Introducing G2.ai, the future of software buying.Try now

Best Cloud Access Security Broker (CASB) Software

Lauren Worth
LW
Researched and written by Lauren Worth

Cloud access security broker (CASB) software is used to provide a layer of protection and policy enforcement for employees accessing cloud-based software. CASB serves as a gateway through which companies can enforce their security requirements beyond on-premise and secure connections between employees and cloud service providers. Companies use CASB software to reduce risks related to cloud applications and network connections while simultaneously monitoring actions and behaviors.

CASB solutions are also used to identify abnormal behaviors from internal actors and then alert administrators of potential shadow IT and noncompliant behaviors. These tools typically monitor and record the actions taken by an individual using the CASB, who can leverage the data collected for behavioral analysis and reporting.

To qualify for inclusion in the Cloud Access Security Broker (CASB) category, a product must:

Secure connections between end users and cloud service providers
Enforce security policies beyond local networks and infrastructure
Protect data and connected devices from cloud-based threats and malware

Best Cloud Access Security Broker (CASB) Software At A Glance

Easiest to Use:
Best Free Software:
Top Trending:
Show LessShow More
Best Free Software:
Top Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
57 Listings in Cloud Access Security Broker (CASB) Available
(100)4.2 out of 5
6th Easiest To Use in Cloud Access Security Broker (CASB) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    At Forcepoint, we understand the transformation our customers currently face. A cloud-based security reality is a journey. And we’re thoroughly committed to helping our customers make it. Forcepoint

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 50% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Forcepoint ONE Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    4
    Ease of Use
    4
    Features
    4
    Security
    4
    Detailed Analysis
    3
    Cons
    Expensive
    3
    Complexity
    2
    Poor Customer Support
    2
    Alert Issues
    1
    Complex Configuration
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Forcepoint ONE features and usability ratings that predict user satisfaction
    8.6
    Ease of Use
    Average: 8.8
    8.2
    Anomoly Detection
    Average: 8.4
    8.2
    Cloud Gap Analytics
    Average: 8.4
    8.3
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1994
    HQ Location
    Austin, TX
    Twitter
    @Forcepointsec
    66,473 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,784 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

At Forcepoint, we understand the transformation our customers currently face. A cloud-based security reality is a journey. And we’re thoroughly committed to helping our customers make it. Forcepoint

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 50% Enterprise
  • 38% Mid-Market
Forcepoint ONE Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
4
Ease of Use
4
Features
4
Security
4
Detailed Analysis
3
Cons
Expensive
3
Complexity
2
Poor Customer Support
2
Alert Issues
1
Complex Configuration
1
Forcepoint ONE features and usability ratings that predict user satisfaction
8.6
Ease of Use
Average: 8.8
8.2
Anomoly Detection
Average: 8.4
8.2
Cloud Gap Analytics
Average: 8.4
8.3
Cloud Registry
Average: 8.6
Seller Details
Year Founded
1994
HQ Location
Austin, TX
Twitter
@Forcepointsec
66,473 Twitter followers
LinkedIn® Page
www.linkedin.com
1,784 employees on LinkedIn®
(67)4.3 out of 5
13th Easiest To Use in Cloud Access Security Broker (CASB) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Palo Alto Networks Prisma® Access protects the hybrid workforce with the superior security of ZTNA while providing exceptional user experiences from a simple, unified security product. Purpose-built

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 45% Enterprise
    • 30% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Prisma Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    30
    Secure Access
    23
    Internet Security
    18
    Protection
    18
    Threat Protection
    17
    Cons
    Complex Setup
    17
    Complex Configuration
    16
    Complex Implementation
    14
    Expensive
    12
    Difficult Learning Curve
    10
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Prisma Access features and usability ratings that predict user satisfaction
    8.4
    Ease of Use
    Average: 8.8
    8.7
    Anomoly Detection
    Average: 8.4
    8.5
    Cloud Gap Analytics
    Average: 8.4
    8.9
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    126,982 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17,221 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Palo Alto Networks Prisma® Access protects the hybrid workforce with the superior security of ZTNA while providing exceptional user experiences from a simple, unified security product. Purpose-built

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 45% Enterprise
  • 30% Mid-Market
Prisma Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
30
Secure Access
23
Internet Security
18
Protection
18
Threat Protection
17
Cons
Complex Setup
17
Complex Configuration
16
Complex Implementation
14
Expensive
12
Difficult Learning Curve
10
Prisma Access features and usability ratings that predict user satisfaction
8.4
Ease of Use
Average: 8.8
8.7
Anomoly Detection
Average: 8.4
8.5
Cloud Gap Analytics
Average: 8.4
8.9
Cloud Registry
Average: 8.6
Seller Details
Company Website
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
126,982 Twitter followers
LinkedIn® Page
www.linkedin.com
17,221 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(79)4.4 out of 5
Optimized for quick response
1st Easiest To Use in Cloud Access Security Broker (CASB) software
View top Consulting Services for Cato SASE Cloud
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cato provides the world’s leading single-vendor SASE platform. Cato creates a seamless and elegant customer experience that effortlessly enables threat prevention, data protection, and timely incident

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 58% Mid-Market
    • 22% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cato SASE Cloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    7
    Customer Support
    6
    Ease of Management
    5
    User Interface
    5
    Easy Management
    4
    Cons
    Difficult Learning
    3
    Difficult Learning Curve
    3
    Limited Features
    3
    Login Issues
    3
    Expensive
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cato SASE Cloud features and usability ratings that predict user satisfaction
    9.1
    Ease of Use
    Average: 8.8
    8.7
    Anomoly Detection
    Average: 8.4
    9.3
    Cloud Gap Analytics
    Average: 8.4
    9.0
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2015
    HQ Location
    Tel-Aviv, Israel
    Twitter
    @CatoNetworks
    12,163 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,232 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cato provides the world’s leading single-vendor SASE platform. Cato creates a seamless and elegant customer experience that effortlessly enables threat prevention, data protection, and timely incident

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 58% Mid-Market
  • 22% Small-Business
Cato SASE Cloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
7
Customer Support
6
Ease of Management
5
User Interface
5
Easy Management
4
Cons
Difficult Learning
3
Difficult Learning Curve
3
Limited Features
3
Login Issues
3
Expensive
2
Cato SASE Cloud features and usability ratings that predict user satisfaction
9.1
Ease of Use
Average: 8.8
8.7
Anomoly Detection
Average: 8.4
9.3
Cloud Gap Analytics
Average: 8.4
9.0
Cloud Registry
Average: 8.6
Seller Details
Company Website
Year Founded
2015
HQ Location
Tel-Aviv, Israel
Twitter
@CatoNetworks
12,163 Twitter followers
LinkedIn® Page
www.linkedin.com
1,232 employees on LinkedIn®
(59)4.4 out of 5
4th Easiest To Use in Cloud Access Security Broker (CASB) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Netskope is the leader in cloud security — we help the world’s largest organizations take advantage of cloud and web without sacrificing security. Our Cloud XD™ technology targets and controls activit

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 58% Enterprise
    • 34% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Netskope One Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Features
    3
    Seamless Implementation
    2
    Security
    2
    Access Centralization
    1
    Cons
    Limited Features
    2
    Access Issues
    1
    Complex Configuration
    1
    Complex Implementation
    1
    Complexity
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Netskope One Platform features and usability ratings that predict user satisfaction
    8.5
    Ease of Use
    Average: 8.8
    8.9
    Anomoly Detection
    Average: 8.4
    8.1
    Cloud Gap Analytics
    Average: 8.4
    8.7
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Netskope
    Year Founded
    2012
    HQ Location
    Santa Clara, CA
    Twitter
    @Netskope
    11,107 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,695 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Netskope is the leader in cloud security — we help the world’s largest organizations take advantage of cloud and web without sacrificing security. Our Cloud XD™ technology targets and controls activit

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 58% Enterprise
  • 34% Mid-Market
Netskope One Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Features
3
Seamless Implementation
2
Security
2
Access Centralization
1
Cons
Limited Features
2
Access Issues
1
Complex Configuration
1
Complex Implementation
1
Complexity
1
Netskope One Platform features and usability ratings that predict user satisfaction
8.5
Ease of Use
Average: 8.8
8.9
Anomoly Detection
Average: 8.4
8.1
Cloud Gap Analytics
Average: 8.4
8.7
Cloud Registry
Average: 8.6
Seller Details
Seller
Netskope
Year Founded
2012
HQ Location
Santa Clara, CA
Twitter
@Netskope
11,107 Twitter followers
LinkedIn® Page
www.linkedin.com
2,695 employees on LinkedIn®
(84)4.6 out of 5
3rd Easiest To Use in Cloud Access Security Broker (CASB) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Check Point Harmony Email & Collaboration, protects enterprise data by preventing targeted attacks on SaaS applications and cloud-based email.

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 52% Mid-Market
    • 32% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Harmony Email & Collaboration Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Threat Detection
    7
    Email Security
    6
    Protection
    5
    Real-time Detection
    5
    Security
    5
    Cons
    Limited Features
    4
    Not User-Friendly
    3
    Access Limitations
    2
    Difficult Learning
    2
    Unclear Guidance
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Harmony Email & Collaboration features and usability ratings that predict user satisfaction
    9.1
    Ease of Use
    Average: 8.8
    8.8
    Anomoly Detection
    Average: 8.4
    8.7
    Cloud Gap Analytics
    Average: 8.4
    8.8
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,087 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,977 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

Check Point Harmony Email & Collaboration, protects enterprise data by preventing targeted attacks on SaaS applications and cloud-based email.

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 52% Mid-Market
  • 32% Enterprise
Harmony Email & Collaboration Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Threat Detection
7
Email Security
6
Protection
5
Real-time Detection
5
Security
5
Cons
Limited Features
4
Not User-Friendly
3
Access Limitations
2
Difficult Learning
2
Unclear Guidance
2
Harmony Email & Collaboration features and usability ratings that predict user satisfaction
9.1
Ease of Use
Average: 8.8
8.8
Anomoly Detection
Average: 8.4
8.7
Cloud Gap Analytics
Average: 8.4
8.8
Cloud Registry
Average: 8.6
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,087 Twitter followers
LinkedIn® Page
www.linkedin.com
7,977 employees on LinkedIn®
Ownership
NASDAQ:CHKP
(94)4.6 out of 5
View top Consulting Services for Cloudflare SSE & SASE Platform
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cloudflare Area 1 is a cloud-native email security platform that identifies and blocks attacks before they hit user inboxes, enabling more effective protection against spear phishing, Business Email C

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 37% Small-Business
    • 34% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cloudflare SSE & SASE Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    12
    Ease of Use
    10
    Performance Speed
    8
    Protection
    8
    Reliability
    7
    Cons
    Needs Improvement
    4
    Difficult Learning
    3
    Difficult Learning Curve
    3
    Expensive
    3
    Learning Difficulty
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cloudflare SSE & SASE Platform features and usability ratings that predict user satisfaction
    9.2
    Ease of Use
    Average: 8.8
    10.0
    Anomoly Detection
    Average: 8.4
    10.0
    Cloud Gap Analytics
    Average: 8.4
    10.0
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2009
    HQ Location
    San Francisco, California
    Twitter
    @Cloudflare
    222,890 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,449 employees on LinkedIn®
    Ownership
    NYSE: NET
Product Description
How are these determined?Information
This description is provided by the seller.

