Introducing G2.ai, the future of software buying.Try now
Insight Assurance
Sponsored
Insight Assurance
Visit Website
Product Avatar Image
Verizon Software Defined Perimeter

By Verizon Enterprise

Unclaimed Profile

Claim your company’s G2 profile

Claiming this profile confirms that you work at Verizon Software Defined Perimeter and allows you to manage how it appears on G2.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Claim Now
4.0 out of 5 stars
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with Verizon Software Defined Perimeter?

Insight Assurance
Sponsored
Insight Assurance
Visit Website
This product hasn't been reviewed yet! Be the first to share your experience.
Leave a Review

Verizon Software Defined Perimeter Reviews & Product Details

Product Avatar Image

Have you used Verizon Software Defined Perimeter before?

Answer a few questions to help the Verizon Software Defined Perimeter community

Verizon Software Defined Perimeter Reviews (2)

Reviews

Verizon Software Defined Perimeter Reviews (2)

4.0
2 reviews

Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Verified User in Education Management
AE
Small-Business (50 or fewer emp.)
"The Cybersecurity solution to use!"
What do you like best about Verizon Software Defined Perimeter?

Verizon Software Defined Perimeter is designed specifically to improve security with something called their 'Zero Trust Model'. It basically ensures that users and devices must have to authorise access before entering a business's networks.

There are a large number of features hence integration can become complex, however users will soon be able to adjust to the service and find themselves frequently using it! And when a business as a whole may need support, Verizon do a good job in suppying customer support Review collected by and hosted on G2.com.

What do you dislike about Verizon Software Defined Perimeter?

Implementing Verizon's SDP can sometimes be a bit complex, particularly when it comes to large and expansive networks. And so, this may require significant planning and resources to ensure it is set up successfully.

Although the service can improve security, it can also implement functions that decrease a user's ease of use as their ability to do simple functions now have additional steps. Review collected by and hosted on G2.com.

Verified User in Hospital & Health Care
AH
Enterprise (> 1000 emp.)
"Software defined virtual security perimeter to block cyber attacks."
What do you like best about Verizon Software Defined Perimeter?

Very easy to implement as this is cloud based solution. Security is taken care of in the real time. Review collected by and hosted on G2.com.

What do you dislike about Verizon Software Defined Perimeter?

Not so many issues while we were planning to implement this solution Review collected by and hosted on G2.com.

There are not enough reviews of Verizon Software Defined Perimeter for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Absolute Secure Access Logo
Absolute Secure Access
4.7
(224)
Absolute Secure Access delivers modern remote access for highly mobile workforces without sacrificing productivity. It provides reliable network connectivity for users to securely access critical resources in the public cloud, private data centers, or on-premises -- even in challenging environments. It is the only solution that proactively optimizes and improves the employee experience while offering deep visibility, control, and analytics to IT administrators.
2
FortiGate-VM NGFW Logo
FortiGate-VM NGFW
4.7
(205)
FortiGate offers a network security platform, designed to deliver threat protection and performance with reduced complexity.
3
GoodAccess Logo
GoodAccess
4.7
(160)
GoodAccess is a Zero Trust cybersecurity platform (SASE/SSE) built for medium-sized businesses (50–5000+ employees). It enables rapid, low-code/no-code deployment—without hardware or expert staff—to secure remote and hybrid teams. With identity-based access, BYOD protection, network segmentation, and full visibility, GoodAccess simplifies enterprise-grade security for modern, multi-cloud environments.
4
Zscaler Internet Access Logo
Zscaler Internet Access
4.4
(156)
Zscaler Internet Access delivers the complete security stack as a service from the cloud.
5
Check Point Harmony SASE Logo
Check Point Harmony SASE
4.6
(152)
Check Point Harmony SASE is a converged networking and network security platform which connects all users, in the office or remote, to all resources, located on-prem, cloud, SaaS or web. It delivers secure Zerto Trust Network Access (ZTNA) connectivity along web protection capabilities including Internet access control, malware protection, data loss prevention(DLP), and sandboxing, as well as a firewall as a service. The solution employs a hybrid architecture, combining on-device and cloud-based protections, which delivers market leading security and performance.
6
OpenVPN CloudConnexa Logo
OpenVPN CloudConnexa
4.6
(116)
CloudConnexa provides secure communication between an organization’s distributed workforce, IoT/IIoT devices, and the online services they rely on daily with a secure virtualized network, based on the market-proven OpenVPN protocol. Get started with 3 free connections.
7
Ivanti Connect Secure Logo
Ivanti Connect Secure
4.3
(87)
Ivanti Secure offers Always-On VPN and Lockdown Mode for compliance-focused businesses. These features protect all network traffic; from your team’s laptops at home to your corporate network, Ivanti Secure helps reduce the possibility of data loss or leakage. When an end user logs into their laptop using our Always-On VPN, our desktop client automatically makes a secure connection to the Ivanti Connect Secure gateway. Once connected, all traffic from the laptop is sent via a protected tunnel. Furthermore, the end user will remain constantly connected to the tunnel, ensuring that data-in-motion remains secure.
8
Twingate Logo
Twingate
4.7
(74)
Twingate secures remote access to private apps, data and environments, allowing businesses to replace corporate VPNs with a more secure, usable, performant and modern zero trust-based solution.
9
Prisma Access Logo
Prisma Access
4.3
(73)
Secure access service edge (SASE) for branch offices, retail locations and mobile users
10
Citrix Secure Private Access Logo
Citrix Secure Private Access
4.5
(69)
Citrix Secure Workspace Access provides a comprehensive, zero-trust approach to deliver secure and contextual access to the corporate internal web apps, SaaS, and virtual applications. It enables the consolidation of traditional security products like VPN, single sign-on, and browser isolation technologies and provides advanced security controls for managed, unmanaged, and BYO devices. Citrix Secure Workspace Access provides a holistic security approach based on zero-trust principles, protecting users, applications, and corporate data against internet web threats and data exfiltration.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.