JuiceSSH Reviews & Product Details

JuiceSSH Overview

What is JuiceSSH?

JuiceSSH is an SSH client for Android that includes SSH, Local Shell, and Telnet support.

JuiceSSH Details
Product Description

JuiceSSH is an SSH client for Android that includes SSH, Local Shell, and Telnet support.

Seller Details
Company Website
Show More

JuiceSSH Reviews

Write a Review
Filter reviews
Showing 1 JuiceSSH review
Showing 1 review
Filter Reviews
Filter Reviews
Sort by
Company Size
All Industries
Already have JuiceSSH?
Write a Review
Enterprise(> 1000 emp.)
Validated Reviewer
Review source: Invitation from G2
Describe the project or task the provider helped with:

I used the JuiceSSH app (free version) in my mobile phone to connect remotely to the internal network devices in the enterprise environment. I also was able to use it while using a VPN connection outside of the network without issues. Review collected by and hosted on G2.com.

What do you like best?

Something I really like about the application is the ability to configure multiple credentials to be used and the ability to add multiple devices so you can manage them directly from your mobile. Also, it is ads-free. Review collected by and hosted on G2.com.

What do you dislike?

I don't have any issues so far with JuiceSSH. I consider it satisfies my needs. Review collected by and hosted on G2.com.

What problems are you solving with the provider? What benefits have you realized?

While doing my work outside the office, I don't need to carry on my heavy laptop with me. I just need my mobile phone. Review collected by and hosted on G2.com.

Show More
Show Less

There are not enough reviews of JuiceSSH for G2 to provide buying insight. Below are some alternatives with more reviews:

Rapid7 Security Services Logo
Rapid7 Security Services
Rapid7 transforms data into insight, empowering IT and security professionals to progress and protect their organizations.
Thales Logo
Thales e-Security is the leader in advanced data security solutions and services, delivering trust wherever information is created, shared or stored.
AllClear ID Logo
AllClear ID
To make smart decisions, move quickly, and minimize damage, your organization will need more than a response plan. We provide expert analysis, planning, and incident simulations, as well as reserved resources to prepare your organization for a successful response.
Storagepipe Logo
By joining Storagepipe's Partner program, you can create and launch your own white-label online backup service. Storagepipe's Service Provider Platform makes it easy to manage customer accounts, and also offers a self-service portal for your clients.
Fingerprint Cards AB Logo
Fingerprint Cards AB
Fingerprint Cards AB (FPC) markets, develops and produces biometric components and technologies that through the analysis and matching of an individuals unique fingerprint verify the persons identity.
Mitnick Security Logo
Mitnick Security
As the worlds most famous hacker, Kevin Mitnick has been the subject of countless news, movies and magazine articles published throughout the world. He has made guest appearances on numerous television and radio programs. Kevin's unparalleled experience leads the Global Ghost Team in testing the security of the worlds leading corporations and governments.
Phirelight Logo
Phirelight was created in 2001 by a team of defense intelligence, cyber security, and military experts who recognized the need to help organizations manage and protect their critical assets.
Nexusguard Logo
Founded in 2008, Nexusguard is the global leader in fighting malicious internet attacks. Nexusguard protects clients against a multitude of threats, including distributed denial of service (DDoS) attacks, to ensure uninterrupted internet service.
Rubicon Labs Logo
Rubicon Labs
Rubicon Labs is a cybersecurity startup founded by veterans of Apple and Broadcom with offices in San Francisco, California and Austin, Texas.
NCC Group Logo
NCC Group
Through an unrivalled suite of services, we provide organizations with peace of mind that that their most important assets are protected, available and operating as they should be at all times.
Show More