2026 Best Software Awards are here!See the list
This product hasn't been reviewed yet! Be the first to share your experience.
Leave a Review

Safe-T Reviews & Product Details

Profile Status

This profile is currently managed by Safe-T but has limited features.

Are you part of the Safe-T team? Upgrade your plan to enhance your branding and engage with visitors to your profile!

Product Avatar Image

Have you used Safe-T before?

Answer a few questions to help the Safe-T community

Safe-T Reviews (1)

Reviews

Safe-T Reviews (1)

5.0
1 reviews
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Verified User in Performing Arts
AP
Mid-Market (51-1000 emp.)
"Just Wow!"
What do you like best about Safe-T?

The Safe-T team was able to get the service set up in my environment in less than half a day. That quick turnaround allowed me to make internal apps easily accessible for my users remotely when the COVID-19 pandemic caused our office to temporarily close. Their response time and support make this product that much better! Review collected by and hosted on G2.com.

What do you dislike about Safe-T?

Making published apps available through the Safe-T appliance would have been super helpful. Review collected by and hosted on G2.com.

There are not enough reviews of Safe-T for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Absolute Secure Access Logo
Absolute Secure Access
4.7
(225)
Absolute Secure Access delivers modern remote access for highly mobile workforces without sacrificing productivity. It provides reliable network connectivity for users to securely access critical resources in the public cloud, private data centers, or on-premises -- even in challenging environments. It is the only solution that proactively optimizes and improves the employee experience while offering deep visibility, control, and analytics to IT administrators.
2
Check Point SASE Logo
Check Point SASE
4.5
(195)
Check Point Harmony SASE is a converged networking and network security platform which connects all users, in the office or remote, to all resources, located on-prem, cloud, SaaS or web. It delivers secure Zerto Trust Network Access (ZTNA) connectivity along web protection capabilities including Internet access control, malware protection, data loss prevention(DLP), and sandboxing, as well as a firewall as a service. The solution employs a hybrid architecture, combining on-device and cloud-based protections, which delivers market leading security and performance.
3
Zscaler Internet Access Logo
Zscaler Internet Access
4.4
(175)
Zscaler Internet Access delivers the complete security stack as a service from the cloud.
4
GoodAccess Logo
GoodAccess
4.7
(161)
GoodAccess is a Zero Trust cybersecurity platform (SASE/SSE) built for medium-sized businesses (50–5000+ employees). It enables rapid, low-code/no-code deployment—without hardware or expert staff—to secure remote and hybrid teams. With identity-based access, BYOD protection, network segmentation, and full visibility, GoodAccess simplifies enterprise-grade security for modern, multi-cloud environments.
5
OpenVPN CloudConnexa Logo
OpenVPN CloudConnexa
4.6
(121)
CloudConnexa provides secure communication between an organization’s distributed workforce, IoT/IIoT devices, and the online services they rely on daily with a secure virtualized network, based on the market-proven OpenVPN protocol. Get started with 3 free connections.
6
Ivanti Connect Secure Logo
Ivanti Connect Secure
4.3
(87)
Ivanti Secure offers Always-On VPN and Lockdown Mode for compliance-focused businesses. These features protect all network traffic; from your team’s laptops at home to your corporate network, Ivanti Secure helps reduce the possibility of data loss or leakage. When an end user logs into their laptop using our Always-On VPN, our desktop client automatically makes a secure connection to the Ivanti Connect Secure gateway. Once connected, all traffic from the laptop is sent via a protected tunnel. Furthermore, the end user will remain constantly connected to the tunnel, ensuring that data-in-motion remains secure.
7
Twingate Logo
Twingate
4.7
(75)
Twingate secures remote access to private apps, data and environments, allowing businesses to replace corporate VPNs with a more secure, usable, performant and modern zero trust-based solution.
8
Prisma Access Logo
Prisma Access
4.3
(73)
Secure access service edge (SASE) for branch offices, retail locations and mobile users
9
Citrix Secure Private Access Logo
Citrix Secure Private Access
4.5
(70)
Citrix Secure Workspace Access provides a comprehensive, zero-trust approach to deliver secure and contextual access to the corporate internal web apps, SaaS, and virtual applications. It enables the consolidation of traditional security products like VPN, single sign-on, and browser isolation technologies and provides advanced security controls for managed, unmanaged, and BYO devices. Citrix Secure Workspace Access provides a holistic security approach based on zero-trust principles, protecting users, applications, and corporate data against internet web threats and data exfiltration.
10
Cisco DNA Center Logo
Cisco DNA Center
4.3
(53)
How Cisco DNA Center works Your programmable network infrastructure sends data to the Cisco DNA Center Appliance. The appliance activates features and capabilities on your network devices using Cisco DNA software. Everything is managed from the Cisco DNA Center dashboard.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.