Introducing G2.ai, the future of software buying.Try now

Best Network Security Policy Management (NSPM) Software

Lauren Worth
LW
Researched and written by Lauren Worth

Network security policy management (NSPM) software provides tools for maintaining compliance and enforcing network security and firewall management policies across an organization.

NSPM tools provide the functionality to create, document, and visualize operational workflows for network security management and orchestration. A few NSPM software offerings also include features for auditing networks, documenting policy changes, and automating security operations.

Companies use NSPM software to ensure consistent network policies and compliance while endpoints, data, and networks remain secure. These tools help identify and remove unnecessary or obsolete security policies and simplify security operations. In addition, they often integrate with other security solutions to streamline policy management across complex networks.

Some of these products may share features with network monitoring software and network management software. However, those groupings are more concerned with performance and functionality than security and compliance.

To qualify for inclusion in the Network Security Policy Management (NSPM) category, a product must:

Develop and facilitate network and firewall policy management
Track and document changes made to security policies
Provide tools to ensure that networks meet various compliance standards

Best Network Security Policy Management (NSPM) Software At A Glance

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
42 Listings in Network Security Policy Management (NSPM) Available
(193)4.5 out of 5
11th Easiest To Use in Network Security Policy Management (NSPM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AlgoSec, a global cybersecurity leader, empowers organizations to secure application connectivity and cloud-native applications throughout their multi-cloud and hybrid network. Trusted by more tha

    Users
    • Security Engineer
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 47% Enterprise
    • 31% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • AlgoSec Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    56
    Security
    38
    Policy Management
    34
    Risk Management
    29
    Features
    24
    Cons
    Improvement Needed
    20
    Improvements Needed
    20
    Missing Features
    13
    Integration Issues
    12
    Limited Features
    10
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AlgoSec features and usability ratings that predict user satisfaction
    8.4
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Console
    Average: 9.0
    9.0
    Policy Optimization
    Average: 8.9
    8.3
    Network Mapping
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    AlgoSec
    Year Founded
    2004
    HQ Location
    Ridgefield Park, New Jersey
    Twitter
    @AlgoSec
    2,451 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    550 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

AlgoSec, a global cybersecurity leader, empowers organizations to secure application connectivity and cloud-native applications throughout their multi-cloud and hybrid network. Trusted by more tha

Users
  • Security Engineer
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 47% Enterprise
  • 31% Mid-Market
AlgoSec Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
56
Security
38
Policy Management
34
Risk Management
29
Features
24
Cons
Improvement Needed
20
Improvements Needed
20
Missing Features
13
Integration Issues
12
Limited Features
10
AlgoSec features and usability ratings that predict user satisfaction
8.4
Has the product been a good partner in doing business?
Average: 9.0
8.3
Console
Average: 9.0
9.0
Policy Optimization
Average: 8.9
8.3
Network Mapping
Average: 8.9
Seller Details
Seller
AlgoSec
Year Founded
2004
HQ Location
Ridgefield Park, New Jersey
Twitter
@AlgoSec
2,451 Twitter followers
LinkedIn® Page
www.linkedin.com
550 employees on LinkedIn®
(125)4.5 out of 5
1st Easiest To Use in Network Security Policy Management (NSPM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CloudGuard Cloud Network Security, part of the CloudGuard Cloud Native Security platform (https://www.g2.com/products/cloudguard-cnapp/reviews) , provides advanced threat prevention and automated clou

    Users
    • Network Engineer
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 51% Enterprise
    • 28% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point CloudGuard Network Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    36
    Ease of Use
    23
    Features
    23
    Threat Detection
    22
    Network Security
    19
    Cons
    Lack of Features
    11
    Lacking Features
    9
    Missing Features
    9
    Expensive
    7
    Cloud Integration
    6
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point CloudGuard Network Security features and usability ratings that predict user satisfaction
    8.7
    Has the product been a good partner in doing business?
    Average: 9.0
    9.2
    Console
    Average: 9.0
    8.9
    Policy Optimization
    Average: 8.9
    9.4
    Network Mapping
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,087 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,977 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CloudGuard Cloud Network Security, part of the CloudGuard Cloud Native Security platform (https://www.g2.com/products/cloudguard-cnapp/reviews) , provides advanced threat prevention and automated clou

