Introducing G2.ai, the future of software buying.Try now
Todyl Security Platform
Sponsored
Todyl Security Platform
Visit Website
Product Avatar Image
SecureIdentity CASB

By SecurEnvoy

Re-claim Profile

Re-claim your company’s G2 profile

This profile hasn’t been active for over a year.
If you work at SecureIdentity CASB, you can re-claim it to keep your company’s information up to date and make the most of your G2 presence.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Re-claim
4.0 out of 5 stars
5 star
0%
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with SecureIdentity CASB?

Todyl Security Platform
Sponsored
Todyl Security Platform
Visit Website
It's been two months since this profile received a new review
Leave a Review

SecureIdentity CASB Reviews & Product Details

Product Avatar Image

Have you used SecureIdentity CASB before?

Answer a few questions to help the SecureIdentity CASB community

SecureIdentity CASB Reviews (2)

Reviews

SecureIdentity CASB Reviews (2)

4.0
2 reviews

Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Akshay T.
AT
Business Development Manager
Small-Business (50 or fewer emp.)
"Advanced SecureIdentity CASB"
What do you like best about SecureIdentity CASB?

SecureIdentity CASB solutions are designed to provide organizations with visibility and control over the use of cloud secrvices and applications. Some potential features that i like is its Security Monitoring offers real-time monitoring and user activity monitoring offers solution can track user activity within cloud services. Review collected by and hosted on G2.com.

What do you dislike about SecureIdentity CASB?

there are not much things to dislike about but there are few similar issues those are Implementing and configuration is not easy to do for new engeeniers, Integration is not easy in CASB. Review collected by and hosted on G2.com.

SY
Small-Business (50 or fewer emp.)
"Advanced SecureIdentity CASB"
What do you like best about SecureIdentity CASB?

I like the most about SecureIdentity CASB is Threat Detection and Response which includes advanced threat detection capabilities to identify and mitigate security threats such as malware, phishing attacks, etc and Real-time Monitoring and Alerts which notify organisations of suspicious activities in their cloud environment. Review collected by and hosted on G2.com.

What do you dislike about SecureIdentity CASB?

There are not much things to dislike about SecureIdentity CASB but fews are such as complexity in deployment, Limited coverage it may not support all cloud services or provide the same level of visibility and control for every application. Review collected by and hosted on G2.com.

There are not enough reviews of SecureIdentity CASB for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Check Point Harmony Email & Collaboration Logo
Check Point Harmony Email & Collaboration
4.6
(512)
Check Point Harmony Email & Office, protects enterprise data by preventing targeted attacks on SaaS applications and cloud-based email.
2
Check Point Harmony SASE Logo
Check Point Harmony SASE
4.5
(195)
Check Point Harmony SASE is a converged networking and network security platform which connects all users, in the office or remote, to all resources, located on-prem, cloud, SaaS or web. It delivers secure Zerto Trust Network Access (ZTNA) connectivity along web protection capabilities including Internet access control, malware protection, data loss prevention(DLP), and sandboxing, as well as a firewall as a service. The solution employs a hybrid architecture, combining on-device and cloud-based protections, which delivers market leading security and performance.
3
Symantec Web Security Service Logo
Symantec Web Security Service
4.4
(120)
Symantec Web Security is a cloud based software that helps protect organization from compromised websites and malicious downloads and allows user to control, monitor and enforce Acceptable Use Policies for organizations users, whether on-premises or away from the office.
4
Forcepoint Data Security Cloud Logo
Forcepoint Data Security Cloud
4.2
(103)
Forcepoint Data Security Cloud is a unified cloud security platform that enables Zero Trust access to the web, SaaS and private applications with best-in-class data security and malware protection while delivering a great user experience. Gain the full visibility and control over web and application usage to mitigate digital risks and give your organization more freedom and flexibility. Key product capabilities include: • Visibility into web, SaaS and private application use • Distributed enforcement – endpoint enforcement, cloud enforcement via in-line proxy & API, and on-prem enforcement • Industry-leading data and threat protection capabilities to secure data everywhere, for people working anywhere • Seamless user experience from any location and any device "
5
Cloudflare SSE & SASE Platform Logo
Cloudflare SSE & SASE Platform
4.6
(103)
Cloudflare Area 1 Security identifies and prevents advanced socially engineered attacks before they impact your enterprise.
6
Cato SASE Cloud Logo
Cato SASE Cloud
4.5
(82)
Cato SASE Cloud delivers a global SD-WAN with built-in network security stack for all enterprise locations, cloud resources and mobile users
7
Prisma Access Logo
Prisma Access
4.3
(73)
Secure access service edge (SASE) for branch offices, retail locations and mobile users
8
Citrix Secure Private Access Logo
Citrix Secure Private Access
4.5
(69)
Citrix Secure Workspace Access provides a comprehensive, zero-trust approach to deliver secure and contextual access to the corporate internal web apps, SaaS, and virtual applications. It enables the consolidation of traditional security products like VPN, single sign-on, and browser isolation technologies and provides advanced security controls for managed, unmanaged, and BYO devices. Citrix Secure Workspace Access provides a holistic security approach based on zero-trust principles, protecting users, applications, and corporate data against internet web threats and data exfiltration.
9
Netskope One Platform Logo
Netskope One Platform
4.4
(66)
Netskope is a Cloud Access Security Broker (CASB)
10
Citrix Workspace Logo
Citrix Workspace
4.4
(60)
Citrix Workspace Essentials provides a comprehensive, zero-trust approach to deliver secure and contextual access to corporate internal web apps, SaaS, and virtual applications. With Citrix Workspace Essentials, IT can consolidate traditional security products such as VPN, single-sign on, multi-factor authentication, and provide usage analytics for Web and SaaS apps. Citrix Workspace Essentials provides end-users with simplified, secure, and VPN-less access to Web apps, SaaS, virtualized apps, and data.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
SecureIdentity CASB
View Alternatives