Show rating breakdown
Save to My Lists
Claimed
Claimed

Top Rated Enclave Alternatives

Enclave Reviews & Product Details

Enclave Overview

What is Enclave?

Enclave is a modern network segmentation platform that combines – access control, asset inventory, encryption and zero trust network access – to create a breakthrough microsegmentation solution that prioritizes both IT and cybersecurity’s highest level needs. Enclave is purpose-built to simultaneously secure and segment your networks. Limit the damage a bad actor can do by decreasing the digital square footage they can explore. Easily implement access controls for employees, support staff, and third party vendors while never disrupting current operations.

Enclave Details
Languages Supported
English
Show LessShow More
Product Description

Enclave is a modern network segmentation platform that combines – access control, asset inventory, encryption and zero trust network access – to create a breakthrough microsegmentation solution that prioritizes both IT and cybersecurity’s highest level needs. Enclave is purpose-built to simultaneously secure and segment your networks. Limit the damage a bad actor can do by decreasing the digital square footage they can explore. Easily implement access controls for employees, support staff, and third party vendors while never disrupting current operations.


Seller Details
Year Founded
2017
HQ Location
Worcester, US
LinkedIn® Page
www.linkedin.com
32 employees on LinkedIn®

Brian H.
BH
Overview Provided by:
Cybersecurity CEO @ SideChannel | Protecting Enterprises with Enclave | Founder @ RealCISO.io

Recent Enclave Reviews

Oscar N.
ON
Oscar N.Small-Business (50 or fewer emp.)
5.0 out of 5
"Enclave has been helpful but I think it may be more now."
Easy to use, visual, easy to deploy, and very simple to implent zerotrust with it
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
2 people requested security information

Enclave Media

Enclave Demo - IAM Integration
INTEGRATIONS AWS IAM Identity Center Google Workspace Microsoft O365 Microsoft Active Directory Okta Duo OpenID Connect (OIDC) SAML 2.0 RESTful API
Enclave Demo - Easy Drag and Drop Access Control
Asset Discovery: Detect unknown assets sitting on the network. Enhanced Visibility: Gain insights into unused or underused assets, helping in optimization and finding potential cost savings. Track and Manage Assets: Monitor all the devices and applications within the network, categorizing a...
Answer a few questions to help the Enclave community
Have you used Enclave before?
Yes

1 Enclave Reviews

5.0 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
1 Enclave Reviews
5.0 out of 5
1 Enclave Reviews
5.0 out of 5

Enclave Pros and Cons

How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cons
This product has not yet received any negative sentiments.
G2 reviews are authentic and verified.
Oscar N.
ON
Information Technology Architect
Small-Business(50 or fewer emp.)
More Options
Validated Reviewer
Verified Current User
Review source: Organic
What do you like best about Enclave?

Easy to use, visual, easy to deploy, and very simple to implent zerotrust with it Review collected by and hosted on G2.com.

What do you dislike about Enclave?

Not always a fit for customers but we are thinking of pushing harder to replace VPN. Review collected by and hosted on G2.com.

What problems is Enclave solving and how is that benefiting you?

CMMC compliance Review collected by and hosted on G2.com.

There are not enough reviews of Enclave for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Okta Logo
Okta
4.5
(885)
Okta is an on-demand identity and access management service for web based applications, both in the cloud and behind the firewall
2
Wiz Logo
Wiz
4.7
(672)
Wiz is a CNAPP that consolidates CSPM, KSPM, CWPP, vulnerability management, IaC scanning, CIEM, DSPM, and container and Kubernetes security into a single platform.
3
BetterCloud Logo
BetterCloud
4.4
(452)
BetterCloud provides critical insights, automated management, and intelligent data security for cloud office platforms.
4
Cisco Duo Logo
Cisco Duo
4.5
(391)
Duo is a cloud-based access security platform built to protect access to any application, from any device. Duo’s passwordless authentication, single sign-on (SSO) and user-friendly multi-factor authentication make secure logins easy for users, reducing friction to their workflow.
5
Red Hat Ansible Automation Platform Logo
Red Hat Ansible Automation Platform
4.6
(307)
Red Hat Ansible Automation Platform is a simple way to automate apps and infrastructure. Application Deployment + Configuration Management + Continuous Delivery.
6
Tenable Nessus Logo
Tenable Nessus
4.5
(283)
From the beginning, we've worked hand-in-hand with the security community. We continuously optimize Nessus based on community feedback to make it the most accurate and comprehensive vulnerability assessment solution in the market. 20 years later and we're still laser focused on community collaboration and product innovation to provide the most accurate and complete vulnerability data - so you don't miss critical issues which could put your organization at risk. Tenable is a 2021 Gartner Representative Vendor in Vulnerability Assessment.
7
Absolute Secure Access Logo
Absolute Secure Access
4.7
(213)
Absolute Secure Access delivers modern remote access for highly mobile workforces without sacrificing productivity. It provides reliable network connectivity for users to securely access critical resources in the public cloud, private data centers, or on-premises -- even in challenging environments. It is the only solution that proactively optimizes and improves the employee experience while offering deep visibility, control, and analytics to IT administrators.
8
Orca Security Logo
Orca Security
4.6
(209)
Get workload-level visibility into AWS, Azure, and GCP without the operational costs of agents. You could buy three tools instead… but why? Orca replaces legacy vulnerability assessment tools, CSPM, and CWPP. Deploys in minutes, not months.
9
FortiClient Logo
FortiClient
4.4
(204)
FortiClient Fabric Agent integrates endpoints into the Security Fabric and provides endpoint telemetry, including user identity, protection status, risk scores, unpatched vulnerabilities, security events, and more.
10
Coro Cybersecurity Logo
Coro Cybersecurity
4.7
(193)
Monitors your cloud applications for data leaks, cyber-threats and regulatory violations that put your business at risk.
Show More