Trustwave UTM

By Trustwave

Unclaimed Profile

Claim Trustwave UTM profile for Free

Your G2 page is often the first place buyers evaluate you. Take control of how your brand shows up.

WHAT YOU UNLOCK

Control your profile

Update logo, screenshots, pricing info

Engage with customers

Respond to reviews, build trust with prospects

See buyer activity

Track who’s viewing, understand engagement

Collect reviews

Create landing page and collect reviews

Sellers who actively manage their G2 profile build more trust and convert more buyers

4.0 out of 5 stars
5 star
0%
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with Trustwave UTM?

It's been two months since this profile received a new review
Leave a Review
Compare this with other toolsSave it to your board and evaluate your options side by side.
Save to board

Trustwave UTM Reviews & Product Details

Product Avatar Image

Have you used Trustwave UTM before?

Answer a few questions to help the Trustwave UTM community

Trustwave UTM Reviews (2)

Reviews

Trustwave UTM Reviews (2)

4.0
2 reviews
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Shumaiz A.
SA
Cto
Mid-Market (51-1000 emp.)
"Trustwave UTM provided me with a secure and user-friendly platform for managing my network."
What do you like best about Trustwave UTM?

The most helpful thing about Trustwave UTM is its comprehensive security features, which are designed to protect networks against a variety of threats. Other upside benefits include user-friendly management tools, granular control over user access, and integrated logging and reporting capabilities. Review collected by and hosted on G2.com.

What do you dislike about Trustwave UTM?

The downside of Trustwave UTM is the product cost, which is higher than other solutions on the market. Additionally, the set-up process can be complicated and time-consuming. Review collected by and hosted on G2.com.

David O.
DO
General Manager
Small-Business (50 or fewer emp.)
"A great tool for protecting your website and reputation"
What do you like best about Trustwave UTM?

My company has used Trustwave for years, starting with their PCI compliance offering. They have kept up their high level of service as they have expanded into UTM Review collected by and hosted on G2.com.

What do you dislike about Trustwave UTM?

Trustwave's products are simple to use but I wish that their support functionality was just a little more robust. For example, an online chat feature could be useful. Review collected by and hosted on G2.com.

There are not enough reviews of Trustwave UTM for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Check Point Next Generation Firewalls (NGFWs) Logo
Check Point Next Generation Firewalls (NGFWs)
4.5
(579)
Check Point Firewall. The Check Point Firewall Software Blade incorporates all of the power and capability of the revolutionary FireWall-1 solution while adding user identity awareness to provide granular event awareness and policy enforcement.
2
WatchGuard Network Security Logo
WatchGuard Network Security
4.7
(267)
WatchGuard has deployed nearly a million integrated, multi-function threat management appliances worldwide. Our signature red boxes are architected to be the industry's smartest, fastest, and meanest security devices with every scanning engine running at full throttle.
3
FortiGate-VM NGFW Logo
FortiGate-VM NGFW
4.6
(229)
FortiGate offers a network security platform, designed to deliver threat protection and performance with reduced complexity.
4
Cisco Meraki Logo
Cisco Meraki
4.3
(216)
Cisco Meraki is a cloud-managed IT solutions provider that simplifies the management of complex networks through a centralized, web-based dashboard. Their comprehensive product portfolio includes wireless access points, switches, security appliances, and IoT devices, all designed to deliver secure, scalable, and high-performance networking experiences. Key Features and Functionality: - Cloud-Managed Access: Meraki's wireless access points and switches enable seamless connectivity for users, devices, and applications, ensuring robust security and simplified management from the edge to the cloud. - Software-Defined WAN (SD-WAN): Their SD-WAN solutions connect users and sites to applications over wide area networks without compromising security, speed, or user experience. - Connected IoT Solutions: Meraki offers smart cameras and sensors that create intuitive and secure experiences for various environments, including workplaces and educational institutions. - Centralized Management: The Meraki dashboard provides a unified platform to monitor, manage, and optimize the entire network infrastructure, offering real-time visibility and control. Primary Value and User Solutions: Cisco Meraki addresses the challenges of managing complex IT infrastructures by offering a cloud-first platform that simplifies deployment, monitoring, and troubleshooting. By integrating networking and security capabilities, Meraki enables organizations to deliver exceptional network experiences, enhance operational efficiency, and adapt to evolving business needs with agility. This approach reduces operational expenses and allows IT teams to focus on strategic initiatives rather than routine maintenance tasks.
5
Check Point SASE Logo
Check Point SASE
4.5
(214)
Check Point Harmony SASE is a converged networking and network security platform which connects all users, in the office or remote, to all resources, located on-prem, cloud, SaaS or web. It delivers secure Zerto Trust Network Access (ZTNA) connectivity along web protection capabilities including Internet access control, malware protection, data loss prevention(DLP), and sandboxing, as well as a firewall as a service. The solution employs a hybrid architecture, combining on-device and cloud-based protections, which delivers market leading security and performance.
6
SonicWall Next Generation Firewall Logo
SonicWall Next Generation Firewall
4.1
(152)
SonicWall real-time breach detection and prevention solutions protect more than one million networks worldwide.
7
Sophos United Threat Management Logo
Sophos United Threat Management
4.1
(89)
The global network of highly skilled researchers and analysts, protecting businesses from known and emerging malware - viruses, rootkits and spyware.
8
Heimdal Logo
Heimdal
4.3
(60)
Heimdal® is a leading cybersecurity provider offering a comprehensive suite of solutions designed to protect organizations from a wide range of digital threats. Established in 2014, Heimdal has developed an integrated platform that combines advanced threat prevention, detection, and response capabilities, ensuring robust security across endpoints, networks, and email systems. Their unified approach simplifies IT operations, enhances threat visibility, and provides real-time defense mechanisms against sophisticated cyberattacks. Key Features and Functionality: - Threat Prevention: Utilizes advanced DNS filtering and predictive technologies to proactively block malicious domains and prevent cyber threats before they infiltrate systems. - Vulnerability Management: Automates the deployment of patches for Microsoft, Linux, and third-party applications, ensuring systems remain up-to-date and secure. - Next-Generation Antivirus: Offers real-time detection and mitigation of malware, ransomware, and other malicious activities through AI-driven analysis. - Privileged Access Management (PAM: Controls and monitors administrative rights, reducing the risk of insider threats and unauthorized access. - Email Security: Protects against phishing, business email compromise, and other email-based threats by analyzing and filtering incoming communications. - Unified Threat Platform: Provides a centralized dashboard for managing all security solutions, offering comprehensive visibility and control over the organization's cybersecurity posture. Primary Value and Problem Solved: Heimdal's integrated cybersecurity platform addresses the complexity and fragmentation often associated with managing multiple security solutions. By consolidating various security functions into a single, user-friendly interface, Heimdal enables organizations to streamline their security operations, reduce administrative overhead, and enhance their overall defense against evolving cyber threats. This unified approach not only improves operational efficiency but also ensures a more resilient and proactive security posture, safeguarding critical assets and sensitive information from potential breaches.
9
Barracuda CloudGen Firewall Logo
Barracuda CloudGen Firewall
4.5
(50)
A Next-Generation firewall for the Cloud Era.
10
OpenCTI by Filigran Logo
OpenCTI by Filigran
4.7
(39)
Filigran provides threat intelligence, adversary simulation and crisis response open solutions.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Trustwave UTM