Introducing G2.ai, the future of software buying.Try now
BeyondTrust Privileged Remote Access
Sponsored
BeyondTrust Privileged Remote Access
Visit Website
Product Avatar Image
Belden Horizon Console

By ProSoft Technology

Unclaimed Profile

Claim your company’s G2 profile

Claiming this profile confirms that you work at Belden Horizon Console and allows you to manage how it appears on G2.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Claim Now
5.0 out of 5 stars
4 star
0%
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with Belden Horizon Console?

BeyondTrust Privileged Remote Access
Sponsored
BeyondTrust Privileged Remote Access
Visit Website
It's been two months since this profile received a new review
Leave a Review

Belden Horizon Console Reviews & Product Details

Product Avatar Image

Have you used Belden Horizon Console before?

Answer a few questions to help the Belden Horizon Console community

Belden Horizon Console Reviews (1)

Reviews

Belden Horizon Console Reviews (1)

5.0
1 reviews

Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
MS
Security Analyst
Small-Business (50 or fewer emp.)
"Review on ProSoft Secure Remote Access"
What do you like best about Belden Horizon Console?

ProSoft Secure Remote Access is great because it offers strong security, is easy to use, and works reliably. People like how simple it is to connect securely to remote networks and manage access. It also works well with different devices, making it a flexible option for remote work. Review collected by and hosted on G2.com.

What do you dislike about Belden Horizon Console?

Some things people might dislike about ProSoft Secure Remote Access include occasional connection problems, a bit of a learning curve for new users, or that it may not have as many features as other remote access tools. Some users might also wish for faster support responses. Review collected by and hosted on G2.com.

There are not enough reviews of Belden Horizon Console for G2 to provide buying insight. Below are some alternatives with more reviews:

1
BeyondTrust Privileged Remote Access Logo
BeyondTrust Privileged Remote Access
4.5
(60)
Privileged Remote Access is a unified access solution. You can provide seamless, secure access to nearly any system, from anywhere via innovative egress techniques and a single administrative console.
2
MSP360 Connect Logo
MSP360 Connect
4.2
(52)
MSP360 Connect is a fast and secure remote access solution enabling remote support, helpdesk assistance, remote work, distance education, and more. It allows users to access and control Windows devices from any operating system at any time regardless of the computer’s global location.
3
Dispel Logo
Dispel
4.8
(13)
Dispel keeps your IP and communications safe through the world's first and only Privacy as a Service Platform.
4
Intel vPro Manageability Logo
Intel vPro Manageability
4.1
(13)
Intel AMT enables IT to remotely manage and repair PCs, workstations and entry servers, utilizing the same tools across platforms
5
TDi Technologies ConsoleWorks Logo
TDi Technologies ConsoleWorks
4.5
(2)
ConsoleWorks by TDi Technologies is an integrated IT/OT cybersecurity and operations platform designed for privileged access users. It offers a unified solution to enhance security, streamline operations, ensure compliance, and automate processes across diverse organizational environments. By providing a secure, single connection, ConsoleWorks manages all interactions between users and endpoint devices, creating a persistent security perimeter that continuously monitors, audits, and logs activities down to each keystroke. This comprehensive oversight supports regulatory compliance, cybersecurity best practices, and efficient IT/OT operations. Key Features and Functionality: - Secure Remote Access: Facilitates secure, browser-based connections to any device, ensuring streamlined access and control for privileged users. - Asset, Patch & Configuration Monitoring: Automates the collection of endpoint configurations and implements configuration change control, reducing security gaps from improper configurations. - Logging & Situational Awareness: Monitors applications, servers, virtual machines, networks, and storage devices in real-time, capturing and logging all activities to support compliance and operational efficiency. - Endpoint Password Management: Centralizes and automates password management, including scheduling automatic changes and setting reset date warnings to meet compliance standards. Primary Value and Problem Solved: ConsoleWorks addresses the critical need for secure and efficient management of IT and OT environments by providing a single platform that integrates security, operations, compliance, and automation. It mitigates risks associated with privileged access, ensures continuous monitoring and logging for compliance, and automates routine tasks to enhance productivity and reliability. By creating a persistent security perimeter and offering real-time situational awareness, ConsoleWorks helps organizations protect their assets, reduce operational disruptions, and maintain regulatory compliance.
6
Claroty Logo
Claroty
4.7
(6)
The Claroty Platform reveals 100% of OT, IoT, and IIoT assets on enterprise networks and protects them from vulnerabilities, emerging threats, malicious insiders, and unintentional errors. Its resilient threat detection model continually monitors the network for both known and unknown threats, automatically weeds out false positives, and gives clear direction on how to take action. This is all enriched by Claroty’s extensive ecosystem of third-party technical integrations, as well as the latest threat signatures and remediation guidance from the renowned Claroty Research Team.
7
SEPIO Logo
SEPIO
4.5
(1)
Founded in 2016 by cybersecurity industry veterans. Sepio's HAC-1 is the first hardware access control platform that provides visibility, control, and mitigation to zero trust, insider threat, BYOD, IT, OT and IoT security programs. Sepio's hardware fingerprinting technology discovers all managed, unmanaged, and hidden devices that are otherwise invisible to all other security tools. Sepio is a strategic partner of Munich Re, the world's largest reinsurance company, and Merlin Cyber, a leading cybersecurity federal solution provider. Interested in a live demo ? https://sepiocyber.com/schedule-a-demo/
8
Honeywell Forge Cybersecurity Cyber Insights Logo
Honeywell Forge Cybersecurity Cyber Insights
5.0
(1)
SCADAfence is the global technology leader in OT & IoT cybersecurity. SCADAfence offers a full suite of industrial cybersecurity products that provides full coverage of large-scale networks, offering best-in-class network monitoring, asset discovery, governance, remote access, and IoT device security. A Gartner “Cool Vendor” in 2020, SCADAfence delivers proactive security and visibility to some of the world's most complex OT networks, including the largest manufacturing facility in Europe. SCADAfence enables organizations in critical infrastructure, manufacturing, and building management industries to operate securely, reliably, and efficiently.
9
Cyolo Logo
Cyolo
3.0
(4)
Securely connecting any user from any device​. Trusted access to any system on any network and platform.
10
Secomea Logo
Secomea
4.2
(3)
ARCS is a ready-to-go software component for your Universal Robots, for alarm management and remote access via VNC.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Belden Horizon Console
View Alternatives