Introducing G2.ai, the future of software buying.Try now
Inactive Profile: Need Admin Access?
No one has managed this profile for over a year.
If you work at NetworkSecure, reclaim access to make changes.
Jamf
Sponsored
Jamf
Visit Website
Product Avatar Image
NetworkSecure

By Allot

Re-claim Profile

Re-claim your company’s G2 profile

This profile hasn’t been active for over a year.
If you work at NetworkSecure, you can re-claim it to keep your company’s information up to date and make the most of your G2 presence.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Re-claim
5.0 out of 5 stars
4 star
0%
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with NetworkSecure?

Jamf
Sponsored
Jamf
Visit Website
It's been two months since this profile received a new review
Leave a Review

NetworkSecure Reviews & Product Details

Product Avatar Image

Have you used NetworkSecure before?

Answer a few questions to help the NetworkSecure community

NetworkSecure Reviews (3)

Reviews

NetworkSecure Reviews (3)

5.0
3 reviews

Pros & Cons

Generated from real user reviews
View All Pros and Cons
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Vijay K.
VK
Professional Freelancer
Small-Business (50 or fewer emp.)
"Exceptional Network Security Services with Reliable Support"
What do you like best about NetworkSecure?

My favorite part of NetworkSecureOverall is its overall brand service. The platform provides real-time threat detection and mitigation which means my network is constantly monitored against potential breaches. With its clean and intuitive layout, it is user-friendly and you do not need technical skillsк to see and control your security settings. Hotstar also has that round-the-clock customer support, which I find to be so reliable, because I get help whenever I need it. As such a powerful, relatively cheap geek tool, NetworkSecure is a rare gem in the cybersecurity space. Review collected by and hosted on G2.com.

What do you dislike about NetworkSecure?

While NetworkSecure is a sound and powerful platform, it can get a little convoluted during first-time setup on occasion, though that certainly isn't insurmountable. Without specific instructions, the configuration process can appear daunting to less-tech-savvy users. Some of the advanced features could use better documentation to enable users to get the most out of their potential. The customer support team is super responsive but it would be lovely to see proactive tutorials or resource onboarding available. Review collected by and hosted on G2.com.

Riddhi k.
RK
Senior System Associate
Small-Business (50 or fewer emp.)
"My experience with NetworkSecure was quite positive. The app setup was straight forward"
What do you like best about NetworkSecure?

What I like about NetworkSecure is it's real time threat detection and alerts. This feature gives me immediate awareness of potential security risks, allowing me to act quickly. Review collected by and hosted on G2.com.

What do you dislike about NetworkSecure?

One aspect I dislike about NetworkSecure is that it can be slow to connect or update device status which can be frustrating Review collected by and hosted on G2.com.

Surendra Nath C.
SC
Product Marketing Specialist
Mid-Market (51-1000 emp.)
"Secure Network with Network Secure"
What do you like best about NetworkSecure?

The way it Secures the Network it could be the best one to Secure the things. Review collected by and hosted on G2.com.

What do you dislike about NetworkSecure?

Who dislikes the Network Secure! It's the thing amazing work. Review collected by and hosted on G2.com.

There are not enough reviews of NetworkSecure for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Jamf Logo
Jamf
4.8
(2,086)
A complete Apple management solution for IT pros to empower users and simplify the deployment, inventory, and security of Macs, iPads, and iPhones. Designed to automate device management for you while driving end-user productivity and creativity, Jamf Pro (formerly Casper Suite) is the EMM tool that delights IT pros and the users they support by delivering on the promise of unified endpoint management for Apple devices.
2
Palo Alto Networks GlobalProtect Logo
Palo Alto Networks GlobalProtect
4.5
(65)
GlobalProtect delivers the protection of next-generation security platform to the mobile workforce in order to stop targeted cyberattacks, evasive application traffic, phishing, malicious websites, command-and-control traffic, and known and unknown threats.
3
Appdome Logo
Appdome
4.8
(63)
AI-Native Platform to automate mobile app protection. 400+ defenses Certified Secure™ for mobile app security, fraud prevention, anti-malware, anti-bot, anti-ATO, and anti-cheat. Full lifecycle automated build, test, monitor, detect, respond, support. All Android & iOS apps.
4
Check Point Harmony Mobile Protection Logo
Check Point Harmony Mobile Protection
4.5
(55)
Harmony Mobile offers enterprise mobile security that protects against threats to the OS, apps and network. Leveraging Check Point’s best-of-breed threat prevention technology, SandBlast Mobile offers the highest threat catch rate in the industry without impacting device performance or user experience.
5
Prey Logo
Prey
4.7
(53)
Prey is an Anti-Theft and management application that helps you keep track and secure your laptop, phone and tablet.
6
Symantec Mobile Threat Defense Logo
Symantec Mobile Threat Defense
4.1
(45)
Helps predict, detect and prevent physical, malware, network and vulnerability exploits to protect businesses from mobile cyberattacks.
7
Check Point Mobile Access Logo
Check Point Mobile Access
4.3
(30)
Mobile data protection (MDP) systems and procedures are needed to protect business data privacy, meet regulatory and contractual requirements, and comply with audits.
8
Zimperium Mobile Threat Defense Logo
Zimperium Mobile Threat Defense
4.6
(21)
Zimperium IPS is the world's first mobile intrusion prevention system app that provides comprehensive protection for iOS and Android devices against mobile network, device and application cyber attacks.
9
Fortra Secure Collaboration Logo
Fortra Secure Collaboration
4.2
(15)
Fortra Secure Collaboration enables businesses of all sizes to easily secure, track and share any digital information across all platforms and devices.
10
Seclore Data-Centric Security Platform Logo
Seclore Data-Centric Security Platform
4.6
(15)
Seclore uses an advanced data-centric approach to security. Our innovative strategy directly protects files that contain sensitive information, ensuring the data is safe regardless of its location. rotecting sensitive data is the primary purpose of data security solutions. Data loss prevention and data encryption solutions have been around for many years, but often lack organizational flexibility or fidelity. Further, the rise of cloud data storage means that endpoint- and network-based data security tools are not enough. The Seclore platform allows you to manage data security policies regardless of where the data is stored. Dynamic watermarking and digital asset classification further allows for greater flexibility in policies. Classification especially enables you to readily understand which files need tighter controls or would be riskier if they were exfiltrated. This also includes enterprise digital rights management (EDRM) capabilities with automated or manual protection methods, and control over data protection regardless of where the data resides. Ultimately, the Seclore data-centric approach means that security is deployed as close to the data as possible.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
NetworkSecure
View Alternatives