaluating zero trust network solutions are trying to balance two priorities at once: implementing comprehensive security controls and maintaining operational efficiency. Strong platforms typically succeed by combining application control, network segmentation, and user-friendly policy management that reduces manual oversight.

Common use cases include endpoint protection through application allow listing that blocks unauthorized software execution, secure remote access enabling users to connect to resources without traditional VPNs, lateral movement prevention restricting network traffic between systems, privilege management controlling admin rights and elevation requests, threat detection identifying malicious activity before execution, and compliance enforcement maintaining audit trails and access controls. Finance teams also rely on these platforms for DNS filtering, conditional access policies tied to device posture, and microsegmentation that isolates critical assets from the broader network.

Pricing for zero trust network companies usually scales with the number of protected endpoints, the number of enabled feature modules, managed detection and response services, and integration complexity. Entry-level plans typically start with basic application control and network filtering, while enterprise zero trust networking software offers advanced threat prevention, 24/7 SOC support, and zero trust network access (ZTNA) capabilities.

Top 5 FAQs from zero trust networking software buyers

  • How do zero trust networking solutions balance security controls with user productivity?
  • What deployment models do zero trust platforms support for hybrid and remote workforces?
  • How well do zero trust network security tools integrate with existing identity and endpoint management systems?
  • What level of visibility and reporting do zero trust providers offer for compliance auditing?
  • How do zero trust software platforms handle legacy applications that can't support modern authentication?

G2's top-rated zero trust networking software, based on verified reviews, includes Zscaler Private Access, Palo Alto Networks IoT/OT Security, Okta, ThreatLocker Platform, and Cisco Duo.

What are the top-reviewed budgeting and forecasting software on G2?

Zscaler Private Access

  • Number of Reviews: 85
  • Satisfaction: 96
  • Market Presence: 97
  • G2 Score: 96

Palo Alto Networks IoT/OT Security

  • Number of Reviews: 62
  • Satisfaction: 91
  • Market Presence: 82
  • G2 Score: 86

Okta

  • Number of Reviews: 186
  • Satisfaction: 72
  • Market Presence: 91
  • G2 Score: 81

ThreatLocker Platform

  • Number of Reviews: 89
  • Satisfaction: 97
  • Market Presence: 60
  • G2 Score: 79

Cisco Duo

  • Number of Reviews: 44
  • Satisfaction: 68
  • Market Presence: 69
  • G2 Score: 69

Satisfaction reflects how users rate their experience with the product based on review signals such as usability, support, and likelihood to recommend. (Source 2)

Market Presence represents a product's market footprint based on company size, user adoption, and product growth indicators. (Source 2)

G2 Score combines Satisfaction and Market Presence to create a category-level ranking that enables direct product comparison. (Source 2)

Learn more about how G2 calculates these scores. (Source 1)

What I Often See in Zero Trust Networking Software

Pros: What I See Users Consistently Appreciating

  • Zero trust architecture prevents unauthorized application execution through default-deny policies

“I like the application control aspect of ThreatLocker Platform and the fact that it uses a Zero Trust method to prevent unknown execution or installation of software. With the application control, I get a wealth of information about what application is trying to run, where it’s running from, and what the application can do, such as talk to the internet or access other files. The zero trust method gives me full control, ensuring no application will run in my environment unless I approve of it first. I would say the initial setup, based on learning through their University, is pretty seamless, and ThreatLocker has an amazing team that helps make the process easier.” - Dino L., ThreatLocker Platform Review

  • Secure network access eliminating traditional VPN dependencies for remote users

“I appreciate how Zscaler Private Access secures remote connectivity for our hybrid workforce without the need for traditional VPNs, enabling safe access to internal applications from any location. I am impressed by the product's ability to noticeably reduce latency and enhance the overall user experience, all while upholding a robust security posture and compliance standards. Setting it up has been straightforward for me, thanks to the clear documentation and the support of an active community. 

I also value how users can connect directly to the specific applications they require, without exposing the entire network. The solution is lightweight and fast, removing the hassle of managing VPNs and their often sluggish tunnels. The admin console offers excellent visibility, and integration with identity providers like Azure is seamless. I find the cost of Zscaler Private Access to be reasonable and attractive, particularly for enterprises, and I appreciate its recognition as a market leader.” - Ritik S., Zscaler Private Access Review

  • Application whitelisting stops malware before it runs on endpoints

“I really like the strict application control and the ease of managing the ThreatLocker Platform. It ensures that only authorized applications can run, and the interface makes managing the application whitelist straightforward. The platform provides a solid and secure operation. Additionally, discovery and policy enforcement were easy, allowing for a quick standard of service.” - Mark A., ThreatLocker Platform Review

Cons: Where I See Many Platforms Falling Short

  • Complex policy configuration requiring extensive planning during initial deployment

“The initial setup and implementation can be a bit complex and time-consuming, especially for first-time users. Sometimes troubleshooting issues takes longer than expected. Also, the pricing feels on the higher side and some advanced features require additional configuration knowledge. Improving documentation and simplifying setup would make it easier for new teams.” - Deepak S., Zscaler Private Access Review

  • Steep learning curve navigating advanced features across multiple security modules

“While the core functionality is strong, the initial learning curve for configuring risk-based policies and understanding the ML-driven device classification can be a bit steep, especially for teams new to OT environments. Additionally, the product documentation could be more detailed regarding troubleshooting advanced detection scenarios. Pricing can also become a concern for smaller organizations with hybrid networks, particularly when scaling to multiple remote sites or factories.” - Verified User in Information Technology and Services, Palo Alto Networks IoT/OT Security Review

My Expert Takeaway on Zero Trust Networking Software in 2026

Review data suggests that zero trust networking software performs particularly well in areas that tend to drive long-term product adoption. The category averages 4.60 out of 5 stars, paired with a 9.20 out of 10 likelihood-to-recommend score, which indicates that most security teams see meaningful value from these platforms once they become part of the security workflow.

