  # Best Zero Trust Networking Software

  *By [Brandon Summers-Miller](https://research.g2.com/insights/author/brandon-summers-miller)*

   Zero trust networking software implements the zero trust security model, which assumes every user, internal or external, is a potential threat until verified. Unlike traditional castle-and-moat security systems, these solutions continuously monitor network activity and user behavior, adapting authentication requirements based on individual risk signals to enforce strict access controls across decentralized networks and locations.

### Core Capabilities of Zero Trust Networking Software

To qualify for inclusion in the Zero Trust Networking category, a product must:

- Utilize adaptive authentication to continuously verify user permissions
- Allow for network segmentation to simplify and broaden policy enforcement
- Monitor traffic and user behavior for ongoing inspection and analysis

### How Zero Trust Networking Software Differs from Other Tools

Zero trust networking software uses similar authentication methods to [risk-based authentication software](https://www.g2.com/categories/risk-based-authentication), but is specifically designed for network access control. Risk-based authentication applies broadly, to networks, applications, databases, and other privileged resources, while zero trust networking is purpose-built to enforce least-privilege access across network infrastructure, making it the preferred choice for organizations managing complex, distributed IT environments.

### Insights from G2 on Zero Trust Networking Software

Based on category trends on G2, continuous verification and behavioral monitoring stand out as the standout features driving adoption. Security teams from enterprises with distributed workforces note that zero trust networking is essential for managing access controls across multiple locations and cloud environments without relying on perimeter-based defenses.




  ## How Many Zero Trust Networking Software Products Does G2 Track?
**Total Products under this Category:** 151

  
## How Does G2 Rank Zero Trust Networking Software Products?

**Why You Can Trust G2's Software Rankings:**

- 30 Analysts and Data Experts
- 7,400+ Authentic Reviews
- 151+ Products
- Unbiased Rankings

G2's software rankings are built on verified user reviews, rigorous moderation, and a consistent research methodology maintained by a team of analysts and data experts. Each product is measured using the same transparent criteria, with no paid placement or vendor influence. While reviews reflect real user experiences, which can be subjective, they offer valuable insight into how software performs in the hands of professionals. Together, these inputs power the G2 Score, a standardized way to compare tools within every category.

  
## Top Zero Trust Networking Software at a Glance
| # | Product | Rating | Best For | What Users Say |
|---|---------|--------|----------|----------------|
| 1 | [Zscaler Private Access](https://www.g2.com/products/zscaler-private-access/reviews) | 4.4/5.0 (132 reviews) | App-level access without traditional VPNs | "[Zscaler Private Access: Stable, Secure VPN Alternative That Streamlines Daily Work](https://www.g2.com/survey_responses/zscaler-private-access-review-12629828)" |
| 2 | [Cisco Duo](https://www.g2.com/products/cisco-duo/reviews) | 4.5/5.0 (492 reviews) | MFA and trusted device access | "[Cisco DUO has been our most reliable 2FA solution so far](https://www.g2.com/survey_responses/cisco-duo-review-12662471)" |
| 3 | [Okta](https://www.g2.com/products/okta/reviews) | 4.5/5.0 (1,196 reviews) | SSO and identity-based access control | "[Intuitive UI, Easy Integrations, and Reliable Okta Uptime](https://www.g2.com/survey_responses/okta-review-12721974)" |
| 4 | [ThreatLocker Platform](https://www.g2.com/products/threatlocker-platform/reviews) | 4.8/5.0 (473 reviews) | Application control and default-deny security | "[Quiet, Reliable Security That Just Works in the Background](https://www.g2.com/survey_responses/threatlocker-platform-review-12665226)" |
| 5 | [FortiClient](https://www.g2.com/products/forticlient/reviews) | 4.4/5.0 (268 reviews) | Unified endpoint access and ZTNA client | "[Seamless and Reliable Security Management](https://www.g2.com/survey_responses/forticlient-review-12727398)" |
| 6 | [Palo Alto Networks IoT/OT Security](https://www.g2.com/products/palo-alto-networks-iot-ot-security/reviews) | 4.4/5.0 (117 reviews) | — | "[Palo Alto Networks IoT/OT Security – Intelligent Visibility with Real-World Impact](https://www.g2.com/survey_responses/palo-alto-networks-iot-ot-security-review-11913838)" |
| 7 | [Illumio](https://www.g2.com/products/illumio/reviews) | 4.6/5.0 (32 reviews) | Microsegmentation for data centers and servers | "[Illuminates Traffic for Enhanced Network Control](https://www.g2.com/survey_responses/illumio-review-12634132)" |
| 8 | [Netskope One Platform](https://www.g2.com/products/netskope-one-platform/reviews) | 4.4/5.0 (70 reviews) | Cloud and web traffic visibility | "[Practical and Reliable SSE Platform for Daily Enterprise Security Operations](https://www.g2.com/survey_responses/netskope-one-platform-review-12795571)" |
| 9 | [Cato SASE Cloud](https://www.g2.com/products/cato-networks-cato-sase-cloud/reviews) | 4.5/5.0 (80 reviews) | SASE with unified network and security controls | "[It’s very good and everything is in cloud](https://www.g2.com/survey_responses/cato-sase-cloud-review-11237657)" |
| 10 | [GoodAccess](https://www.g2.com/products/goodaccess/reviews) | 4.7/5.0 (164 reviews) | Static IP access for remote teams | "[Seamless Setup and Secure, Centralized VPN Access with Static IPs](https://www.g2.com/survey_responses/goodaccess-review-12716014)" |

  
## Which Zero Trust Networking Software Is Best for Your Use Case?

- **Leader:** [Zscaler Private Access](https://www.g2.com/products/zscaler-private-access/reviews)
- **Highest Performer:** [GoodAccess](https://www.g2.com/products/goodaccess/reviews)
- **Easiest to Use:** [ThreatLocker Platform](https://www.g2.com/products/threatlocker-platform/reviews)
- **Top Trending:** [ThreatLocker Platform](https://www.g2.com/products/threatlocker-platform/reviews)
- **Best Free Software:** [ThreatLocker Platform](https://www.g2.com/products/threatlocker-platform/reviews)

  
## Which Type of Zero Trust Networking Software Tools Are You Looking For?
  - [Zero Trust Networking Software](https://www.g2.com/categories/zero-trust-networking) *(current)*
  - [Network Access Control Software](https://www.g2.com/categories/network-access-control-nac)
  - [Cloud Access Security Broker (CASB) Software](https://www.g2.com/categories/cloud-access-security-broker-casb)
  - [Software-Defined Perimeter (SDP) Software](https://www.g2.com/categories/software-defined-perimeter-sdp)
  - [Cloud Edge Security Software](https://www.g2.com/categories/cloud-edge-security)
  - [Secure Access Service Edge (SASE) Platforms](https://www.g2.com/categories/secure-access-service-edge-sase-platforms)
  - [Zero Trust Platforms](https://www.g2.com/categories/zero-trust-platforms)
  - [Secure Service Edge (SSE) Solutions](https://www.g2.com/categories/secure-service-edge-sse-solutions)

  
---

**Sponsored**

### OpenVPN CloudConnexa

CloudConnexa®, powered by OpenVPN, is the leader in delivering premium, enterprise-grade network security accessible to businesses of all sizes. Easy to set up and simple to deploy, CloudConnexa&#39;s cloud-native service provides scalable secure network and resource access no matter where employees work, or corporate resources are based.



[Visit website](https://www.g2.com/external_clickthroughs/record?secure%5Bad_program%5D=ppc&amp;secure%5Bad_slot%5D=category_product_list&amp;secure%5Bcategory_id%5D=1848&amp;secure%5Bdisplayable_resource_id%5D=1848&amp;secure%5Bdisplayable_resource_type%5D=Category&amp;secure%5Bmedium%5D=sponsored&amp;secure%5Bplacement_reason%5D=page_category&amp;secure%5Bplacement_resource_ids%5D%5B%5D=1848&amp;secure%5Bprioritized%5D=false&amp;secure%5Bproduct_id%5D=23475&amp;secure%5Bresource_id%5D=1848&amp;secure%5Bresource_type%5D=Category&amp;secure%5Bsource_type%5D=category_page&amp;secure%5Bsource_url%5D=https%3A%2F%2Fwww.g2.com%2Fcategories%2Fzero-trust-networking&amp;secure%5Btoken%5D=40dd0d76946afbd523269520b232aca2bf8e4741cb328d9a40c1b0102e10b7ee&amp;secure%5Burl%5D=https%3A%2F%2Fopenvpn.net%2Fcloud-vpn%2Fpricing%2F%3Futm_source%3Dg2%26utm_medium%3Dpaid&amp;secure%5Burl_type%5D=free_trial)

---

  
## Buyer Guide: Key Questions for Choosing Zero Trust Networking Software Software
  ### What does Zero Trust Networking software do?
  I define Zero Trust Networking software as an access-control layer for private applications, networks, devices, and workloads. It checks identity, device trust, policy, and context before a user or device reaches a resource. From what I see across G2 reviewer accounts, these platforms are used to narrow access through MFA, device posture checks, certificates, network segmentation, private app access, policy rules, and activity monitoring. Instead of giving users broad network entry through older VPN models, the software helps security teams grant access to specific resources under specific conditions.


  ### Why do businesses use Zero Trust Networking software?
  When I reviewed G2 sentiment in this category, the recurring pressure point was access risk. Remote work, contractor access, unmanaged devices, and exposed internal applications all made it harder for teams to trust network-level access alone.

From the patterns I evaluated, several outcomes show up consistently:

- Reviewers describe secure remote access as a core use case, especially for distributed teams and users working outside the office.
- Many appreciate MFA, 2FA, SSO, certificates, and posture checks because access decisions account for both the user and the device.
- Security teams use these tools to reduce broad VPN exposure, hide private applications, and limit movement across the network.
- Admins value logs, alerts, device visibility, and policy views because they make access activity easier to review.

However, reviewers also point to setup effort, certificate handling, console complexity, offline access, reporting limits, pricing, and policy tuning as areas that need close evaluation.


  ### Who uses Zero Trust Networking software primarily?
  After analyzing G2 reviewer profiles, I found that Zero Trust Networking software serves teams that manage secure access, network control, and device trust.

- **Security administrators:** Define access policies, review authentication activity, and monitor risk signals.
- **Network engineers:** Manage segmentation, routing, certificates, private access paths, and traffic controls.
- **IT administrators:** Roll out MFA, manage users and devices, troubleshoot access, and support day-to-day connectivity.
- **Infrastructure teams:** Protect internal apps, servers, cloud environments, and hybrid access paths.
- **MSPs and consultants:** Deploy and manage zero trust controls across client environments.


  ### What types of Zero Trust Networking software should I consider?
  When I examined how reviewers describe the products in this category, Zero Trust Networking platforms generally cluster into a few groups:

- **Zero trust network access tools:** Built for private application access, remote users, identity checks, and reduced VPN exposure.
- **SASE and SSE platforms:** Combine secure access with web security, cloud app control, and policy enforcement.
- **MFA and identity access tools:** Focus on user verification, SSO, adaptive access, and login protection.
- **Network access control tools:** Manage certificates, device onboarding, wired or wireless access, and endpoint visibility.
- **Microsegmentation tools:** Limit lateral movement, map traffic, and contain breach spread.


  ### What are the core features to look for in Zero Trust Networking software?
  From the G2 review patterns I evaluated, the strongest tools tend to combine access control with usable administration.

- **Identity-based policies** with MFA, SSO, role rules, and conditional access.
- **Device posture checks,** endpoint visibility, certificates, and compliance status.
- **Private application access** that limits exposure of internal systems.
- **Network segmentation** or microsegmentation for containment.
- **Policy creation, policy testing, alerts,** access logs, and reporting.
- **Integrations** with identity providers, directories, endpoint tools, SIEM platforms, and cloud environments.
- **Admin controls** for user groups, fallback access, offline codes, and certificate handling.
- Stable client performance, clear setup steps, and support during rollout or access issues.


  ### What trends are shaping Zero Trust Networking software right now?
  From my analysis of recent reviewer discussions and current security guidance, several shifts are reshaping this category:

- **Resource-level access is replacing broad network access:** Security teams are granting access to specific applications and workloads rather than entire networks.
- **Device trust is becoming central to access decisions:** Posture checks, certificates, and endpoint compliance are now part of the access flow.
- **Microsegmentation is becoming more practical:** Teams are using smaller access zones to reduce lateral movement after a breach.
- **Zero trust rollouts are becoming phased programs:** Organizations are moving from broad strategy to step-by-step maturity plans.
- **Visibility and governance are getting more weight:** Access logs, policy controls, and cross-domain reporting are becoming core buying criteria.


  ### How should I choose Zero Trust Networking software?
  Based on the G2 review data I analyzed, I suggest choosing around the access risk your team needs to reduce first. For remote access, the strongest fit should handle private app access, MFA, device posture, client reliability, and user setup cleanly. Lateral movement concerns call for segmentation, traffic mapping, policy testing, and reporting. Identity and device-control gaps require closer review of SSO, certificates, posture checks, offline access, and admin workflows. I also advise weighing rollout effort, console usability, integrations, pricing, and support quality, since reviewers often connect those details with long-term success.