Users
  • Network Engineer
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 51% Enterprise
  • 28% Mid-Market
Check Point CloudGuard Network Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
36
Ease of Use
23
Features
23
Threat Detection
22
Network Security
19
Cons
Lack of Features
11
Lacking Features
9
Missing Features
9
Expensive
7
Cloud Integration
6
Check Point CloudGuard Network Security features and usability ratings that predict user satisfaction
8.7
Has the product been a good partner in doing business?
Average: 9.0
9.2
Console
Average: 9.0
8.9
Policy Optimization
Average: 8.9
9.4
Network Mapping
Average: 8.9
Seller Details
Company Website
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,087 Twitter followers
LinkedIn® Page
www.linkedin.com
7,977 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(30)4.7 out of 5
5th Easiest To Use in Network Security Policy Management (NSPM) software
Save to My Lists
Entry Level Price:Starting at $395.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Firewall Analyzer is a vendor neutral log analytics and firewall rule management software that provides in-depth visibility into your organization's network security environment. Here are some of the

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 47% Mid-Market
    • 30% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ManageEngine Firewall Analyzer features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.0
    9.1
    Console
    Average: 9.0
    9.1
    Policy Optimization
    Average: 8.9
    9.2
    Network Mapping
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Del Valle, Texas
    Twitter
    @manageengine
    7,677 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    464 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Firewall Analyzer is a vendor neutral log analytics and firewall rule management software that provides in-depth visibility into your organization's network security environment. Here are some of the

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 47% Mid-Market
  • 30% Enterprise
ManageEngine Firewall Analyzer features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.0
9.1
Console
Average: 9.0
9.1
Policy Optimization
Average: 8.9
9.2
Network Mapping
Average: 8.9
Seller Details
Year Founded
2002
HQ Location
Del Valle, Texas
Twitter
@manageengine
7,677 Twitter followers
LinkedIn® Page
www.linkedin.com
464 employees on LinkedIn®
(95)4.4 out of 5
8th Easiest To Use in Network Security Policy Management (NSPM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Tufin simplifies the management of some of the largest, most complex networks in the world, that consist of thousands of firewall and network devices and emerging hybrid cloud infrastructures. Enterpr

    Users
    No information available
    Industries
    • Computer & Network Security
    • Banking
    Market Segment
    • 68% Enterprise
    • 19% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tufin Orchestration Suite features and usability ratings that predict user satisfaction
    8.7
    Has the product been a good partner in doing business?
    Average: 9.0
    8.2
    Console
    Average: 9.0
    8.6
    Policy Optimization
    Average: 8.9
    8.6
    Network Mapping
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tufin
    Year Founded
    2005
    HQ Location
    Boston, Massachusetts
    Twitter
    @TufinTech
    8,139 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    476 employees on LinkedIn®
    Ownership
    NYSE: TUFN
Product Description
How are these determined?Information
This description is provided by the seller.

Tufin simplifies the management of some of the largest, most complex networks in the world, that consist of thousands of firewall and network devices and emerging hybrid cloud infrastructures. Enterpr

Users
No information available
Industries
  • Computer & Network Security
  • Banking
Market Segment
  • 68% Enterprise
  • 19% Mid-Market
Tufin Orchestration Suite features and usability ratings that predict user satisfaction
8.7
Has the product been a good partner in doing business?
Average: 9.0
8.2
Console
Average: 9.0
8.6
Policy Optimization
Average: 8.9
8.6
Network Mapping
Average: 8.9
Seller Details
Seller
Tufin
Year Founded
2005
HQ Location
Boston, Massachusetts
Twitter
@TufinTech
8,139 Twitter followers
LinkedIn® Page
www.linkedin.com
476 employees on LinkedIn®
Ownership
NYSE: TUFN
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 32% Small-Business
    • 32% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Azure Firewall Manager features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.0
    9.0
    Console
    Average: 9.0
    9.0
    Policy Optimization
    Average: 8.9
    9.0
    Network Mapping
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    14,002,464 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    237,523 employees on LinkedIn®
    Ownership
    MSFT
Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 32% Small-Business
  • 32% Enterprise
Azure Firewall Manager features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.0
9.0
Console
Average: 9.0
9.0
Policy Optimization
Average: 8.9
9.0
Network Mapping
Average: 8.9
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
14,002,464 Twitter followers
LinkedIn® Page
www.linkedin.com
237,523 employees on LinkedIn®
Ownership
MSFT
(20)4.8 out of 5
Optimized for quick response
3rd Easiest To Use in Network Security Policy Management (NSPM) software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Opinnate Network Security Policy Manager (NSPM): Simple, Effective, and Cost-Effective Network Security Opinnate’s Network Security Policy Manager (NSPM) is designed to simplify the complexities of