Where I see the biggest difference between average and high-performing security teams is how they use these tools beyond basic endpoint protection. The most successful teams treat zero trust software as a comprehensive security framework, not just as an application blocker. They actively leverage network control features, implement conditional access policies based on device posture, and use unified audit capabilities to track threats across their environment. That approach helps maintain stronger security postures and reduces time-to-detection when incidents occur.

I also notice stronger adoption patterns in industries where security threats are particularly intense, such as information technology services, computer and network security, healthcare, and financial services. In those environments, security teams often need to protect against sophisticated attacks while maintaining user productivity. Zero trust networking systems make it easier to enforce strict controls without losing visibility into endpoint activity.

Another clear trend in the data is that ease of deployment and support strongly influence adoption. Products with the highest recommendation scores tend to combine powerful security capabilities with learning modes that allow gradual rollout across organizations. Metrics like Ease of Setup (6.27/7) and Quality of Support (6.38/7) reinforce the idea that most teams can implement these platforms without significant operational friction, especially when vendors provide proactive engineering support.

If I were advising a team evaluating the best zero trust networking software, I would focus on three things early in the buying process: how easily security teams can configure policies without disrupting legitimate workflows, how effectively the platform provides visibility into blocked threats and access attempts, and how well it integrates with existing identity and endpoint management tools. The tools that perform best in those areas usually become foundational infrastructure for modern security operations.

Zero Trust Networking Software FAQs

What are the best zero trust network security tools?

Zero trust network security requires comprehensive controls that combine identity verification, application control, and network segmentation. Top-rated zero trust network tools on G2 include:

  • Zscaler Private Access: Cloud-native ZTNA platform for secure application access without VPNs.
  • Palo Alto Networks IoT/OT Security: Advanced threat prevention and network security for enterprise environments.
  • Okta: Identity-centric zero trust with adaptive authentication and access management.
  • ThreatLocker Platform: Application allowlisting and endpoint protection with zero trust principles.
  • Cisco Duo: Multi-factor authentication and device trust for secure access control.

Which zero trust providers offer the strongest enterprise cybersecurity features?

Enterprise teams need platforms that support large deployments, advanced policies, and centralized management. Top enterprise zero trust networking software options on G2 include:

  • Zscaler Private Access: Cloud-native ZTNA platform designed for enterprise-scale secure access.
  • ThreatLocker Platform: Enterprise-ready zero trust with application control and network segmentation.
  • Cisco Duo: Widely deployed multi-factor authentication and zero trust access for enterprises.
  • Okta: Identity-centric zero trust with enterprise SSO and adaptive authentication.
  • Prisma Access: Comprehensive SASE platform with zero trust network access for large organizations.

What are the top zero trust network solutions for small businesses?

Small businesses typically need affordable, easy-to-deploy solutions with strong security fundamentals. Top small business zero trust network options on G2 include:

  • ThreatLocker Platform: Accessible zero trust security with manageable deployment for small teams.
  • Todyl Security Platform: All-in-one security platform designed for small to mid-sized businesses.
  • Cisco Duo: Simple multi-factor authentication and device trust for small organizations.
  • Check Point SASE: Scalable SASE solution starting with small deployments.
  • GoodAccess: Zero trust network access built for smaller organizations and distributed teams.

Which zero trust product should we use for network security?

Network safety requires internal segmentation, access controls, and threat detection. Best products on G2 include:

What zero trust solution is best for securing office networks?

Office network security requires endpoint protection, internal segmentation, and access controls. Best solutions on G2 include:

  • ThreatLocker Platform: Office endpoint and network security with application control.
  • Cisco Duo: Secure access to office resources with multi-factor authentication.
  • Check Point SASE: Office network security with zero trust segmentation.
  • FortiClient: Comprehensive endpoint and network security for office environments.
  • Zscaler Private Access: Secure access to office applications without traditional VPNs.

What's the best zero trust platform for cloud services and SaaS environments?

Cloud-first zero trust requires seamless integration with SaaS applications and remote access capabilities. Best platforms on G2 include:

  • Zscaler Private Access: Purpose-built for cloud services with zero trust network access.
  • Cisco Duo: Strong SaaS integration for secure authentication and device trust.
  • Check Point SASE: Cloud-delivered SASE with zero trust for distributed environments.
  • ThreatLocker Platform: Supports cloud deployment with application and network control.
  • FortiClient: Integrates zero trust access with cloud-based security services.

Which zero trust solution is best for securing remote access without VPNs?

Zero Trust Network Access (ZTNA) eliminates VPN complexity while maintaining secure connections. Best tools on G2 include:

  • Zscaler Private Access: Leading ZTNA platform for VPN-less secure access to applications.
  • ThreatLocker Platform: Network control features enabling secure access without traditional VPNs.
  • Check Point SASE: SASE platform with integrated ZTNA for remote workforce access.
  • Cisco Duo: Secure access gateway offering a VPN alternative with zero-trust principles.
  • Kitecyber: Zero trust network access for remote users without VPN infrastructure.

Sources

  1. G2 Research Scoring Methodologies
  2. G2 Market Presence Score Overview


Researched By: Brandon Summers-Miller

Last updated on: March 15, 2026