Introducing G2.ai, the future of software buying.Try now
It's been two months since this profile received a new review
Leave a Review

Trustle Reviews & Product Details

Profile Status

This profile is currently managed by Trustle but has limited features.

Are you part of the Trustle team? Upgrade your plan to enhance your branding and engage with visitors to your profile!

Product Avatar Image

Have you used Trustle before?

Answer a few questions to help the Trustle community

Trustle Reviews (1)

Reviews

Trustle Reviews (1)

4.5
1 reviews

Pros & Cons

Generated from real user reviews
View All Pros and Cons
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Rehan D.
RD
Infrastructure Manager
Mid-Market (51-1000 emp.)
"Trustle Cloud Base Security Solution"
What do you like best about Trustle?

Trustle provides a cloud-based solution for identity security and access management, automating just-in-time access and identifying risks across cloud environments. Review collected by and hosted on G2.com.

What do you dislike about Trustle?

Not found currently in that cloud security application. Review collected by and hosted on G2.com.

There are not enough reviews of Trustle for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Salesforce Platform Logo
Salesforce Platform
4.5
(3,867)
Platform as a Service (PaaS) eliminates the expense and complexity of evaluating, buying, configuring, and managing all the hardware and software needed for custom-built applications.
2
JumpCloud Logo
JumpCloud
4.5
(3,772)
The JumpCloud Directory Platform reimagines the directory as a complete platform for identity, access, and device management.
3
Okta Logo
Okta
4.5
(1,115)
Okta is The World’s Identity Company™. As the leading independent Identity partner, we free everyone to safely use any technology — anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.
4
Microsoft Entra ID Logo
Microsoft Entra ID
4.5
(854)
Entra ID is a comprehensive identity and access management cloud solution that provides a robust set of capabilities to manage users and groups and help secure access to applications including Microsoft online services like Office 365 and a world of non-Microsoft SaaS applications.
5
Wiz Logo
Wiz
4.7
(753)
Wiz is a CNAPP that consolidates CSPM, KSPM, CWPP, vulnerability management, IaC scanning, CIEM, DSPM, and container and Kubernetes security into a single platform.
6
BetterCloud Logo
BetterCloud
4.4
(476)
BetterCloud provides critical insights, automated management, and intelligent data security for cloud office platforms.
7
FortiCNAPP Logo
FortiCNAPP
4.4
(383)
FortiCNAPP is a comprehensive Cloud-Native Application Protection Platform (CNAPP) that consolidates Cloud Security Posture Management (CSPM), Cloud Workload Protection (CWPP), Cloud Infrastructure Entitlement Management (CIEM), Kubernetes security, and compliance into a single solution. Using AI-based anomaly detection and behavioral analytics, FortiCNAPP continuously monitors cloud environments to identify misconfigurations, vulnerabilities, and active threats in real time. The platform supports agentless and agent-based deployment models, ensuring flexible coverage across diverse architectures. FortiCNAPP also integrates with the Fortinet Security Fabric, correlating cloud data with network and endpoint insights from FortiGuard, FortiSOAR, and more, delivering full-stack threat context, faster remediation, and unified risk management.
8
BeyondTrust Remote Support Logo
BeyondTrust Remote Support
4.7
(369)
The #1 solution for leading enterprises to accelerate and secure your service desk with centralized, efficient, and secure access for servicing and monitoring any endpoint, anywhere, attended or not.
9
CrowdStrike Falcon Endpoint Protection Platform Logo
CrowdStrike Falcon Endpoint Protection Platform
4.6
(363)
CrowdStrike Falcon endpoint protection unifies the technologies required to successfully stop breaches: next-generation antivirus, endpoint detection and response, IT hygiene, 24/7 threat hunting and threat intelligence. They combine to provide continuous breach prevention in a single agent.
10
Orca Security Logo
Orca Security
4.6
(224)
Get workload-level visibility into AWS, Azure, and GCP without the operational costs of agents. You could buy three tools instead… but why? Orca replaces legacy vulnerability assessment tools, CSPM, and CWPP. Deploys in minutes, not months.
Show More
Discussions related to Trustle

Discussions for this product are not available at this time. Be the first one to Start a discussion

Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Trustle
View Alternatives