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 50% Mid-Market
    • 35% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Opinnate features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 9.0
    9.5
    Console
    Average: 9.0
    9.7
    Policy Optimization
    Average: 8.9
    8.8
    Network Mapping
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Opinnate
    Company Website
    Year Founded
    2022
    HQ Location
    London, Bromley
    Twitter
    @OpinnateSec
    14 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Opinnate Network Security Policy Manager (NSPM): Simple, Effective, and Cost-Effective Network Security Opinnate’s Network Security Policy Manager (NSPM) is designed to simplify the complexities of

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 50% Mid-Market
  • 35% Small-Business
Opinnate features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 9.0
9.5
Console
Average: 9.0
9.7
Policy Optimization
Average: 8.9
8.8
Network Mapping
Average: 8.9
Seller Details
Seller
Opinnate
Company Website
Year Founded
2022
HQ Location
London, Bromley
Twitter
@OpinnateSec
14 Twitter followers
LinkedIn® Page
www.linkedin.com
10 employees on LinkedIn®
(46)4.5 out of 5
7th Easiest To Use in Network Security Policy Management (NSPM) software
View top Consulting Services for Palo Alto Networks Panorama
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Panorama network security management provides static rules and dynamic security updates in an ever-changing threat landscape. Reduce administrator workload and improve your overall security posture wi

    Users
    • Network Engineer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 48% Enterprise
    • 37% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Palo Alto Networks Panorama Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Centralized Management
    1
    Customer Support
    1
    Ease of Use
    1
    Easy Integrations
    1
    Features
    1
    Cons
    Complex Setup
    1
    Difficult Learning Curve
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Palo Alto Networks Panorama features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.0
    9.2
    Console
    Average: 9.0
    9.0
    Policy Optimization
    Average: 8.9
    8.8
    Network Mapping
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    126,982 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17,221 employees on LinkedIn®
    Ownership
    NYSE: PANW
Product Description
How are these determined?Information
This description is provided by the seller.

Panorama network security management provides static rules and dynamic security updates in an ever-changing threat landscape. Reduce administrator workload and improve your overall security posture wi

Users
  • Network Engineer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 48% Enterprise
  • 37% Mid-Market
Palo Alto Networks Panorama Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Centralized Management
1
Customer Support
1
Ease of Use
1
Easy Integrations
1
Features
1
Cons
Complex Setup
1
Difficult Learning Curve
1
Palo Alto Networks Panorama features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.0
9.2
Console
Average: 9.0
9.0
Policy Optimization
Average: 8.9
8.8
Network Mapping
Average: 8.9
Seller Details
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
126,982 Twitter followers
LinkedIn® Page
www.linkedin.com
17,221 employees on LinkedIn®
Ownership
NYSE: PANW
(46)4.5 out of 5
6th Easiest To Use in Network Security Policy Management (NSPM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Trellix ePolicy Orchestrator (ePO) is a centralized, scalable, extensible platform for security policy management and enforcement of enterprise networks and endpoints. This product provides users with

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 63% Enterprise
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trellix ePolicy Orchestrator features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.0
    8.7
    Console
    Average: 9.0
    8.9
    Policy Optimization
    Average: 8.9
    8.4
    Network Mapping
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Trellix
    Year Founded
    2004
    HQ Location
    Milpitas, CA
    Twitter
    @Trellix
    250,269 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    826 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Trellix ePolicy Orchestrator (ePO) is a centralized, scalable, extensible platform for security policy management and enforcement of enterprise networks and endpoints. This product provides users with

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 63% Enterprise
  • 33% Mid-Market
Trellix ePolicy Orchestrator features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.0
8.7
Console
Average: 9.0
8.9
Policy Optimization
Average: 8.9
8.4
Network Mapping
Average: 8.9
Seller Details
Seller
Trellix
Year Founded
2004
HQ Location
Milpitas, CA
Twitter
@Trellix
250,269 Twitter followers
LinkedIn® Page
www.linkedin.com
826 employees on LinkedIn®
(17)4.7 out of 5
2nd Easiest To Use in Network Security Policy Management (NSPM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    NG Firewall simplifies network security with a single, modular, software platform that provides a browser-based, responsive and intuitive interface enabling you to quickly gain visibility into the tra

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 59% Small-Business
    • 41% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Arista NG Firewall features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.0
    9.7
    Console
    Average: 9.0
    9.4
    Policy Optimization
    Average: 8.9
    9.2
    Network Mapping
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2004
    HQ Location
    Santa Clara, US
    Twitter
    @arista_channels
    2,476 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,862 employees on LinkedIn®
    Ownership
    NYSE:ANET
Product Description
How are these determined?Information
This description is provided by the seller.

