Introducing G2.ai, the future of software buying.Try now

Best Cloud Edge Security Software

Lauren Worth
LW
Researched and written by Lauren Worth

Cloud edge security solutions provide companies with a cloud-delivered solution to securely access the internet, cloud-based applications, and business networks. The products are delivered using SD-WAN technology, which combines software-defined networking with a wide area network. This allows cloud edge security solutions to operate anywhere and combine security functions to protect all network activity.

Companies use these tools combine security functions of traditional tools such as secure web gateways (SWG), cloud access security brokers (CASB), and web application firewalls (WAF). This helps businesses and security teams create a single point of visibility for security policies, activities, and risks without forcing the user to interact with numerous tools or provide recurring authentication. The unified security solutions are designed to provide complete visibility across complex, hybrid environments. This simplifies work for administrators by using a single tool to classify, govern, and report on all user activity and network traffic without impacting end-user experiences. There is some direct relationship between cloud edge security tools and the other technologies mentioned above, but traditional CASB, WAF, and SWG products operate independently and do not provide the same level of visibility and accessibility across hybrid environments. The closest solution would be a software-defined perimeter (SDP), which provides unified network security but not unified access to cloud-based applications, networks, and web browsers.

To qualify for inclusion in the Cloud Edge Security category, a product must:

Provide a single access point for SaaS applications, web browsers, and networks
Centrally manage policies and risks across hybrid environments, networks, and applications
Provide a virtual web application firewall as a service
Unify incident management across hybrid environments

Best Cloud Edge Security Software At A Glance

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
34 Listings in Cloud Edge Security Available
(67)4.3 out of 5
7th Easiest To Use in Cloud Edge Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Palo Alto Networks Prisma® Access protects the hybrid workforce with the superior security of ZTNA while providing exceptional user experiences from a simple, unified security product. Purpose-built

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 45% Enterprise
    • 30% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Prisma Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    30
    Secure Access
    23
    Internet Security
    18
    Protection
    18
    Threat Protection
    17
    Cons
    Complex Setup
    17
    Complex Configuration
    16
    Complex Implementation
    14
    Expensive
    12
    Difficult Learning Curve
    10
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Prisma Access features and usability ratings that predict user satisfaction
    8.2
    Anomaly Detection
    Average: 8.4
    8.4
    Cloud Application Brokerage
    Average: 8.5
    8.5
    Policy Enforcement
    Average: 8.6
    8.4
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    126,982 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17,221 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Palo Alto Networks Prisma® Access protects the hybrid workforce with the superior security of ZTNA while providing exceptional user experiences from a simple, unified security product. Purpose-built

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 45% Enterprise
  • 30% Mid-Market
Prisma Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
30
Secure Access
23
Internet Security
18
Protection
18
Threat Protection
17
Cons
Complex Setup
17
Complex Configuration
16
Complex Implementation
14
Expensive
12
Difficult Learning Curve
10
Prisma Access features and usability ratings that predict user satisfaction
8.2
Anomaly Detection
Average: 8.4
8.4
Cloud Application Brokerage
Average: 8.5
8.5
Policy Enforcement
Average: 8.6
8.4
Ease of Use
Average: 8.7
Seller Details
Company Website
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
126,982 Twitter followers
LinkedIn® Page
www.linkedin.com
17,221 employees on LinkedIn®
(276)4.4 out of 5
Optimized for quick response
4th Easiest To Use in Cloud Edge Security software
View top Consulting Services for Cisco Umbrella
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cisco Umbrella simplifies cybersecurity and compliance by providing a converged set of capabilities in a single, cloud-native solution. Its combination of DNS-layer security, secure web gateway, CASB,

    Users
    • Network Engineer
    • Software Developer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 48% Mid-Market
    • 29% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco Umbrella features and usability ratings that predict user satisfaction
    9.0
    Anomaly Detection
    Average: 8.4
    8.8
    Cloud Application Brokerage
    Average: 8.5
    9.1
    Policy Enforcement
    Average: 8.6
    8.5
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Company Website
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    728,816 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,057 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cisco Umbrella simplifies cybersecurity and compliance by providing a converged set of capabilities in a single, cloud-native solution. Its combination of DNS-layer security, secure web gateway, CASB,

Users
  • Network Engineer
  • Software Developer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 48% Mid-Market
  • 29% Enterprise
Cisco Umbrella features and usability ratings that predict user satisfaction
9.0
Anomaly Detection
Average: 8.4
8.8
Cloud Application Brokerage
Average: 8.5
9.1
Policy Enforcement
Average: 8.6
8.5
Ease of Use
Average: 8.7
Seller Details
Seller
Cisco
Company Website
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
728,816 Twitter followers
LinkedIn® Page
www.linkedin.com
95,057 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(100)4.2 out of 5
3rd Easiest To Use in Cloud Edge Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    At Forcepoint, we understand the transformation our customers currently face. A cloud-based security reality is a journey. And we’re thoroughly committed to helping our customers make it. Forcepoint

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 50% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Forcepoint ONE Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    4
    Ease of Use
    4
    Features
    4
    Security
    4
    Detailed Analysis
    3
    Cons
    Expensive
    3
    Complexity
    2
    Poor Customer Support
    2
    Alert Issues
    1
    Complex Configuration
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Forcepoint ONE features and usability ratings that predict user satisfaction
    9.2
    Anomaly Detection
    Average: 8.4
    8.6
    Cloud Application Brokerage
    Average: 8.5
    9.3
    Policy Enforcement
    Average: 8.6
    8.6
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1994
    HQ Location
    Austin, TX
    Twitter
    @Forcepointsec
    66,473 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,784 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

At Forcepoint, we understand the transformation our customers currently face. A cloud-based security reality is a journey. And we’re thoroughly committed to helping our customers make it. Forcepoint

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 50% Enterprise
  • 38% Mid-Market
Forcepoint ONE Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
4
Ease of Use
4
Features
4
Security
4
Detailed Analysis
3
Cons
Expensive
3
Complexity
2
Poor Customer Support
2
Alert Issues
1
Complex Configuration
1
Forcepoint ONE features and usability ratings that predict user satisfaction
9.2
Anomaly Detection
Average: 8.4
8.6
Cloud Application Brokerage
Average: 8.5
9.3
Policy Enforcement
Average: 8.6
8.6
Ease of Use
Average: 8.7
Seller Details
Year Founded
1994
HQ Location
Austin, TX
Twitter
@Forcepointsec
66,473 Twitter followers
LinkedIn® Page
www.linkedin.com
1,784 employees on LinkedIn®
(79)4.4 out of 5
Optimized for quick response
1st Easiest To Use in Cloud Edge Security software
View top Consulting Services for Cato SASE Cloud
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cato provides the world’s leading single-vendor SASE platform. Cato creates a seamless and elegant customer experience that effortlessly enables threat prevention, data protection, and timely incident

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 58% Mid-Market
    • 22% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cato SASE Cloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    7
    Customer Support
    6
    Ease of Management
    5
    User Interface
    5
    Easy Management
    4
    Cons
    Difficult Learning
    3
    Difficult Learning Curve
    3
    Limited Features
    3
    Login Issues
    3
    Expensive
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cato SASE Cloud features and usability ratings that predict user satisfaction
    8.2
    Anomaly Detection
    Average: 8.4
    8.3
    Cloud Application Brokerage
    Average: 8.5
    9.2
    Policy Enforcement
    Average: 8.6
    9.1
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2015
    HQ Location
    Tel-Aviv, Israel
    Twitter
    @CatoNetworks
    12,163 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,232 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cato provides the world’s leading single-vendor SASE platform. Cato creates a seamless and elegant customer experience that effortlessly enables threat prevention, data protection, and timely incident

