Secure Access by InstaSafe

4.5
(2)

Our technology has some thoughtful innovations to secure your network from unauthorized access, without jeopardizing genuine users trying to work with your in-house applications.

Work for Secure Access by InstaSafe?

Learning about Secure Access by InstaSafe?

We can help you find the solution that fits you best.

Secure Access by InstaSafe Reviews

Chat with a G2 Advisor
Write a Review
Filter Reviews
Filter Reviews
Ratings
Company Size
User Role
Industry
Showing 2 Secure Access by InstaSafe reviews
LinkedIn Connections
Secure Access by InstaSafe review by User in Computer Software
User in Computer Software
Validated Reviewer
Review Source
content

"Really useful for working remotely"

What do you like best?

It's a pretty standard VPN tool used when I work from home, I like that it generally is pretty consistent and has a good connection

What do you dislike?

It was pretty hard to connect for the first time, not very intuitive, but after that it's fine. I wish there was able a better way to get help when remote.

What problems are you solving with the product? What benefits have you realized?

I can easily work from home and access company documents/Confluence knowledge base

Sign in to G2 to see what your connections have to say about Secure Access by InstaSafe
Secure Access by InstaSafe review by User
User
Validated Reviewer
Review Source
content

"Really great for working from home"

What do you like best?

It works well consistently, and is pretty basic. I like that it doesn't have too many features.

What do you dislike?

It is really difficult to setup the first time, and they do not provide very much support if you run into problems.

What problems are you solving with the product? What benefits have you realized?

Needing a VPN for working remotely.

What Multi-Factor Authentication solution do you use?

Thanks for letting us know!

There are not enough reviews of Secure Access by InstaSafe for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Duo Security Logo
Duo Security
4.4
(112)
Cloud-based user authentication vendor: authenticate with your phone, Duo mobile app, landline, or tokens with or without an internet connection
2
Google Authenticator Logo
Google Authenticator
4.5
(94)
Google Authenticator is a multifactor app for mobile devices.
3
RSA SecurID® Access Logo
RSA SecurID® Access
4.4
(53)
Establish an enterprise-wide authentication policy that protects your most valuable applications, resources, and information.
4
Ping Intelligent Identity Platform Logo
Ping Intelligent Identity Platform
4.2
(35)
Ping Intelligent Identity Platform is a multi-factor authentication solution.
5
Authy Logo
Authy
4.6
(30)
Two-Factor Authentication smartphone app for consumers, simplest 2fa Rest API for developers and a strong authentication platform for the enterprise.
6
AWS Certificate Manager Logo
AWS Certificate Manager
4.4
(29)
AWS Certificate Manager is a service that lets you easily provision, manage, and deploy Secure Sockets Layer/Transport Layer Security (SSL/TLS) certificates for use with AWS services to secure network communications and establish the identity of websites.
7
Google Security Key Enforcement Logo
Google Security Key Enforcement
4.3
(23)
Google Security Key Enforcement is an enhanced protection against phishing.
8
Symantec VIP Access Manager Logo
Symantec VIP Access Manager
4.4
(18)
Create a single access point to protect your cloud and on-premise web apps via Single Sign-On (SSO) with Symantec VIP two-factor authentication.
9
Azure Multi-Factor Authentication Logo
Azure Multi-Factor Authentication
4.1
(18)
Azure Multi-Factor Authentication reduces organizational risk and helps enable regulatory compliance by providing an extra level of authentication, in addition to a user’s account credentials, to secure employee, customer, and partner access.
10
AuthPoint Multi-Factor Authentication Logo
AuthPoint Multi-Factor Authentication
4.5
(31)
WatchGuard AuthPoint is the right solution at the right time to make MFA a reality for the businesses who desperately need it to block attacks. Multi-factor authentication (MFA) solution not only helps to reduce the likelihood of network disruptions and data breaches arising from lost or stolen credentials, but we deliver this important capability entirely from the Cloud for easy set-up and management. AuthPoint goes beyond traditional 2-Factor Authentication (2FA) by considering innovative ways to positively identify users, and our large ecosystem of 3rd party integrations means that you can use MFA to protect access to the network, VPNs, and Cloud applications.
Show more
Kate from G2

Learning about Secure Access by InstaSafe?

I can help.
* We monitor all Secure Access by InstaSafe reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.