Cloudflare Area 1 is a cloud-native email security platform that identifies and blocks attacks before they hit user inboxes, enabling more effective protection against spear phishing, Business Email C

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 37% Small-Business
  • 34% Mid-Market
Cloudflare SSE & SASE Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
12
Ease of Use
10
Performance Speed
8
Protection
8
Reliability
7
Cons
Needs Improvement
4
Difficult Learning
3
Difficult Learning Curve
3
Expensive
3
Learning Difficulty
3
Cloudflare SSE & SASE Platform features and usability ratings that predict user satisfaction
9.2
Ease of Use
Average: 8.8
10.0
Anomoly Detection
Average: 8.4
10.0
Cloud Gap Analytics
Average: 8.4
10.0
Cloud Registry
Average: 8.6
Seller Details
Year Founded
2009
HQ Location
San Francisco, California
Twitter
@Cloudflare
222,890 Twitter followers
LinkedIn® Page
www.linkedin.com
5,449 employees on LinkedIn®
Ownership
NYSE: NET
(56)4.4 out of 5
View top Consulting Services for Citrix Workspace
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Citrix Workspace Essentials provides a comprehensive, zero-trust approach to deliver secure and contextual access to corporate internal web apps, SaaS, and virtual applications. With Citrix Workspace

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 68% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Citrix Workspace Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    6
    Security
    4
    Access
    3
    Easy Access
    3
    Efficiency
    3
    Cons
    Slow Loading
    4
    Slow Performance
    4
    Delay Issues
    3
    Slow Internet
    3
    Complex Configuration
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Citrix Workspace features and usability ratings that predict user satisfaction
    8.6
    Ease of Use
    Average: 8.8
    8.6
    Anomoly Detection
    Average: 8.4
    8.6
    Cloud Gap Analytics
    Average: 8.4
    8.5
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Citrix
    Year Founded
    1989
    HQ Location
    Fort Lauderdale, FL
    Twitter
    @citrix
    203,540 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,634 employees on LinkedIn®
    Ownership
    NASDAQ:CTXS
Product Description
How are these determined?Information
This description is provided by the seller.

Citrix Workspace Essentials provides a comprehensive, zero-trust approach to deliver secure and contextual access to corporate internal web apps, SaaS, and virtual applications. With Citrix Workspace

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 68% Enterprise
  • 25% Mid-Market
Citrix Workspace Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
6
Security
4
Access
3
Easy Access
3
Efficiency
3
Cons
Slow Loading
4
Slow Performance
4
Delay Issues
3
Slow Internet
3
Complex Configuration
2
Citrix Workspace features and usability ratings that predict user satisfaction
8.6
Ease of Use
Average: 8.8
8.6
Anomoly Detection
Average: 8.4
8.6
Cloud Gap Analytics
Average: 8.4
8.5
Cloud Registry
Average: 8.6
Seller Details
Seller
Citrix
Year Founded
1989
HQ Location
Fort Lauderdale, FL
Twitter
@citrix
203,540 Twitter followers
LinkedIn® Page
www.linkedin.com
4,634 employees on LinkedIn®
Ownership
NASDAQ:CTXS
(45)4.5 out of 5
12th Easiest To Use in Cloud Access Security Broker (CASB) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Zscaler global cloud delivers the entire gateway security stack as a service. By securely connecting users to their applications, regardless of device, location, or network, Zscaler is transforming en

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 42% Enterprise
    • 18% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Zscaler Cloud Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    6
    Ease of Use
    4
    Cloud Security
    3
    Cloud Services
    3
    Cybersecurity
    3
    Cons
    Cloud Dependency Issues
    2
    Expensive
    2
    Integration Issues
    2
    Poor Customer Support
    2
    Poor Technical Support
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Zscaler Cloud Platform features and usability ratings that predict user satisfaction
    8.6
    Ease of Use
    Average: 8.8
    8.5
    Anomoly Detection
    Average: 8.4
    8.8
    Cloud Gap Analytics
    Average: 8.4
    9.2
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Zscaler
    Year Founded
    2008
    HQ Location
    San Jose, California
    Twitter
    @zscaler
    16,610 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,674 employees on LinkedIn®
    Ownership
    NASDAQ:ZS
Product Description
How are these determined?Information
This description is provided by the seller.

Zscaler global cloud delivers the entire gateway security stack as a service. By securely connecting users to their applications, regardless of device, location, or network, Zscaler is transforming en

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 42% Enterprise
  • 18% Small-Business
Zscaler Cloud Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
6
Ease of Use
4
Cloud Security
3
Cloud Services
3
Cybersecurity
3
Cons
Cloud Dependency Issues
2
Expensive
2
Integration Issues
2
Poor Customer Support
2
Poor Technical Support
2
Zscaler Cloud Platform features and usability ratings that predict user satisfaction
8.6
Ease of Use
Average: 8.8
8.5
Anomoly Detection
Average: 8.4
8.8
Cloud Gap Analytics
Average: 8.4
9.2
Cloud Registry
Average: 8.6
Seller Details
Seller
Zscaler
Year Founded
2008
HQ Location
San Jose, California
Twitter
@zscaler
16,610 Twitter followers
LinkedIn® Page
www.linkedin.com
8,674 employees on LinkedIn®
Ownership
NASDAQ:ZS
(125)4.4 out of 5
7th Easiest To Use in Cloud Access Security Broker (CASB) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Symantec Web Security Service (WSS) provides the same proactive web protection capabilities delivered by the market’s leading on-premises Secure Web Gateway, Symantec ProxySG, but delivered as a resil

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 42% Enterprise
    • 24% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Symantec Web Security Service Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    8
    Security
    7
    Features
    5
    Malware Protection
    5
    Software Updates
    4
    Cons
    Expensive
    5
    Poor Customer Support
    4
    Slow Performance
    4
    Performance Issues
    3
    Slow Startup
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Symantec Web Security Service features and usability ratings that predict user satisfaction
    8.9
    Ease of Use
    Average: 8.8
    8.4
    Anomoly Detection
    Average: 8.4
    8.7
    Cloud Gap Analytics
    Average: 8.4
    8.7
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    60,101 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    59,194 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

Symantec Web Security Service (WSS) provides the same proactive web protection capabilities delivered by the market’s leading on-premises Secure Web Gateway, Symantec ProxySG, but delivered as a resil

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 42% Enterprise
  • 24% Small-Business
Symantec Web Security Service Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
8
Security
7
Features
5
Malware Protection
5
Software Updates
4
Cons
Expensive
5
Poor Customer Support
4
Slow Performance
4
Performance Issues
3
Slow Startup
3
Symantec Web Security Service features and usability ratings that predict user satisfaction
8.9
Ease of Use
Average: 8.8
8.4
Anomoly Detection
Average: 8.4
8.7
Cloud Gap Analytics
Average: 8.4
8.7
Cloud Registry
Average: 8.6
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
60,101 Twitter followers
LinkedIn® Page
www.linkedin.com
59,194 employees on LinkedIn®
Ownership
NASDAQ: CA
(59)4.4 out of 5
10th Easiest To Use in Cloud Access Security Broker (CASB) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Microsoft Defender for Cloud Apps is an enterprise-grade security for cloud apps.

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 47% Enterprise
    • 22% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Microsoft Defender for Cloud Apps Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Easy Integrations
    1
    Efficiency
    1
    Features
    1
    Notifications
    1
    Real-time Detection
    1
    Cons
    Complexity
    1
    Difficult Learning
    1
    Integration Issues
    1
    Limited Features
    1
    Limited Integrations
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microsoft Defender for Cloud Apps features and usability ratings that predict user satisfaction
    8.4
    Ease of Use
    Average: 8.8
    8.7
    Anomoly Detection
    Average: 8.4
    8.7
    Cloud Gap Analytics
    Average: 8.4
    8.5
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    14,002,464 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    237,523 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Microsoft Defender for Cloud Apps is an enterprise-grade security for cloud apps.

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 47% Enterprise
  • 22% Mid-Market
Microsoft Defender for Cloud Apps Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Easy Integrations
1
Efficiency
1
Features
1
Notifications
1
Real-time Detection
1
Cons
Complexity
1
Difficult Learning
1
Integration Issues
1
Limited Features
1
Limited Integrations
1
Microsoft Defender for Cloud Apps features and usability ratings that predict user satisfaction
8.4
Ease of Use
Average: 8.8
8.7
Anomoly Detection
Average: 8.4
8.7
Cloud Gap Analytics
Average: 8.4
8.5
Cloud Registry
Average: 8.6
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
14,002,464 Twitter followers
LinkedIn® Page
www.linkedin.com
237,523 employees on LinkedIn®
Ownership
MSFT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Citrix Secure Workspace Access provides a comprehensive, zero-trust approach to deliver secure and contextual access to the corporate internal web apps, SaaS, and virtual applications. It enables the

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 48% Enterprise
    • 24% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Citrix Secure Workspace Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Cloud Management
    1
    Customer Support
    1
    Daily Use
    1
    Easy Integrations
    1
    Cons
    Connection Issues
    2
    Delay Issues
    2
    Connectivity Issues
    1
    Error Handling
    1
    Performance Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Citrix Secure Workspace Access features and usability ratings that predict user satisfaction
    9.0
    Ease of Use
    Average: 8.8
    8.1
    Anomoly Detection
    Average: 8.4
    8.5
    Cloud Gap Analytics
    Average: 8.4
    8.0
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Citrix
    Year Founded
    1989
    HQ Location
    Fort Lauderdale, FL
    Twitter
    @citrix
    203,540 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,634 employees on LinkedIn®
    Ownership
    NASDAQ:CTXS
Product Description
How are these determined?Information
This description is provided by the seller.

