Xiid Zero Knowledge Networking Architecture

By Xiid

Re-claim Profile

Unlock access to Xiid Zero Knowledge Networking Architecture profile for Free

Your G2 page is often the first place buyers evaluate you. Take control of how your brand shows up

WHAT YOU UNLOCK

Control your profile

Update logo, screenshots, pricing info

Engage with customers

Respond to reviews, build trust with prospects

See buyer activity

Track who’s viewing, understand engagement

Collect reviews

Create landing page and collect reviews

Sellers who actively manage their G2 profile build more trust and convert more buyers

5.0 out of 5 stars
4 star
0%
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with Xiid Zero Knowledge...?

It's been two months since this profile received a new review
Leave a Review
Compare this with other toolsSave it to your board and evaluate your options side by side.
Save to board

Xiid Zero Knowledge Networking Architecture Reviews & Product Details

Product Avatar Image

Have you used Xiid Zero Knowledge Networking Architecture before?

Answer a few questions to help the Xiid Zero Knowledge Networking Architecture community

Xiid Zero Knowledge Networking Architecture Reviews (3)

Reviews

Xiid Zero Knowledge Networking Architecture Reviews (3)

5.0
3 reviews
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
MG
Mid-Market (51-1000 emp.)
"The best technology at the best price"
What do you like best about Xiid Zero Knowledge Networking Architecture?

A military-grade technology to get a piece of data from point A to point B, using deception against adversaries. A new way of understanding cyber security. Review collected by and hosted on G2.com.

What do you dislike about Xiid Zero Knowledge Networking Architecture?

Everything is improvable in life ... we look forward to the release of smartphone protection. Review collected by and hosted on G2.com.

Verified User in Consulting
EC
Small-Business (50 or fewer emp.)
"Filling the liquid security and encryption gaps in a COTS product world."
What do you like best about Xiid Zero Knowledge Networking Architecture?

The solution fills gaps that all other COTS products to not address. Albiet a compliment to a COTS product or a replacement for your current solution, XIID address and enhances the security postures with a unique new age approach using simplicity and the highest level of security on the market. Review collected by and hosted on G2.com.

What do you dislike about Xiid Zero Knowledge Networking Architecture?

CISO's have to decide to add this to their existing security stack of COTS products. It compliments and / or can replace parts of your existing tech stack and that causes management decision delays. Review collected by and hosted on G2.com.

Patrick R.
PR
Small-Business (50 or fewer emp.)
"Amazing technology built by an amazing team."
What do you like best about Xiid Zero Knowledge Networking Architecture?

I appreciate the thouroughness of the whole solutions offered by Xiid. It covers the most important part of cybersecurity in a manner that no one else can offer. Review collected by and hosted on G2.com.

What do you dislike about Xiid Zero Knowledge Networking Architecture?

I would love to see a mobile version of their solution. Review collected by and hosted on G2.com.

There are not enough reviews of Xiid Zero Knowledge Networking Architecture for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Okta Logo
Okta
4.5
(1,221)
Okta is The World’s Identity Company™. As the leading independent Identity partner, we free everyone to safely use any technology — anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.
2
Check Point Next Generation Firewalls (NGFWs) Logo
Check Point Next Generation Firewalls (NGFWs)
4.5
(580)
Check Point Firewall. The Check Point Firewall Software Blade incorporates all of the power and capability of the revolutionary FireWall-1 solution while adding user identity awareness to provide granular event awareness and policy enforcement.
3
Cisco Duo Logo
Cisco Duo
4.5
(510)
Duo is a cloud-based access security platform built to protect access to any application, from any device. Duo’s passwordless authentication, single sign-on (SSO) and user-friendly multi-factor authentication make secure logins easy for users, reducing friction to their workflow.
4
BetterCloud Logo
BetterCloud
4.4
(478)
BetterCloud provides critical insights, automated management, and intelligent data security for cloud office platforms.
5
ThreatLocker Platform Logo
ThreatLocker Platform
4.8
(472)
Get unprecedented visibility and control of your cybersecurity, quickly, easily, and cost-effectively. Schedule a free product demonstration and ThreatLocker will show you how.
6
FortiClient Logo
FortiClient
4.4
(274)
FortiClient Fabric Agent integrates endpoints into the Security Fabric and provides endpoint telemetry, including user identity, protection status, risk scores, unpatched vulnerabilities, security events, and more.
7
TrendAI Vision One Logo
TrendAI Vision One
4.7
(232)
Trend Micro Vision One (XDR) collects and correlates deep activity data across multiple vectors - email, endpoints, servers, cloud workloads, and networks - enabling a level of detection and investigation that is difficult or impossible to achieve with SIEM or individual point solutions.
8
Absolute Secure Access Logo
Absolute Secure Access
4.7
(225)
Absolute Secure Access delivers modern remote access for highly mobile workforces without sacrificing productivity. It provides reliable network connectivity for users to securely access critical resources in the public cloud, private data centers, or on-premises -- even in challenging environments. It is the only solution that proactively optimizes and improves the employee experience while offering deep visibility, control, and analytics to IT administrators.
9
Check Point SASE Logo
Check Point SASE
4.5
(213)
Check Point Harmony SASE is a converged networking and network security platform which connects all users, in the office or remote, to all resources, located on-prem, cloud, SaaS or web. It delivers secure Zerto Trust Network Access (ZTNA) connectivity along web protection capabilities including Internet access control, malware protection, data loss prevention(DLP), and sandboxing, as well as a firewall as a service. The solution employs a hybrid architecture, combining on-device and cloud-based protections, which delivers market leading security and performance.
10
Check Point CloudGuard Network Security Logo
Check Point CloudGuard Network Security
4.5
(185)
Check Point CloudGuard Network Security for private and public cloud platforms is designed to protect assets in the cloud against the most sophisticated threats.
Show More
People Icons

Start a Discussion about Xiid Zero Knowledge Networking Architecture

Have a software question? Get answers from real users and experts.

Start a Discussion
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Xiid Zero Knowledge...