Introducing G2.ai, the future of software buying.Try now
GoodAccess
Sponsored
GoodAccess
Visit Website
Product Avatar Image
Zero Networks Segment

By Zero Networks

5.0 out of 5 stars
4 star
0%
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with Zero Networks Segment?

GoodAccess
Sponsored
GoodAccess
Visit Website
This product hasn't been reviewed yet! Be the first to share your experience.
Leave a Review

Zero Networks Segment Reviews & Product Details

Profile Status

This profile is currently managed by Zero Networks Segment but has limited features.

Are you part of the Zero Networks Segment team? Upgrade your plan to enhance your branding and engage with visitors to your profile!

Zero Networks Segment Media

Zero Networks Segment Demo - Zero Networks Segment
Dashboard view of Zero Networks segment
Product Avatar Image

Have you used Zero Networks Segment before?

Answer a few questions to help the Zero Networks Segment community

Zero Networks Segment Reviews (1)

Reviews

Zero Networks Segment Reviews (1)

5.0
1 reviews

Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Verified User in Information Technology and Services
AI
Small-Business (50 or fewer emp.)
"Scalable on demand tool"
What do you like best about Zero Networks Segment?

Solution for cybersecurity,

Asset management, Policy expert and IRM functionality stands out the best. Prediction of cyber attacks and provide ML algos to tackle them. Review collected by and hosted on G2.com.

What do you dislike about Zero Networks Segment?

Pricing for implementation,

Limited functional capabilities like zoxor off and many more,

Cannot be used for small scale packages, minimal customization capabilities Review collected by and hosted on G2.com.

There are not enough reviews of Zero Networks Segment for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Cisco Duo Logo
Cisco Duo
4.5
(428)
Duo is a cloud-based access security platform built to protect access to any application, from any device. Duo’s passwordless authentication, single sign-on (SSO) and user-friendly multi-factor authentication make secure logins easy for users, reducing friction to their workflow.
2
Okta Logo
Okta
4.5
(1,036)
Okta is The World’s Identity Company™. As the leading independent Identity partner, we free everyone to safely use any technology — anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.
3
BetterCloud Logo
BetterCloud
4.4
(477)
BetterCloud provides critical insights, automated management, and intelligent data security for cloud office platforms.
4
Check Point Next Generation Firewalls (NGFWs) Logo
Check Point Next Generation Firewalls (NGFWs)
4.5
(566)
Check Point Firewall. The Check Point Firewall Software Blade incorporates all of the power and capability of the revolutionary FireWall-1 solution while adding user identity awareness to provide granular event awareness and policy enforcement.
5
ThreatLocker Platform Logo
ThreatLocker Platform
4.8
(294)
Get unprecedented visibility and control of your cybersecurity, quickly, easily, and cost-effectively. Schedule a free product demonstration and ThreatLocker will show you how.
6
Absolute Secure Access Logo
Absolute Secure Access
4.7
(225)
Absolute Secure Access delivers modern remote access for highly mobile workforces without sacrificing productivity. It provides reliable network connectivity for users to securely access critical resources in the public cloud, private data centers, or on-premises -- even in challenging environments. It is the only solution that proactively optimizes and improves the employee experience while offering deep visibility, control, and analytics to IT administrators.
7
FortiClient Logo
FortiClient
4.4
(211)
FortiClient Fabric Agent integrates endpoints into the Security Fabric and provides endpoint telemetry, including user identity, protection status, risk scores, unpatched vulnerabilities, security events, and more.
8
Trend Vision One Logo
Trend Vision One
4.7
(210)
Trend Micro Vision One (XDR) collects and correlates deep activity data across multiple vectors - email, endpoints, servers, cloud workloads, and networks - enabling a level of detection and investigation that is difficult or impossible to achieve with SIEM or individual point solutions.
9
AlgoSec Logo
AlgoSec
4.5
(196)
AlgoSec is a business-driven security management solution.
10
Check Point Harmony SASE Logo
Check Point Harmony SASE
4.5
(195)
Check Point Harmony SASE is a converged networking and network security platform which connects all users, in the office or remote, to all resources, located on-prem, cloud, SaaS or web. It delivers secure Zerto Trust Network Access (ZTNA) connectivity along web protection capabilities including Internet access control, malware protection, data loss prevention(DLP), and sandboxing, as well as a firewall as a service. The solution employs a hybrid architecture, combining on-device and cloud-based protections, which delivers market leading security and performance.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Zero Networks Segment
View Alternatives