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 58% Mid-Market
  • 22% Enterprise
Cato SASE Cloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
7
Customer Support
6
Ease of Management
5
User Interface
5
Easy Management
4
Cons
Difficult Learning
3
Difficult Learning Curve
3
Limited Features
3
Login Issues
3
Expensive
2
Cato SASE Cloud features and usability ratings that predict user satisfaction
8.2
Anomaly Detection
Average: 8.4
8.3
Cloud Application Brokerage
Average: 8.5
9.2
Policy Enforcement
Average: 8.6
9.1
Ease of Use
Average: 8.7
Seller Details
Company Website
Year Founded
2015
HQ Location
Tel-Aviv, Israel
Twitter
@CatoNetworks
12,163 Twitter followers
LinkedIn® Page
www.linkedin.com
1,232 employees on LinkedIn®
(43)4.7 out of 5
5th Easiest To Use in Cloud Edge Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Todyl empowers businesses of any size with a complete, end-to-end security program. The Todyl Security Platform converges SASE, SIEM, Endpoint Security, GRC, MXDR, and more into a cloud-native, singl

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 88% Small-Business
    • 12% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Todyl Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    26
    Customer Support
    24
    Features
    19
    Security
    16
    Cybersecurity
    13
    Cons
    Technical Issues
    7
    Integration Issues
    6
    Limited Features
    6
    Lacking Features
    5
    Pricing Issues
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Todyl Security Platform features and usability ratings that predict user satisfaction
    8.9
    Anomaly Detection
    Average: 8.4
    8.1
    Cloud Application Brokerage
    Average: 8.5
    8.7
    Policy Enforcement
    Average: 8.6
    8.5
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Todyl
    Company Website
    Year Founded
    2015
    HQ Location
    Denver, CO
    LinkedIn® Page
    www.linkedin.com
    136 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Todyl empowers businesses of any size with a complete, end-to-end security program. The Todyl Security Platform converges SASE, SIEM, Endpoint Security, GRC, MXDR, and more into a cloud-native, singl

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 88% Small-Business
  • 12% Mid-Market
Todyl Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
26
Customer Support
24
Features
19
Security
16
Cybersecurity
13
Cons
Technical Issues
7
Integration Issues
6
Limited Features
6
Lacking Features
5
Pricing Issues
5
Todyl Security Platform features and usability ratings that predict user satisfaction
8.9
Anomaly Detection
Average: 8.4
8.1
Cloud Application Brokerage
Average: 8.5
8.7
Policy Enforcement
Average: 8.6
8.5
Ease of Use
Average: 8.7
Seller Details
Seller
Todyl
Company Website
Year Founded
2015
HQ Location
Denver, CO
LinkedIn® Page
www.linkedin.com
136 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Netskope is the leader in cloud security — we help the world’s largest organizations take advantage of cloud and web without sacrificing security. Our Cloud XD™ technology targets and controls activit

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 59% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Netskope One Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Features
    3
    Seamless Implementation
    2
    Security
    2
    Access Centralization
    1
    Cons
    Limited Features
    2
    Access Issues
    1
    Complex Configuration
    1
    Complex Implementation
    1
    Complexity
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Netskope One Platform features and usability ratings that predict user satisfaction
    8.0
    Anomaly Detection
    Average: 8.4
    8.8
    Cloud Application Brokerage
    Average: 8.5
    8.8
    Policy Enforcement
    Average: 8.6
    8.5
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Netskope
    Year Founded
    2012
    HQ Location
    Santa Clara, CA
    Twitter
    @Netskope
    11,107 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,695 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Netskope is the leader in cloud security — we help the world’s largest organizations take advantage of cloud and web without sacrificing security. Our Cloud XD™ technology targets and controls activit

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 59% Enterprise
  • 33% Mid-Market
Netskope One Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Features
3
Seamless Implementation
2
Security
2
Access Centralization
1
Cons
Limited Features
2
Access Issues
1
Complex Configuration
1
Complex Implementation
1
Complexity
1
Netskope One Platform features and usability ratings that predict user satisfaction
8.0
Anomaly Detection
Average: 8.4
8.8
Cloud Application Brokerage
Average: 8.5
8.8
Policy Enforcement
Average: 8.6
8.5
Ease of Use
Average: 8.7
Seller Details
Seller
Netskope
Year Founded
2012
HQ Location
Santa Clara, CA
Twitter
@Netskope
11,107 Twitter followers
LinkedIn® Page
www.linkedin.com
2,695 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cloud Edge Unified threat management as a service for managed service providers

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 47% Mid-Market
    • 41% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cloud Edge features and usability ratings that predict user satisfaction
    7.9
    Anomaly Detection
    Average: 8.4
    8.1
    Cloud Application Brokerage
    Average: 8.5
    8.3
    Policy Enforcement
    Average: 8.6
    8.8
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Tokyo
    Twitter
    @trendmicro
    112,808 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,690 employees on LinkedIn®
    Ownership
    OTCMKTS:TMICY
Product Description
How are these determined?Information
This description is provided by the seller.

Cloud Edge Unified threat management as a service for managed service providers

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 47% Mid-Market
  • 41% Small-Business
Cloud Edge features and usability ratings that predict user satisfaction
7.9
Anomaly Detection
Average: 8.4
8.1
Cloud Application Brokerage
Average: 8.5
8.3
Policy Enforcement
Average: 8.6
8.8
Ease of Use
Average: 8.7
Seller Details
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
112,808 Twitter followers
LinkedIn® Page
www.linkedin.com
7,690 employees on LinkedIn®
Ownership
OTCMKTS:TMICY
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    No information available
    Market Segment
    • 47% Mid-Market
    • 26% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Akamai Secure Access Service Edge (SASE) features and usability ratings that predict user satisfaction
    8.2
    Anomaly Detection
    Average: 8.4
    7.4
    Cloud Application Brokerage
    Average: 8.5
    8.2
    Policy Enforcement
    Average: 8.6
    8.7
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1998
    HQ Location
    Cambridge, MA
    Twitter
    @Akamai
    118,566 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10,006 employees on LinkedIn®
    Ownership
    NASDAQ:AKAM
Users
No information available
Industries
No information available
Market Segment
  • 47% Mid-Market
  • 26% Enterprise
Akamai Secure Access Service Edge (SASE) features and usability ratings that predict user satisfaction
8.2
Anomaly Detection
Average: 8.4
7.4
Cloud Application Brokerage
Average: 8.5
8.2
Policy Enforcement
Average: 8.6
8.7
Ease of Use
Average: 8.7
Seller Details
Year Founded
1998
HQ Location
Cambridge, MA
Twitter
@Akamai
118,566 Twitter followers
LinkedIn® Page
www.linkedin.com
10,006 employees on LinkedIn®
Ownership
NASDAQ:AKAM
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Check Point Harmony Connect redefines SASE by making it easy to access corporate applications, SaaS and the internet for any user or branch, from any device, without compromising on security. Built to

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 44% Small-Business
    • 28% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point CloudGuard Harmony Connect (CloudGuard Connect) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    2
    Access Centralization
    1
    Centralized Management
    1
    Ease of Connectivity
    1
    Performance Efficiency
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point CloudGuard Harmony Connect (CloudGuard Connect) features and usability ratings that predict user satisfaction
    7.8
    Anomaly Detection
    Average: 8.4
    7.8
    Cloud Application Brokerage
    Average: 8.5
    8.2
    Policy Enforcement
    Average: 8.6
    8.8
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,087 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,977 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