---

  ## What Are the Top-Rated Zero Trust Networking Software Products in 2026?
### 1. [Zscaler Private Access](https://www.g2.com/products/zscaler-private-access/reviews)
  **Average Rating:** 4.4/5.0
  **Total Reviews:** 132
  **Why buyers love it?:** After I reviewed Zscaler Private Access feedback, I placed it around secure app access that removes broad network exposure. Reviewers call out client connector access, app-level controls, identity and device posture checks, background connectivity, and easier remote access to internal systems. A strong fit for teams that want private app access controlled by user and device context.



### What Do G2 Reviewers Say About Zscaler Private Access?
*AI-generated summary from verified user reviews*

**Pros:**

- Users value the **always-on security** of Zscaler Private Access, ensuring uninterrupted and safe access to applications.
- Users appreciate the **ease of use** of Zscaler Private Access, enjoying quick updates and simple management.
- Users value the **secure and seamless access** provided by Zscaler Private Access, enhancing security without traditional VPNs.
- Users value the **efficiency of seamless access** to applications without the need for traditional VPN connections.
- Users value the **reliable always-on security** of Zscaler Private Access, ensuring protected access without slowing down performance.

**Cons:**

- Users experience **connection issues** with Zscaler, including frustrating re-sign-ins and poor performance during network fluctuations.
- Users find **error handling challenging** in Zscaler Private Access, complicating troubleshooting and connectivity solutions.
- Users experience **slow loading** times with Zscaler Private Access, impacting their overall connectivity and browsing speed.
- Users find Zscaler Private Access **expensive** , especially smaller businesses that compare pricing to traditional VPN solutions.
- Users report experiencing **slow internet** issues with Zscaler Private Access, affecting connectivity and overall performance.

#### Key Features
  - Authentication User experience
  - Password Policy Enforcement
  - Multi-Domain Support
  - Network Mapping
  - Security Automation
  #### What Are Recent G2 Reviews of Zscaler Private Access?

**"[Seamless Security Without VPN Hassle](https://www.g2.com/survey_responses/zscaler-private-access-review-12599410)"**

**Rating:** 4.5/5.0 stars
*— Betül B.*

[Read full review](https://www.g2.com/survey_responses/zscaler-private-access-review-12599410)

---

**"[Zscaler Private Access: Stable, Secure VPN Alternative That Streamlines Daily Work](https://www.g2.com/survey_responses/zscaler-private-access-review-12629828)"**

**Rating:** 4.0/5.0 stars
*— Esma Y.*

[Read full review](https://www.g2.com/survey_responses/zscaler-private-access-review-12629828)

---

  #### What Are G2 Users Discussing About Zscaler Private Access?

- [What are the 6 components of ZPA solution?](https://www.g2.com/discussions/what-are-the-6-components-of-zpa-solution)
- [What does zscaler software do?](https://www.g2.com/discussions/zscaler-private-access-what-does-zscaler-software-do) - 1 comment
- [What is private access zscaler?](https://www.g2.com/discussions/what-is-private-access-zscaler) - 1 comment
### 2. [Cisco Duo](https://www.g2.com/products/cisco-duo/reviews)
  **Average Rating:** 4.5/5.0
  **Total Reviews:** 492
  **Why buyers love it?:** Cisco Duo’s G2 reviews gave me a clear read on identity verification through MFA, device trust, and simple access checks. Users point to push approvals, phone-based verification, Trusted Endpoints, broad app coverage, technical support, and protection against compromised credentials. Works well for teams that need stronger login security without making daily access feel difficult.



### What Do G2 Reviewers Say About Cisco Duo?
*AI-generated summary from verified user reviews*

**Pros:**

- Users appreciate the **ease of use** of Cisco Duo, praising its seamless deployment and user-friendly authentication process.
- Users appreciate the **quick and user-friendly security** of Cisco Duo, ensuring fast, reliable access with minimal effort.
- Users appreciate the **stronger security features** of Cisco Duo, benefiting from easy-to-use multi-factor authentication.
- Users appreciate the **easy approval process** of Cisco Duo, enabling quick access to secure systems without hassle.
- Users appreciate the **ease of authentication** with Cisco Duo, praising its simple multi-factor login options.

**Cons:**

- Users experience **authentication issues** like loops and delays, complicating the overall user experience with Cisco Duo.
- Users experience **login issues** due to dependency on internet connectivity and delays in approval notifications.
- Users note the **complexity** of initial setup and potential confusion with other authentication apps affecting their experience.
- Users report **notification issues** , often missing push alerts and needing to manually open the app for access.
- Users experience frustrating **delay issues** with push notifications and OTP messages, affecting their login efficiency.

#### Key Features
  - Authentication User experience
  - Remote Access
  - Ease of installation on server
  - Multiple Operating system support
  - Voice-Based Telephony
  #### What Are Recent G2 Reviews of Cisco Duo?

**"[Simple, Secure Logins with Cisco Duo’s Fast Mobile Push Authentication](https://www.g2.com/survey_responses/cisco-duo-review-12792634)"**

**Rating:** 5.0/5.0 stars
*— mani s.*

[Read full review](https://www.g2.com/survey_responses/cisco-duo-review-12792634)

---

**"[Cisco DUO has been our most reliable 2FA solution so far](https://www.g2.com/survey_responses/cisco-duo-review-12662471)"**

**Rating:** 5.0/5.0 stars
*— Jason L.*

[Read full review](https://www.g2.com/survey_responses/cisco-duo-review-12662471)

---

  #### What Are G2 Users Discussing About Cisco Duo?

- [What is Duo Security used for?](https://www.g2.com/discussions/what-is-duo-security-used-for) - 3 comments
- [Is Duo Security Safe?](https://www.g2.com/discussions/is-duo-security-safe) - 2 comments
- [Is Duo Security free?](https://www.g2.com/discussions/is-duo-security-free) - 3 comments
### 3. [Okta](https://www.g2.com/products/okta/reviews)
  **Average Rating:** 4.5/5.0
  **Total Reviews:** 1,196
  **Why buyers love it?:** In Okta’s G2 feedback, I noticed its strongest fit in centralizing identity, SSO, MFA, and app access across the business. Reviewers highlight SAML and OIDC support, prebuilt integrations, adaptive policies, user management, secure logins, and easier access to multiple work apps. A good match for teams that want identity to anchor zero trust access decisions.



### What Do G2 Reviewers Say About Okta?
*AI-generated summary from verified user reviews*

**Pros:**

- Users value the **ease of use** of Okta, simplifying access to multiple websites with a single password.
- Users value the **flexibility of dual factor authentication** in Okta, enhancing security and streamlining access across platforms.
- Users value the **enhanced security and ease of use** that Okta&#39;s single sign-on provides, streamlining access to multiple systems.
- Users appreciate the **centralized authentication system** of Okta, simplifying access to third-party apps with ease.
- Users value Okta for its **easy access** , enabling quick logins and efficient management of multiple applications.

**Cons:**

- Users face **authentication issues** with Okta, leading to access delays and frustration during critical work tasks.
- Users experience **login issues** with Okta, citing slow authentication and inconvenient mobile restrictions frustrating their access.
- Users find Okta to be **expensive** , especially with unclear pricing structures that may escalate costs quickly.
- Users find the **complex setup** of Okta challenging, especially with policy management and troubleshooting difficulties.
- Users find the **frequent authentication prompts** disruptive, especially when using the same device for logins.

#### Key Features
  - Authentication User experience
  - Remote Access
  - Ease of connecting applications
  - Multiple Operating system support
  - Access Termination
  #### What Are Recent G2 Reviews of Okta?

**"[Streamlined Identity Management and Security with Okta SSO and MFA](https://www.g2.com/survey_responses/okta-review-12607144)"**

**Rating:** 5.0/5.0 stars
*— Brian B.*

[Read full review](https://www.g2.com/survey_responses/okta-review-12607144)

---

**"[Intuitive UI, Easy Integrations, and Reliable Okta Uptime](https://www.g2.com/survey_responses/okta-review-12721974)"**

**Rating:** 4.5/5.0 stars
*— Ethan W.*

[Read full review](https://www.g2.com/survey_responses/okta-review-12721974)

---

  #### What Are G2 Users Discussing About Okta?

- [What database does Just Eat use?](https://www.g2.com/discussions/what-database-does-just-eat-use) - 1 comment
- [How good is Okta?](https://www.g2.com/discussions/how-good-is-okta) - 2 comments
- [What are the 4 A&#39;s of cloud identity?](https://www.g2.com/discussions/what-are-the-4-a-s-of-cloud-identity)
### 4. [ThreatLocker Platform](https://www.g2.com/products/threatlocker-platform/reviews)
  **Average Rating:** 4.8/5.0
  **Total Reviews:** 473
  **Why buyers love it?:** ThreatLocker Platform stood out to me in G2 reviews for application control that blocks unknown or unauthorized software from running. Review sentiment points to default-deny policies, app allowlisting, storage control, endpoint visibility, software compliance, and strong support during policy setup. A practical choice for teams that want tighter control over what can run across managed devices.



### What Do G2 Reviewers Say About ThreatLocker Platform?
*AI-generated summary from verified user reviews*

**Pros:**

- Users commend the **fantastic customer support** from ThreatLocker, enabling prompt resolutions and effective assistance when needed.
- Users value the **effective threat detection** of ThreatLocker, enhancing security while maintaining user-friendly environments.
- Users value the **intuitive interface** of ThreatLocker Platform, simplifying policy deployment and enhancing security management effortlessly.
- Users value the **robust security measures** of ThreatLocker, ensuring only trusted applications run and minimizing risk significantly.
- Users value the **top-class protection** offered by ThreatLocker, enhancing security while maintaining confidence in their environment.

**Cons:**

- Users face a **steep learning curve** with ThreatLocker, though mastering it leads to achieving desired objectives.
- Users find the **difficult learning curve** of ThreatLocker challenging initially, but it becomes manageable with time.
- Users find the **difficult configuration** of ThreatLocker Platform challenging, especially during initial setup and policy management.
- Users find the **difficult navigation** of ThreatLocker Platform challenging, impacting their ability to efficiently manage settings.
- Users find the **training required** for ThreatLocker cumbersome and time-consuming, complicating the onboarding process.

#### Key Features
  - Compliance
  - System Isolation
  - Automated Remediation
  - Proactive report alerts
  - Automated remediation
  #### What Are Recent G2 Reviews of ThreatLocker Platform?

**"[Quiet, Reliable Security That Just Works in the Background](https://www.g2.com/survey_responses/threatlocker-platform-review-12665226)"**

**Rating:** 4.0/5.0 stars
*— Ryan L.*

[Read full review](https://www.g2.com/survey_responses/threatlocker-platform-review-12665226)

---

**"[Zero-Trust Security Made Simple](https://www.g2.com/survey_responses/threatlocker-platform-review-5368288)"**

**Rating:** 5.0/5.0 stars
*— Rich D.*

[Read full review](https://www.g2.com/survey_responses/threatlocker-platform-review-5368288)

---

  #### What Are G2 Users Discussing About ThreatLocker Platform?

- [Does ThreatLocker work on Mac?](https://www.g2.com/discussions/does-threatlocker-work-on-mac) - 2 comments, 1 upvote
- [What is Application Control software?](https://www.g2.com/discussions/what-is-application-control-software)
- [What is the function of application whitelisting?](https://www.g2.com/discussions/what-is-the-function-of-application-whitelisting) - 1 comment
### 5. [FortiClient](https://www.g2.com/products/forticlient/reviews)
  **Average Rating:** 4.4/5.0
  **Total Reviews:** 268
  **Why buyers love it?:** As I worked through FortiClient’s G2 feedback, I placed it around endpoint security, ZTNA, VPN, and web filtering from one client. Reviewers call out a lightweight agent, hybrid access, Fortinet integrations, VPN support, endpoint visibility, and centralized security management. A solid option for teams that want secure access and endpoint protection managed through the Fortinet environment.



### What Do G2 Reviewers Say About FortiClient?
*AI-generated summary from verified user reviews*

**Pros:**

- Users find FortiClient&#39;s **ease of use** enhances their productivity and ensures a smooth user experience.
- Users appreciate the **robust security** provided by FortiClient, ensuring data protection and preventing unauthorized access effectively.
- Users value the **stable and efficient VPN functionality** of FortiClient, enabling seamless remote access and usability.
- Users appreciate the **stable VPN connectivity** of FortiClient, noting its reliability and ease of management for remote access.
- Users find FortiClient to be **highly reliable** , providing stable VPN connections and strong endpoint protection effortlessly.

**Cons:**

- Users experience **unstable connections** with FortiClient, often facing unexpected disconnections and confusing troubleshooting processes.
- Users experience **connection issues** with FortiClient, including frequent disconnections and unclear troubleshooting logs.
- Users experience **slow performance** with FortiClient, including delays and unclear error messages during troubleshooting.
- Users experience **remote access issues** with frequent disconnections, complicating troubleshooting and frustrating IT support efforts.
- Users face **update issues** with FortiClient, leading to disconnects and challenging troubleshooting due to limited logs.

#### Key Features
  - Compliance
  - System Isolation
  - Automated Remediation
  - AI Text Generation
  #### What Are Recent G2 Reviews of FortiClient?