Citrix Secure Workspace Access provides a comprehensive, zero-trust approach to deliver secure and contextual access to the corporate internal web apps, SaaS, and virtual applications. It enables the

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 48% Enterprise
  • 24% Mid-Market
Citrix Secure Workspace Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Cloud Management
1
Customer Support
1
Daily Use
1
Easy Integrations
1
Cons
Connection Issues
2
Delay Issues
2
Connectivity Issues
1
Error Handling
1
Performance Issues
1
Citrix Secure Workspace Access features and usability ratings that predict user satisfaction
9.0
Ease of Use
Average: 8.8
8.1
Anomoly Detection
Average: 8.4
8.5
Cloud Gap Analytics
Average: 8.4
8.0
Cloud Registry
Average: 8.6
Seller Details
Seller
Citrix
Year Founded
1989
HQ Location
Fort Lauderdale, FL
Twitter
@citrix
203,540 Twitter followers
LinkedIn® Page
www.linkedin.com
4,634 employees on LinkedIn®
Ownership
NASDAQ:CTXS
(25)4.5 out of 5
11th Easiest To Use in Cloud Access Security Broker (CASB) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 40% Mid-Market
    • 36% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FortiCASB-SaaS features and usability ratings that predict user satisfaction
    8.6
    Ease of Use
    Average: 8.8
    8.6
    Anomoly Detection
    Average: 8.4
    8.7
    Cloud Gap Analytics
    Average: 8.4
    8.6
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortinet
    Year Founded
    2000
    HQ Location
    Sunnyvale, CA
    Twitter
    @Fortinet
    151,611 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    14,832 employees on LinkedIn®
    Ownership
    NASDAQ: FTNT
Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 40% Mid-Market
  • 36% Small-Business
FortiCASB-SaaS features and usability ratings that predict user satisfaction
8.6
Ease of Use
Average: 8.8
8.6
Anomoly Detection
Average: 8.4
8.7
Cloud Gap Analytics
Average: 8.4
8.6
Cloud Registry
Average: 8.6
Seller Details
Seller
Fortinet
Year Founded
2000
HQ Location
Sunnyvale, CA
Twitter
@Fortinet
151,611 Twitter followers
LinkedIn® Page
www.linkedin.com
14,832 employees on LinkedIn®
Ownership
NASDAQ: FTNT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Prisma SaaS looks directly into SaaS applications, providing full visibility into the activities of users and data while granular controls maintain policy to eliminate data exposure and threat risks.

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 35% Mid-Market
    • 29% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Prisma Saas Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    3
    Threat Detection
    3
    Cybersecurity
    2
    Data Protection
    2
    Insights
    2
    Cons
    Expensive
    2
    Limited Compatibility
    2
    Pricing Issues
    2
    Access Control
    1
    Access Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Prisma Saas Security features and usability ratings that predict user satisfaction
    8.6
    Ease of Use
    Average: 8.8
    7.9
    Anomoly Detection
    Average: 8.4
    7.4
    Cloud Gap Analytics
    Average: 8.4
    8.1
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    126,982 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17,221 employees on LinkedIn®
    Ownership
    NYSE: PANW
Product Description
How are these determined?Information
This description is provided by the seller.

Prisma SaaS looks directly into SaaS applications, providing full visibility into the activities of users and data while granular controls maintain policy to eliminate data exposure and threat risks.

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 35% Mid-Market
  • 29% Enterprise
Prisma Saas Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
3
Threat Detection
3
Cybersecurity
2
Data Protection
2
Insights
2
Cons
Expensive
2
Limited Compatibility
2
Pricing Issues
2
Access Control
1
Access Issues
1
Prisma Saas Security features and usability ratings that predict user satisfaction
8.6
Ease of Use
Average: 8.8
7.9
Anomoly Detection
Average: 8.4
7.4
Cloud Gap Analytics
Average: 8.4
8.1
Cloud Registry
Average: 8.6
Seller Details
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
126,982 Twitter followers
LinkedIn® Page
www.linkedin.com
17,221 employees on LinkedIn®
Ownership
NYSE: PANW
(12)4.6 out of 5
View top Consulting Services for Oracle CASB Cloud
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Oracle CASB Cloud is an API-based cloud access security broker for applications and workloads.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 58% Mid-Market
    • 25% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Oracle CASB Cloud features and usability ratings that predict user satisfaction
    9.5
    Ease of Use
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Oracle
    Year Founded
    1977
    HQ Location
    Austin, TX
    Twitter
    @Oracle
    822,135 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    204,855 employees on LinkedIn®
    Ownership
    NYSE:ORCL
Product Description
How are these determined?Information
This description is provided by the seller.

Oracle CASB Cloud is an API-based cloud access security broker for applications and workloads.

Users
No information available
Industries
No information available
Market Segment
  • 58% Mid-Market
  • 25% Enterprise
Oracle CASB Cloud features and usability ratings that predict user satisfaction
9.5
Ease of Use
Average: 8.8
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Oracle
Year Founded
1977
HQ Location
Austin, TX
Twitter
@Oracle
822,135 Twitter followers
LinkedIn® Page
www.linkedin.com
204,855 employees on LinkedIn®
Ownership
NYSE:ORCL
(36)4.3 out of 5
5th Easiest To Use in Cloud Access Security Broker (CASB) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Securely adopt cloud apps and meet your regulatory compliance requirements with an industry-leading Cloud Access Security Broker (CASB) that integrates with the rest of your enterprise security. Cloud

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 53% Enterprise
    • 25% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CloudSOC Cloud Access Security Broker (CASB) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cloud Integration
    1
    Cloud Management
    1
    Cloud Security
    1
    Cybersecurity
    1
    Data Protection
    1
    Cons
    Complex Configuration
    1
    Complexity
    1
    Inefficiency
    1
    Licensing Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CloudSOC Cloud Access Security Broker (CASB) features and usability ratings that predict user satisfaction
    8.2
    Ease of Use
    Average: 8.8
    7.8
    Anomoly Detection
    Average: 8.4
    7.4
    Cloud Gap Analytics
    Average: 8.4
    8.1
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    60,101 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    59,194 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

Securely adopt cloud apps and meet your regulatory compliance requirements with an industry-leading Cloud Access Security Broker (CASB) that integrates with the rest of your enterprise security. Cloud

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 53% Enterprise
  • 25% Small-Business
CloudSOC Cloud Access Security Broker (CASB) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cloud Integration
1
Cloud Management
1
Cloud Security
1
Cybersecurity
1
Data Protection
1
Cons
Complex Configuration
1
Complexity
1
Inefficiency
1
Licensing Issues
1
CloudSOC Cloud Access Security Broker (CASB) features and usability ratings that predict user satisfaction
8.2
Ease of Use
Average: 8.8
7.8
Anomoly Detection
Average: 8.4
7.4
Cloud Gap Analytics
Average: 8.4
8.1
Cloud Registry
Average: 8.6
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
60,101 Twitter followers
LinkedIn® Page
www.linkedin.com
59,194 employees on LinkedIn®
Ownership
NASDAQ: CA
(44)4.3 out of 5
8th Easiest To Use in Cloud Access Security Broker (CASB) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Trend Micro Cloud App Security delivers advanced threat and data protection for Office 365 and cloud file-sharing services.

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 39% Mid-Market
    • 39% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Trend Micro Cloud App Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Email Security
    1
    Security
    1
    Threat Protection
    1
    Cons
    Access Limitations
    1
    Limited Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trend Micro Cloud App Security features and usability ratings that predict user satisfaction
    8.5
    Ease of Use
    Average: 8.8
    9.1
    Anomoly Detection
    Average: 8.4
    9.4
    Cloud Gap Analytics
    Average: 8.4
    8.5
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Tokyo
    Twitter
    @trendmicro
    112,808 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,690 employees on LinkedIn®
    Ownership
    OTCMKTS:TMICY
Product Description
How are these determined?Information
This description is provided by the seller.

Trend Micro Cloud App Security delivers advanced threat and data protection for Office 365 and cloud file-sharing services.

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 39% Mid-Market
  • 39% Enterprise
Trend Micro Cloud App Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Email Security
1
Security
1
Threat Protection
1
Cons
Access Limitations
1
Limited Features
1
Trend Micro Cloud App Security features and usability ratings that predict user satisfaction
8.5
Ease of Use
Average: 8.8
9.1
Anomoly Detection
Average: 8.4
9.4
Cloud Gap Analytics
Average: 8.4
8.5
Cloud Registry
Average: 8.6
Seller Details
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
112,808 Twitter followers
LinkedIn® Page
www.linkedin.com
7,690 employees on LinkedIn®
Ownership
OTCMKTS:TMICY
(29)4.2 out of 5
9th Easiest To Use in Cloud Access Security Broker (CASB) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 45% Small-Business
    • 34% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Avast Secure Internet Gateway Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cloud Security
    1
    Cybersecurity
    1
    Features
    1
    Integrations
    1
    Real-time Detection
    1
    Cons
    Complex Configuration
    1
    Expensive
    1
    Limited Customization
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Avast Secure Internet Gateway features and usability ratings that predict user satisfaction
    9.6
    Ease of Use
    Average: 8.8
    8.5
    Anomoly Detection
    Average: 8.4
    8.5
    Cloud Gap Analytics
    Average: 8.4
    9.0
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2022
    HQ Location
    Tempe, Arizona
    Twitter
    @GenDigitalInc
    4,253 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,518 employees on LinkedIn®
    Ownership
    NASDAQ: GEN
Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 45% Small-Business
  • 34% Mid-Market
Avast Secure Internet Gateway Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cloud Security
1
Cybersecurity
1
Features
1
Integrations
1
Real-time Detection
1
Cons
Complex Configuration
1
Expensive
1
Limited Customization
1
Avast Secure Internet Gateway features and usability ratings that predict user satisfaction
9.6
Ease of Use
Average: 8.8
8.5
Anomoly Detection
Average: 8.4
8.5
Cloud Gap Analytics
Average: 8.4
9.0
Cloud Registry
Average: 8.6
Seller Details
Year Founded
2022
HQ Location
Tempe, Arizona
Twitter
@GenDigitalInc
4,253 Twitter followers
LinkedIn® Page
www.linkedin.com
2,518 employees on LinkedIn®
Ownership
NASDAQ: GEN
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    VPC Service Controls allow users to define a security perimeter around Google Cloud Platform resources such as Cloud Storage buckets, Bigtable instances, and BigQuery datasets to constrain data within

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 35% Enterprise
    • 35% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Google VPC Service Controls features and usability ratings that predict user satisfaction
    9.0
    Ease of Use
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Google
    Year Founded
    1998
    HQ Location
    Mountain View, CA
    Twitter
    @google
    32,750,646 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    310,061 employees on LinkedIn®
    Ownership
    NASDAQ:GOOG
Product Description
How are these determined?Information
This description is provided by the seller.

