# Xage Security Reviews
**Vendor:** Xage Security  
**Category:** [OT Secure Remote Access Software](https://www.g2.com/categories/ot-secure-remote-access)  
**Average Rating:** 4.0/5.0  
**Total Reviews:** 1
## About Xage Security
The Xage Security Suite delivers comprehensive security for industrial operations, protecting every element, new or legacy, and every interaction: human-to-machine, machine-to-machine, or edge-to-cloud.




## Xage Security Reviews
  ### 1. Greater understanding of possible weaknesses in our equipment

**Rating:** 4.0/5.0 stars

**Reviewed by:** Giuseppe L. | Global Expansion Manager, Primary/Secondary Education, Enterprise (> 1000 emp.)

**Reviewed Date:** December 06, 2024

**What do you like best about Xage Security?**

I found that the agentless architecture of Xage Fabric convenient for me. This makes for easy deployment and reduces the chances of interrupting business that is already in progress.  Compared to other traditional ways of security it is more effective.

**What do you dislike about Xage Security?**

Xage does not install agents within the device itself, it cannot generate detailed reports on software versions and possible weaknesses inherent to the equipment. This has the effect of making it difficult to have a comprehensive view of the security situation.

**What problems is Xage Security solving and how is that benefiting you?**

The Xage Fabric Platform for OT security does not require the deployment of agents in order to make its processes effective.  This makes it easier to install and also minimizes the chances of operational interuptions.



- [View Xage Security pricing details and edition comparison](https://www.g2.com/products/xage-security/reviews?section=pricing&secure%5Bexpires_at%5D=2026-05-16+19%3A49%3A52+-0500&secure%5Bsession_id%5D=7742ed27-54a9-44b9-922b-9357da45106f&secure%5Btoken%5D=6aa782ad590ed984b88d05093ba3792bde3210685223ef2ac42723f09115cab8&format=llm_user)

## Xage Security Features
**Administration**
- Policy, User, and Role Management
- Approval Workflows
- Automated Provisioning
- Bulk Changes
- Centralized Management
- Self-Service Access Requests

**Connected Device Security**
- Vulnerability Assessment
- Identity Lifecycle
- Threat Protection
- Behavior Analysis
- Incident Response
- IoT Network Security
- OTA Updates
- Alerts & Notifications

**Administration**
- Policy Enforcement
- Dependency Mapping
- Network Mapping

**Administration**
- User, Role, and Access Management
- Policy, User, and Role Management - Privileged Access Manager
- Network Mapping
- Governance

**Functionality**
- Multi-Factor Authentication
- Single Sign-On
- BYOD support
- Password Vault
- Centralized management
- Role-based security
- Live notifications
- Live session recording & playback
- Hide passwords
- Temporary, time-limited privilege

**Platform**
- Dashboard
- Hardware
- Performance
- Reporting

**Enforcement**
- Identity-Based Policy Management
- Workflow Automation
- Network Segmentation
- Intelligent Segmentation
- Workload Protection

**Functionality**
- Temporary, time-limited privilege
- Network Segmentation
- Adaptive Access Control
- Access Control
- Workflows

**Monitoring**
- Audit Logging
- Activity Logging
- Anomaly Detection

**Visibility**
- Breach Detection
- Observability
- Application Discovery

**Reporting**
- Reporting
- Audit Logs
- Activity Monitoring
- Security Frameworks

**Reporting**
- Audit log
- Reporting

## Top Xage Security Alternatives
  - [Agentforce 360 Platform (formerly Salesforce Platform)](https://www.g2.com/products/agentforce-360-platform-formerly-salesforce-platform/reviews) - 4.5/5.0 (3,775 reviews)
  - [JumpCloud](https://www.g2.com/products/jumpcloud/reviews) - 4.5/5.0 (3,835 reviews)
  - [Microsoft Entra ID](https://www.g2.com/products/microsoft-entra-id/reviews) - 4.5/5.0 (868 reviews)