Check Point Harmony Connect redefines SASE by making it easy to access corporate applications, SaaS and the internet for any user or branch, from any device, without compromising on security. Built to

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 44% Small-Business
  • 28% Mid-Market
Check Point CloudGuard Harmony Connect (CloudGuard Connect) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
2
Access Centralization
1
Centralized Management
1
Ease of Connectivity
1
Performance Efficiency
1
Cons
This product has not yet received any negative sentiments.
Check Point CloudGuard Harmony Connect (CloudGuard Connect) features and usability ratings that predict user satisfaction
7.8
Anomaly Detection
Average: 8.4
7.8
Cloud Application Brokerage
Average: 8.5
8.2
Policy Enforcement
Average: 8.6
8.8
Ease of Use
Average: 8.7
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,087 Twitter followers
LinkedIn® Page
www.linkedin.com
7,977 employees on LinkedIn®
Ownership
NASDAQ:CHKP
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The internet is the new corporate network, leading organizations to transition to their network security to Secure Access Service Edge (SASE). However, current solutions break the user experience with

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 50% Mid-Market
    • 35% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point Harmony SASE Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    10
    Secure Access
    9
    Security
    9
    Reliability
    7
    Features
    5
    Cons
    Complex Configuration
    6
    Complex Implementation
    6
    Complex Setup
    5
    Connection Issues
    5
    Integration Issues
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point Harmony SASE features and usability ratings that predict user satisfaction
    7.3
    Anomaly Detection
    Average: 8.4
    9.6
    Cloud Application Brokerage
    Average: 8.5
    8.5
    Policy Enforcement
    Average: 8.6
    9.4
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,087 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,977 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

The internet is the new corporate network, leading organizations to transition to their network security to Secure Access Service Edge (SASE). However, current solutions break the user experience with

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 50% Mid-Market
  • 35% Small-Business
Check Point Harmony SASE Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
10
Secure Access
9
Security
9
Reliability
7
Features
5
Cons
Complex Configuration
6
Complex Implementation
6
Complex Setup
5
Connection Issues
5
Integration Issues
5
Check Point Harmony SASE features and usability ratings that predict user satisfaction
7.3
Anomaly Detection
Average: 8.4
9.6
Cloud Application Brokerage
Average: 8.5
8.5
Policy Enforcement
Average: 8.6
9.4
Ease of Use
Average: 8.7
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,087 Twitter followers
LinkedIn® Page
www.linkedin.com
7,977 employees on LinkedIn®
Ownership
NASDAQ:CHKP
(70)4.7 out of 5
Optimized for quick response
2nd Easiest To Use in Cloud Edge Security software
Save to My Lists
Entry Level Price:Starting at $5.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Twingate is a secure remote access solution for an organization’s private applications, data, and environments, whether they are on-premise or in the cloud. Built to make the lives of DevOps teams, IT

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 51% Mid-Market
    • 43% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Twingate Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    9
    Security
    9
    Easy Setup
    7
    Secure Access
    7
    Setup Ease
    7
    Cons
    Performance Issues
    11
    Limited Customization
    5
    Complex Implementation
    4
    Complex Configuration
    3
    Lacking Features
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Twingate features and usability ratings that predict user satisfaction
    7.1
    Anomaly Detection
    Average: 8.4
    10.0
    Cloud Application Brokerage
    Average: 8.5
    9.1
    Policy Enforcement
    Average: 8.6
    9.8
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    HQ Location
    Redwood City, California
    Twitter
    @TwingateHQ
    2,285 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    75 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Twingate is a secure remote access solution for an organization’s private applications, data, and environments, whether they are on-premise or in the cloud. Built to make the lives of DevOps teams, IT

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 51% Mid-Market
  • 43% Small-Business
Twingate Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
9
Security
9
Easy Setup
7
Secure Access
7
Setup Ease
7
Cons
Performance Issues
11
Limited Customization
5
Complex Implementation
4
Complex Configuration
3
Lacking Features
3
Twingate features and usability ratings that predict user satisfaction
7.1
Anomaly Detection
Average: 8.4
10.0
Cloud Application Brokerage
Average: 8.5
9.1
Policy Enforcement
Average: 8.6
9.8
Ease of Use
Average: 8.7
Seller Details
Company Website
HQ Location
Redwood City, California
Twitter
@TwingateHQ
2,285 Twitter followers
LinkedIn® Page
www.linkedin.com
75 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Fastly Next-Gen WAF provides advanced protection for your applications, APIs, and microservices, wherever they live, from a single unified solution. Built on Fastly’s proprietary SmartParse detect

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 48% Mid-Market
    • 38% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Fastly Next-Gen WAF Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    5
    Security
    4
    Customer Support
    3
    DDoS Protection
    3
    Detection Efficiency
    2
    Cons
    Expensive
    3
    Poor Customer Support
    3
    Complex Configuration
    2
    Complex Setup
    2
    Complex Management
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Fastly Next-Gen WAF features and usability ratings that predict user satisfaction
    7.8
    Anomaly Detection
    Average: 8.4
    6.1
    Cloud Application Brokerage
    Average: 8.5
    7.8
    Policy Enforcement
    Average: 8.6
    9.1
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fastly
    Year Founded
    2011
    HQ Location
    San Francisco, CA
    Twitter
    @fastly
    29,238 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,312 employees on LinkedIn®
    Ownership
    NYSE: FSLY
Product Description
How are these determined?Information
This description is provided by the seller.

The Fastly Next-Gen WAF provides advanced protection for your applications, APIs, and microservices, wherever they live, from a single unified solution. Built on Fastly’s proprietary SmartParse detect

Users
No information available
Industries
No information available
Market Segment
  • 48% Mid-Market
  • 38% Enterprise
Fastly Next-Gen WAF Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
5
Security
4
Customer Support
3
DDoS Protection
3
Detection Efficiency
2
Cons
Expensive
3
Poor Customer Support
3
Complex Configuration
2
Complex Setup
2
Complex Management
1
Fastly Next-Gen WAF features and usability ratings that predict user satisfaction
7.8
Anomaly Detection
Average: 8.4
6.1
Cloud Application Brokerage
Average: 8.5
7.8
Policy Enforcement
Average: 8.6
9.1
Ease of Use
Average: 8.7
Seller Details
Seller
Fastly
Year Founded
2011
HQ Location
San Francisco, CA
Twitter
@fastly
29,238 Twitter followers
LinkedIn® Page
www.linkedin.com
1,312 employees on LinkedIn®
Ownership
NYSE: FSLY
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    No information available
    Market Segment
    • 61% Enterprise
    • 17% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Zscaler Secure Access Service Edge (SASE) features and usability ratings that predict user satisfaction
    8.5
    Anomaly Detection
    Average: 8.4
    9.1
    Cloud Application Brokerage
    Average: 8.5
    8.5
    Policy Enforcement
    Average: 8.6
    9.3
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Zscaler
    Year Founded
    2008
    HQ Location
    San Jose, California
    Twitter
    @zscaler
    16,610 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,674 employees on LinkedIn®
    Ownership
    NASDAQ:ZS
Users
No information available
Industries
No information available
Market Segment
  • 61% Enterprise
  • 17% Small-Business
Zscaler Secure Access Service Edge (SASE) features and usability ratings that predict user satisfaction
8.5
Anomaly Detection
Average: 8.4
9.1
Cloud Application Brokerage
Average: 8.5
8.5
Policy Enforcement
Average: 8.6
9.3
Ease of Use
Average: 8.7
Seller Details
Seller
Zscaler
Year Founded
2008
HQ Location
San Jose, California
Twitter
@zscaler
16,610 Twitter followers
LinkedIn® Page
www.linkedin.com
8,674 employees on LinkedIn®
Ownership
NASDAQ:ZS
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 38% Mid-Market
    • 38% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • VeloCloud SASE features and usability ratings that predict user satisfaction
    8.6
    Anomaly Detection
    Average: 8.4
    9.2
    Cloud Application Brokerage
    Average: 8.5
    9.3
    Policy Enforcement
    Average: 8.6
    9.1
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    60,101 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    59,194 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 38% Mid-Market
  • 38% Small-Business
VeloCloud SASE features and usability ratings that predict user satisfaction
8.6
Anomaly Detection
Average: 8.4
9.2
Cloud Application Brokerage
Average: 8.5
9.3
Policy Enforcement
Average: 8.6
9.1
Ease of Use
Average: 8.7
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
60,101 Twitter followers
LinkedIn® Page
www.linkedin.com
59,194 employees on LinkedIn®
Ownership
NASDAQ: CA
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Overview Webscale is the Cloud Platform for Modern Commerce, offering security, scalability, performance and automation for global brands. The Webscale SaaS platform leverages automation and DevOps pr

