This product hasn't been reviewed yet! Be the first to share your experience.
Leave a Review
SUBROSA Reviews (0)
G2 reviews are authentic and verified.
Here's how.
We strive to keep our reviews authentic.
G2 reviews are an important part of the buying process, and we understand the value they provide to both our customers and buyers. To ensure the value is retained, it's important to make certain that reviews are authentic and trustworthy, which is why G2 requires verified methods to write a review and validates the reviewer's identity before approving. G2 validates the reviewers identity with our moderation process that prevents inauthentic reviews, and we strive to collect reviews in a responsible and ethical manner.
There are not enough reviews of SUBROSA for G2 to provide buying insight. Below are some alternatives with more reviews:
1
Coro Cybersecurity
4.7
(231)
Monitors your cloud applications for data leaks, cyber-threats and regulatory violations that put your business at risk.
2
NordLayer
4.3
(126)
A stress-free way to secure your network.
3
Portnox
4.4
(108)
Portnox is a solution for on-premise network access control, visibility and enforcement in real-time on all devices.
4
Genea Security
4.4
(94)
Genea Security's cloud-based access control system is designed for the convenience and security of both tenants and building management teams.
5
SecureW2 JoinNow
4.7
(92)
The full JoinNow Suite contains everything you need to transition to secure passwordless authentication. It includes an intuitive managed PKI for certificate creation and management, as well as best-in-class certificate delivery solutions such as a dissolvable self-service configuration client for unmanaged devices and automatic enrollment gateways for managed devices. The platform also offers a Cloud RADIUS server, designed from the ground up for passwordless security and works seamlessly with Cloud Identity Providers.
6
Twingate
4.7
(75)
Twingate secures remote access to private apps, data and environments, allowing businesses to replace corporate VPNs with a more secure, usable, performant and modern zero trust-based solution.
7
Citrix Gateway
4.0
(72)
Citrix Gateway is a customer-managed solution that can be deployed on premises or on any public cloud, such as AWS, Azure, or Google Cloud Platform.
8
Google Cloud Identity-Aware Proxy
4.4
(54)
Cloud Identity-Aware Proxy (Cloud IAP) controls access to user cloud applications running on Google Cloud Platform.
9
Cisco Identity Services Engine (ISE)
4.5
(50)
Cisco Identity Services Engine (ISE) is a comprehensive network access control (NAC) solution that serves as the cornerstone of a zero-trust security framework. It enables organizations to enforce security policies, manage endpoints, and ensure that only trusted users and devices can access network resources. By integrating intelligence from across the network stack, ISE provides real-time contextual information, allowing for precise control over who and what connects to the network.
Key Features and Functionality:
- Context-Aware Access Control: ISE gathers detailed information about users, devices, locations, and access methods to enforce policies that grant or restrict network access based on comprehensive contextual data.
- Endpoint Compliance: The platform continuously assesses device posture to ensure compliance with security policies, preventing unpatched or non-compliant devices from posing risks to the network.
- Automated Threat Containment: ISE can automatically identify and contain threats by leveraging network intelligence, effectively turning the network into a proactive defense mechanism.
- Flexible Deployment Options: Supporting both on-premises and multi-cloud environments, ISE offers deployment flexibility to meet diverse organizational needs.
- Integration with Security Ecosystem: ISE integrates seamlessly with other security solutions, enhancing overall security posture through coordinated policy enforcement and threat response.
Primary Value and Problem Solved:
Cisco ISE addresses the critical need for secure and efficient network access control in today's complex IT environments. By providing a centralized platform for policy enforcement and endpoint management, it reduces the risk of unauthorized access and potential security breaches. Organizations benefit from enhanced visibility into network activities, streamlined compliance with security policies, and the agility to adapt to evolving security threats. Ultimately, ISE empowers businesses to maintain a resilient security posture while supporting operational continuity and growth.
10
Foxpass by Splashtop
4.7
(44)
Advanced access control for servers and WiFi. Foxpass increases your organization's server and network security by ensuring employee accounts have access only to what they need.
No Discussions for This Product Yet
Be the first to ask a question and get answers from real users and experts.
Start a discussion
Pricing
Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.
Categories on G2
Explore More
Top account-based platforms for marketing automation
Best speech-to-text app for large corporate use
What platform integrates recruiting automation with ATS systems?