**"[Seamless and Reliable Security Management](https://www.g2.com/survey_responses/forticlient-review-12727398)"**

**Rating:** 5.0/5.0 stars
*— Cheryl B.*

[Read full review](https://www.g2.com/survey_responses/forticlient-review-12727398)

---

**"[Excellent Unified One Agent: Lightweight EDR, VPN, and Web Filtering in One Client](https://www.g2.com/survey_responses/forticlient-review-12497023)"**

**Rating:** 4.0/5.0 stars
*— Alejandro A.*

[Read full review](https://www.g2.com/survey_responses/forticlient-review-12497023)

---

  #### What Are G2 Users Discussing About FortiClient?

- [What is FortiClient used for?](https://www.g2.com/discussions/what-is-forticlient-used-for) - 1 comment
- [How do I use FortiClient VPN?](https://www.g2.com/discussions/how-do-i-use-forticlient-vpn) - 1 comment
- [Is FortiClient free?](https://www.g2.com/discussions/is-forticlient-free) - 2 comments
### 6. [Palo Alto Networks IoT/OT Security](https://www.g2.com/products/palo-alto-networks-iot-ot-security/reviews)
  **Average Rating:** 4.4/5.0
  **Total Reviews:** 117
  **Product Description:** What is Palo Alto Networks IoT/OT Security? Palo Alto Networks IoT/OT Security is a comprehensive solution delivering ML-powered visibility, prevention, and zero-trust enforcement in a single platform for all your connected devices. Our portfolio offers a range of IoT and OT security solutions tailored to meet the specific needs of our customer in different verticals: Enterprise IoT Security A Zero Trust security solution for IoT devices that uses a three-tier ML model, App-ID technology, and crowdsourced telemetry. It can discover devices, assess devices, protect devices, and simplify operations. Industrial OT Security A security solution for OT devices and networks that uses machine learning (ML), App-ID, and Device-ID technology. It offers visibility, segmentation, access control, risk monitoring, and continuous security inspection. Medical IoT Security A Zero Trust security solution for connected medical devices that helps healthcare providers protect their network from threats. The security solution uses machine learning (ML) to generate device profiles from five key behaviors: internal connections, internet connections, protocols, applications, and payloads. It also integrates with security orchestration, automation, and response (SOAR) systems for playbook-based incident response.



### What Do G2 Reviewers Say About Palo Alto Networks IoT/OT Security?
*AI-generated summary from verified user reviews*

**Pros:**

- Users value the **full visibility and continuous monitoring** provided by Palo Alto Networks IoT/OT Security for effective threat protection.
- Users value the **deep visibility and advanced anomaly detection** provided by Palo Alto Networks IoT/OT Security for enhanced protection.
- Users praise the **effortless security management** of Palo Alto Networks IoT/OT Security, streamlining protection for connected devices.
- Users value the **deep visibility and automated risk insights** from Palo Alto Networks IoT/OT Security for better management.
- Users value the **full visibility and continuous monitoring** of their IoT/OT devices, enhancing security and reducing risks.

**Cons:**

- Users highlight the **high cost** of Palo Alto Networks IoT/OT Security, which may not fit all budgets.
- Users find the **complex setup** of Palo Alto Networks IoT/OT Security challenging, especially for inexperienced teams.
- Users find the **difficult learning curve** of Palo Alto Networks IoT/OT Security challenging, particularly during initial setup.
- Users find the **difficult configuration** of Palo Alto Networks IoT/OT Security challenging, especially in diverse environments.
- Users note the **required expertise** for managing Palo Alto Networks IoT/OT Security can hinder effective deployment and maintenance.
  #### What Are Recent G2 Reviews of Palo Alto Networks IoT/OT Security?

**"[Great Tool for Managing and Securing Every Device on the Network](https://www.g2.com/survey_responses/palo-alto-networks-iot-ot-security-review-11915009)"**

**Rating:** 5.0/5.0 stars
*— Ritika G.*

[Read full review](https://www.g2.com/survey_responses/palo-alto-networks-iot-ot-security-review-11915009)

---

**"[Palo Alto Networks IoT/OT Security – Intelligent Visibility with Real-World Impact](https://www.g2.com/survey_responses/palo-alto-networks-iot-ot-security-review-11913838)"**

**Rating:** 5.0/5.0 stars
*— pawan m.*

[Read full review](https://www.g2.com/survey_responses/palo-alto-networks-iot-ot-security-review-11913838)

---

### 7. [Illumio](https://www.g2.com/products/illumio/reviews)
  **Average Rating:** 4.6/5.0
  **Total Reviews:** 32
  **Why buyers love it?:** After I reviewed Illumio’s G2 feedback, its clearest fit came through in microsegmentation for limiting lateral movement across servers and networks. Users point to traffic-flow visibility, configurable segmentation, endpoint performance, firewalling controls, and easier deployment across large environments. A strong fit for teams that need to restrict access between workloads without redesigning the network.



### What Do G2 Reviewers Say About Illumio?
*AI-generated summary from verified user reviews*

**Pros:**

- Users value the **ease of use** in Illumio, praising its simple configuration and quick deployment for efficient management.
- Users value Illumio for its **robust security features** that effectively protect against cyber threats and lateral movement.
- Users value the **centralized management** of Illumio, enhancing security while simplifying operations across their networks.
- Users value the **ease of implementation** with Illumio, simplifying micro-segmentation integration and enhancing security effortlessly.
- Users value the **installation ease** of Illumio, noting its straightforward configuration and quick deployment process.

**Cons:**

- Users find that Illumio has a **difficult learning curve** , requiring time and effort to master its policy model.
- Users often experience **integration issues** with Illumio, particularly regarding log streaming to SIEM systems, limiting functionality.
- Users experience **compatibility issues** with Illumio, particularly regarding legacy operating systems, hindering overall effectiveness.
- Users face a notable **difficult learning curve** with Illumio, making initial understanding challenging despite eventual clarity.
- Users find the **licensing and cost high** , especially when compared to simpler security controls.

#### Key Features
  - Network Segmentation
  #### What Are Recent G2 Reviews of Illumio?

**"[Top choice for Micro-Segmentation and Flow Visualization](https://www.g2.com/survey_responses/illumio-review-12631462)"**

**Rating:** 5.0/5.0 stars
*— Luc C.*

[Read full review](https://www.g2.com/survey_responses/illumio-review-12631462)

---

**"[Illuminates Traffic for Enhanced Network Control](https://www.g2.com/survey_responses/illumio-review-12634132)"**

**Rating:** 4.0/5.0 stars
*— Chris K.*

[Read full review](https://www.g2.com/survey_responses/illumio-review-12634132)

---

### 8. [Netskope One Platform](https://www.g2.com/products/netskope-one-platform/reviews)
  **Average Rating:** 4.4/5.0
  **Total Reviews:** 70
  **Why buyers love it?:** Netskope One Platform’s G2 feedback gave me a focused read on visibility and control across cloud, web, SaaS, and private app traffic. Reviewers highlight DLP, threat protection, app-risk visibility, role-based policies, shadow IT discovery, and one place to manage several security functions. Works well for teams that need zero trust access tied to cloud security and data protection.



### What Do G2 Reviewers Say About Netskope One Platform?
*AI-generated summary from verified user reviews*

**Pros:**

- Users value the **ease of use** of Netskope One Platform, streamlining security management from a single unified console.
- Users value the **exceptional security features** of Netskope One Platform, ensuring robust protection and monitoring of data activities.
- Users value the **comprehensive visibility** offered by Netskope One Platform, enhancing security and simplifying management across various environments.
- Users value the **easy integrations** of Netskope One Platform, enabling seamless connection with various IT solutions.
- Users value the **efficient unified approach** of Netskope One Platform, simplifying security management while enhancing overall protection.

**Cons:**

- Users find the **complex configuration** of Netskope One Platform challenging, requiring time and expertise for effective use.
- Users find the **complex implementation** of Netskope One Platform time-consuming and challenging, especially for new teams.
- Users find the **complexity** of Netskope One challenging during initial setup and when navigating advanced features.
- Users find the **difficult learning** process of Netskope One Platform challenging due to its complex features and configuration.
- Users often face a **difficult learning curve** with the Netskope One Platform, impacting their initial deployment and configuration experience.

#### Key Features
  - Data Management
  - Access Control
  - Encryption
  - User Analytics
  - SSO
  #### What Are Recent G2 Reviews of Netskope One Platform?

**"[Practical and Reliable SSE Platform for Daily Enterprise Security Operations](https://www.g2.com/survey_responses/netskope-one-platform-review-12795571)"**

**Rating:** 5.0/5.0 stars
*— Shibu K.*

[Read full review](https://www.g2.com/survey_responses/netskope-one-platform-review-12795571)

---

**"[Netskope One Platform: A Zero-Trust SASE That Crushed Our Hybrid Headaches- Admin-Approved Beast.](https://www.g2.com/survey_responses/netskope-one-platform-review-12779047)"**

**Rating:** 5.0/5.0 stars
*— kaushal p.*

[Read full review](https://www.g2.com/survey_responses/netskope-one-platform-review-12779047)

---

  #### What Are G2 Users Discussing About Netskope One Platform?

- [Is Netskope a CASB?](https://www.g2.com/discussions/is-netskope-a-casb) - 1 comment
- [What does a CASB do?](https://www.g2.com/discussions/netskope-what-does-a-casb-do)
- [How much does Netskope cost?](https://www.g2.com/discussions/how-much-does-netskope-cost)
### 9. [Cato SASE Cloud](https://www.g2.com/products/cato-networks-cato-sase-cloud/reviews)
  **Average Rating:** 4.5/5.0
  **Total Reviews:** 80
  **Why buyers love it?:** In Cato SASE Cloud’s G2 reviews, I noticed its strongest use case in bringing SD-WAN, firewall, secure web gateway, CASB, and ZTNA into one cloud-managed platform. The review data points to centralized management, site connectivity, remote access, segmentation, policy enforcement, and reduced tool switching. A good match for teams that want networking and security managed through one SASE platform.



### What Do G2 Reviewers Say About Cato SASE Cloud?
*AI-generated summary from verified user reviews*

**Pros:**

- Users value the **ease of use** in Cato SASE Cloud, appreciating its intuitive interface and streamlined management.
- Users value the **excellent customer support** from Cato SASE Cloud, enhancing their deployment and overall experience.
- Users value the **reliability** of Cato SASE Cloud, praising its consistent performance and robust security features.
- Users value the **comprehensive threat protection** of Cato SASE Cloud, enhancing security through integrated solutions.
- Users value the **deployment ease** of Cato SASE Cloud, appreciating quick setup and simplified daily management.

**Cons:**

- Users find **limited features** in Cato SASE Cloud, noting challenges with customization and detailed reporting options.
- Users experience **connection issues** with frequent disconnections, impacting usability and causing frustrations for organizations.
- Users find the **costly licensing** of Cato SASE Cloud burdensome, especially for smaller organizations and specific use cases.
- Users find **compatibility issues** when implementing complex security policies on Cato SASE Cloud compared to traditional solutions.
- Users find the **expensive licensing** for Cato SASE Cloud challenging, particularly for small and medium-sized businesses.

#### Key Features
  - Connectivity
  - Performance
  - Network Segmentation
  - Application Security
  - Adaptive Access Control
  #### What Are Recent G2 Reviews of Cato SASE Cloud?

**"[It’s very good and everything is in cloud](https://www.g2.com/survey_responses/cato-sase-cloud-review-11237657)"**

**Rating:** 5.0/5.0 stars
*— Mohd A.*

[Read full review](https://www.g2.com/survey_responses/cato-sase-cloud-review-11237657)

---

**"[Unified network and security in a single console: SD-WAN, NGFW, and ZTA without complications](https://www.g2.com/survey_responses/cato-sase-cloud-review-12662576)"**

**Rating:** 5.0/5.0 stars
*— Roberto  M.*

[Read full review](https://www.g2.com/survey_responses/cato-sase-cloud-review-12662576)

---

  #### What Are G2 Users Discussing About Cato SASE Cloud?

- [How good is Cato networks?](https://www.g2.com/discussions/how-good-is-cato-networks)
- [How does Cato VPN Work?](https://www.g2.com/discussions/how-does-cato-vpn-work)
- [What is Cato technology?](https://www.g2.com/discussions/what-is-cato-technology)
### 10. [GoodAccess](https://www.g2.com/products/goodaccess/reviews)
  **Average Rating:** 4.7/5.0
  **Total Reviews:** 164
  **Why buyers love it?:** GoodAccess came through in G2 feedback as a simple zero trust access option for remote workers, static IP needs, and SaaS whitelisting. Users call out quick setup, cloud VPN access, identity-based controls, device posture checks, centralized access control, and fixed gateway IPs. A practical choice for smaller IT teams that need secure remote access without heavy infrastructure.



### What Do G2 Reviewers Say About GoodAccess?
*AI-generated summary from verified user reviews*

**Pros:**

- Users find GoodAccess to be **very user-friendly** , offering a fast setup and reliable performance across all operating systems.
- Users value the **security and ease of use** of GoodAccess, ensuring reliable performance for remote work.
- Users commend GoodAccess for its **reliable VPN services** , ensuring seamless access and optimal performance without issues.
- Users commend the **responsive customer support** of GoodAccess, ensuring quick resolutions for any issues encountered.
- Users appreciate the **easy setup** of GoodAccess, finding the integration quick and straightforward for their teams.

**Cons:**

- Users express concern over GoodAccess&#39;s **expensive pricing** , suggesting discounts for long-term users to improve value.
- Users experience **connection issues** , including varying speeds and frequent reconnections, affecting overall performance and usability.
- Users face **access issues** with GoodAccess, including connection problems and integration challenges with AWS Cloudfront.
- Users express concern about **limited location options** , wishing for more regions and better support for diverse geographies.
- Users often face **connectivity issues** with GoodAccess, including frequent disconnections and slow connection speeds.

