It's been two months since this profile received a new review
Leave a Review
Compare this with other toolsSave it to your board and evaluate your options side by side.
Save to board

Packetriot Reviews & Product Details

Profile Status

This profile is currently managed by Packetriot but has limited features.

Are you part of the Packetriot team? Upgrade your plan to enhance your branding and engage with visitors to your profile!

Packetriot Integrations

(2)
Integration information sourced from real user reviews.

Packetriot Media

Packetriot Demo - Tunnel View
View and search across all of the tunnels your team has deployed.
Packetriot Demo - Packetriot Homepage
Host web and TCP applications on the Internet from any network or device. Access databases, custom web apps, ssh, media servers and more.
Packetriot Demo - Setup & Installation
The Packetriot overview page provides quick links to our client application for popular OS targets. Packetriot cryptographically signs our Windows and Mac binaries, including installers, so that target platforms and their endpoint security systems can verify and trust our client.
Product Avatar Image

Have you used Packetriot before?

Answer a few questions to help the Packetriot community

Packetriot Reviews (2)

Reviews

Packetriot Reviews (2)

5.0
2 reviews

Pros & Cons

Generated from real user reviews
View All Pros and Cons
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
HS
IT and Office Manager
Small-Business (50 or fewer emp.)
"Packetriot’s Amazing Customer Service and Easy Web Interface"
What do you like best about Packetriot?

The system works well, and there is now even a web interface that really makes things easy, but what really sets this service apart and puts it head and shoulders above the rest, is the customer service. I was on the free plan initially and even then, I got personally guided through a very specific scenario for our company! It also did not stop there, the high customer service level continued as about a year later we added another complex setup to our package and again, we were personally assisted with this too. The team at Packetriot are knowledgeable, helpful, willing to assist and simply amazing (and a huge thank you from us directly to John) Review collected by and hosted on G2.com.

What do you dislike about Packetriot?

I cannot think of anything, it has everything the others and is well documented. Review collected by and hosted on G2.com.

Verified User in Computer Software
UC
Small-Business (50 or fewer emp.)
"Simple, Reliable Secure Tunneling with Packetriot"
What do you like best about Packetriot?

What I like best about Packetriot is how simple and reliable it is for securely exposing internal applications without dealing with complex VPN setups or firewall reconfiguration. The setup process is straightforward, and once configured, it just works.

The automatic TLS encryption and built-in authentication features provide strong security without extra effort. It’s especially useful when you need to expose web or TCP services from a closed network environment. The edge network performance has been stable and dependable for our use cases.

Pricing is predictable and transparent, which makes planning easier. Over the years, their support has been responsive and practical — whenever we needed help, the turnaround time was quick and solutions were clear. They were also flexible in accommodating custom payment arrangements early on, which we appreciated.

Overall, it’s a reliable, developer-friendly solution that simplifies secure remote access. Review collected by and hosted on G2.com.

What do you dislike about Packetriot?

There aren’t any major drawbacks, but as with most networking tools, there’s a small learning curve if you’re not already familiar with tunneling concepts or TCP-based exposure. Beginners may need a little time to fully grasp the more advanced configuration options.

It would also help to have even more detailed documentation, along with additional real-world examples that cover complex deployment scenarios.

That said, once it’s properly configured, the platform runs smoothly and reliably. Review collected by and hosted on G2.com.

There are not enough reviews of Packetriot for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Absolute Secure Access Logo
Absolute Secure Access
4.7
(225)
Absolute Secure Access delivers modern remote access for highly mobile workforces without sacrificing productivity. It provides reliable network connectivity for users to securely access critical resources in the public cloud, private data centers, or on-premises -- even in challenging environments. It is the only solution that proactively optimizes and improves the employee experience while offering deep visibility, control, and analytics to IT administrators.
2
Check Point SASE Logo
Check Point SASE
4.5
(206)
Check Point Harmony SASE is a converged networking and network security platform which connects all users, in the office or remote, to all resources, located on-prem, cloud, SaaS or web. It delivers secure Zerto Trust Network Access (ZTNA) connectivity along web protection capabilities including Internet access control, malware protection, data loss prevention(DLP), and sandboxing, as well as a firewall as a service. The solution employs a hybrid architecture, combining on-device and cloud-based protections, which delivers market leading security and performance.
3
Zscaler Internet Access Logo
Zscaler Internet Access
4.4
(188)
Zscaler Internet Access delivers the complete security stack as a service from the cloud.
4
GoodAccess Logo
GoodAccess
4.7
(165)
GoodAccess is a Zero Trust cybersecurity platform (SASE/SSE) built for medium-sized businesses (50–5000+ employees). It enables rapid, low-code/no-code deployment—without hardware or expert staff—to secure remote and hybrid teams. With identity-based access, BYOD protection, network segmentation, and full visibility, GoodAccess simplifies enterprise-grade security for modern, multi-cloud environments.
5
OpenVPN CloudConnexa Logo
OpenVPN CloudConnexa
4.6
(124)
CloudConnexa provides secure communication between an organization’s distributed workforce, IoT/IIoT devices, and the online services they rely on daily with a secure virtualized network, based on the market-proven OpenVPN protocol. Get started with 3 free connections.
6
Ivanti Connect Secure Logo
Ivanti Connect Secure
4.3
(87)
Ivanti Secure offers Always-On VPN and Lockdown Mode for compliance-focused businesses. These features protect all network traffic; from your team’s laptops at home to your corporate network, Ivanti Secure helps reduce the possibility of data loss or leakage. When an end user logs into their laptop using our Always-On VPN, our desktop client automatically makes a secure connection to the Ivanti Connect Secure gateway. Once connected, all traffic from the laptop is sent via a protected tunnel. Furthermore, the end user will remain constantly connected to the tunnel, ensuring that data-in-motion remains secure.
7
Twingate Logo
Twingate
4.7
(76)
Twingate secures remote access to private apps, data and environments, allowing businesses to replace corporate VPNs with a more secure, usable, performant and modern zero trust-based solution.
8
Prisma Access Logo
Prisma Access
4.3
(73)
Secure access service edge (SASE) for branch offices, retail locations and mobile users
9
Citrix Secure Private Access Logo
Citrix Secure Private Access
4.5
(70)
Citrix Secure Workspace Access provides a comprehensive, zero-trust approach to deliver secure and contextual access to the corporate internal web apps, SaaS, and virtual applications. It enables the consolidation of traditional security products like VPN, single sign-on, and browser isolation technologies and provides advanced security controls for managed, unmanaged, and BYO devices. Citrix Secure Workspace Access provides a holistic security approach based on zero-trust principles, protecting users, applications, and corporate data against internet web threats and data exfiltration.
10
Citrix Workspace Logo
Citrix Workspace
4.4
(63)
Citrix Workspace Essentials provides a comprehensive, zero-trust approach to deliver secure and contextual access to corporate internal web apps, SaaS, and virtual applications. With Citrix Workspace Essentials, IT can consolidate traditional security products such as VPN, single-sign on, multi-factor authentication, and provide usage analytics for Web and SaaS apps. Citrix Workspace Essentials provides end-users with simplified, secure, and VPN-less access to Web apps, SaaS, virtualized apps, and data.
Show More
People Icons

Start a Discussion about Packetriot

Have a software question? Get answers from real users and experts.

Start a Discussion
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Packetriot