# Safe-T Reviews
**Vendor:** Safe-T  
**Category:** [Software-Defined Perimeter (SDP) Software](https://www.g2.com/categories/software-defined-perimeter-sdp)  
**Average Rating:** 5.0/5.0  
**Total Reviews:** 1
## About Safe-T
Safe-T’s Software Defined Perimeter (SDP) transforms access challenges into access advantages. Secure Application Access grants access to applications on a need-to-know basis ONLY, while giving your users fast and seamless access to the resources they need. The result? A “verify-first, access-second” Zero Trust approach across your applications for enhanced security, greater understanding, and fewer frustrated users.




## Safe-T Reviews
  ### 1. Just Wow!

**Rating:** 5.0/5.0 stars

**Reviewed by:** Verified User in Performing Arts | Mid-Market (51-1000 emp.)

**Reviewed Date:** April 23, 2020

**What do you like best about Safe-T?**

The Safe-T team was able to get the service set up in my environment in less than half a day.  That quick turnaround allowed me to make internal apps easily accessible for my users remotely when the COVID-19 pandemic caused our office to temporarily close.  Their response time and support make this product that much better!

**What do you dislike about Safe-T?**

Making published apps available through the Safe-T appliance would have been super helpful.

**What problems is Safe-T solving and how is that benefiting you?**

I was looking to get anyway from client-based VPN solutions.  The Safe-T product is seamless and very practical for secure access to your internal network.


## Safe-T Discussions
  - [What is Safe-T used for?](https://www.g2.com/discussions/what-is-safe-t-used-for)

- [View Safe-T pricing details and edition comparison](https://www.g2.com/products/safe-t/reviews?section=pricing&secure%5Bexpires_at%5D=2026-05-14+10%3A36%3A02+-0500&secure%5Bsession_id%5D=e0471fc9-4b6c-4999-8f98-66210db6dc06&secure%5Btoken%5D=39c7a4e77a261bd9057753288ec0158b52d9b32338c0ffcc27b6e078f37a7da0&format=llm_user)

## Safe-T Features
**Administration**
- Network Segmentation
- Scalability
- Global Access

**Protection**
- Policy Enforcement
- Security Audit
- Access Control
- User Authentication

**Monitoring**
- Compliance Monitoring
- Vulnerability Monitoring
- Configuration Monitoring
- Observability

## Top Safe-T Alternatives
  - [Absolute Secure Access](https://www.g2.com/products/absolute-secure-access/reviews) - 4.7/5.0 (224 reviews)
  - [Check Point SASE](https://www.g2.com/products/check-point-sase/reviews) - 4.5/5.0 (211 reviews)
  - [Zscaler Internet Access](https://www.g2.com/products/zscaler-internet-access/reviews) - 4.4/5.0 (186 reviews)