#### Key Features
  - Multi-Device Usage
  - Live Customer Support
  - Network Segmentation
  - Security Automation
  - Adaptive Access Control
  #### What Are Recent G2 Reviews of GoodAccess?

**"[Seamless Setup and Secure, Centralized VPN Access with Static IPs](https://www.g2.com/survey_responses/goodaccess-review-12716014)"**

**Rating:** 4.5/5.0 stars
*— Rinalon E.*

[Read full review](https://www.g2.com/survey_responses/goodaccess-review-12716014)

---

**"[Seamless VPN Solution with Top-Tier Performance](https://www.g2.com/survey_responses/goodaccess-review-12625643)"**

**Rating:** 5.0/5.0 stars
*— Satya Prateek B.*

[Read full review](https://www.g2.com/survey_responses/goodaccess-review-12625643)

---

  #### What Are G2 Users Discussing About GoodAccess?

- [What is a cloud VPN?](https://www.g2.com/discussions/what-is-a-cloud-vpn) - 2 comments, 2 upvotes
- [What is GoodAccess VPN?](https://www.g2.com/discussions/what-is-goodaccess-vpn) - 1 comment, 1 upvote
- [How do you use GoodAccess?](https://www.g2.com/discussions/how-do-you-use-goodaccess) - 1 comment, 1 upvote
### 11. [Absolute Secure Access](https://www.g2.com/products/absolute-secure-access/reviews)
  **Average Rating:** 4.7/5.0
  **Total Reviews:** 224
  **Product Description:** Absolute Secure Access (formerly NetMotion by Absolute) is one of the company’s core product lines, which was added through the acquisition of NetMotion in July 2021. The product portfolio provides resilient network connectivity for users to securely access critical resources in the public cloud, private data centers, and on-premises. These products allow users to transition from traditional VPN to a resilient Zero Trust approach, without impairing productivity or admin controls. Absolute Secure Access encompasses three products: • Absolute VPN provides security and confidentiality for data in motion by means of encryption and access controls. It also offers benefits to the end user, such as making tunnel and network sessions resilient and optimizing streaming video and audio. • Absolute ZTNA provides a software-defined perimeter via Zero Trust Network Access, creating a context-based, logical access boundary around an application or set of applications – wherever they&#39;re hosted. It shields applications from the Internet, making them invisible to unauthorized users. Access policies are enforced at the endpoint, avoiding latency and any data transgression. • Absolute Insights™ for Network offers diagnostic and experience monitoring capabilities across endpoints and network, allowing organizations to proactively monitor, investigate, and remediate end user performance issues quickly and at scale, even on networks that are not company-owned or managed



### What Do G2 Reviewers Say About Absolute Secure Access?
*AI-generated summary from verified user reviews*

**Pros:**

- Users find Absolute Secure Access exceptionally **easy to use** , enhancing business protection with intuitive features and stable performance.
- Users value the **connectivity stability** of Absolute Secure Access, ensuring reliable connections across different networks seamlessly.
- Users value the **secure and reliable access** provided by Absolute Secure Access, enhancing performance for remote work.
- Users enjoy the **persistent and intelligent VPN connectivity** of Absolute Secure Access, enhancing reliability for on-the-go work.
- Users value the **robust security features** of Absolute Secure Access, ensuring protection against threats instantly.

**Cons:**

- Users face **access issues** due to lost domain values and prolonged renewal processes, leading to frustration and confusion.
- Users find the **initial setup and policy configuration complex** , requiring significant time and offering a steep learning curve.
- Users find the **complex implementation** process time-consuming and challenging, especially for smaller IT teams during onboarding.
- Users find the product **expensive** , as ongoing costs and infrastructure needs can significantly add up.
- Users find **integration issues** challenging, especially with Duo MFA and FortiAuthenticator, hindering the product&#39;s full potential.
  #### What Are Recent G2 Reviews of Absolute Secure Access?

**"[Effortless, Secure Remote Access with Minimal Interaction](https://www.g2.com/survey_responses/absolute-secure-access-review-6897638)"**

**Rating:** 5.0/5.0 stars
*— Greg S.*

[Read full review](https://www.g2.com/survey_responses/absolute-secure-access-review-6897638)

---

**"[Absolute Secure - NetMotion VPN](https://www.g2.com/survey_responses/absolute-secure-access-review-8466726)"**

**Rating:** 4.0/5.0 stars
*— Mo V.*

[Read full review](https://www.g2.com/survey_responses/absolute-secure-access-review-8466726)

---

  #### What Are G2 Users Discussing About Absolute Secure Access?

- [Is NetMotion a VPN?](https://www.g2.com/discussions/is-netmotion-a-vpn) - 2 comments
- [How does NetMotion mobility work?](https://www.g2.com/discussions/how-does-netmotion-mobility-work) - 1 comment
- [What is NetMotion complete?](https://www.g2.com/discussions/what-is-netmotion-complete) - 1 comment
### 12. [FortiSASE](https://www.g2.com/products/fortisase/reviews)
  **Average Rating:** 4.3/5.0
  **Total Reviews:** 16
  **Product Description:** FortiSASE is a cloud-delivered Secure Access Service Edge (SASE) solution designed to provide secure and seamless access to the internet, cloud services, and private applications for remote users. By integrating networking and security functionalities into a unified platform, FortiSASE ensures consistent protection and optimal performance across all user locations. Key Features and Functionality: - Unified Security Services: FortiSASE combines Secure Web Gateway (SWG), Universal Zero Trust Network Access (ZTNA), Cloud Access Security Broker (CASB), Firewall-as-a-Service (FWaaS), and Data Loss Prevention (DLP) into a single solution. - Flexible Connectivity Options: The solution offers adaptable deployment methods, including native SD-WAN integration, support for microbranches, agent-based and agentless access, and flexible point-of-presence (PoP) selection, catering to diverse organizational needs. - AI-Powered Threat Intelligence: Leveraging FortiGuard Labs, FortiSASE utilizes artificial intelligence to provide real-time threat intelligence, ensuring continuous updates with the latest attack information for proactive security measures. - Global Coverage and Scalability: With over 170 PoPs worldwide, FortiSASE delivers low-latency, high-performance connectivity, ensuring reliable and scalable access for users across various regions. Primary Value and User Solutions: FortiSASE addresses the challenges of securing a hybrid workforce by providing consistent, enterprise-grade security regardless of user location. It simplifies operations through unified management and policy enforcement, reducing complexity and operational overhead. By converging networking and security into a single platform, FortiSASE enhances user experience, ensures data protection, and supports compliance with regional data residency and sovereignty laws.



### What Do G2 Reviewers Say About FortiSASE?
*AI-generated summary from verified user reviews*

**Pros:**

- Users value the **advanced threat protection** of FortiSASE, benefiting from comprehensive security across multiple services.
- Users value the **AI/ML-powered threat protection** of FortiSASE, ensuring robust defense against evolving cyber threats.
- Users find FortiSASE to be **easy to use and implement** , streamlining security and management for remote access.
- Users value the **secure access** that FortiSASE provides for remote users, ensuring easy management and strong protection.
- Users appreciate the **seamless app integration** offered by FortiSASE, enhancing their networking and security capabilities effectively.

**Cons:**

- Users find the **difficult learning curve** of FortiSASE challenging, especially without prior Fortinet experience.
- Users find the setup of FortiSASE to be **difficult** , especially for those new to Fortinet products.
- Users find the **high cost** of FortiSASE challenging, especially for smaller teams managing budgets.
- Users face **complex implementation challenges** with FortiSASE, leading to a frustrating experience and ongoing issues.
- Users find the **complex setup** of FortiSASE challenging, especially without prior experience in configuration.
  #### What Are Recent G2 Reviews of FortiSASE?

**"[FortiSASE review](https://www.g2.com/survey_responses/fortisase-review-11795255)"**

**Rating:** 5.0/5.0 stars
*— Mohan E.*

[Read full review](https://www.g2.com/survey_responses/fortisase-review-11795255)

---

**"[Reliable Cloud Security for Remote Teams](https://www.g2.com/survey_responses/fortisase-review-11790081)"**

**Rating:** 4.5/5.0 stars
*— Harshul S.*

[Read full review](https://www.g2.com/survey_responses/fortisase-review-11790081)

---

### 13. [Cloudflare One (SASE)](https://www.g2.com/products/cloudflare-one-sase/reviews)
  **Average Rating:** 4.6/5.0
  **Total Reviews:** 101
  **Product Description:** Cloudflare One is a single-vendor secure access service edge (SASE) platform that converges security and networking services into a unified, global connectivity cloud. It replaces legacy, fragmented hardware and first-generation SASE solutions with a composable, programmable architecture. Cloudflare One connects and protects an organization&#39;s workforce, AI agents, and infrastructure. Learn more at https://www.cloudflare.com/sase/ Designed for agility, it enables teams to: - Accelerate safe AI adoption with granular visibility, control, and AI agent governance. - Modernize remote access by replacing clunky VPNs with zero trust access. - Block email phishing attacks with flexible, SASE-native email security. - Protect web traffic for remote users and branch offices with lightweight DNS filtering. - Deploy “coffee shop networking” with a light branch, heavy cloud approach.



### What Do G2 Reviewers Say About Cloudflare One (SASE)?
*AI-generated summary from verified user reviews*

**Pros:**

- Users value the **ease of use** of Cloudflare One, enjoying its seamless integration and intuitive dashboard for effective security management.
- Users value the **streamlined security** and efficiency of Cloudflare One, ensuring robust protection across its global network.
- Users value the **reliable and scalable protection** Cloudflare One offers, ensuring security and performance for remote access.
- Users value the **streamlined security** of Cloudflare One, ensuring efficiency and protection regardless of their location.
- Users appreciate the **intuitive user interface** of Cloudflare One, which simplifies network security and access control management.

**Cons:**

- Users find the **steep learning curve** of Cloudflare One challenging, especially when adapting to new network security concepts.
- Users find the **initial complexity** of Cloudflare One challenging, especially with setup and configuration of advanced features.
- Users find the **difficult learning curve** of Cloudflare One challenging, especially during initial setup and feature integration.
- Users face a **difficult learning curve** with Cloudflare One, especially during initial setup and policy configurations.
- Users find the **difficult setup** of Cloudflare One challenging, particularly for those unfamiliar with SASE concepts.
  #### What Are Recent G2 Reviews of Cloudflare One (SASE)?

**"[Unified Security and Networking Made Effortless with Cloudflare](https://www.g2.com/survey_responses/cloudflare-one-sase-review-11999796)"**

**Rating:** 4.5/5.0 stars
*— Ahsan Y.*

[Read full review](https://www.g2.com/survey_responses/cloudflare-one-sase-review-11999796)

---

**"[Effortless Integrations and User-Friendly Setup](https://www.g2.com/survey_responses/cloudflare-one-sase-review-12797898)"**

**Rating:** 5.0/5.0 stars
*— Ravn Sebastian E.*

[Read full review](https://www.g2.com/survey_responses/cloudflare-one-sase-review-12797898)

---

  #### What Are G2 Users Discussing About Cloudflare One (SASE)?

- [What is Cloudflare Area 1 Security used for?](https://www.g2.com/discussions/what-is-cloudflare-area-1-security-used-for)
- [What is Cloudflare Zero Trust Services used for?](https://www.g2.com/discussions/what-is-cloudflare-zero-trust-services-used-for)
- [What is Gateway Cloudflare?](https://www.g2.com/discussions/what-is-gateway-cloudflare)
### 14. [Check Point SASE](https://www.g2.com/products/check-point-sase/reviews)
  **Average Rating:** 4.5/5.0
  **Total Reviews:** 211
  **Product Description:** The internet is the new corporate network, leading organizations to transition to their network security to Secure Access Service Edge (SASE). However, current solutions break the user experience with slow connections and complex management. Check Point SASE is a game-changing solution that delivers 10x faster internet security, SaaS Security, and full mesh Zero Trust Access and optimized SD-WAN performance—all with an emphasis on streamlined management. Combining innovative on-device and cloud-delivered network protections, Check Point SASE offers a local browsing experience with tighter security and privacy, and an identity-centric zero trust access policy that accommodates everyone: employees, BYOD and third parties. Its SD-WAN solution unifies industry-leading threat prevention with optimized connectivity, automated steering for over 10,000 applications and seamless link failover for uninterrupted web conferencing. Using Check Point SASE, business can build a secure corporate network over a private global backbone in less than an hour. The service is managed from a unified console and is backed by an award-winning global support team that has you covered 24/7.



### What Do G2 Reviewers Say About Check Point SASE?
*AI-generated summary from verified user reviews*

**Pros:**

- Users value the **strong zero-trust security model** of Check Point SASE, ensuring every connection is verified for safety.
- Users find Check Point SASE to be **easy to use** , appreciating its straightforward interface and seamless connectivity.
- Users appreciate the **secure access** provided by Check Point SASE, ensuring protection without compromising performance or user experience.
- Users value the **comprehensive security** of Check Point SASE, enhancing protection for distributed workforces and daily operations.
- Users highlight the **reliability** of Check Point SASE, noting minimal outages and consistent performance over time.