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 56% Small-Business
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Webscale One Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    7
    Ease of Use
    4
    Cloud Services
    3
    Helpful
    3
    Cloud Compatibility
    2
    Cons
    Expensive
    3
    Complexity
    2
    Learning Curve
    2
    Pricing Issues
    2
    Complex Coding
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Webscale One features and usability ratings that predict user satisfaction
    9.2
    Anomaly Detection
    Average: 8.4
    9.1
    Cloud Application Brokerage
    Average: 8.5
    9.1
    Policy Enforcement
    Average: 8.6
    9.0
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Webscale
    Year Founded
    2013
    HQ Location
    Santa Clara, US
    Twitter
    @WebscaleNet
    1,360 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    72 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Overview Webscale is the Cloud Platform for Modern Commerce, offering security, scalability, performance and automation for global brands. The Webscale SaaS platform leverages automation and DevOps pr

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 56% Small-Business
  • 38% Mid-Market
Webscale One Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
7
Ease of Use
4
Cloud Services
3
Helpful
3
Cloud Compatibility
2
Cons
Expensive
3
Complexity
2
Learning Curve
2
Pricing Issues
2
Complex Coding
1
Webscale One features and usability ratings that predict user satisfaction
9.2
Anomaly Detection
Average: 8.4
9.1
Cloud Application Brokerage
Average: 8.5
9.1
Policy Enforcement
Average: 8.6
9.0
Ease of Use
Average: 8.7
Seller Details
Seller
Webscale
Year Founded
2013
HQ Location
Santa Clara, US
Twitter
@WebscaleNet
1,360 Twitter followers
LinkedIn® Page
www.linkedin.com
72 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Zscaler global cloud delivers the entire gateway security stack as a service. By securely connecting users to their applications, regardless of device, location, or network, Zscaler is transforming en

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 42% Enterprise
    • 18% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Zscaler Cloud Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    6
    Ease of Use
    4
    Cloud Security
    3
    Cloud Services
    3
    Cybersecurity
    3
    Cons
    Cloud Dependency Issues
    2
    Expensive
    2
    Integration Issues
    2
    Poor Customer Support
    2
    Poor Technical Support
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Zscaler Cloud Platform features and usability ratings that predict user satisfaction
    8.7
    Anomaly Detection
    Average: 8.4
    8.3
    Cloud Application Brokerage
    Average: 8.5
    8.3
    Policy Enforcement
    Average: 8.6
    8.6
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Zscaler
    Year Founded
    2008
    HQ Location
    San Jose, California
    Twitter
    @zscaler
    16,610 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,674 employees on LinkedIn®
    Ownership
    NASDAQ:ZS
Product Description
How are these determined?Information
This description is provided by the seller.

Zscaler global cloud delivers the entire gateway security stack as a service. By securely connecting users to their applications, regardless of device, location, or network, Zscaler is transforming en

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 42% Enterprise
  • 18% Small-Business
Zscaler Cloud Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
6
Ease of Use
4
Cloud Security
3
Cloud Services
3
Cybersecurity
3
Cons
Cloud Dependency Issues
2
Expensive
2
Integration Issues
2
Poor Customer Support
2
Poor Technical Support
2
Zscaler Cloud Platform features and usability ratings that predict user satisfaction
8.7
Anomaly Detection
Average: 8.4
8.3
Cloud Application Brokerage
Average: 8.5
8.3
Policy Enforcement
Average: 8.6
8.6
Ease of Use
Average: 8.7
Seller Details
Seller
Zscaler
Year Founded
2008
HQ Location
San Jose, California
Twitter
@zscaler
16,610 Twitter followers
LinkedIn® Page
www.linkedin.com
8,674 employees on LinkedIn®
Ownership
NASDAQ:ZS
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Barracuda’s cloud-first SASE platform enables businesses to control access to data from any device, anytime, anywhere, and allows security inspection and policy enforcement in the cloud, at the branch

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 42% Mid-Market
    • 8% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Barracuda SecureEdge features and usability ratings that predict user satisfaction
    7.8
    Anomaly Detection
    Average: 8.4
    7.4
    Cloud Application Brokerage
    Average: 8.5
    8.6
    Policy Enforcement
    Average: 8.6
    8.4
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Barracuda
    Year Founded
    2002
    HQ Location
    Campbell, CA
    Twitter
    @Barracuda
    15,550 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,135 employees on LinkedIn®
    Ownership
    Private
Product Description
How are these determined?Information
This description is provided by the seller.

Barracuda’s cloud-first SASE platform enables businesses to control access to data from any device, anytime, anywhere, and allows security inspection and policy enforcement in the cloud, at the branch

Users
No information available
Industries
No information available
Market Segment
  • 42% Mid-Market
  • 8% Enterprise
Barracuda SecureEdge features and usability ratings that predict user satisfaction
7.8
Anomaly Detection
Average: 8.4
7.4
Cloud Application Brokerage
Average: 8.5
8.6
Policy Enforcement
Average: 8.6
8.4
Ease of Use
Average: 8.7
Seller Details
Seller
Barracuda
Year Founded
2002
HQ Location
Campbell, CA
Twitter
@Barracuda
15,550 Twitter followers
LinkedIn® Page
www.linkedin.com
2,135 employees on LinkedIn®
Ownership
Private
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cloud Gateway is your one-stop shop for secure and simplified network management. It provides a single pane of glass view, giving you complete control and visibility over your entire network and secur

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 40% Mid-Market
    • 30% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cloud Gateway features and usability ratings that predict user satisfaction
    8.6
    Anomaly Detection
    Average: 8.4
    9.0
    Cloud Application Brokerage
    Average: 8.5
    8.9
    Policy Enforcement
    Average: 8.6
    9.3
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    London, England
    Twitter
    @cloudgatewayltd
    421 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    44 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cloud Gateway is your one-stop shop for secure and simplified network management. It provides a single pane of glass view, giving you complete control and visibility over your entire network and secur