VPC Service Controls allow users to define a security perimeter around Google Cloud Platform resources such as Cloud Storage buckets, Bigtable instances, and BigQuery datasets to constrain data within

Users
No information available
Industries
No information available
Market Segment
  • 35% Enterprise
  • 35% Small-Business
Google VPC Service Controls features and usability ratings that predict user satisfaction
9.0
Ease of Use
Average: 8.8
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Google
Year Founded
1998
HQ Location
Mountain View, CA
Twitter
@google
32,750,646 Twitter followers
LinkedIn® Page
www.linkedin.com
310,061 employees on LinkedIn®
Ownership
NASDAQ:GOOG
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Proofpoint provides the only CASB to meet the needs of security people serious about cloud threats, data loss and time-to-value. We secure Microsoft 365, Google Workspace, Box, Dropbox, Slack, Service

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 64% Enterprise
    • 18% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Proofpoint Cloud App Security Broker features and usability ratings that predict user satisfaction
    9.3
    Ease of Use
    Average: 8.8
    9.4
    Anomoly Detection
    Average: 8.4
    9.4
    Cloud Gap Analytics
    Average: 8.4
    9.4
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Sunnyvale, CA
    Twitter
    @proofpoint
    30,886 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,756 employees on LinkedIn®
    Ownership
    NASDAQ: PFPT
Product Description
How are these determined?Information
This description is provided by the seller.

Proofpoint provides the only CASB to meet the needs of security people serious about cloud threats, data loss and time-to-value. We secure Microsoft 365, Google Workspace, Box, Dropbox, Slack, Service

Users
No information available
Industries
No information available
Market Segment
  • 64% Enterprise
  • 18% Mid-Market
Proofpoint Cloud App Security Broker features and usability ratings that predict user satisfaction
9.3
Ease of Use
Average: 8.8
9.4
Anomoly Detection
Average: 8.4
9.4
Cloud Gap Analytics
Average: 8.4
9.4
Cloud Registry
Average: 8.6
Seller Details
Year Founded
2002
HQ Location
Sunnyvale, CA
Twitter
@proofpoint
30,886 Twitter followers
LinkedIn® Page
www.linkedin.com
4,756 employees on LinkedIn®
Ownership
NASDAQ: PFPT
(16)4.8 out of 5
2nd Easiest To Use in Cloud Access Security Broker (CASB) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ManagedMethods is a leading cloud application security platform for K-12 school districts, mid-market companies, and local governments. The platform provides award-winning cloud security that empowers

    Users
    No information available
    Industries
    • Education Management
    Market Segment
    • 69% Mid-Market
    • 25% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ManagedMethods features and usability ratings that predict user satisfaction
    9.2
    Ease of Use
    Average: 8.8
    8.9
    Anomoly Detection
    Average: 8.4
    9.2
    Cloud Gap Analytics
    Average: 8.4
    7.5
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Boulder, CO
    Twitter
    @managedmethods
    602 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    35 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ManagedMethods is a leading cloud application security platform for K-12 school districts, mid-market companies, and local governments. The platform provides award-winning cloud security that empowers

Users
No information available
Industries
  • Education Management
Market Segment
  • 69% Mid-Market
  • 25% Enterprise
ManagedMethods features and usability ratings that predict user satisfaction
9.2
Ease of Use
Average: 8.8
8.9
Anomoly Detection
Average: 8.4
9.2
Cloud Gap Analytics
Average: 8.4
7.5
Cloud Registry
Average: 8.6
Seller Details
Year Founded
2013
HQ Location
Boulder, CO
Twitter
@managedmethods
602 Twitter followers
LinkedIn® Page
www.linkedin.com
35 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Enterprise Application Access is a unique cloud architecture that closes all inbound firewall ports, while ensuring that only authorized users and devices have access to the internal applications they

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 23% Enterprise
    • 23% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Akamai Enterprise Application Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    3
    Data Security
    2
    Reliability
    2
    Secure Access
    2
    Ease of Access
    1
    Cons
    Connection Issues
    2
    Difficult Learning
    2
    Difficult Learning Curve
    2
    High Learning Curve
    2
    Learning Curve
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Akamai Enterprise Application Access features and usability ratings that predict user satisfaction
    8.3
    Ease of Use
    Average: 8.8
    7.5
    Anomoly Detection
    Average: 8.4
    8.5
    Cloud Gap Analytics
    Average: 8.4
    8.8
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1998
    HQ Location
    Cambridge, MA
    Twitter
    @Akamai
    118,566 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10,006 employees on LinkedIn®
    Ownership
    NASDAQ:AKAM
Product Description
How are these determined?Information
This description is provided by the seller.

Enterprise Application Access is a unique cloud architecture that closes all inbound firewall ports, while ensuring that only authorized users and devices have access to the internal applications they

Users
No information available
Industries
No information available
Market Segment
  • 23% Enterprise
  • 23% Mid-Market
Akamai Enterprise Application Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
3
Data Security
2
Reliability
2
Secure Access
2
Ease of Access
1
Cons
Connection Issues
2
Difficult Learning
2
Difficult Learning Curve
2
High Learning Curve
2
Learning Curve
2
Akamai Enterprise Application Access features and usability ratings that predict user satisfaction
8.3
Ease of Use
Average: 8.8
7.5
Anomoly Detection
Average: 8.4
8.5
Cloud Gap Analytics
Average: 8.4
8.8
Cloud Registry
Average: 8.6
Seller Details
Year Founded
1998
HQ Location
Cambridge, MA
Twitter
@Akamai
118,566 Twitter followers
LinkedIn® Page
www.linkedin.com
10,006 employees on LinkedIn®
Ownership
NASDAQ:AKAM
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Barracuda CloudGen Access makes it easy to simplify compliance and secure third-party access to your systems, providing Zero Trust Access to all your apps and data from any device and location. Barrac

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 45% Mid-Market
    • 35% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Barracuda CloudGen Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cloud Technology
    3
    Data Security
    3
    Ease of Use
    3
    Protection
    3
    Affordable Pricing
    2
    Cons
    Slow Performance
    3
    Expensive
    2
    Complex Configuration
    1
    Complex Implementation
    1
    Difficult Learning
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Barracuda CloudGen Access features and usability ratings that predict user satisfaction
    8.8
    Ease of Use
    Average: 8.8
    9.4
    Anomoly Detection
    Average: 8.4
    8.9
    Cloud Gap Analytics
    Average: 8.4
    10.0
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Barracuda
    Year Founded
    2002
    HQ Location
    Campbell, CA
    Twitter
    @Barracuda
    15,550 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,135 employees on LinkedIn®
    Ownership
    Private
Product Description
How are these determined?Information
This description is provided by the seller.

Barracuda CloudGen Access makes it easy to simplify compliance and secure third-party access to your systems, providing Zero Trust Access to all your apps and data from any device and location. Barrac

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 45% Mid-Market
  • 35% Small-Business
Barracuda CloudGen Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cloud Technology
3
Data Security
3
Ease of Use
3
Protection
3
Affordable Pricing
2
Cons
Slow Performance
3
Expensive
2
Complex Configuration
1
Complex Implementation
1
Difficult Learning
1
Barracuda CloudGen Access features and usability ratings that predict user satisfaction
8.8
Ease of Use
Average: 8.8
9.4
Anomoly Detection
Average: 8.4
8.9
Cloud Gap Analytics
Average: 8.4
10.0
Cloud Registry
Average: 8.6
Seller Details
Seller
Barracuda
Year Founded
2002
HQ Location
Campbell, CA
Twitter
@Barracuda
15,550 Twitter followers
LinkedIn® Page
www.linkedin.com
2,135 employees on LinkedIn®
Ownership
Private
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Skyhigh Security Service Edge portfolio goes beyond data access and focuses on data use, allowing organizations to collaborate from any device and from anywhere without sacrificing security, while

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 33% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Skyhigh Security Service Edge Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Easy Integrations
    4
    Integrations
    4
    Ease of Use
    3
    Access Control
    1
    Customer Support
    1
    Cons
    Complex Configuration
    1
    Complexity
    1
    Complex Setup
    1
    Inadequate Reporting
    1
    Lacking Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Skyhigh Security Service Edge features and usability ratings that predict user satisfaction
    9.0
    Ease of Use
    Average: 8.8
    6.1
    Anomoly Detection
    Average: 8.4
    6.7
    Cloud Gap Analytics
    Average: 8.4
    7.2
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    San Jose, CA
    Twitter
    @skyhighsecurity
    17,873 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    639 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Skyhigh Security Service Edge portfolio goes beyond data access and focuses on data use, allowing organizations to collaborate from any device and from anywhere without sacrificing security, while

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 33% Enterprise
  • 33% Mid-Market
Skyhigh Security Service Edge Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Easy Integrations
4
Integrations
4
Ease of Use
3
Access Control
1
Customer Support
1
Cons
Complex Configuration
1
Complexity
1
Complex Setup
1
Inadequate Reporting
1
Lacking Features
1
Skyhigh Security Service Edge features and usability ratings that predict user satisfaction
9.0
Ease of Use
Average: 8.8
6.1
Anomoly Detection
Average: 8.4
6.7
Cloud Gap Analytics
Average: 8.4
7.2
Cloud Registry
Average: 8.6
Seller Details
HQ Location
San Jose, CA
Twitter
@skyhighsecurity
17,873 Twitter followers
LinkedIn® Page
www.linkedin.com
639 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The internet is the new corporate network, leading organizations to transition to their network security to Secure Access Service Edge (SASE). However, current solutions break the user experience with

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 50% Mid-Market
    • 35% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point Harmony SASE Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    10
    Secure Access
    9
    Security
    9
    Reliability
    7
    Features
    5
    Cons
    Complex Configuration
    6
    Complex Implementation
    6
    Complex Setup
    5
    Connection Issues
    5
    Integration Issues
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point Harmony SASE features and usability ratings that predict user satisfaction
    9.4
    Ease of Use
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
    9.2
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,087 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,977 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

The internet is the new corporate network, leading organizations to transition to their network security to Secure Access Service Edge (SASE). However, current solutions break the user experience with

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 50% Mid-Market
  • 35% Small-Business
Check Point Harmony SASE Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
10
Secure Access
9
Security
9
Reliability
7
Features
5
Cons
Complex Configuration
6
Complex Implementation
6
Complex Setup
5
Connection Issues
5
Integration Issues
5
Check Point Harmony SASE features and usability ratings that predict user satisfaction
9.4
Ease of Use
Average: 8.8
0.0
No information available
0.0
No information available
9.2
Cloud Registry
Average: 8.6
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,087 Twitter followers
LinkedIn® Page
www.linkedin.com
7,977 employees on LinkedIn®
Ownership
NASDAQ:CHKP
(69)4.3 out of 5
View top Consulting Services for Lookout
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Lookout is a mobile app that fights cybercriminals by predicting and stopping mobile attacks before they do harm.