**Cons:**

- Users find the **complex implementation** of Check Point SASE frustrating, causing delays and challenging configurations during setup.
- Users face a **complex configuration** process that can be challenging, especially for those new to SASE.
- Users find the **complex setup** of Check Point SASE to be time-consuming and challenging, impacting deployment efforts.
- Users find the **high cost** of Check Point SASE a significant barrier for medium-sized businesses, impacting overall satisfaction.
- Users face a **steep learning curve** with Check Point SASE, complicating initial setup and configuration adjustments.
  #### What Are Recent G2 Reviews of Check Point SASE?

**"[Secure, Reliable Remote Access with Fast, Easy Deployment](https://www.g2.com/survey_responses/check-point-sase-review-12608376)"**

**Rating:** 5.0/5.0 stars
*— Jose M.*

[Read full review](https://www.g2.com/survey_responses/check-point-sase-review-12608376)

---

**"[Versatile, Reliable Check Point Security Across Mobile and SandBlast Threat Emulation](https://www.g2.com/survey_responses/check-point-sase-review-12638659)"**

**Rating:** 4.5/5.0 stars
*— Verified User in Computer &amp; Network Security*

[Read full review](https://www.g2.com/survey_responses/check-point-sase-review-12638659)

---

  #### What Are G2 Users Discussing About Check Point SASE?

- [Is perimeter 81 a VPN?](https://www.g2.com/discussions/is-perimeter-81-a-vpn) - 1 comment
- [How does perimeter 81 work?](https://www.g2.com/discussions/how-does-perimeter-81-work) - 1 comment
- [What are the capabilities of software perimeter solution?](https://www.g2.com/discussions/perimeter-81-what-are-the-capabilities-of-software-perimeter-solution) - 1 comment
### 15. [Palo Alto Networks Panorama](https://www.g2.com/products/palo-alto-networks-panorama/reviews)
  **Average Rating:** 4.5/5.0
  **Total Reviews:** 37
  **Product Description:** Panorama network security management provides static rules and dynamic security updates in an ever-changing threat landscape. Reduce administrator workload and improve your overall security posture with a single rule base for firewall, threat prevention, URL filtering, application awareness, iser identification, file blocking, and data filtering.



### What Do G2 Reviewers Say About Palo Alto Networks Panorama?
*AI-generated summary from verified user reviews*

**Pros:**

- Users value the **centralized management** of Palo Alto Networks Panorama, enabling effortless control and visibility across multiple firewalls.
- Users value the **centralized management and visibility** of Palo Alto Networks Panorama, streamlining firewall management effectively.
- Users appreciate the **user-friendly interface** of Palo Alto Networks Panorama, simplifying management through a centralized console.
- Users value the **centralized management** of Palo Alto Networks Panorama, appreciating its intuitive interface and comprehensive features.
- Users praise the **intuitive user interface** of Palo Alto Networks Panorama for its effective graphical representation.

**Cons:**

- Users find the **complex setup** challenging, especially for new users, impacting the initial experience with Panorama.
- Users often find the **difficult learning curve** of Palo Alto Networks Panorama challenging when getting started.
- Users find Palo Alto Networks Panorama to be **expensive** and sometimes experience delays in support responsiveness.
- Users experience **poor customer support** with Palo Alto Networks Panorama, often facing delays in response times.
  #### What Are Recent G2 Reviews of Palo Alto Networks Panorama?

**"[Panorama in Focus: Centralized Firewall Management at Scale](https://www.g2.com/survey_responses/palo-alto-networks-panorama-review-11467067)"**

**Rating:** 4.5/5.0 stars
*— Hailemichael Y.*

[Read full review](https://www.g2.com/survey_responses/palo-alto-networks-panorama-review-11467067)

---

**"[One dashboard, many trades-offs](https://www.g2.com/survey_responses/palo-alto-networks-panorama-review-12752955)"**

**Rating:** 4.5/5.0 stars
*— Akash P.*

[Read full review](https://www.g2.com/survey_responses/palo-alto-networks-panorama-review-12752955)

---

  #### What Are G2 Users Discussing About Palo Alto Networks Panorama?

- [What are the additional features and capabilities provided by Palo Alto?](https://www.g2.com/discussions/palo-alto-networks-panorama-what-are-the-additional-features-and-capabilities-provided-by-palo-alto)
- [Which two form factors is Panorama available in?](https://www.g2.com/discussions/which-two-form-factors-is-panorama-available-in)
- [What are 3 focus areas in which Panorama adds value?](https://www.g2.com/discussions/what-are-3-focus-areas-in-which-panorama-adds-value)
### 16. [Check Point Cloud Firewall (formerly CloudGuard Network Security)](https://www.g2.com/products/check-point-cloud-firewall-formerly-cloudguard-network-security/reviews)
  **Average Rating:** 4.5/5.0
  **Total Reviews:** 172
  **Product Description:** CloudGuard Network Security is a comprehensive cloud security solution designed to protect public, private, and hybrid cloud environments from a wide array of cyber threats. This platform focuses on delivering advanced threat protection, ensuring that organizations can confidently transition to the cloud while maintaining robust security measures. With an impressive malware catch rate, CloudGuard is engineered to defend against various types of attacks, including ransomware and other malicious software. Targeted at enterprises and organizations that are increasingly adopting cloud technologies, CloudGuard Network Security is particularly beneficial for IT teams and security professionals who require a reliable and efficient way to manage security across multiple environments. The solution is ideal for businesses looking to enhance their cloud security posture without compromising on agility or operational efficiency. By integrating seamlessly with leading Infrastructure as Code (IaC) tools, CloudGuard automates network security processes, making it easier for teams to implement security measures within their continuous integration and continuous deployment (CI/CD) workflows. One of the standout features of CloudGuard is its advanced protection capabilities. The platform includes a suite of security features such as a firewall, data loss prevention (DLP), intrusion prevention system (IPS), application control, IPsec VPN, URL filtering, antivirus, anti-bot protection, threat extraction, and threat emulation. These tools work in concert to provide a multi-layered defense strategy that addresses various attack vectors, ensuring that organizations can mitigate risks effectively. Additionally, CloudGuard&#39;s automated network security capabilities support IaC and CI/CD practices, allowing organizations to streamline their security processes through the use of APIs and automation. This enables security teams to focus on more strategic initiatives rather than being bogged down by manual tasks. The unified security management feature further enhances the solution by providing consistent visibility and policy management across hybrid-cloud and on-premises environments. Users can access logging, reporting, and control from a single interface, simplifying the management of security policies and improving overall operational efficiency. Overall, CloudGuard Network Security stands out in the cloud security landscape by offering a robust, integrated solution that not only protects against emerging threats but also enhances the agility and efficiency of security operations. Its comprehensive feature set and automation capabilities make it a valuable asset for organizations navigating the complexities of cloud security.



### What Do G2 Reviewers Say About Check Point Cloud Firewall (formerly CloudGuard Network Security)?
*AI-generated summary from verified user reviews*

**Pros:**

- Users value the **advanced threat protection** of Check Point CloudGuard, enhancing security across various cloud environments effectively.
- Users appreciate the **ease of use** of Check Point CloudGuard, simplifying cloud security management with a centralized console.
- Users value the **advanced threat prevention** of Check Point CloudGuard Network Security, enhancing their security across multi-cloud environments.
- Users value the **advanced threat prevention** capabilities of Check Point CloudGuard, ensuring secure and efficient cloud security management.
- Users appreciate the **consistent enterprise-grade security** of Check Point CloudGuard across multi-cloud and hybrid environments.

**Cons:**

- Users find the **complexity of setup and management** challenging, requiring high-skilled teams for effective use.
- Users report a **difficult setup** , with a steep learning curve and complex troubleshooting that hinders overall usability.
- Users find the **difficult learning** curve challenging, especially for teams unfamiliar with the Check Point ecosystem.
- Users find the **difficult configuration** of Check Point CloudGuard challenging, especially for teams unfamiliar with its ecosystem.
- Users face a **difficult learning curve** with Check Point CloudGuard Network Security, complicating setup and adaptation for beginners.
  #### What Are Recent G2 Reviews of Check Point Cloud Firewall (formerly CloudGuard Network Security)?

**"[Reliable and User-Friendly Security with Minor Setup Hurdles](https://www.g2.com/survey_responses/check-point-cloud-firewall-formerly-cloudguard-network-security-review-12725446)"**

**Rating:** 4.5/5.0 stars
*— Rishi T.*

[Read full review](https://www.g2.com/survey_responses/check-point-cloud-firewall-formerly-cloudguard-network-security-review-12725446)

---

**"[Cloud Guard: A One-Stop, Continuously Updated Security Solution](https://www.g2.com/survey_responses/check-point-cloud-firewall-formerly-cloudguard-network-security-review-12385847)"**

**Rating:** 5.0/5.0 stars
*— Prasanth K.*

[Read full review](https://www.g2.com/survey_responses/check-point-cloud-firewall-formerly-cloudguard-network-security-review-12385847)

---

  #### What Are G2 Users Discussing About Check Point Cloud Firewall (formerly CloudGuard Network Security)?

- [How has CloudGuard Network Security supported your cybersecurity efforts, and what features do you rely on most?](https://www.g2.com/discussions/how-has-cloudguard-network-security-supported-your-cybersecurity-efforts-and-what-features-do-you-rely-on-most) - 1 comment
- [What is CloudGuard Network Security (IaaS) used for?](https://www.g2.com/discussions/what-is-cloudguard-network-security-iaas-used-for) - 1 comment
- [What is CloudGuard Network Security for Gateway Load Balancer used for?](https://www.g2.com/discussions/cloudguard-network-security-for-gateway-load-balancer-what-is-cloudguard-network-security-for-gateway-load-balancer-used-for) - 1 comment
### 17. [Appgate SDP](https://www.g2.com/products/appgate-sdp/reviews)
  **Average Rating:** 4.8/5.0
  **Total Reviews:** 36
  **Product Description:** Appgate SDP is a leading Zero Trust Network Access solution that simplifies and strengthens access controls for all users, devices, and workloads. We deliver secure access for complex and hybrid enterprises by thwarting complex threats, reducing costs, and boosting operational efficiency. The full suite of Appgate solutions and services protects more than 650 organizations across the government, fortune 50, and global enterprises.



### What Do G2 Reviewers Say About Appgate SDP?
*AI-generated summary from verified user reviews*

**Pros:**

- Users highlight the **exceptional security** features of Appgate SDP, ensuring safe and flexible access for all users.
- Users commend the **fantastic customer support** from Appgate, which enhances their overall experience significantly.
- Users value the **ease of use** in Appgate SDP, enjoying simple management and a user-friendly experience.
- Users value the **secure and user-friendly network access** provided by Appgate SDP, enhancing both admin and user experiences.
- Users value the **reliability** of Appgate SDP, noting its consistent performance and minimal downtime for optimal security.

**Cons:**

- Users face **performance issues** with Appgate SDP, citing complex setups and configuration challenges that hinder efficiency.
- Users face a **complex deployment and learning curve** with Appgate SDP, requiring significant setup and customization efforts.
- Users experience **connection issues** on CGNAT networks and sometimes with home wi-fi, requiring support assistance.
- Users report **connectivity issues** primarily related to CGNAT networks and occasional disruptions with home Wi-Fi connections.
- Users experience a **difficult configuration** process with Appgate SDP, making the initial setup complex and challenging.
  #### What Are Recent G2 Reviews of Appgate SDP?

**"[Centralized Control, Simple Yet Powerful](https://www.g2.com/survey_responses/appgate-sdp-review-12442751)"**

**Rating:** 4.5/5.0 stars
*— David R.*

[Read full review](https://www.g2.com/survey_responses/appgate-sdp-review-12442751)

---

**"[Appgate SDP Delivers True Zero Trust with Fast, Direct Access](https://www.g2.com/survey_responses/appgate-sdp-review-12677786)"**

**Rating:** 5.0/5.0 stars
*— T Nagesh K.*

[Read full review](https://www.g2.com/survey_responses/appgate-sdp-review-12677786)

---

  #### What Are G2 Users Discussing About Appgate SDP?

- [What is Appgate SDP used for?](https://www.g2.com/discussions/what-is-appgate-sdp-used-for)
### 18. [TrendAI Vision One](https://www.g2.com/products/trendai-vision-one/reviews)
  **Average Rating:** 4.7/5.0
  **Total Reviews:** 238
  **Product Description:** TrendAI Vision One is a cloud-native security operations platform, serving cloud, hybrid, and on-premises environments. It combines ASM and XDR in a single console to effectively manage cyber risk across your organization. The platform provides powerful risk insights, earlier threat detection, and automated risk and threat response options. Utilize the platform’s predictive machine learning and advanced security analytics for a broader perspective and advanced context. TrendAI Vision One integrates with its own expansive protection platform portfolio and industry-leading global threat intelligence, in addition to a broad ecosystem of purpose-built and API-driven third-party integrations.



### What Do G2 Reviewers Say About TrendAI Vision One?
*AI-generated summary from verified user reviews*

**Pros:**

- Users value the **high visibility** of Trend Vision One&#39;s developers, appreciating the comprehensive tools for enhanced security management.
- Users value the **comprehensive and intuitive security tools** of Trend Vision One, enhancing their threat detection and response capabilities.
- Users commend the **ease of use** of Trend Vision One, highlighting intuitive dashboards and straightforward implementation processes.
- Users value the **centralized security platform** of Trend Vision One, integrating various features for ease and efficiency.
- Users value the **effective threat detection** of Trend Vision One, appreciating its reliable early warning of suspicious activities.

