Join the 1500 companies using G2 Track to manage SaaS spend, usage, contracts & compliance.

IBM Secure Gateway

5.0
(1)

The Secure Gateway Service provides a quick, easy, and secure solution to connect anything to anything. The solution provides a persistent connection between on-premises or third party cloud environments and the IBM Cloud.

Work for IBM Secure Gateway?

Learning about IBM Secure Gateway?

We can help you find the solution that fits you best.

IBM Secure Gateway Reviews

Chat with a G2 Advisor
Write a Review
Filter Reviews
Filter Reviews
Ratings
Company Size
User Role
Industry
Showing 1 IBM Secure Gateway review
LinkedIn Connections
IBM Secure Gateway review by User in Hospital & Health Care
User in Hospital & Health Care
Validated Reviewer
Review Source
content

"IBM review"

What do you like best?

It allows you to safely connect to other thing without fear of privacy breeeches

What do you dislike?

It’s seems to good to be true but it actually works

What business problems are you solving with the product? What benefits have you realized?

It solves our security issues when using computers etc. gives us a secure gateway

Sign in to G2 to see what your connections have to say about IBM Secure Gateway

What Cloud Workload Protection Platforms solution do you use?

Thanks for letting us know!

There are not enough reviews of IBM Secure Gateway for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Google Cloud Platform Security Overview Logo
Google Cloud Platform Security Overview
4.1
(51)
Cloud Platform Security Overview allows users to deploy on an infrastructure protected by top experts in information, application, and network security.
2
Azure Security Center Logo
Azure Security Center
4.1
(13)
Azure Security Center provides security management and threat protection across your hybrid cloud workloads. It allows you to prevent, detect, and respond to security threats with increased visibility.
3
Trend Micro Deep Security Logo
Trend Micro Deep Security
4.2
(12)
Trend Micro Deep Security is designed to mprove visibility and simplify security management across physical, virtual, and cloud environments.
4
Symantec Cloud Workload Protection Logo
Symantec Cloud Workload Protection
4.1
(11)
Automate security for your public cloud workloads and containers, and scan Amazon S3 buckets for malware with cloud-native protection that integrates with DevOps and CI/CD pipelines
5
AWS Control Tower Logo
AWS Control Tower
3.6
(7)
AWS Control Tower automates the set-up of a baseline environment, or landing zone, that is a secure, well-architected multi-account AWS environment. The configuration of the landing zone is based on best practices that have been established by working with thousands of enterprise customers to create a secure environment that makes it easier to govern AWS workloads with rules for security, operations, and compliance.
6
McAfee Server Security Suite Logo
McAfee Server Security Suite
4.5
(4)
McAfee Server Security Suites deliver the industry's first comprehensive solution for discovering, monitoring, and securing cloud workloads. They combine server security technologies to minimize CPU overhead, provide complete security controls for all essential workloads, support all major virtualization environments, and centralize security management through a single administrative console. The most attractive benefit is that our security scales elastically as your demand fluctuates.
7
Trend Micro Hybrid Cloud Security Solution Logo
Trend Micro Hybrid Cloud Security Solution
4.2
(3)
The Trend Micro Hybrid Cloud Security solution, powered by XGen security, delivers a blend of cross-generational threat defense techniques that have been optimized to protect physical, virtual, and cloud workloads.
8
Smart UPS Logo
Smart UPS
4.7
(3)
APC's next-generation Connected Smart-UPS * is a time-saving, resource-saving innovation, making it easier to deploy, maintain, and monitor your power infrastructure - so you can focus on your business.
9
Oracle Security Monitoring and Analytics Cloud Service Logo
Oracle Security Monitoring and Analytics Cloud Service
4.3
(3)
Oracle Security Monitoring and Analytics (SMA) Cloud Service enables rapid detection, investigation and remediation of the broadest range of security threats across on-premises and cloud IT assets. Security Monitoring and Analytics provides integrated SIEM and UEBA capabilities built on machine learning, user session awareness, and up-to-date threat intelligence context. This service is built on Oracle Management Cloud's secure, unified big data platform.
10
IBM Security zSecure Logo
IBM Security zSecure
2.5
(1)
IBM Security zSecure Admin automates and simplifies IBM Resource Access Control Facility (RACF) security and compliance administration tasks and enhances RACF delegation capabilities and identity governance. By automating many recurring system administration functions and enhancing the native RACF authorization and delegation capabilities, zSecure Admin helps you maximize IT resources, reduce errors, increase efficiency, improve service quality and identify problems quickly to help minimize security risks and demonstrate compliance.
Show more
Kate from G2

Learning about IBM Secure Gateway?

I can help.
* We monitor all IBM Secure Gateway reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.