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 43% Small-Business
    • 41% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Lookout Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Protection
    1
    Data Security
    1
    Email Security
    1
    Network Security
    1
    Protection
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Lookout features and usability ratings that predict user satisfaction
    8.8
    Ease of Use
    Average: 8.8
    8.0
    Anomoly Detection
    Average: 8.4
    8.7
    Cloud Gap Analytics
    Average: 8.4
    9.0
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Lookout
    Year Founded
    2007
    HQ Location
    San Francisco, CA
    Twitter
    @Lookout
    45,386 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    630 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Lookout is a mobile app that fights cybercriminals by predicting and stopping mobile attacks before they do harm.

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 43% Small-Business
  • 41% Enterprise
Lookout Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Protection
1
Data Security
1
Email Security
1
Network Security
1
Protection
1
Cons
This product has not yet received any negative sentiments.
Lookout features and usability ratings that predict user satisfaction
8.8
Ease of Use
Average: 8.8
8.0
Anomoly Detection
Average: 8.4
8.7
Cloud Gap Analytics
Average: 8.4
9.0
Cloud Registry
Average: 8.6
Seller Details
Seller
Lookout
Year Founded
2007
HQ Location
San Francisco, CA
Twitter
@Lookout
45,386 Twitter followers
LinkedIn® Page
www.linkedin.com
630 employees on LinkedIn®
Entry Level Price:$5.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Nudge Security continuously discovers and inventories every cloud and SaaS application your employees use at work, including shadow IT, so you can understand and manage your SaaS security posture. Nud

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 38% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Nudge Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    3
    Security
    3
    Deployment Ease
    2
    Malware Protection
    2
    Reliability
    2
    Cons
    Access Control
    1
    Limited Acceptance
    1
    Limited Features
    1
    Technical Issues
    1
    User Management
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Nudge Security features and usability ratings that predict user satisfaction
    9.3
    Ease of Use
    Average: 8.8
    8.9
    Anomoly Detection
    Average: 8.4
    8.9
    Cloud Gap Analytics
    Average: 8.4
    8.3
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2022
    Twitter
    @nudge_security
    381 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    26 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Nudge Security continuously discovers and inventories every cloud and SaaS application your employees use at work, including shadow IT, so you can understand and manage your SaaS security posture. Nud

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 38% Small-Business
Nudge Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
3
Security
3
Deployment Ease
2
Malware Protection
2
Reliability
2
Cons
Access Control
1
Limited Acceptance
1
Limited Features
1
Technical Issues
1
User Management
1
Nudge Security features and usability ratings that predict user satisfaction
9.3
Ease of Use
Average: 8.8
8.9
Anomoly Detection
Average: 8.4
8.9
Cloud Gap Analytics
Average: 8.4
8.3
Cloud Registry
Average: 8.6
Seller Details
Year Founded
2022
Twitter
@nudge_security
381 Twitter followers
LinkedIn® Page
www.linkedin.com
26 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Todyl empowers businesses of any size with a complete, end-to-end security program. The Todyl Security Platform converges SASE, SIEM, Endpoint Security, GRC, MXDR, and more into a cloud-native, singl

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 88% Small-Business
    • 12% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Todyl Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    26
    Customer Support
    24
    Features
    19
    Security
    16
    Cybersecurity
    13
    Cons
    Technical Issues
    7
    Integration Issues
    6
    Limited Features
    6
    Lacking Features
    5
    Pricing Issues
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Todyl Security Platform features and usability ratings that predict user satisfaction
    8.5
    Ease of Use
    Average: 8.8
    8.3
    Anomoly Detection
    Average: 8.4
    7.9
    Cloud Gap Analytics
    Average: 8.4
    6.7
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Todyl
    Company Website
    Year Founded
    2015
    HQ Location
    Denver, CO
    LinkedIn® Page
    www.linkedin.com
    136 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Todyl empowers businesses of any size with a complete, end-to-end security program. The Todyl Security Platform converges SASE, SIEM, Endpoint Security, GRC, MXDR, and more into a cloud-native, singl

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 88% Small-Business
  • 12% Mid-Market
Todyl Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
26
Customer Support
24
Features
19
Security
16
Cybersecurity
13
Cons
Technical Issues
7
Integration Issues
6
Limited Features
6
Lacking Features
5
Pricing Issues
5
Todyl Security Platform features and usability ratings that predict user satisfaction
8.5
Ease of Use
Average: 8.8
8.3
Anomoly Detection
Average: 8.4
7.9
Cloud Gap Analytics
Average: 8.4
6.7
Cloud Registry
Average: 8.6
Seller Details
Seller
Todyl
Company Website
Year Founded
2015
HQ Location
Denver, CO
LinkedIn® Page
www.linkedin.com
136 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CloudWize is a no-code Cloud Security Center of Excellence that gives you maximum cloud compliance & security. Get 360° Protection from Architecture Design to Runtime. CludWize enforces cloud reg

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CloudWize Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    5
    Security
    5
    Cloud Services
    4
    Customer Support
    4
    Cloud Integration
    3
    Cons
    Complex Implementation
    1
    Complex Setup
    1
    Improvements Needed
    1
    Insufficient Training
    1
    Poor Documentation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CloudWize features and usability ratings that predict user satisfaction
    9.0
    Ease of Use
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CloudWize
    Year Founded
    2019
    HQ Location
    Netanya, IL
    Twitter
    @cloud_wize
    94 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    9 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CloudWize is a no-code Cloud Security Center of Excellence that gives you maximum cloud compliance & security. Get 360° Protection from Architecture Design to Runtime. CludWize enforces cloud reg

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
  • 33% Mid-Market
CloudWize Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
5
Security
5
Cloud Services
4
Customer Support
4
Cloud Integration
3
Cons
Complex Implementation
1
Complex Setup
1
Improvements Needed
1
Insufficient Training
1
Poor Documentation
1
CloudWize features and usability ratings that predict user satisfaction
9.0
Ease of Use
Average: 8.8
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
CloudWize
Year Founded
2019
HQ Location
Netanya, IL
Twitter
@cloud_wize
94 Twitter followers
LinkedIn® Page
www.linkedin.com
9 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Adaptiv Networks provides amazingly simple, secure, and reliable cloud connectivity for customers who vaue who value simplicity, performance, and cost effectiveness. We offer a range of scalable SD-WA

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 40% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Adaptiv features and usability ratings that predict user satisfaction
    6.9
    Ease of Use
    Average: 8.8
    8.3
    Anomoly Detection
    Average: 8.4
    7.1
    Cloud Gap Analytics
    Average: 8.4
    7.1
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Adaptiv
    HQ Location
    Gatineau
    LinkedIn® Page
    www.linkedin.com
    42 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Adaptiv Networks provides amazingly simple, secure, and reliable cloud connectivity for customers who vaue who value simplicity, performance, and cost effectiveness. We offer a range of scalable SD-WA

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 40% Small-Business
Adaptiv features and usability ratings that predict user satisfaction
6.9
Ease of Use
Average: 8.8
8.3
Anomoly Detection
Average: 8.4
7.1
Cloud Gap Analytics
Average: 8.4
7.1
Cloud Registry
Average: 8.6
Seller Details
Seller
Adaptiv
HQ Location
Gatineau
LinkedIn® Page
www.linkedin.com
42 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Censornet Cloud Application Security (CASB) enables your business to discover, analyse, secure and manage user interaction with cloud applications. Achieve complete visibility and control with a full-

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • TrustLayer Cloud Application Security (CASB) features and usability ratings that predict user satisfaction
    9.4
    Ease of Use
    Average: 8.8
    8.3
    Anomoly Detection
    Average: 8.4
    8.3
    Cloud Gap Analytics
    Average: 8.4
    8.3
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    Basingstoke, England
    LinkedIn® Page
    www.linkedin.com
    57 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Censornet Cloud Application Security (CASB) enables your business to discover, analyse, secure and manage user interaction with cloud applications. Achieve complete visibility and control with a full-

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
TrustLayer Cloud Application Security (CASB) features and usability ratings that predict user satisfaction
9.4
Ease of Use
Average: 8.8
8.3
Anomoly Detection
Average: 8.4
8.3
Cloud Gap Analytics
Average: 8.4
8.3
Cloud Registry
Average: 8.6
Seller Details
Year Founded
2015
HQ Location
Basingstoke, England
LinkedIn® Page
www.linkedin.com
57 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 38% Mid-Market
    • 38% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • VeloCloud SASE features and usability ratings that predict user satisfaction
    9.1
    Ease of Use
    Average: 8.8
    10.0
    Anomoly Detection
    Average: 8.4
    10.0
    Cloud Gap Analytics
    Average: 8.4
    9.2
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    60,101 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    59,194 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 38% Mid-Market
  • 38% Small-Business
VeloCloud SASE features and usability ratings that predict user satisfaction
9.1
Ease of Use
Average: 8.8
10.0
Anomoly Detection
Average: 8.4
10.0
Cloud Gap Analytics
Average: 8.4
9.2
Cloud Registry
Average: 8.6
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
60,101 Twitter followers
LinkedIn® Page
www.linkedin.com
59,194 employees on LinkedIn®
Ownership
NASDAQ: CA
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Atmos is a modern Security Service Edge (SSE) platform powered by Axis. Atmos securely connects users to the business resources needed in order to get work done, regardless of application, device, or

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 38% Enterprise
    • 38% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Axis Security features and usability ratings that predict user satisfaction
    9.6
    Ease of Use
    Average: 8.8
    6.7
    Anomoly Detection
    Average: 8.4
    4.2
    Cloud Gap Analytics
    Average: 8.4
    8.3
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    HQ Location
    San Mateo, CA
    Twitter
    @AxisSecurityHQ
    456 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    260 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Atmos is a modern Security Service Edge (SSE) platform powered by Axis. Atmos securely connects users to the business resources needed in order to get work done, regardless of application, device, or

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 38% Enterprise
  • 38% Mid-Market
Axis Security features and usability ratings that predict user satisfaction
9.6
Ease of Use
Average: 8.8
6.7
Anomoly Detection
Average: 8.4
4.2
Cloud Gap Analytics
Average: 8.4
8.3
Cloud Registry
Average: 8.6
Seller Details
Year Founded
2018
HQ Location
San Mateo, CA
Twitter
@AxisSecurityHQ
456 Twitter followers
LinkedIn® Page
www.linkedin.com
260 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    StratoKey is a Cloud Access Security Broker (CASB) that specializes in securing cloud and SaaS applications with Encryption, Monitoring, Analytics and Defence (EMAD™).