Users
No information available
Industries
No information available
Market Segment
  • 40% Mid-Market
  • 30% Enterprise
Cloud Gateway features and usability ratings that predict user satisfaction
8.6
Anomaly Detection
Average: 8.4
9.0
Cloud Application Brokerage
Average: 8.5
8.9
Policy Enforcement
Average: 8.6
9.3
Ease of Use
Average: 8.7
Seller Details
Year Founded
2017
HQ Location
London, England
Twitter
@cloudgatewayltd
421 Twitter followers
LinkedIn® Page
www.linkedin.com
44 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Barracuda CloudGen Access makes it easy to simplify compliance and secure third-party access to your systems, providing Zero Trust Access to all your apps and data from any device and location. Barrac

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 45% Mid-Market
    • 35% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Barracuda CloudGen Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cloud Technology
    3
    Data Security
    3
    Ease of Use
    3
    Protection
    3
    Affordable Pricing
    2
    Cons
    Slow Performance
    3
    Expensive
    2
    Complex Configuration
    1
    Complex Implementation
    1
    Difficult Learning
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Barracuda CloudGen Access features and usability ratings that predict user satisfaction
    8.3
    Anomaly Detection
    Average: 8.4
    9.2
    Cloud Application Brokerage
    Average: 8.5
    7.9
    Policy Enforcement
    Average: 8.6
    8.8
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Barracuda
    Year Founded
    2002
    HQ Location
    Campbell, CA
    Twitter
    @Barracuda
    15,550 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,135 employees on LinkedIn®
    Ownership
    Private
Product Description
How are these determined?Information
This description is provided by the seller.

Barracuda CloudGen Access makes it easy to simplify compliance and secure third-party access to your systems, providing Zero Trust Access to all your apps and data from any device and location. Barrac

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 45% Mid-Market
  • 35% Small-Business
Barracuda CloudGen Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cloud Technology
3
Data Security
3
Ease of Use
3
Protection
3
Affordable Pricing
2
Cons
Slow Performance
3
Expensive
2
Complex Configuration
1
Complex Implementation
1
Difficult Learning
1
Barracuda CloudGen Access features and usability ratings that predict user satisfaction
8.3
Anomaly Detection
Average: 8.4
9.2
Cloud Application Brokerage
Average: 8.5
7.9
Policy Enforcement
Average: 8.6
8.8
Ease of Use
Average: 8.7
Seller Details
Seller
Barracuda
Year Founded
2002
HQ Location
Campbell, CA
Twitter
@Barracuda
15,550 Twitter followers
LinkedIn® Page
www.linkedin.com
2,135 employees on LinkedIn®
Ownership
Private
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 67% Mid-Market
    • 25% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • FortiSASE Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    3
    Threat Protection
    3
    Data Security
    2
    Network Security
    2
    Secure Access
    2
    Cons
    Complex Setup
    1
    Difficult Configuration
    1
    Difficult Learning Curve
    1
    Expensive
    1
    Required Expertise
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FortiSASE features and usability ratings that predict user satisfaction
    9.3
    Anomaly Detection
    Average: 8.4
    8.3
    Cloud Application Brokerage
    Average: 8.5
    8.6
    Policy Enforcement
    Average: 8.6
    9.0
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortinet
    Year Founded
    2000
    HQ Location
    Sunnyvale, CA
    Twitter
    @Fortinet
    151,611 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    14,832 employees on LinkedIn®
    Ownership
    NASDAQ: FTNT
Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 67% Mid-Market
  • 25% Enterprise
FortiSASE Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
3
Threat Protection
3
Data Security
2
Network Security
2
Secure Access
2
Cons
Complex Setup
1
Difficult Configuration
1
Difficult Learning Curve
1
Expensive
1
Required Expertise
1
FortiSASE features and usability ratings that predict user satisfaction
9.3
Anomaly Detection
Average: 8.4
8.3
Cloud Application Brokerage
Average: 8.5
8.6
Policy Enforcement
Average: 8.6
9.0
Ease of Use
Average: 8.7
Seller Details
Seller
Fortinet
Year Founded
2000
HQ Location
Sunnyvale, CA
Twitter
@Fortinet
151,611 Twitter followers
LinkedIn® Page
www.linkedin.com
14,832 employees on LinkedIn®
Ownership
NASDAQ: FTNT
(69)4.3 out of 5
View top Consulting Services for Lookout
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Lookout is a mobile app that fights cybercriminals by predicting and stopping mobile attacks before they do harm.

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 43% Small-Business
    • 41% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Lookout Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Protection
    1
    Data Security
    1
    Email Security
    1
    Network Security
    1
    Protection
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Lookout features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    8.8
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Lookout
    Year Founded
    2007
    HQ Location
    San Francisco, CA
    Twitter
    @Lookout
    45,386 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    630 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Lookout is a mobile app that fights cybercriminals by predicting and stopping mobile attacks before they do harm.

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 43% Small-Business
  • 41% Enterprise
Lookout Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Protection
1
Data Security
1
Email Security
1
Network Security
1
Protection
1
Cons
This product has not yet received any negative sentiments.
Lookout features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
8.8
Ease of Use
Average: 8.7
Seller Details
Seller
Lookout
Year Founded
2007
HQ Location
San Francisco, CA
Twitter
@Lookout
45,386 Twitter followers
LinkedIn® Page
www.linkedin.com
630 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Skyhigh Security Service Edge portfolio goes beyond data access and focuses on data use, allowing organizations to collaborate from any device and from anywhere without sacrificing security, while

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 33% Enterprise
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Skyhigh Security Service Edge Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Easy Integrations
    4
    Integrations
    4
    Ease of Use
    3
    Access Control
    1
    Customer Support
    1
    Cons
    Complex Configuration
    1
    Complexity
    1
    Complex Setup
    1
    Inadequate Reporting
    1
    Lacking Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Skyhigh Security Service Edge features and usability ratings that predict user satisfaction
    5.0
    Anomaly Detection
    Average: 8.4
    5.0
    Cloud Application Brokerage
    Average: 8.5
    4.2
    Policy Enforcement
    Average: 8.6
    9.0
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    San Jose, CA
    Twitter
    @skyhighsecurity
    17,873 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    639 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Skyhigh Security Service Edge portfolio goes beyond data access and focuses on data use, allowing organizations to collaborate from any device and from anywhere without sacrificing security, while