**Cons:**

- Users find the **complex interface** challenging, leading to difficulty in recognizing features and understanding integrations.
- Users face **integration issues** that complicate usability, with challenges in agentless security and third-party compatibility.
- Users find the **steep learning curve** of Trend Vision One challenging, particularly for teams new to XDR platforms.
- Users find the **cost prohibitive** , making it challenging for smaller firms to adopt Trend Vision One.
- Users find the **limited features** of Trend Vision One lacking in detailed information and integration options.
  #### What Are Recent G2 Reviews of TrendAI Vision One?

**"[Unified XDR Platform Delivering Enhanced Visibility, Faster Detection, and Proactive Threat Response](https://www.g2.com/survey_responses/trendai-vision-one-review-12375604)"**

**Rating:** 5.0/5.0 stars
*— Nishant K.*

[Read full review](https://www.g2.com/survey_responses/trendai-vision-one-review-12375604)

---

**"[Scalable Security with Easy Setup, Needs Better Training Support](https://www.g2.com/survey_responses/trendai-vision-one-review-12800247)"**

**Rating:** 4.5/5.0 stars
*— Andrew W.*

[Read full review](https://www.g2.com/survey_responses/trendai-vision-one-review-12800247)

---

  #### What Are G2 Users Discussing About TrendAI Vision One?

- [What is Trend Micro Vision One (XDR) used for?](https://www.g2.com/discussions/what-is-trend-micro-vision-one-xdr-used-for) - 1 comment, 2 upvotes
- [How does XDR work?](https://www.g2.com/discussions/how-does-xdr-work) - 1 comment, 2 upvotes
- [How can Trend Micro XDR solve your detection and response challenges?](https://www.g2.com/discussions/how-can-trend-micro-xdr-solve-your-detection-and-response-challenges) - 1 comment
### 19. [Kitecyber](https://www.g2.com/products/kitecyber/reviews)
  **Average Rating:** 4.8/5.0
  **Total Reviews:** 34
  **Product Description:** Kitecyber is a comprehensive cybersecurity solution designed to protect endpoint devices, users, applications, and data for organizations of all sizes. Headquartered in the Bay Area, California, Kitecyber distinguishes itself as a leader in the cybersecurity industry by offering a unified endpoint and network security product that simplifies IT management while enhancing security protocols. This innovative solution is tailored to meet the diverse needs of businesses, ensuring robust protection against evolving cyber threats, use of Gen AI tools and hybrid workforce. The target audience for Kitecyber encompasses small to medium-sized businesses (SMBs) and large enterprises that seek to strengthen their cybersecurity posture without the complexities often associated with multiple point solutions. By integrating four essential security functions into one cohesive platform, Kitecyber effectively addresses the critical challenges faced by IT departments in managing security across various endpoints and networks. The comprehensive coverage includes: 1) Unified endpoint management and compliance automation 2) Secure web gateway for SaaS, Gen AI and Internet security 3) Zero Trust Network Access for Private applcations 4) Endpoint and network DLP for data security Kitecyber&#39;s key features include device management and compliance controls, enabling organizations to monitor and enforce security policies across all devices seamlessly. The Secure Web Gateway provides advanced protection against Internet threats, incorporating URL filtering and security measures for Software as a Service (SaaS) and Gen AI applications. Additionally, the Zero Trust Private Access feature acts as a next-generation VPN, ensuring secure remote access to AWS, Azure, GCP clouds for users while minimizing the risk of unauthorized access. Furthermore, the Data Loss Prevention (DLP) capabilities are designed to safeguard sensitive information from potential breaches, ensuring compliance with data protection regulations. Kitecyber also uses Gen AI to significantly reduce false positive alerts, do data classification using context within the document in addition to pattern matching, automatically analyze suspicious activity of processes and creating incident reports with root causes and remediations. This significantly lowers the burden on SOC and NOC teams who have to deal with too many alerts and triage them. The benefits of using Kitecyber extend beyond mere protection; the product is designed for ease of installation and operation, making it accessible for IT teams with varying levels of expertise. By consolidating multiple security functions into a single platform, Kitecyber enhances security while improving operational efficiency. Organizations can reduce the complexity of their security infrastructure, allowing them to focus on core business objectives while maintaining a strong defense against cyber threats. This unique combination of features and user-friendly design positions Kitecyber as a valuable asset for any organization looking to enhance its cybersecurity framework.



### What Do G2 Reviewers Say About Kitecyber?
*AI-generated summary from verified user reviews*

**Pros:**

- Users appreciate the **responsive and knowledgeable customer support** team of Kitecyber, enhancing their overall experience significantly.
- Users love the **ease of use** of Kitecyber, appreciating its simple installation and user-friendly interface.
- Users value Kitecyber for its **excellent customer support** , lightweight design, and ease of implementation for security management.
- Users value the **comprehensive security** provided by KiteCyber, seamlessly integrating multiple solutions into one platform.
- Users praise KiteCyber for its **reliability** , citing quick onboarding and effective support in remote workforce management.

**Cons:**

- Users find the **limited features** of Kitecyber require extra clicks and offer insufficient customization and depth.
- Users experience **process delays** in implementing high-priority features, affecting the responsiveness of KiteCyber’s updates.
- Users find the **usability issues** in Kitecyber&#39;s dashboard challenging at first, needing time to become familiar with it.
- Users experience **alert issues** with Kitecyber, receiving warnings on safe websites, which can be disruptive.
- Users find the **difficult configuration** initially challenging, but support assistance makes navigation easier over time.
  #### What Are Recent G2 Reviews of Kitecyber?

**"[Kitecyber: A Strong Workforce Security Fit for SMBs](https://www.g2.com/survey_responses/kitecyber-review-12506503)"**

**Rating:** 5.0/5.0 stars
*— Sumit B.*

[Read full review](https://www.g2.com/survey_responses/kitecyber-review-12506503)

---

**"[Kitecyber Simplifies Cybersecurity and Compliance with an All-in-One Workflow](https://www.g2.com/survey_responses/kitecyber-review-12590659)"**

**Rating:** 5.0/5.0 stars
*— Ashish S.*

[Read full review](https://www.g2.com/survey_responses/kitecyber-review-12590659)

---

### 20. [Todyl Security Platform](https://www.g2.com/products/todyl-security-platform/reviews)
  **Average Rating:** 4.6/5.0
  **Total Reviews:** 96
  **Product Description:** Todyl empowers businesses of any size with a complete, end-to-end security program. The Todyl Security Platform converges SASE, SIEM, Endpoint Security, GRC, MXDR, and more into a cloud-native, single-agent platform purpose-built for MSPs, MSSPs, and Mid-Market IT professionals. Each module is designed to be deployed in a targeted, agile approach to meet any use case. When all modules are combined, our platform becomes a comprehensive security solution that is cloud-first, globally accessible, and features a highly intuitive interface. With Todyl, your security stack becomes one comprehensive, consolidated, and customizable platform, making security more intuitive and streamlined to combat modern threats. Our platform helps to eliminate the complexity, cost, and operational overhead traditional approaches to cybersecurity require, empowering teams with the capabilities they need to protect, detect, and respond to cyberattacks.



### What Do G2 Reviewers Say About Todyl Security Platform?
*AI-generated summary from verified user reviews*

**Pros:**

- Users praise the **ease of use** of Todyl, appreciating its intuitive interface and responsive support team.
- Users commend Todyl&#39;s **excellent customer support** , highlighting quick responses and easy solutions that enhance their experience.
- Users value the **convenient unified security solution** of Todyl Security Platform, enhancing protection across diverse tools and services.
- Users value the **comprehensive security** offered by Todyl Security Platform, ensuring protection and ease of integration.
- Users highlight the **deployment ease** of Todyl, praising its intuitive interface and seamless integration across platforms.

**Cons:**

- Users identify a need for **improvements in customization, third-party integrations, and advanced configuration options** on the Todyl platform.
- Users note **integration issues** with Todyl, citing limited API, evolving modules, and need for more third-party options.
- Users find **reporting inadequate** and suggest easier access to reports for better strategic reviews and workflows.
- Users note **limited features** in Todyl, suggesting improvements in modules, customization, and reporting for better usability.
- Users find **reporting difficult** to obtain and suggest improvements for enhanced functionality during strategic reviews.
  #### What Are Recent G2 Reviews of Todyl Security Platform?

**"[Effortless Investigations and Easy Deployment with Todyl](https://www.g2.com/survey_responses/todyl-security-platform-review-12166067)"**

**Rating:** 4.0/5.0 stars
*— Bradley H.*

[Read full review](https://www.g2.com/survey_responses/todyl-security-platform-review-12166067)

---

**"[How Todyl Security Platform Supports Our Tiered Managed Services Model](https://www.g2.com/survey_responses/todyl-security-platform-review-9701342)"**

**Rating:** 4.0/5.0 stars
*— Daniel B.*

[Read full review](https://www.g2.com/survey_responses/todyl-security-platform-review-9701342)

---

### 21. [Twingate](https://www.g2.com/products/twingate/reviews)
  **Average Rating:** 4.7/5.0
  **Total Reviews:** 73
  **Product Description:** Twingate is a secure remote access solution for an organization’s private applications, data, and environments, whether they are on-premise or in the cloud. Built to make the lives of DevOps teams, IT/infrastructure teams, and end users easier, it replaces outdated business VPNs which were not built to handle a world in which &quot;work from anywhere&quot; and cloud-based assets are increasingly the norm. Twingate’s modern zero trust-based approach to securing remote access focuses on improving security, while not compromising on usability and maintainability. Twingate distinguishes itself from other solutions in the following ways: - Software-only solution can be deployed alongside existing solutions in minutes, without requiring changes to existing infrastructure. - Enables least privilege access at the application level without requiring networks to be re-architected. - Centralized admin console, coupled with extensive logging capabilities, provides control and visibility over an enterprise’s entire network. - Scales up to support more users and resources without burdening IT teams with network segmentation projects or buying new hardware. - Client agents can be set up by users without IT support, are always on, and do not require user interaction once enabled. - User internet connectivity is improved due to split tunneling, no backhauling, and an intelligent client agent that handles authorization and routing activities on device.



### What Do G2 Reviewers Say About Twingate?
*AI-generated summary from verified user reviews*

**Pros:**

- Users value Twingate&#39;s **security features** , enabling safe and flexible access to resources across various environments.
- Users value the **ease of use** of Twingate, appreciating its simple configuration and intuitive administrative portal.
- Users praise Twingate for its **secure access** and ease of use, making it a reliable VPN replacement.
- Users appreciate the **secure and easy access management** that Twingate provides for developers in non-production environments.
- Users highlight the **implementation ease** of Twingate, enabling seamless setup for secure remote access without extensive technical skills.

**Cons:**

- Users experience significant **performance issues** with Twingate, especially in large-scale deployments and macOS configurations.
- Users struggle with the **complex configuration** of Twingate, especially for enterprise deployment across different operating systems.
- Users struggle with **complex implementation** and deployment issues across MDMs, especially for macOS environments.
- Users express frustration with **limited customization** , particularly in deployment and management for enterprise environments.
- Users experience significant **update issues** with Twingate, affecting deployment and management, especially in enterprise settings.
  #### What Are Recent G2 Reviews of Twingate?

**"[Seamless, Scalable ZTNA with Granular Access Controls](https://www.g2.com/survey_responses/twingate-review-11833704)"**

**Rating:** 4.0/5.0 stars
*— Vivek S.*

[Read full review](https://www.g2.com/survey_responses/twingate-review-11833704)

---

**"[Fast, Reliable Connectivity with Easy MFA Integration and Strong Security](https://www.g2.com/survey_responses/twingate-review-12296109)"**

**Rating:** 4.5/5.0 stars
*— Elman M.*

[Read full review](https://www.g2.com/survey_responses/twingate-review-12296109)

---

  #### What Are G2 Users Discussing About Twingate?

- [How do you use Twingate?](https://www.g2.com/discussions/how-do-you-use-twingate)
- [What is Twingate used for?](https://www.g2.com/discussions/what-is-twingate-used-for)
- [What do VPNs do?](https://www.g2.com/discussions/what-do-vpns-do)
### 22. [Citrix Workspace](https://www.g2.com/products/citrix-workspace-2024-10-30/reviews)
  **Average Rating:** 4.4/5.0
  **Total Reviews:** 64
  **Product Description:** Citrix Workspace Essentials provides a comprehensive, zero-trust approach to deliver secure and contextual access to corporate internal web apps, SaaS, and virtual applications. With Citrix Workspace Essentials, IT can consolidate traditional security products such as VPN, single-sign on, multi-factor authentication, and provide usage analytics for Web and SaaS apps. Citrix Workspace Essentials provides end-users with simplified, secure, and VPN-less access to Web apps, SaaS, virtualized apps, and data.



### What Do G2 Reviewers Say About Citrix Workspace?
*AI-generated summary from verified user reviews*

**Pros:**

- Users appreciate the **strong security features** of Citrix Workspace, ensuring safe collaboration and data protection for teams.
- Users find Citrix Workspace&#39;s **ease of use** highly convenient, enhancing collaboration and user experience seamlessly.
- Users value the **strong security features** of Citrix Workspace, ensuring safe collaboration and data protection for teams.
- Users appreciate the **seamless remote work experience** Citrix Workspace provides while ensuring top-notch security standards.
- Users value the **premium security measures** of Citrix Workspace, ensuring safe remote access and a great user experience.