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Mid-Market
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • StratoKey features and usability ratings that predict user satisfaction
    8.3
    Ease of Use
    Average: 8.8
    8.3
    Anomoly Detection
    Average: 8.4
    7.5
    Cloud Gap Analytics
    Average: 8.4
    9.2
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    StratoKey
    Year Founded
    2012
    HQ Location
    N/A
    Twitter
    @StratoKey
    199 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

StratoKey is a Cloud Access Security Broker (CASB) that specializes in securing cloud and SaaS applications with Encryption, Monitoring, Analytics and Defence (EMAD™).

Users
No information available
Industries
No information available
Market Segment
  • 67% Mid-Market
  • 33% Small-Business
StratoKey features and usability ratings that predict user satisfaction
8.3
Ease of Use
Average: 8.8
8.3
Anomoly Detection
Average: 8.4
7.5
Cloud Gap Analytics
Average: 8.4
9.2
Cloud Registry
Average: 8.6
Seller Details
Seller
StratoKey
Year Founded
2012
HQ Location
N/A
Twitter
@StratoKey
199 Twitter followers
LinkedIn® Page
www.linkedin.com
4 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CloudCodes SSO1 is a platform that provides enterprises a simple and unified way to secure web access to all cloud applications.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 33% Enterprise
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CloudCodes features and usability ratings that predict user satisfaction
    7.5
    Ease of Use
    Average: 8.8
    5.0
    Anomoly Detection
    Average: 8.4
    5.0
    Cloud Gap Analytics
    Average: 8.4
    5.0
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    Pune, India
    Twitter
    @cloudcodes
    373 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    23 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CloudCodes SSO1 is a platform that provides enterprises a simple and unified way to secure web access to all cloud applications.

Users
No information available
Industries
No information available
Market Segment
  • 33% Enterprise
  • 33% Mid-Market
CloudCodes features and usability ratings that predict user satisfaction
7.5
Ease of Use
Average: 8.8
5.0
Anomoly Detection
Average: 8.4
5.0
Cloud Gap Analytics
Average: 8.4
5.0
Cloud Registry
Average: 8.6
Seller Details
Year Founded
2011
HQ Location
Pune, India
Twitter
@cloudcodes
373 Twitter followers
LinkedIn® Page
www.linkedin.com
23 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CyberArk Secure Cloud Access provisions Zero Standing Privileges (ZSP) across multi-cloud environments, scoping just enough permissions to adhere to the principle of least privilege access. CyberAr

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Mid-Market
    • 40% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CyberArk Secure Cloud Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Security
    2
    User Interface
    2
    Access Management
    1
    Cybersecurity
    1
    Cons
    Internet Dependency
    1
    Network Issues
    1
    Resource Limitations
    1
    Slow Internet Speed
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CyberArk Secure Cloud Access features and usability ratings that predict user satisfaction
    8.7
    Ease of Use
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CyberArk
    Year Founded
    1999
    HQ Location
    Newton, MA
    Twitter
    @CyberArk
    17,416 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,051 employees on LinkedIn®
    Ownership
    NASDAQ:CYBR
Product Description
How are these determined?Information
This description is provided by the seller.

CyberArk Secure Cloud Access provisions Zero Standing Privileges (ZSP) across multi-cloud environments, scoping just enough permissions to adhere to the principle of least privilege access. CyberAr

Users
No information available
Industries
No information available
Market Segment
  • 60% Mid-Market
  • 40% Enterprise
CyberArk Secure Cloud Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Security
2
User Interface
2
Access Management
1
Cybersecurity
1
Cons
Internet Dependency
1
Network Issues
1
Resource Limitations
1
Slow Internet Speed
1
CyberArk Secure Cloud Access features and usability ratings that predict user satisfaction
8.7
Ease of Use
Average: 8.8
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
CyberArk
Year Founded
1999
HQ Location
Newton, MA
Twitter
@CyberArk
17,416 Twitter followers
LinkedIn® Page
www.linkedin.com
4,051 employees on LinkedIn®
Ownership
NASDAQ:CYBR
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DoControl provides organizations with the automated, self-service tools they require for Software as a Service (SaaS) application data access monitoring, orchestration, and remediation. The solution u

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • DoControl Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    2
    Visibility
    2
    Access Control
    1
    Cloud Management
    1
    Deployment Ease
    1
    Cons
    Complexity
    2
    Access Control
    1
    Complex Configuration
    1
    Configuration Issues
    1
    Connectivity Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DoControl features and usability ratings that predict user satisfaction
    8.3
    Ease of Use
    Average: 8.8
    7.5
    Anomoly Detection
    Average: 8.4
    7.5
    Cloud Gap Analytics
    Average: 8.4
    10.0
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    DoControl
    Year Founded
    2020
    HQ Location
    New York, US
    LinkedIn® Page
    www.linkedin.com
    60 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

DoControl provides organizations with the automated, self-service tools they require for Software as a Service (SaaS) application data access monitoring, orchestration, and remediation. The solution u

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
DoControl Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
2
Visibility
2
Access Control
1
Cloud Management
1
Deployment Ease
1
Cons
Complexity
2
Access Control
1
Complex Configuration
1
Configuration Issues
1
Connectivity Issues
1
DoControl features and usability ratings that predict user satisfaction
8.3
Ease of Use
Average: 8.8
7.5
Anomoly Detection
Average: 8.4
7.5
Cloud Gap Analytics
Average: 8.4
10.0
Cloud Registry
Average: 8.6
Seller Details
Seller
DoControl
Year Founded
2020
HQ Location
New York, US
LinkedIn® Page
www.linkedin.com
60 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Grip brings the industry’s most comprehensive visibility across all enterprise SaaS applications--known or unknown for apps, users, and their basic interactions with extreme accuracy to minimize false

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 40% Enterprise
    • 40% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Grip Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Compliance Control
    1
    Protection
    1
    Threat Protection
    1
    Cons
    Complex Configuration
    1
    Difficult Learning
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Grip Security features and usability ratings that predict user satisfaction
    8.3
    Ease of Use
    Average: 8.8
    10.0
    Anomoly Detection
    Average: 8.4
    10.0
    Cloud Gap Analytics
    Average: 8.4
    10.0
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2021
    HQ Location
    Tel-Aviv, IL
    LinkedIn® Page
    www.linkedin.com
    119 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Grip brings the industry’s most comprehensive visibility across all enterprise SaaS applications--known or unknown for apps, users, and their basic interactions with extreme accuracy to minimize false

Users
No information available
Industries
No information available
Market Segment
  • 40% Enterprise
  • 40% Small-Business
Grip Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Compliance Control
1
Protection
1
Threat Protection
1
Cons
Complex Configuration
1
Difficult Learning
1
Grip Security features and usability ratings that predict user satisfaction
8.3
Ease of Use
Average: 8.8
10.0
Anomoly Detection
Average: 8.4
10.0
Cloud Gap Analytics
Average: 8.4
10.0
Cloud Registry
Average: 8.6
Seller Details
Year Founded
2021
HQ Location
Tel-Aviv, IL
LinkedIn® Page
www.linkedin.com
119 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cyberse

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Enterprise
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SaaS Security by Palo Alto Networks features and usability ratings that predict user satisfaction
    9.2
    Ease of Use
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    126,982 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17,221 employees on LinkedIn®
    Ownership
    NYSE: PANW
Product Description
How are these determined?Information
This description is provided by the seller.

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cyberse

Users
No information available
Industries
No information available
Market Segment
  • 67% Enterprise
  • 33% Small-Business
SaaS Security by Palo Alto Networks features and usability ratings that predict user satisfaction
9.2
Ease of Use
Average: 8.8
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
126,982 Twitter followers
LinkedIn® Page
www.linkedin.com
17,221 employees on LinkedIn®
Ownership
NYSE: PANW
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SecureIdentity CASB provides additional layers of security between your users as they embrace cloud based applications and services. Allowing organisations to understand the associated risks and what

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SecureIdentity CASB Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Monitoring
    2
    Real-time Detection
    1
    Security
    1
    Threat Detection
    1
    Visibility
    1
    Cons
    Complex Configuration
    2
    Cloud Limitations
    1
    Complex Implementation
    1
    Integration Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SecureIdentity CASB features and usability ratings that predict user satisfaction
    8.3
    Ease of Use
    Average: 8.8
    7.5
    Anomoly Detection
    Average: 8.4
    8.3
    Cloud Gap Analytics
    Average: 8.4
    7.5
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2003
    HQ Location
    Theale, Berkshire, United Kingdom
    Twitter
    @securenvoy
    667 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    9 employees on LinkedIn®
    Phone
    44 (0) 845 2600010
Product Description
How are these determined?Information
This description is provided by the seller.

SecureIdentity CASB provides additional layers of security between your users as they embrace cloud based applications and services. Allowing organisations to understand the associated risks and what

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
SecureIdentity CASB Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Monitoring
2
Real-time Detection
1
Security
1
Threat Detection
1
Visibility
1
Cons
Complex Configuration
2
Cloud Limitations
1
Complex Implementation
1
Integration Issues
1
SecureIdentity CASB features and usability ratings that predict user satisfaction
8.3
Ease of Use
Average: 8.8
7.5
Anomoly Detection
Average: 8.4
8.3
Cloud Gap Analytics
Average: 8.4
7.5
Cloud Registry
Average: 8.6
Seller Details
Year Founded
2003
HQ Location
Theale, Berkshire, United Kingdom
Twitter
@securenvoy
667 Twitter followers
LinkedIn® Page
www.linkedin.com
9 employees on LinkedIn®
Phone
44 (0) 845 2600010
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Skyhigh Cloud Access Security Broker protects data and stops threats in the cloud across SaaS, and PaaS, and IaaS environments from a single, cloud-native enforcement point. It enables organizations t

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Skyhigh Cloud Access Security Broker Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    1
    Implementation Ease
    1
    Intuitive Technology
    1
    Setup Ease
    1
    Cons
    Complex Implementation
    1
    Poor Customer Support
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Skyhigh Cloud Access Security Broker features and usability ratings that predict user satisfaction
    9.2
    Ease of Use
    Average: 8.8
    10.0
    Anomoly Detection
    Average: 8.4
    8.3
    Cloud Gap Analytics
    Average: 8.4
    10.0
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    San Jose, CA
    Twitter
    @skyhighsecurity
    17,873 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    639 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Skyhigh Cloud Access Security Broker protects data and stops threats in the cloud across SaaS, and PaaS, and IaaS environments from a single, cloud-native enforcement point. It enables organizations t

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Small-Business
Skyhigh Cloud Access Security Broker Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
1
Implementation Ease
1
Intuitive Technology
1
Setup Ease
1
Cons
Complex Implementation
1
Poor Customer Support
1
Skyhigh Cloud Access Security Broker features and usability ratings that predict user satisfaction
9.2
Ease of Use
Average: 8.8
10.0
Anomoly Detection
Average: 8.4
8.3
Cloud Gap Analytics
Average: 8.4
10.0
Cloud Registry
Average: 8.6
Seller Details
HQ Location
San Jose, CA
Twitter
@skyhighsecurity
17,873 Twitter followers
LinkedIn® Page
www.linkedin.com
639 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Versa SASE is a cloud-native, multi-tenant, multi-service software for a software defined network.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 42% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Versa SASE features and usability ratings that predict user satisfaction
    8.7
    Ease of Use
    Average: 8.8
    9.2
    Anomoly Detection
    Average: 8.4
    8.3
    Cloud Gap Analytics
    Average: 8.4
    9.2
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2012
    HQ Location
    Santa Clara
    Twitter
    @versanetworks
    28,176 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    788 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Versa SASE is a cloud-native, multi-tenant, multi-service software for a software defined network.