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 33% Enterprise
  • 33% Small-Business
Skyhigh Security Service Edge Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Easy Integrations
4
Integrations
4
Ease of Use
3
Access Control
1
Customer Support
1
Cons
Complex Configuration
1
Complexity
1
Complex Setup
1
Inadequate Reporting
1
Lacking Features
1
Skyhigh Security Service Edge features and usability ratings that predict user satisfaction
5.0
Anomaly Detection
Average: 8.4
5.0
Cloud Application Brokerage
Average: 8.5
4.2
Policy Enforcement
Average: 8.6
9.0
Ease of Use
Average: 8.7
Seller Details
HQ Location
San Jose, CA
Twitter
@skyhighsecurity
17,873 Twitter followers
LinkedIn® Page
www.linkedin.com
639 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 30% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SonicWall Cloud Secure Edge Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    3
    Secure Access
    2
    Threat Protection
    2
    Authentication
    1
    Customer Support
    1
    Cons
    Access Issues
    1
    Expensive
    1
    Integration Issues
    1
    Poor Documentation
    1
    Process Delays
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SonicWall Cloud Secure Edge features and usability ratings that predict user satisfaction
    8.8
    Anomaly Detection
    Average: 8.4
    7.9
    Cloud Application Brokerage
    Average: 8.5
    7.5
    Policy Enforcement
    Average: 8.6
    9.0
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SonicWall
    Year Founded
    1991
    HQ Location
    Milpitas, CA
    Twitter
    @SonicWall
    29,682 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,997 employees on LinkedIn®
Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 30% Small-Business
SonicWall Cloud Secure Edge Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
3
Secure Access
2
Threat Protection
2
Authentication
1
Customer Support
1
Cons
Access Issues
1
Expensive
1
Integration Issues
1
Poor Documentation
1
Process Delays
1
SonicWall Cloud Secure Edge features and usability ratings that predict user satisfaction
8.8
Anomaly Detection
Average: 8.4
7.9
Cloud Application Brokerage
Average: 8.5
7.5
Policy Enforcement
Average: 8.6
9.0
Ease of Use
Average: 8.7
Seller Details
Seller
SonicWall
Year Founded
1991
HQ Location
Milpitas, CA
Twitter
@SonicWall
29,682 Twitter followers
LinkedIn® Page
www.linkedin.com
1,997 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Atmos is a modern Security Service Edge (SSE) platform powered by Axis. Atmos securely connects users to the business resources needed in order to get work done, regardless of application, device, or

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 38% Mid-Market
    • 38% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Axis Security features and usability ratings that predict user satisfaction
    10.0
    Anomaly Detection
    Average: 8.4
    10.0
    Cloud Application Brokerage
    Average: 8.5
    9.2
    Policy Enforcement
    Average: 8.6
    9.6
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    HQ Location
    San Mateo, CA
    Twitter
    @AxisSecurityHQ
    456 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    260 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Atmos is a modern Security Service Edge (SSE) platform powered by Axis. Atmos securely connects users to the business resources needed in order to get work done, regardless of application, device, or

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 38% Mid-Market
  • 38% Enterprise
Axis Security features and usability ratings that predict user satisfaction
10.0
Anomaly Detection
Average: 8.4
10.0
Cloud Application Brokerage
Average: 8.5
9.2
Policy Enforcement
Average: 8.6
9.6
Ease of Use
Average: 8.7
Seller Details
Year Founded
2018
HQ Location
San Mateo, CA
Twitter
@AxisSecurityHQ
456 Twitter followers
LinkedIn® Page
www.linkedin.com
260 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Adaptiv Networks provides amazingly simple, secure, and reliable cloud connectivity for customers who vaue who value simplicity, performance, and cost effectiveness. We offer a range of scalable SD-WA

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 40% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Adaptiv features and usability ratings that predict user satisfaction
    8.3
    Anomaly Detection
    Average: 8.4
    9.4
    Cloud Application Brokerage
    Average: 8.5
    8.9
    Policy Enforcement
    Average: 8.6
    6.9
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Adaptiv
    HQ Location
    Gatineau
    LinkedIn® Page
    www.linkedin.com
    42 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Adaptiv Networks provides amazingly simple, secure, and reliable cloud connectivity for customers who vaue who value simplicity, performance, and cost effectiveness. We offer a range of scalable SD-WA

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 40% Small-Business
Adaptiv features and usability ratings that predict user satisfaction
8.3
Anomaly Detection
Average: 8.4
9.4
Cloud Application Brokerage
Average: 8.5
8.9
Policy Enforcement
Average: 8.6
6.9
Ease of Use
Average: 8.7
Seller Details
Seller
Adaptiv
HQ Location
Gatineau
LinkedIn® Page
www.linkedin.com
42 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Grip brings the industry’s most comprehensive visibility across all enterprise SaaS applications--known or unknown for apps, users, and their basic interactions with extreme accuracy to minimize false

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 40% Small-Business
    • 40% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Grip Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Compliance Control
    1
    Protection
    1
    Threat Protection
    1
    Cons
    Complex Configuration
    1
    Difficult Learning
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Grip Security features and usability ratings that predict user satisfaction
    7.5
    Anomaly Detection
    Average: 8.4
    10.0
    Cloud Application Brokerage
    Average: 8.5
    9.2
    Policy Enforcement
    Average: 8.6
    8.3
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2021
    HQ Location
    Tel-Aviv, IL
    LinkedIn® Page
    www.linkedin.com
    119 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Grip brings the industry’s most comprehensive visibility across all enterprise SaaS applications--known or unknown for apps, users, and their basic interactions with extreme accuracy to minimize false

Users
No information available
Industries
No information available
Market Segment
  • 40% Small-Business
  • 40% Enterprise
Grip Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Compliance Control
1
Protection
1
Threat Protection
1
Cons
Complex Configuration
1
Difficult Learning
1
Grip Security features and usability ratings that predict user satisfaction
7.5
Anomaly Detection
Average: 8.4
10.0
Cloud Application Brokerage
Average: 8.5
9.2
Policy Enforcement
Average: 8.6
8.3
Ease of Use
Average: 8.7
Seller Details
Year Founded
2021
HQ Location
Tel-Aviv, IL
LinkedIn® Page
www.linkedin.com
119 employees on LinkedIn®
(94)4.6 out of 5
View top Consulting Services for Cloudflare SSE & SASE Platform
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cloudflare Area 1 is a cloud-native email security platform that identifies and blocks attacks before they hit user inboxes, enabling more effective protection against spear phishing, Business Email C

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 37% Small-Business
    • 34% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cloudflare SSE & SASE Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    12
    Ease of Use
    10
    Performance Speed
    8
    Protection
    8
    Reliability
    7
    Cons
    Needs Improvement
    4
    Difficult Learning
    3
    Difficult Learning Curve
    3
    Expensive
    3
    Learning Difficulty
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cloudflare SSE & SASE Platform features and usability ratings that predict user satisfaction
    9.4
    Anomaly Detection
    Average: 8.4
    8.3
    Cloud Application Brokerage
    Average: 8.5
    9.4
    Policy Enforcement
    Average: 8.6
    9.2
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2009
    HQ Location
    San Francisco, California
    Twitter
    @Cloudflare
    222,890 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,449 employees on LinkedIn®
    Ownership
    NYSE: NET
Product Description
How are these determined?Information
This description is provided by the seller.

Cloudflare Area 1 is a cloud-native email security platform that identifies and blocks attacks before they hit user inboxes, enabling more effective protection against spear phishing, Business Email C

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 37% Small-Business
  • 34% Mid-Market
Cloudflare SSE & SASE Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
12
Ease of Use
10
Performance Speed
8
Protection
8
Reliability
7
Cons
Needs Improvement
4
Difficult Learning
3
Difficult Learning Curve
3
Expensive
3
Learning Difficulty
3
Cloudflare SSE & SASE Platform features and usability ratings that predict user satisfaction
9.4
Anomaly Detection
Average: 8.4
8.3
Cloud Application Brokerage
Average: 8.5
9.4
Policy Enforcement
Average: 8.6
9.2
Ease of Use
Average: 8.7
Seller Details
Year Founded
2009
HQ Location
San Francisco, California
Twitter
@Cloudflare
222,890 Twitter followers
LinkedIn® Page
www.linkedin.com
5,449 employees on LinkedIn®
Ownership
NYSE: NET
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    iboss is a leading Zero Trust Secure Access Service Edge (SASE) cloud security platform that consolidates network and security technologies into a single cloud-based service. By integrating VPN, Secur