**Cons:**

- Users often face **connection issues** with Citrix Workspace, leading to disconnections and performance glitches during use.
- Users often face **slow loading** times with Citrix Workspace, leading to frustration and interruptions in their workflow.
- Users face **slow performance** with Citrix Workspace, leading to disruptions and frustration during their workflow.
- Users find the **configuration process complex** , often requiring significant time and adjustment to effectively use Citrix Workspace.
- Users find the **complex setup** of Citrix Workspace time-consuming and challenging, particularly for new users.
  #### What Are Recent G2 Reviews of Citrix Workspace?

**"[Secure, Seamless Remote Access with Citrix Workspace](https://www.g2.com/survey_responses/citrix-workspace-review-12736255)"**

**Rating:** 5.0/5.0 stars
*— mani s.*

[Read full review](https://www.g2.com/survey_responses/citrix-workspace-review-12736255)

---

**"[Unified Interface Enhances Workflow with Minor Lag Issues](https://www.g2.com/survey_responses/citrix-workspace-review-12765935)"**

**Rating:** 5.0/5.0 stars
*— Verified User in Hospital &amp; Health Care*

[Read full review](https://www.g2.com/survey_responses/citrix-workspace-review-12765935)

---

  #### What Are G2 Users Discussing About Citrix Workspace?

- [What does Citrix Workspace Essentials do?](https://www.g2.com/discussions/what-does-citrix-workspace-essentials-do)
- [What is the difference between Citrix workspace and Citrix Workspace app?](https://www.g2.com/discussions/what-is-the-difference-between-citrix-workspace-and-citrix-workspace-app)
- [What is Citrix virtual desktops essentials?](https://www.g2.com/discussions/what-is-citrix-virtual-desktops-essentials)
### 23. [Prisma Access](https://www.g2.com/products/prisma-access/reviews)
  **Average Rating:** 4.3/5.0
  **Total Reviews:** 71
  **Why buyers love it?:** Prisma Access’s G2 feedback led me to its fit in securing remote and branch users with consistent cloud-delivered policies. Reviewers call out ZTNA, firewall controls, secure web gateway features, URL filtering, threat prevention, centralized management, and visibility across distributed environments. Well suited to organizations that need secure access and policy control across office, cloud, and remote work locations.



### What Do G2 Reviewers Say About Prisma Access?
*AI-generated summary from verified user reviews*

**Pros:**

- Users value the **consistent cloud-delivered security** of Prisma Access for all users, enhancing overall protection and management.
- Users commend the **robust cloud-delivered security** of Prisma Access, highlighting its scalability and zero trust approach.
- Users value the **granular security access** of Prisma Access, ensuring protection across diverse workflows and data.
- Users appreciate the **consistent, cloud-native security** of Prisma Access, providing robust protection for distributed workforces.
- Users appreciate the **robust cloud-delivered security** of Prisma Access, ensuring extensive visibility and protection across all traffic.

**Cons:**

- Users find the **setup process complex** , requiring additional time and effort to navigate the features effectively.
- Users find the **complex implementation** of Prisma Access challenging, especially without a dedicated IT team for setup.
- Users find the **initial setup complex** , particularly for organizations lacking dedicated network or security teams.
- Users find the **high cost** of Prisma Access to be a significant drawback, impacting overall accessibility and setup.
- Users find the **difficult learning curve** of Prisma Access challenging, particularly for those new to Palo Alto&#39;s ecosystem.

#### Key Features
  - Network Segmentation
  - Data Protection
  - Identity Scoring
  - Cloud Registry
  - Web Gateway
  #### What Are Recent G2 Reviews of Prisma Access?

**"[Reliable Cloud Security with Room for Improvement](https://www.g2.com/survey_responses/prisma-access-review-11246850)"**

**Rating:** 5.0/5.0 stars
*— Stephen C.*

[Read full review](https://www.g2.com/survey_responses/prisma-access-review-11246850)

---

**"[New Approach to the Cloud Access](https://www.g2.com/survey_responses/prisma-access-review-11360675)"**

**Rating:** 5.0/5.0 stars
*— Hanzeela B.*

[Read full review](https://www.g2.com/survey_responses/prisma-access-review-11360675)

---

  #### What Are G2 Users Discussing About Prisma Access?

- [What is Prisma Access (formerly GlobalProtect cloud service) used for?](https://www.g2.com/discussions/what-is-prisma-access-formerly-globalprotect-cloud-service-used-for)
### 24. [OpenVPN CloudConnexa](https://www.g2.com/products/openvpn-cloudconnexa/reviews)
  **Average Rating:** 4.6/5.0
  **Total Reviews:** 123
  **Product Description:** CloudConnexa®, powered by OpenVPN, is the leader in delivering premium, enterprise-grade network security accessible to businesses of all sizes. Easy to set up and simple to deploy, CloudConnexa&#39;s cloud-native service provides scalable secure network and resource access no matter where employees work, or corporate resources are based.



### What Do G2 Reviewers Say About OpenVPN CloudConnexa?
*AI-generated summary from verified user reviews*

**Pros:**

- Users commend the **quick and helpful customer support** from OpenVPN CloudConnexa, enhancing their overall experience and confidence.
- Users appreciate the **ease of use** of OpenVPN CloudConnexa, as it&#39;s intuitive and requires no prior networking knowledge.
- Users appreciate the **robust security features** of OpenVPN CloudConnexa, enhancing safety and trust in their business operations.
- Users praise the **easy configuration and multiple connectivity features** of OpenVPN CloudConnexa, enhancing their networking experience.
- Users appreciate the **simple and secure access** offered by OpenVPN CloudConnexa for effective private networking.

**Cons:**

- Users feel the pricing is **expensive** , especially with device-based licensing impacting costs for larger teams.
- Users experience **connection issues** that can be frustrating, especially with reCaptcha loops and inconsistent stability.
- Users find the **complex configuration** challenging, especially for those lacking technical expertise and understanding of networking concepts.
- Users experience a **difficult learning curve** with OpenVPN CloudConnexa due to advanced networking and configuration complexities.
- Users face **connectivity issues** that can be frustrating, requiring patience and extensive troubleshooting across multiple networks.
  #### What Are Recent G2 Reviews of OpenVPN CloudConnexa?

**"[Secure, Cloud-Native Connectivity with Zero Trust and Centralized Control](https://www.g2.com/survey_responses/openvpn-cloudconnexa-review-12375153)"**

**Rating:** 4.0/5.0 stars
*— Prakash S.*

[Read full review](https://www.g2.com/survey_responses/openvpn-cloudconnexa-review-12375153)

---

**"[Simple, Cloud-Managed Secure Networking with a Modern Dashboard](https://www.g2.com/survey_responses/openvpn-cloudconnexa-review-12211546)"**

**Rating:** 5.0/5.0 stars
*— Sanket P.*

[Read full review](https://www.g2.com/survey_responses/openvpn-cloudconnexa-review-12211546)

---

### 25. [Akamai Enterprise Application Access](https://www.g2.com/products/akamai-akamai-enterprise-application-access/reviews)
  **Average Rating:** 4.4/5.0
  **Total Reviews:** 27
  **Product Description:** Enterprise Application Access is a unique cloud architecture that closes all inbound firewall ports, while ensuring that only authorized users and devices have access to the internal applications they need, and not the entire network. No one can access applications directly because they are hidden from the Internet and public exposure. Enterprise Application Access integrates data path protection, single sign-on, identity access, application security, and management visibility and control into a single service.



### What Do G2 Reviewers Say About Akamai Enterprise Application Access?
*AI-generated summary from verified user reviews*

**Pros:**

- Users appreciate the **excellent customer support** of Akamai Enterprise Application Access, enhancing their overall experience and integration.
- Users find Akamai Enterprise Application Access to be **easy to use** , enhancing daily productivity with seamless integration and support.
- Users find Akamai Enterprise Application Access offers **easy access** with intuitive use and strong support for ZTNA needs.
- Users value the **abundant features** of Akamai Enterprise Application Access, noting its ease of use and excellent support.
- Users value the **robust security measures** offered by Akamai, safeguarding against DDoS and zero-day threats effectively.

  #### What Are Recent G2 Reviews of Akamai Enterprise Application Access?

**"[Akamai protect organization security](https://www.g2.com/survey_responses/akamai-enterprise-application-access-review-10406268)"**

**Rating:** 5.0/5.0 stars
*— Verified User in Insurance*

[Read full review](https://www.g2.com/survey_responses/akamai-enterprise-application-access-review-10406268)

---

**"[best ZTNA out there](https://www.g2.com/survey_responses/akamai-enterprise-application-access-review-10590988)"**

**Rating:** 5.0/5.0 stars
*— Yash K.*

[Read full review](https://www.g2.com/survey_responses/akamai-enterprise-application-access-review-10590988)

---

  #### What Are G2 Users Discussing About Akamai Enterprise Application Access?

- [What is Akamai Zero Trust Security used for?](https://www.g2.com/discussions/what-is-akamai-zero-trust-security-used-for)

    ## What Is Zero Trust Networking Software?
  [Zero Trust Architecture Software](https://www.g2.com/categories/zero-trust-architecture)
  ## What Software Categories Are Similar to Zero Trust Networking Software?
    - [Network Access Control Software](https://www.g2.com/categories/network-access-control-nac)
    - [Cloud Access Security Broker (CASB) Software](https://www.g2.com/categories/cloud-access-security-broker-casb)
    - [Software-Defined Perimeter (SDP) Software](https://www.g2.com/categories/software-defined-perimeter-sdp)
    - [Cloud Edge Security Software](https://www.g2.com/categories/cloud-edge-security)
    - [Secure Access Service Edge (SASE) Platforms](https://www.g2.com/categories/secure-access-service-edge-sase-platforms)
    - [Zero Trust Platforms](https://www.g2.com/categories/zero-trust-platforms)
    - [Secure Service Edge (SSE) Solutions](https://www.g2.com/categories/secure-service-edge-sse-solutions)

  
---

## How Do You Choose the Right Zero Trust Networking Software?

### What You Should Know About Zero Trust Networking Software

### **Zero Trust Networking Software Buying Insights at a Glance**

[Zero trust networking software](https://www.g2.com/categories/zero-trust-networking) enforces the principle of &quot;never trust, always verify&quot; by authenticating every access request, limiting lateral movement, and maintaining granular control over network resources. Instead of treating network perimeters as secure boundaries, these platforms assume breach and verify each connection attempt, whether from users, devices, or applications, before granting access. The result is a security architecture that feels more like continuous authentication and less like traditional perimeter defense.

Zero trust networking software has become central to modern cybersecurity strategies. Security teams rely on these platforms to implement application whitelisting, control network access without VPNs, enforce least-privilege policies, and maintain visibility across endpoints. In practice, the best zero trust networking software acts as the connective layer between identity management, endpoint security, and network access control workflows.

Based on G2 review data, users rate zero trust networking software strongly overall. Zero trust network products in the category have an average star rating of 4.60/5 and an average likelihood to recommend of 9.20/10. Ease-of-use metrics trend high across the category, with 6.32/7 for Ease of Use, 6.27/7 for Ease of Setup, and 6.38/7 for Quality of Support. These scores suggest that most security teams are able to adopt zero trust software relatively quickly once policies are configured.

The biggest buying pattern that appears across reviews is that teams evaluating zero trust network solutions are trying to balance two priorities at once: implementing comprehensive security controls and maintaining operational efficiency. Strong platforms typically succeed by combining application control, network segmentation, and user-friendly policy management that reduces manual oversight.

Common use cases include endpoint protection through application allow listing that blocks unauthorized software execution, secure remote access enabling users to connect to resources without traditional VPNs, lateral movement prevention restricting network traffic between systems, privilege management controlling admin rights and elevation requests, threat detection identifying malicious activity before execution, and compliance enforcement maintaining audit trails and access controls. Finance teams also rely on these platforms for DNS filtering, conditional access policies tied to device posture, and microsegmentation that isolates critical assets from the broader network.

Pricing for zero trust network companies usually scales with the number of protected endpoints, the number of enabled feature modules, managed detection and response services, and integration complexity. Entry-level plans typically start with basic application control and network filtering, while enterprise zero trust networking software offers advanced threat prevention, 24/7 SOC support, and zero trust network access (ZTNA) capabilities.

**Top 5 FAQs from zero trust networking software buyers**

- How do zero trust networking solutions balance security controls with user productivity?
- What deployment models do zero trust platforms support for hybrid and remote workforces?
- How well do zero trust network security tools integrate with existing [identity and endpoint management systems](https://www.g2.com/categories/endpoint-management)?
- What level of visibility and reporting do zero trust providers offer for compliance auditing?
- How do zero trust software platforms handle legacy applications that can&#39;t support modern authentication?

G2&#39;s top-rated zero trust networking software, based on verified reviews, includes [Zscaler Private Access,](https://www.g2.com/products/zscaler-private-access/reviews) [Palo Alto Networks IoT/OT Security](https://www.g2.com/products/palo-alto-networks-iot-ot-security/reviews), [Okta](https://www.g2.com/products/okta/reviews), [ThreatLocker Platform](https://www.g2.com/products/threatlocker-platform/reviews), and [Cisco Duo](https://www.g2.com/products/cisco-duo/reviews).

