Secure Access by InstaSafe


Our technology has some thoughtful innovations to secure your network from unauthorized access, without jeopardizing genuine users trying to work with your in-house applications.

Work for Secure Access by InstaSafe?

Learning about Secure Access by InstaSafe?

We can help you find the solution that fits you best.

Secure Access by InstaSafe Reviews

Chat with a G2 Advisor
Write a Review
Filter Reviews
Filter Reviews
Company Size
User Role
Showing 2 Secure Access by InstaSafe reviews
LinkedIn Connections
Secure Access by InstaSafe review by User in Computer Software
User in Computer Software
Validated Reviewer
Review Source

"Really useful for working remotely"

What do you like best?

It's a pretty standard VPN tool used when I work from home, I like that it generally is pretty consistent and has a good connection

What do you dislike?

It was pretty hard to connect for the first time, not very intuitive, but after that it's fine. I wish there was able a better way to get help when remote.

What problems are you solving with the product? What benefits have you realized?

I can easily work from home and access company documents/Confluence knowledge base

Sign in to G2 to see what your connections have to say about Secure Access by InstaSafe
Secure Access by InstaSafe review by User
Validated Reviewer
Review Source

"Really great for working from home"

What do you like best?

It works well consistently, and is pretty basic. I like that it doesn't have too many features.

What do you dislike?

It is really difficult to setup the first time, and they do not provide very much support if you run into problems.

What problems are you solving with the product? What benefits have you realized?

Needing a VPN for working remotely.

What Multi-Factor Authentication solution do you use?

Thanks for letting us know!

There are not enough reviews of Secure Access by InstaSafe for G2 to provide buying insight. Below are some alternatives with more reviews:

Duo Security Logo
Duo Security
Cloud-based user authentication vendor: authenticate with your phone, Duo mobile app, landline, or tokens with or without an internet connection
Google Authenticator Logo
Google Authenticator
Google Authenticator is a multifactor app for mobile devices.
RSA SecurID® Access Logo
RSA SecurID® Access
Establish an enterprise-wide authentication policy that protects your most valuable applications, resources, and information.
Ping Intelligent Identity Platform Logo
Ping Intelligent Identity Platform
Ping Intelligent Identity Platform is a multi-factor authentication solution.
Authy Logo
Two-Factor Authentication smartphone app for consumers, simplest 2fa Rest API for developers and a strong authentication platform for the enterprise.
AWS Certificate Manager Logo
AWS Certificate Manager
AWS Certificate Manager is a service that lets you easily provision, manage, and deploy Secure Sockets Layer/Transport Layer Security (SSL/TLS) certificates for use with AWS services to secure network communications and establish the identity of websites.
Google Security Key Enforcement Logo
Google Security Key Enforcement
Google Security Key Enforcement is an enhanced protection against phishing.
Symantec VIP Access Manager Logo
Symantec VIP Access Manager
Create a single access point to protect your cloud and on-premise web apps via Single Sign-On (SSO) with Symantec VIP two-factor authentication.
Azure Multi-Factor Authentication Logo
Azure Multi-Factor Authentication
Azure Multi-Factor Authentication reduces organizational risk and helps enable regulatory compliance by providing an extra level of authentication, in addition to a user’s account credentials, to secure employee, customer, and partner access.
AuthPoint Multi-Factor Authentication Logo
AuthPoint Multi-Factor Authentication
WatchGuard AuthPoint is the right solution at the right time to make MFA a reality for the businesses who desperately need it to block attacks. Multi-factor authentication (MFA) solution not only helps to reduce the likelihood of network disruptions and data breaches arising from lost or stolen credentials, but we deliver this important capability entirely from the Cloud for easy set-up and management. AuthPoint goes beyond traditional 2-Factor Authentication (2FA) by considering innovative ways to positively identify users, and our large ecosystem of 3rd party integrations means that you can use MFA to protect access to the network, VPNs, and Cloud applications.
Show more
Kate from G2

Learning about Secure Access by InstaSafe?

I can help.
* We monitor all Secure Access by InstaSafe reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.