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 47% Mid-Market
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • iboss Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    2
    Cloud Security
    1
    Data Security
    1
    Network Security
    1
    Secure Access
    1
    Cons
    Access Issues
    1
    Expensive
    1
    Expensive Licensing
    1
    Login Issues
    1
    Slow Internet
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • iboss features and usability ratings that predict user satisfaction
    10.0
    Anomaly Detection
    Average: 8.4
    8.3
    Cloud Application Brokerage
    Average: 8.5
    10.0
    Policy Enforcement
    Average: 8.6
    7.9
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    iboss
    Year Founded
    2003
    HQ Location
    Boston, MA
    Twitter
    @iboss
    44 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    344 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

iboss is a leading Zero Trust Secure Access Service Edge (SASE) cloud security platform that consolidates network and security technologies into a single cloud-based service. By integrating VPN, Secur

Users
No information available
Industries
No information available
Market Segment
  • 47% Mid-Market
  • 33% Small-Business
iboss Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
2
Cloud Security
1
Data Security
1
Network Security
1
Secure Access
1
Cons
Access Issues
1
Expensive
1
Expensive Licensing
1
Login Issues
1
Slow Internet
1
iboss features and usability ratings that predict user satisfaction
10.0
Anomaly Detection
Average: 8.4
8.3
Cloud Application Brokerage
Average: 8.5
10.0
Policy Enforcement
Average: 8.6
7.9
Ease of Use
Average: 8.7
Seller Details
Seller
iboss
Year Founded
2003
HQ Location
Boston, MA
Twitter
@iboss
44 Twitter followers
LinkedIn® Page
www.linkedin.com
344 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Our Secure Web Gateway includes ProxySG, and sits between your users and their interactions with the Internet to identify malicious payloads and to control sensitive content. Our Secure Web Gateway co

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 35% Mid-Market
    • 29% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ProxySG and Advanced Secure Gateway (ASG) features and usability ratings that predict user satisfaction
    10.0
    Anomaly Detection
    Average: 8.4
    10.0
    Cloud Application Brokerage
    Average: 8.5
    10.0
    Policy Enforcement
    Average: 8.6
    8.8
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    60,101 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    59,194 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

Our Secure Web Gateway includes ProxySG, and sits between your users and their interactions with the Internet to identify malicious payloads and to control sensitive content. Our Secure Web Gateway co

Users
No information available
Industries
No information available
Market Segment
  • 35% Mid-Market
  • 29% Enterprise
ProxySG and Advanced Secure Gateway (ASG) features and usability ratings that predict user satisfaction
10.0
Anomaly Detection
Average: 8.4
10.0
Cloud Application Brokerage
Average: 8.5
10.0
Policy Enforcement
Average: 8.6
8.8
Ease of Use
Average: 8.7
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
60,101 Twitter followers
LinkedIn® Page
www.linkedin.com
59,194 employees on LinkedIn®
Ownership
NASDAQ: CA
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Versa SASE is a cloud-native, multi-tenant, multi-service software for a software defined network.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 42% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Versa SASE features and usability ratings that predict user satisfaction
    10.0
    Anomaly Detection
    Average: 8.4
    10.0
    Cloud Application Brokerage
    Average: 8.5
    9.4
    Policy Enforcement
    Average: 8.6
    8.7
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2012
    HQ Location
    Santa Clara
    Twitter
    @versanetworks
    28,176 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    788 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Versa SASE is a cloud-native, multi-tenant, multi-service software for a software defined network.

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 42% Mid-Market
Versa SASE features and usability ratings that predict user satisfaction
10.0
Anomaly Detection
Average: 8.4
10.0
Cloud Application Brokerage
Average: 8.5
9.4
Policy Enforcement
Average: 8.6
8.7
Ease of Use
Average: 8.7
Seller Details
Year Founded
2012
HQ Location
Santa Clara
Twitter
@versanetworks
28,176 Twitter followers
LinkedIn® Page
www.linkedin.com
788 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CleanINTERNET® is an intelligence-powered security solution using high performance computing technology, patented software algorithms and uniquely skilled security analysts to deliver a robust alterna

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 80% Mid-Market
    • 20% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Centripetal CleanINTERNET ® Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Implementation Ease
    1
    Integration Capabilities
    1
    Network Security
    1
    Reliability
    1
    Security
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Centripetal CleanINTERNET ® features and usability ratings that predict user satisfaction
    7.5
    Anomaly Detection
    Average: 8.4
    9.2
    Cloud Application Brokerage
    Average: 8.5
    10.0
    Policy Enforcement
    Average: 8.6
    9.3
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2009
    HQ Location
    Reston, VA
    Twitter
    @Centripetal_AI
    475 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    73 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CleanINTERNET® is an intelligence-powered security solution using high performance computing technology, patented software algorithms and uniquely skilled security analysts to deliver a robust alterna

Users
No information available
Industries
No information available
Market Segment
  • 80% Mid-Market
  • 20% Small-Business
Centripetal CleanINTERNET ® Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Implementation Ease
1
Integration Capabilities
1
Network Security
1
Reliability
1
Security
1
Cons
This product has not yet received any negative sentiments.
Centripetal CleanINTERNET ® features and usability ratings that predict user satisfaction
7.5
Anomaly Detection
Average: 8.4
9.2
Cloud Application Brokerage
Average: 8.5
10.0
Policy Enforcement
Average: 8.6
9.3
Ease of Use
Average: 8.7
Seller Details
Year Founded
2009
HQ Location
Reston, VA
Twitter
@Centripetal_AI
475 Twitter followers
LinkedIn® Page
www.linkedin.com
73 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Securely connecting any user from any device​. Trusted access to any system on any network and platform.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 25% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cyolo features and usability ratings that predict user satisfaction
    4.2
    Anomaly Detection
    Average: 8.4
    5.0
    Cloud Application Brokerage
    Average: 8.5
    4.2
    Policy Enforcement
    Average: 8.6
    7.2
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cyolo
    Year Founded
    2020
    HQ Location
    Mountain View, US
    LinkedIn® Page
    www.linkedin.com
    85 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Securely connecting any user from any device​. Trusted access to any system on any network and platform.

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 25% Mid-Market
Cyolo features and usability ratings that predict user satisfaction
4.2
Anomaly Detection
Average: 8.4
5.0
Cloud Application Brokerage
Average: 8.5
4.2
Policy Enforcement
Average: 8.6
7.2
Ease of Use
Average: 8.7
Seller Details
Seller
Cyolo
Year Founded
2020
HQ Location
Mountain View, US
LinkedIn® Page
www.linkedin.com
85 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Essent OrderTrax features and usability ratings that predict user satisfaction
    10.0
    Anomaly Detection
    Average: 8.4
    10.0
    Cloud Application Brokerage
    Average: 8.5
    10.0
    Policy Enforcement
    Average: 8.6
    10.0
    Ease of Use
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Essent
    Twitter
    @EssentCorp
    380 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    27 employees on LinkedIn®
Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Essent OrderTrax features and usability ratings that predict user satisfaction
10.0
Anomaly Detection
Average: 8.4
10.0
Cloud Application Brokerage
Average: 8.5
10.0
Policy Enforcement
Average: 8.6
10.0
Ease of Use
Average: 8.7
Seller Details
Seller
Essent
Twitter
@EssentCorp
380 Twitter followers
LinkedIn® Page
www.linkedin.com
27 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    At FastEdge, we cultivate a dynamic and collaborative environment that sparks creativity and fuels the development of groundbreaking AI-powered computer vision solutions. Innovation at Our Core Colla

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Edge.ai features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    VA, US
    LinkedIn® Page
    www.linkedin.com
    11 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

At FastEdge, we cultivate a dynamic and collaborative environment that sparks creativity and fuels the development of groundbreaking AI-powered computer vision solutions. Innovation at Our Core Colla

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Edge.ai features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
HQ Location
VA, US
LinkedIn® Page
www.linkedin.com
11 employees on LinkedIn®

Learn More About Cloud Edge Security Software

What is Cloud Edge Security Software?