### What are the top-reviewed budgeting and forecasting software on G2?

[Zscaler Private Access](https://www.g2.com/products/zscaler-private-access/reviews)

- Number of Reviews: 85
- Satisfaction: 96
- Market Presence: 97
- G2 Score: 96

[Palo Alto Networks IoT/OT Security](https://www.g2.com/products/palo-alto-networks-iot-ot-security/reviews)

- Number of Reviews: 62
- Satisfaction: 91
- Market Presence: 82
- G2 Score: 86

[Okta](https://www.g2.com/products/okta/reviews)

- Number of Reviews: 186
- Satisfaction: 72
- Market Presence: 91
- G2 Score: 81

[ThreatLocker Platform](https://www.g2.com/products/threatlocker-platform/reviews)

- Number of Reviews: 89
- Satisfaction: 97
- Market Presence: 60
- G2 Score: 79

[Cisco Duo](https://www.g2.com/products/cisco-duo/reviews)

- Number of Reviews: 44
- Satisfaction: 68
- Market Presence: 69
- G2 Score: 69

Satisfaction reflects how users rate their experience with the product based on review signals such as usability, support, and likelihood to recommend. ([Source 2](https://www.g2.com/reports))

Market Presence represents a product&#39;s market footprint based on company size, user adoption, and product growth indicators. ([Source 2](https://www.g2.com/reports))

G2 Score combines Satisfaction and Market Presence to create a category-level ranking that enables direct product comparison. ([Source 2](https://www.g2.com/reports))

Learn more about how G2 calculates these scores. ([Source 1](https://documentation.g2.com/docs/research-scoring-methodologies))

### What I Often See in Zero Trust Networking Software

#### Pros: What I See Users Consistently Appreciating

- **Zero trust architecture prevents unauthorized application execution through default-deny policies**

_“I like the application control aspect of ThreatLocker Platform and the fact that it uses a Zero Trust method to prevent unknown execution or installation of software. With the application control, I get a wealth of information about what application is trying to run, where it’s running from, and what the application can do, such as talk to the internet or access other files. The zero trust method gives me full control, ensuring no application will run in my environment unless I approve of it first. I would say the initial setup, based on learning through their University, is pretty seamless, and ThreatLocker has an amazing team that helps make the process easier.”_ - [Dino L](https://www.g2.com/products/threatlocker-platform/reviews/threatlocker-platform-review-12457885)., ThreatLocker Platform Review

- **Secure network access eliminating traditional VPN dependencies for remote users**

_“I appreciate how Zscaler Private Access secures remote connectivity for our hybrid workforce without the need for traditional VPNs, enabling safe access to internal applications from any location. I am impressed by the product&#39;s ability to noticeably reduce latency and enhance the overall user experience, all while upholding a robust security posture and compliance standards. Setting it up has been straightforward for me, thanks to the clear documentation and the support of an active community.&amp;nbsp;_

_I also value how users can connect directly to the specific applications they require, without exposing the entire network. The solution is lightweight and fast, removing the hassle of managing VPNs and their often sluggish tunnels. The admin console offers excellent visibility, and integration with identity providers like Azure is seamless. I find the cost of Zscaler Private Access to be reasonable and attractive, particularly for enterprises, and I appreciate its recognition as a market leader.”_ - [Ritik S.](https://www.g2.com/products/zscaler-private-access/reviews/zscaler-private-access-review-11829562), Zscaler Private Access Review

- **Application whitelisting stops malware before it runs on endpoints**

_“I really like the strict application control and the ease of managing the ThreatLocker Platform. It ensures that only authorized applications can run, and the interface makes managing the application whitelist straightforward. The platform provides a solid and secure operation. Additionally, discovery and policy enforcement were easy, allowing for a quick standard of service.”_ - [Mark A.](https://www.g2.com/products/threatlocker-platform/reviews/threatlocker-platform-review-12437773), ThreatLocker Platform Review

#### Cons: Where I See Many Platforms Falling Short

- **Complex policy configuration requiring extensive planning during initial deployment**

_“The initial setup and implementation can be a bit complex and time-consuming, especially for first-time users. Sometimes troubleshooting issues takes longer than expected. Also, the pricing feels on the higher side and some advanced features require additional configuration knowledge. Improving documentation and simplifying setup would make it easier for new teams.”_ - [Deepak S.](https://www.g2.com/products/zscaler-private-access/reviews/zscaler-private-access-review-10788884), Zscaler Private Access Review

- **Steep learning curve navigating advanced features across multiple security modules**

“While the core functionality is strong, the initial learning curve for configuring risk-based policies and understanding the ML-driven device classification can be a bit steep, especially for teams new to OT environments. Additionally, the product documentation could be more detailed regarding troubleshooting advanced detection scenarios. Pricing can also become a concern for smaller organizations with hybrid networks, particularly when scaling to multiple remote sites or factories.” - [Verified User in Information Technology and Services](https://www.g2.com/products/palo-alto-networks-iot-ot-security/reviews/palo-alto-networks-iot-ot-security-review-11276520), Palo Alto Networks IoT/OT Security Review

### My Expert Takeaway on Zero Trust Networking Software in 2026

Review data suggests that zero trust networking software performs particularly well in areas that tend to drive long-term product adoption. The category averages 4.60 out of 5 stars, paired with a 9.20 out of 10 likelihood-to-recommend score, which indicates that most security teams see meaningful value from these platforms once they become part of the security workflow.

Where I see the biggest difference between average and high-performing security teams is how they use these tools beyond basic endpoint protection. The most successful teams treat zero trust software as a comprehensive security framework, not just as an application blocker. They actively leverage network control features, implement conditional access policies based on device posture, and use unified audit capabilities to track threats across their environment. That approach helps maintain stronger security postures and reduces time-to-detection when incidents occur.

I also notice stronger adoption patterns in industries where security threats are particularly intense, such as information technology services, computer and network security, healthcare, and financial services. In those environments, security teams often need to protect against sophisticated attacks while maintaining user productivity. Zero trust networking systems make it easier to enforce strict controls without losing visibility into endpoint activity.

Another clear trend in the data is that ease of deployment and support strongly influence adoption. Products with the highest recommendation scores tend to combine powerful security capabilities with learning modes that allow gradual rollout across organizations. Metrics like Ease of Setup (6.27/7) and Quality of Support (6.38/7) reinforce the idea that most teams can implement these platforms without significant operational friction, especially when vendors provide proactive engineering support.

If I were advising a team evaluating the best zero trust networking software, I would focus on three things early in the buying process: how easily security teams can configure policies without disrupting legitimate workflows, how effectively the platform provides visibility into blocked threats and access attempts, and how well it integrates with existing identity and endpoint management tools. The tools that perform best in those areas usually become foundational infrastructure for modern security operations.

### Zero Trust Networking Software FAQs

#### **What are the best zero trust network security tools?**

Zero trust network security requires comprehensive controls that combine identity verification, application control, and network segmentation. Top-rated zero trust network tools on G2 include:

- [Zscaler Private Access](https://www.g2.com/products/zscaler-private-access/reviews) **:** Cloud-native ZTNA platform for secure application access without VPNs.
- [Palo Alto Networks IoT/OT Security](https://www.g2.com/products/palo-alto-networks-iot-ot-security/reviews) **:** Advanced threat prevention and network security for enterprise environments.
- [Okta](https://www.g2.com/products/okta/reviews) **:** Identity-centric zero trust with adaptive authentication and access management.
- [ThreatLocker Platform](https://www.g2.com/products/threatlocker-platform/reviews) **:** Application allowlisting and endpoint protection with zero trust principles.
- [Cisco Duo](https://www.g2.com/products/cisco-duo/reviews) **:** Multi-factor authentication and device trust for secure access control.

#### **Which zero trust providers offer the strongest enterprise cybersecurity features?**

Enterprise teams need platforms that support large deployments, advanced policies, and centralized management. [Top enterprise zero trust networking software](https://www.g2.com/categories/zero-trust-networking/enterprise) options on G2 include:

- [Zscaler Private Access](https://www.g2.com/products/zscaler-private-access/reviews) **:** Cloud-native ZTNA platform designed for enterprise-scale secure access.
- [ThreatLocker Platform](https://www.g2.com/products/threatlocker-platform/reviews) **:** Enterprise-ready zero trust with application control and network segmentation.
- [Cisco Duo](https://www.g2.com/products/cisco-duo/reviews) **:** Widely deployed multi-factor authentication and zero trust access for enterprises.
- [Okta](https://www.g2.com/products/okta/reviews) **:** Identity-centric zero trust with enterprise SSO and adaptive authentication.
- [Prisma Access](https://www.g2.com/products/prisma-access/reviews) **:** Comprehensive [SASE platform](https://www.g2.com/categories/secure-access-service-edge-sase-platforms) with zero trust network access for large organizations.

#### **What are the top zero trust network solutions for small businesses?**

Small businesses typically need affordable, easy-to-deploy solutions with strong security fundamentals. [Top small business zero trust network options](https://www.g2.com/categories/zero-trust-networking/small-business) on G2 include:

- [ThreatLocker Platform](https://www.g2.com/products/threatlocker-platform/reviews) **:** Accessible zero trust security with manageable deployment for small teams.
- [Todyl Security Platform](https://www.g2.com/products/todyl-security-platform/reviews) **:** All-in-one security platform designed for small to mid-sized businesses.
- [Cisco Duo](https://www.g2.com/products/cisco-duo/reviews) **:** Simple multi-factor authentication and device trust for small organizations.
- [Check Point SASE](https://www.g2.com/products/check-point-sase/reviews) **:** Scalable SASE solution starting with small deployments.
- [GoodAccess](https://www.g2.com/products/goodaccess/reviews) **:** Zero trust network access built for smaller organizations and distributed teams.

#### **Which zero trust product should we use for network security?**

Network safety requires internal segmentation, access controls, and threat detection. Best products on G2 include:

- [ThreatLocker Platform](https://www.g2.com/products/threatlocker-platform/reviews) **:** Network control and application security for comprehensive protection.
- [Zscaler Private Access](https://www.g2.com/products/zscaler-private-access/reviews) **:** Cloud-based network security with zero trust access controls.
- [Check Point SASE](https://www.g2.com/products/check-point-sase/reviews) **:** Network security with zero trust segmentation and threat prevention.
- [Palo Alto Networks IoT/OT Security](https://www.g2.com/products/palo-alto-networks-iot-ot-security/reviews) **:** Advanced network security for IoT and operational technology.
- [FortiClient](https://www.g2.com/products/forticlient/reviews) **:** Network security with zero trust access for distributed environments.

#### **What zero trust solution is best for securing office networks?**

Office network security requires endpoint protection, internal segmentation, and access controls. Best solutions on G2 include:

- [ThreatLocker Platform](https://www.g2.com/products/threatlocker-platform/reviews) **:** Office endpoint and network security with application control.
- [Cisco Duo](https://www.g2.com/products/cisco-duo/reviews) **:** Secure access to office resources with multi-factor authentication.
- [Check Point SASE](https://www.g2.com/products/check-point-sase/reviews) **:** Office network security with zero trust segmentation.
- [FortiClient](https://www.g2.com/products/forticlient/reviews) **:** Comprehensive endpoint and network security for office environments.
- [Zscaler Private Access](https://www.g2.com/products/zscaler-private-access/reviews) **:** Secure access to office applications without traditional VPNs.

#### **What&#39;s the best zero trust platform for cloud services and SaaS environments?**

Cloud-first zero trust requires seamless integration with SaaS applications and remote access capabilities. Best platforms on G2 include:

- [Zscaler Private Access](https://www.g2.com/products/zscaler-private-access/reviews) **:** Purpose-built for cloud services with zero trust network access.
- [Cisco Duo](https://www.g2.com/products/cisco-duo/reviews) **:** Strong SaaS integration for secure authentication and device trust.
- [Check Point SASE](https://www.g2.com/products/check-point-sase/reviews) **:** Cloud-delivered SASE with zero trust for distributed environments.
- [ThreatLocker Platform](https://www.g2.com/products/threatlocker-platform/reviews) **:** Supports cloud deployment with application and network control.
- [FortiClient](https://www.g2.com/products/forticlient/reviews) **:** Integrates zero trust access with cloud-based security services.

#### **Which zero trust solution is best for securing remote access without VPNs?**

Zero Trust Network Access (ZTNA) eliminates VPN complexity while maintaining secure connections. Best tools on G2 include:

- [Zscaler Private Access](https://www.g2.com/products/zscaler-private-access/reviews) **:** Leading ZTNA platform for VPN-less secure access to applications.
- [ThreatLocker Platform](https://www.g2.com/products/threatlocker-platform/reviews) **:** Network control features enabling secure access without traditional VPNs.
- [Check Point SASE](https://www.g2.com/products/check-point-sase/reviews) **:** SASE platform with integrated ZTNA for remote workforce access.
- [Cisco Duo](https://www.g2.com/products/cisco-duo/reviews) **:** Secure access gateway offering a VPN alternative with zero-trust principles.
- [Kitecyber](https://www.g2.com/products/kitecyber/reviews) **:** Zero trust network access for remote users without VPN infrastructure.

### Sources

1. [G2 Research Scoring Methodologies](https://documentation.g2.com/docs/research-scoring-methodologies)
2. [G2 Market Presence Score Overview](https://www.g2.com/reports)

Researched By: [Brandon Summers-Miller](https://research.g2.com/insights/author/brandon-summers-miller)

Last updated on: March 15, 2026



    