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 42% Mid-Market
Versa SASE features and usability ratings that predict user satisfaction
8.7
Ease of Use
Average: 8.8
9.2
Anomoly Detection
Average: 8.4
8.3
Cloud Gap Analytics
Average: 8.4
9.2
Cloud Registry
Average: 8.6
Seller Details
Year Founded
2012
HQ Location
Santa Clara
Twitter
@versanetworks
28,176 Twitter followers
LinkedIn® Page
www.linkedin.com
788 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A CASB or Cloud Access Security Broker is an advanced cloud solution that lets you configure detailed granular access policies and set security control over popular cloud apps such as Google Workspace

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cloud Access Security Broker (CASB) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Access Control
    1
    Cybersecurity
    1
    Protection
    1
    Real-time Detection
    1
    Secure Access
    1
    Cons
    Complex Configuration
    1
    Difficult Learning
    1
    Expensive
    1
    Integration Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cloud Access Security Broker (CASB) features and usability ratings that predict user satisfaction
    6.7
    Ease of Use
    Average: 8.8
    10.0
    Anomoly Detection
    Average: 8.4
    8.3
    Cloud Gap Analytics
    Average: 8.4
    8.3
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2012
    HQ Location
    Pune, India
    Twitter
    @miniOrange_it
    27 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    454 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A CASB or Cloud Access Security Broker is an advanced cloud solution that lets you configure detailed granular access policies and set security control over popular cloud apps such as Google Workspace

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Cloud Access Security Broker (CASB) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Access Control
1
Cybersecurity
1
Protection
1
Real-time Detection
1
Secure Access
1
Cons
Complex Configuration
1
Difficult Learning
1
Expensive
1
Integration Issues
1
Cloud Access Security Broker (CASB) features and usability ratings that predict user satisfaction
6.7
Ease of Use
Average: 8.8
10.0
Anomoly Detection
Average: 8.4
8.3
Cloud Gap Analytics
Average: 8.4
8.3
Cloud Registry
Average: 8.6
Seller Details
Year Founded
2012
HQ Location
Pune, India
Twitter
@miniOrange_it
27 Twitter followers
LinkedIn® Page
www.linkedin.com
454 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IT solution providers are the first—and often only—line of defense for every kind of business in every part of the world. Whether managing mom-and-pop businesses or high-profile clients, providing pre

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ConnectWise Cybersecurity Management – Network features and usability ratings that predict user satisfaction
    6.7
    Ease of Use
    Average: 8.8
    8.3
    Anomoly Detection
    Average: 8.4
    10.0
    Cloud Gap Analytics
    Average: 8.4
    10.0
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1982
    HQ Location
    Tampa, FL
    Twitter
    @ConnectWise
    14,998 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,224 employees on LinkedIn®
    Phone
    800-671-6898
Product Description
How are these determined?Information
This description is provided by the seller.

IT solution providers are the first—and often only—line of defense for every kind of business in every part of the world. Whether managing mom-and-pop businesses or high-profile clients, providing pre

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
ConnectWise Cybersecurity Management – Network features and usability ratings that predict user satisfaction
6.7
Ease of Use
Average: 8.8
8.3
Anomoly Detection
Average: 8.4
10.0
Cloud Gap Analytics
Average: 8.4
10.0
Cloud Registry
Average: 8.6
Seller Details
Year Founded
1982
HQ Location
Tampa, FL
Twitter
@ConnectWise
14,998 Twitter followers
LinkedIn® Page
www.linkedin.com
3,224 employees on LinkedIn®
Phone
800-671-6898
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Securely connecting any user from any device​. Trusted access to any system on any network and platform.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 25% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cyolo features and usability ratings that predict user satisfaction
    7.2
    Ease of Use
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cyolo
    Year Founded
    2020
    HQ Location
    Mountain View, US
    LinkedIn® Page
    www.linkedin.com
    85 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Securely connecting any user from any device​. Trusted access to any system on any network and platform.

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 25% Mid-Market
Cyolo features and usability ratings that predict user satisfaction
7.2
Ease of Use
Average: 8.8
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Cyolo
Year Founded
2020
HQ Location
Mountain View, US
LinkedIn® Page
www.linkedin.com
85 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    "Forcepoint ONE Cloud Access Security Broker (CASB) enables zero trust access to business-critical SaaS applications with best-in-class data security and malware protection. Forcepoint’s multimode CAS

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Forcepoint ONE Cloud Access Security Broker (CASB) features and usability ratings that predict user satisfaction
    10.0
    Ease of Use
    Average: 8.8
    8.3
    Anomoly Detection
    Average: 8.4
    10.0
    Cloud Gap Analytics
    Average: 8.4
    8.3
    Cloud Registry
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1994
    HQ Location
    Austin, TX
    Twitter
    @Forcepointsec
    66,473 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,784 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

"Forcepoint ONE Cloud Access Security Broker (CASB) enables zero trust access to business-critical SaaS applications with best-in-class data security and malware protection. Forcepoint’s multimode CAS

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Forcepoint ONE Cloud Access Security Broker (CASB) features and usability ratings that predict user satisfaction
10.0
Ease of Use
Average: 8.8
8.3
Anomoly Detection
Average: 8.4
10.0
Cloud Gap Analytics
Average: 8.4
8.3
Cloud Registry
Average: 8.6
Seller Details
Year Founded
1994
HQ Location
Austin, TX
Twitter
@Forcepointsec
66,473 Twitter followers
LinkedIn® Page
www.linkedin.com
1,784 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Menlo Security protects organizations from cyber threats that attack enterprise browsers. Menlo Security’s patented Cloud-Browser Security Platform scales to provide comprehensive protection across en

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Enterprise
    • 25% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Menlo Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cybersecurity
    1
    Malware Protection
    1
    Protection
    1
    Security
    1
    Threat Protection
    1
    Cons
    Complex Configuration
    1
    Dependency Issues
    1
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Menlo Security features and usability ratings that predict user satisfaction
    8.3
    Ease of Use
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2012
    HQ Location
    Mountain View, CA
    Twitter
    @menlosecurity
    17,181 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    114 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Menlo Security protects organizations from cyber threats that attack enterprise browsers. Menlo Security’s patented Cloud-Browser Security Platform scales to provide comprehensive protection across en

Users
No information available
Industries
No information available
Market Segment
  • 75% Enterprise
  • 25% Small-Business
Menlo Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cybersecurity
1
Malware Protection
1
Protection
1
Security
1
Threat Protection
1
Cons
Complex Configuration
1
Dependency Issues
1
Slow Performance
1
Menlo Security features and usability ratings that predict user satisfaction
8.3
Ease of Use
Average: 8.8
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2012
HQ Location
Mountain View, CA
Twitter
@menlosecurity
17,181 Twitter followers
LinkedIn® Page
www.linkedin.com
114 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Rezonate is the Cloud Identity Protection Platform (CIPP) CISOs rely on to eliminate an adversary’s opportunity to breach cloud identity and access. Built for security and loved by DevOps teams, Rezon

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Rezonate Cloud Identity Protection Platform features and usability ratings that predict user satisfaction
    10.0
    Ease of Use
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Rezonate
    Year Founded
    2022
    HQ Location
    Boston, US
    LinkedIn® Page
    www.linkedin.com
    22 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Rezonate is the Cloud Identity Protection Platform (CIPP) CISOs rely on to eliminate an adversary’s opportunity to breach cloud identity and access. Built for security and loved by DevOps teams, Rezon

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Rezonate Cloud Identity Protection Platform features and usability ratings that predict user satisfaction
10.0
Ease of Use
Average: 8.8
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Rezonate
Year Founded
2022
HQ Location
Boston, US
LinkedIn® Page
www.linkedin.com
22 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Atmosec takes a holistic approach to securing your ever evolving SaaS ecosystem. Focusing not only on individual services or specific users, Atmosec also understands how different services communica

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Atmosec Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    1
    Security
    1
    Security Features
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Atmosec features and usability ratings that predict user satisfaction
    6.7
    Ease of Use
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Atmosec
    Twitter
    @Atmosec_
    62 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Atmosec takes a holistic approach to securing your ever evolving SaaS ecosystem. Focusing not only on individual services or specific users, Atmosec also understands how different services communica

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Enterprise
Atmosec Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
1
Security
1
Security Features
1
Cons
This product has not yet received any negative sentiments.
Atmosec features and usability ratings that predict user satisfaction
6.7
Ease of Use
Average: 8.8
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Atmosec
Twitter
@Atmosec_
62 Twitter followers
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AT&T Global Security Gateway features and usability ratings that predict user satisfaction
    8.3
    Ease of Use
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    AT&T
    Year Founded
    1876
    HQ Location
    Dallas, TX
    Twitter
    @ATT
    890,284 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    178,523 employees on LinkedIn®
    Ownership
    NYSE: T
Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
AT&T Global Security Gateway features and usability ratings that predict user satisfaction
8.3
Ease of Use
Average: 8.8
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
AT&T
Year Founded
1876
HQ Location
Dallas, TX
Twitter
@ATT
890,284 Twitter followers
LinkedIn® Page
www.linkedin.com
178,523 employees on LinkedIn®
Ownership
NYSE: T
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Isoolate protects users from sophisticated cybersecurity attacks by isolating threats from reaching end-point devices, such as desktops, laptops, smart phones and tablets. Its transformational "appli

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DefenseX features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
Product Description
How are these determined?Information
This description is provided by the seller.