Cloud edge security software provides enterprises with a cloud-delivered solution to securely access the internet and cloud-based applications that run at the cloud edge or where compute capabilities are run closer to end devices. The software is delivered using software-defined wide area network (SD-WAN) technology. This allows cloud edge security solutions to operate anywhere and combine security functions to protect all network activity.

What Are the Common Features of Cloud Edge Security?

To address the need for cloud edge security software, many organizations are turning to secure access service edge (SASE) platforms, which converge SD-WAN capabilities with network security functions as a cloud-delivered service.

SASE framework: The SASE framework includes capabilities such as cloud access security broker (CASB) software, zero-trust networking software, and firewall as a service (FWaaS) —all available in a single cloud-delivered service model that simplifies IT.

SASE architecture: SASE architecture also enables companies to return networking and security to the cloud where the applications and data are located. It helps ensure secure access regardless of device location. It provides a set of best practices to secure applications and data in an era where work happens everywhere, and users are the new network perimeter.

What are the Benefits of Cloud Edge Security Software?

There are several benefits to using cloud edge security software, as mentioned below.

Secures data: A major advantage of cloud edge security platforms is that it helps secure the data already being processed at the cloud edge. The sheer volume of data produced by devices at the edge connecting to the internet requires vastly more processing. 

Secures real-time transactions: Edge computing moves processing and storage resources closer to the source of cloud data to manage loads. However, the movement of data from the cloud to the edge makes it very vulnerable to attacks. Cloud edge security software helps secure real-time edge data transactions that might take place in the Internet of Things (IoT), such as smart applications in retail or manufacturing. These tools make these transactions more secure and reliable.

Secures endpoints: Examples of cloud edge security software capabilities include web filtering, anti-malware, intrusion prevention systems (IPS), and next-generation firewalls that permit or deny traffic based on IP addresses. These functionalities are often built into the organization's SD-WAN. Effective cloud edge security software enables IT to secure all edge endpoints or devices easily. 

Who Uses Cloud Edge Security Software?

IT and cybersecurity staff: IT and cybersecurity staff use cloud edge security tools to securely monitor the data traffic at the cloud edge, ensuring safe B2C and B2B transactions. Securing these transactions keeps intruders from attacking these otherwise vulnerable internet transactions, which may be numerous in volume.

Industries: As enterprises move cloud capabilities across the WAN to users at the edge, industries such as healthcare and finance have more burden to protect sensitive data that comes with strict compliance requirements. Cloud edge security software can prioritize important security fundamentals such as encryption for data stored locally and in transit between the network core and edge computing devices.

Challenges with Cloud Edge Security Software?

There are some challenges IT teams can encounter with cloud edge security software.

Potential design flaws: With edge computing comes devices that can take virtually any form, from micro-data centers at remote locations, or a vast array of IoT devices. An example is the rapid shift to hybrid work models in response to the global pandemic, where millions of distributed remote offices and BYOD devices suddenly had to be managed simultaneously.

However, the design of these edge devices prioritizes functionality and connectivity over security. A poorly designed cloud edge security software approach by buyers does not secure the edge and makes it vulnerable to zero-day threats.

Increased cybersecurity risks: Edge computing increases the risk of cybersecurity threats entering the corporate network. Deploying hundreds of edge computing devices creates hundreds of potential entry points for security attacks and breaches. Cloud edge security solutions must have a 360-degree view of the attack surface and provide a built-in security stack to protect against zero-day threats, malware, and other vulnerabilities at the point of access. 

How to Buy Cloud Edge Security Software

Requirements Gathering (RFI/RFP) for Cloud Edge Security Software

If an organization is just starting and looking to purchase cloud edge security software, g2.com can help select the best one.

Most business pain points might be related to all the manual work that must be completed. If the company is large and has a lot of networks, data, or devices in its organization, it may need to shop for cloud edge security platforms that can grow with its organization. Users should think about the pain points in security to help create a checklist of criteria. Additionally, the buyer must determine the number of employees who will need to use the cloud edge security software and if they currently have the skills to administer it. 

Taking a holistic overview of the business and identifying pain points can help the team springboard into creating a checklist of criteria. The checklist serves as a detailed guide that includes both necessary and nice-to-have features, including budget features, number of users, integrations, security staff skills, cloud or on-premises solutions, and more.

Depending on the deployment scope, it might be helpful to produce an RFI, a one-page list with a few bullet points describing what is needed from cloud edge security software.

Compare Cloud Edge Security Software Products

Create a long list

Vendor evaluations are essential to the software buying process, from meeting the business functionality needs to implementation. For ease of comparison, after all demos are complete, it helps to prepare a consistent list of questions regarding specific needs and concerns to ask each vendor.

Create a short list

From the long list of vendors, it is helpful to narrow down the list of vendors and come up with a shorter list of contenders, preferably no more than three to five. With this list, businesses can produce a matrix to compare the features and pricing of the various solutions.

Conduct demos

To ensure the comparison is comprehensive, the user should demo each solution on the short list with the same use cases. This will allow the business to evaluate like for like and see how each vendor stacks up against the competition. 

Selection of Cloud Edge Security Software

Choose a selection team

Before getting started, creating a winning team that will work together throughout the entire process, from identifying pain points to implementation, is crucial. The software selection team should consist of organization members with the right interest, skills, and time to participate in this process. A good starting point is to aim for three to five people who fill roles such as the main decision maker, project manager, process owner, system owner, or staffing subject matter expert, as well as a technical lead, head administrator, or security administrator. The vendor selection team may be smaller in smaller companies, with fewer participants multitasking and taking on more responsibilities.

Compare notes

The selection team should compare notes, facts, and figures noted during the process, such as costs, security capabilities, and alert and incident response times.

Negotiation

Just because something is written on a company’s pricing page does not mean it's final. It is crucial to open up a conversation regarding pricing and licensing. For example, the vendor may be willing to give a discount for multi-year contracts or for recommending the product to others.

Final decision

After this stage, and before going all in, it is recommended to roll out a test run or pilot program to test adoption with a small sample size of users. If the tool is well used and well received, the buyer can be confident that the selection was correct. If not, it might be time to go back to the drawing board.

What does Cloud Edge Security Software cost?

Cloud edge security software is considered a long-term investment. This means there must be a careful evaluation of vendors, and the software should be tailored to each organization's specific requirements. Once cloud edge security software is purchased, deployed, and integrated into an organization’s security system, the cost could be high, so the evaluation stage of selecting the right tool is crucial. The notion of rip-and-replace cost can be high. The cloud edge security software vendor chosen should continue to provide support for the platform with flexibility and open integration. Pricing can be pay-as-you-go, and costs may also vary depending if cloud edge security is self-managed or fully managed.

Return on Investment (ROI)

Organizations decide to purchase cloud edge security software with some type of return on investment (ROI). As they want to recoup the money spent on the software, it is critical to understand the costs that will be saved in terms of efficiency. In the long run, the investment must be worth preventing the downtime and loss of revenue that would be caused by a security breach.