Isoolate protects users from sophisticated cybersecurity attacks by isolating threats from reaching end-point devices, such as desktops, laptops, smart phones and tablets. Its transformational "appli

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
DefenseX features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    iboss is a leading Zero Trust Secure Access Service Edge (SASE) cloud security platform that consolidates network and security technologies into a single cloud-based service. By integrating VPN, Secur

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 47% Mid-Market
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • iboss Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    2
    Cloud Security
    1
    Data Security
    1
    Network Security
    1
    Secure Access
    1
    Cons
    Access Issues
    1
    Expensive
    1
    Expensive Licensing
    1
    Login Issues
    1
    Slow Internet
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • iboss features and usability ratings that predict user satisfaction
    7.9
    Ease of Use
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    iboss
    Year Founded
    2003
    HQ Location
    Boston, MA
    Twitter
    @iboss
    44 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    344 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

iboss is a leading Zero Trust Secure Access Service Edge (SASE) cloud security platform that consolidates network and security technologies into a single cloud-based service. By integrating VPN, Secur

Users
No information available
Industries
No information available
Market Segment
  • 47% Mid-Market
  • 33% Small-Business
iboss Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
2
Cloud Security
1
Data Security
1
Network Security
1
Secure Access
1
Cons
Access Issues
1
Expensive
1
Expensive Licensing
1
Login Issues
1
Slow Internet
1
iboss features and usability ratings that predict user satisfaction
7.9
Ease of Use
Average: 8.8
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
iboss
Year Founded
2003
HQ Location
Boston, MA
Twitter
@iboss
44 Twitter followers
LinkedIn® Page
www.linkedin.com
344 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    LTS Secure Cloud Access Security Broker has proven itself to be indispensable for cloud security. These days, nearly every organization has fully integrated the cloud in its day-to-day operations. Th

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LTS Secure Cloud Access Security Broker features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2012
    HQ Location
    Pune, IN
    LinkedIn® Page
    www.linkedin.com
    10 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

LTS Secure Cloud Access Security Broker has proven itself to be indispensable for cloud security. These days, nearly every organization has fully integrated the cloud in its day-to-day operations. Th

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
LTS Secure Cloud Access Security Broker features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2012
HQ Location
Pune, IN
LinkedIn® Page
www.linkedin.com
10 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Plurilock AI is an award-winning Cloud Access Security Broker (CASB), Data Loss Prevention (DLP) and Single Sign-On (SSO) platform built for small to medium businesses, and priced to meet their budget

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Plurilock Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Access Control
    1
    Secure Access
    1
    Single Sign-On
    1
    Threat Detection
    1
    Cons
    Integration Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Plurilock features and usability ratings that predict user satisfaction
    8.3
    Ease of Use
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Plurilock
    Year Founded
    2016
    HQ Location
    Victoria, CA
    Twitter
    @plurilock
    985 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    56 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Plurilock AI is an award-winning Cloud Access Security Broker (CASB), Data Loss Prevention (DLP) and Single Sign-On (SSO) platform built for small to medium businesses, and priced to meet their budget

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Plurilock Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Access Control
1
Secure Access
1
Single Sign-On
1
Threat Detection
1
Cons
Integration Issues
1
Plurilock features and usability ratings that predict user satisfaction
8.3
Ease of Use
Average: 8.8
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Plurilock
Year Founded
2016
HQ Location
Victoria, CA
Twitter
@plurilock
985 Twitter followers
LinkedIn® Page
www.linkedin.com
56 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Savvy is the identity-first security platform built for the way work happens today — in the browser, across hundreds of SaaS apps, on devices you don’t always control. We protect the layer where ri

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Savvy SaaS Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Device Management
    1
    Ease of Use
    1
    Easy Management
    1
    Time-saving
    1
    Cons
    Integration Issues
    1
    Limited Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Savvy SaaS Security Platform features and usability ratings that predict user satisfaction
    8.3
    Ease of Use
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2021
    HQ Location
    Palo Alto, US
    LinkedIn® Page
    www.linkedin.com
    71 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Savvy is the identity-first security platform built for the way work happens today — in the browser, across hundreds of SaaS apps, on devices you don’t always control. We protect the layer where ri

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Savvy SaaS Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Device Management
1
Ease of Use
1
Easy Management
1
Time-saving
1
Cons
Integration Issues
1
Limited Features
1
Savvy SaaS Security Platform features and usability ratings that predict user satisfaction
8.3
Ease of Use
Average: 8.8
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2021
HQ Location
Palo Alto, US
LinkedIn® Page
www.linkedin.com
71 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SecuPi Data Security Platform enables seamless data security over on-prem & cross-cloud, consistently applied over business applications, analytical workloads & privileged users. SecuPi is ser

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SecuPi Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SecuPi
    Year Founded
    2014
    HQ Location
    New York, US
    Twitter
    @Secu_Pi
    261 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    54 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SecuPi Data Security Platform enables seamless data security over on-prem & cross-cloud, consistently applied over business applications, analytical workloads & privileged users. SecuPi is ser

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
SecuPi Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
SecuPi
Year Founded
2014
HQ Location
New York, US
Twitter
@Secu_Pi
261 Twitter followers
LinkedIn® Page
www.linkedin.com
54 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 38% Mid-Market
    • 34% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Symantec Integrated Cyber Defense Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Alert Notifications
    3
    Ease of Use
    3
    Security
    3
    Cybersecurity
    2
    Cybersecurity Protection
    2
    Cons
    Slow Performance
    4
    Performance Issues
    3
    Complexity
    2
    Delays
    2
    High Resource Consumption
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Symantec Integrated Cyber Defense features and usability ratings that predict user satisfaction
    8.8
    Ease of Use
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    60,101 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    59,194 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 38% Mid-Market
  • 34% Enterprise
Symantec Integrated Cyber Defense Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Alert Notifications
3
Ease of Use
3
Security
3
Cybersecurity
2
Cybersecurity Protection
2
Cons
Slow Performance
4
Performance Issues
3
Complexity
2
Delays
2
High Resource Consumption
2
Symantec Integrated Cyber Defense features and usability ratings that predict user satisfaction
8.8
Ease of Use
Average: 8.8
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
60,101 Twitter followers
LinkedIn® Page
www.linkedin.com
59,194 employees on LinkedIn®
Ownership
NASDAQ: CA
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The TrustLogix Cloud Data Security Platform provides data owners and security owners with a single point of visibility and control of sensitive data access across all clouds and data platforms, at spe

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • TrustLogix Cloud Data Security Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The TrustLogix Cloud Data Security Platform provides data owners and security owners with a single point of visibility and control of sensitive data access across all clouds and data platforms, at spe

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
TrustLogix Cloud Data Security Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®

Learn More About Cloud Access Security Broker (CASB) Software

What is Cloud Access Security Broker (CASB) Software?

Cloud access security broker (CASB) technology secures data stored within or processed by cloud-based applications, typically software as a service (SaaS) solutions. Cloud security access brokers focus on protecting cloud applications. Users of CASB can launch and access their cloud applications in a secured environment.These tools utilize multiple security technologies that help prevent unapproved parties from accessing applications while also preventing data loss and data breaches. They provide a single, secure location for users to access applications. Many platforms support single sign-on for easier access once operating in the CASB environment.

Some CASB tools provide users with a sandboxed environment. The sandbox is a resource-isolated working environment that ensures files and data are transferred directly to the cloud application provider. Other CASB tools utilize firewall and malware detection features, along with security policy enforcement mechanisms to protect information connected to SaaS applications.

These tools can be utilized across devices and operated locally, regardless of the user’s physical location. Individual users can be isolated and cut off from the network. These tools can function across a variety of SaaS applications and software vendors. They can be integrated directly or chosen from a marketplace. Many tools have centralized access through a single sign-on portal. Users can log in to a secure portal and have access to all of the cloud applications they use.

Key Benefits of CASB Software

  • Improves cloud application and data security
  • Simplifies management to improve compliance-related operations
  • Improves identity management and user governance
  • Increases visibility of users, activities, and anomalies

Why Use Cloud Access Security Broker (CASB) Software?

These tools make it easier for businesses to provide secure access to cloud-based applications for their employees. Almost all the benefits of using a CASB system pertain to information security. The majority of benefits can be classified into three categories: threat protection, data security, and governance.

Threat protection — Threats come in multiple forms and CASB products are prepared to defend against them from any direction. Common threat protection features are designed to prevent phishing, malware, account takeover, and malicious content. Phishing can be prevented by securing cloud-based email applications. Malicious attachments and urls can be flagged or sent to spam. Malware can come from emails, downloads or any other kind of malicious content; if malware is present, CASB software can alert users and prevent them from engaging with it. Account takeover can be discovered by monitoring functionality designed to detect abnormal behavior, policy violations, and unexpected configuration changes.

Data security and loss prevention — All data requires security, but some information requires more protection than others. CASB tools help users discover sensitive data within cloud-based applications. Most CASB tools allow for user permission policy enforcement, this helps prevent unauthorized parties from viewing or downloading sensitive information. Many sensitive datasets require increased encryption; these files must be classified as such and CASB solutions will enforce stronger encryption and anomaly monitoring on those specific files.

Governance and compliance — Compliance goes hand in hand with data security and loss prevention. However, increased visibility is a key benefit of CASB solutions. This makes it easier to discover non-compliant datasets and audit systems for policy requirements. They improve a company’s ability to delegate user permissions, enforce security policies and alert security teams of both cloud-based and insider threats.

What are the Common Features of Cloud Access Security Broker (CASB) Software?

Single sign-on (SSO) — SSO features provide a single access point for users to access multiple cloud products without multiple logins. This reduces the time users spend finding applications and logging onto them, improving productivity and user experience.

User analytics — User analytics and monitoring allow companies to view and document individual behaviors and report suspicious activities. They can also alert security teams to compromised accounts by flagging anomalous behaviors.

Cloud gap analytics — Cloud gap analysis features examine data associated with denied entries and policy violations. This helps provide security teams with information that can be used to improve authentication and security protocols.

Anomaly detection — Anomaly detection identifies abnormal behavior by monitoring activity related to user behavior and comparing it to benchmarked patterns.

Cloud registry — Cloud registries provide a list or marketplace of SaaS applications compatible with a CASB solution. Users can access this list to explore integrations or new applications.

Mobile device management (MDM) — MDM functionality offers users the ability to set standards for types of mobile devices and networks capable of accessing data. This allows security teams to customize access requirements and permissions of off-premise and mobile device users.

Access control — Access control features typically refers to support of lightweight directory access protocol (LDAP). This simplifies an administrator’s ability to edit or update application availability and information access.

Data encryption — Data encryption features might refer to data-centric policy enforcement for sensitive information or encompassing encryption for any information stored or accessed through the CASB system.