NG Firewall simplifies network security with a single, modular, software platform that provides a browser-based, responsive and intuitive interface enabling you to quickly gain visibility into the tra

Users
No information available
Industries
No information available
Market Segment
  • 59% Small-Business
  • 41% Mid-Market
Arista NG Firewall features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.0
9.7
Console
Average: 9.0
9.4
Policy Optimization
Average: 8.9
9.2
Network Mapping
Average: 8.9
Seller Details
Year Founded
2004
HQ Location
Santa Clara, US
Twitter
@arista_channels
2,476 Twitter followers
LinkedIn® Page
www.linkedin.com
4,862 employees on LinkedIn®
Ownership
NYSE:ANET
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 56% Mid-Market
    • 28% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FortiPortal features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.0
    8.8
    Console
    Average: 9.0
    8.8
    Policy Optimization
    Average: 8.9
    8.7
    Network Mapping
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortinet
    Year Founded
    2000
    HQ Location
    Sunnyvale, CA
    Twitter
    @Fortinet
    151,611 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    14,832 employees on LinkedIn®
    Ownership
    NASDAQ: FTNT
Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 56% Mid-Market
  • 28% Small-Business
FortiPortal features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.0
8.8
Console
Average: 9.0
8.8
Policy Optimization
Average: 8.9
8.7
Network Mapping
Average: 8.9
Seller Details
Seller
Fortinet
Year Founded
2000
HQ Location
Sunnyvale, CA
Twitter
@Fortinet
151,611 Twitter followers
LinkedIn® Page
www.linkedin.com
14,832 employees on LinkedIn®
Ownership
NASDAQ: FTNT
(71)4.4 out of 5
Optimized for quick response
4th Easiest To Use in Network Security Policy Management (NSPM) software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Portnox offers cloud-native zero trust access control and cybersecurity essentials that enable agile, resource-constrained IT teams to proactively address today’s most pressing security challenges: th

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 41% Enterprise
    • 39% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Portnox Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    15
    Customer Support
    10
    Easy Integrations
    8
    Integrations
    8
    Implementation Ease
    6
    Cons
    Performance Issues
    6
    Lack of Clarity
    4
    Poor Interface Design
    4
    Difficult Learning Curve
    3
    UX Improvement
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Portnox features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.0
    8.5
    Console
    Average: 9.0
    7.5
    Policy Optimization
    Average: 8.9
    8.3
    Network Mapping
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Portnox
    Company Website
    Year Founded
    2007
    HQ Location
    Austin, Texas
    Twitter
    @portnox
    826 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    85 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Portnox offers cloud-native zero trust access control and cybersecurity essentials that enable agile, resource-constrained IT teams to proactively address today’s most pressing security challenges: th

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 41% Enterprise
  • 39% Mid-Market
Portnox Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
15
Customer Support
10
Easy Integrations
8
Integrations
8
Implementation Ease
6
Cons
Performance Issues
6
Lack of Clarity
4
Poor Interface Design
4
Difficult Learning Curve
3
UX Improvement
3
Portnox features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.0
8.5
Console
Average: 9.0
7.5
Policy Optimization
Average: 8.9
8.3
Network Mapping
Average: 8.9
Seller Details
Seller
Portnox
Company Website
Year Founded
2007
HQ Location
Austin, Texas
Twitter
@portnox
826 Twitter followers
LinkedIn® Page
www.linkedin.com
85 employees on LinkedIn®
(51)4.3 out of 5
9th Easiest To Use in Network Security Policy Management (NSPM) software
View top Consulting Services for Cisco DNA Center
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cisco DNA Center is the network management system, foundational controller, and analytics platform at the heart of Cisco’s intent-based network. Cisco DNA Center addresses the demands of digitization,

    Users
    No information available
    Industries
    • Hospital & Health Care
    • Computer & Network Security
    Market Segment
    • 37% Enterprise
    • 18% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cisco DNA Center Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    7
    Automation
    5
    Reliability
    4
    Centralized Management
    3
    Cybersecurity
    3
    Cons
    Complexity
    4
    Expensive
    4
    Compatibility Issues
    2
    Complex Implementation
    2
    Learning Curve
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco DNA Center features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.0
    8.7
    Console
    Average: 9.0
    8.0
    Policy Optimization
    Average: 8.9
    8.7
    Network Mapping
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    728,816 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,057 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Cisco DNA Center is the network management system, foundational controller, and analytics platform at the heart of Cisco’s intent-based network. Cisco DNA Center addresses the demands of digitization,

Users
No information available
Industries
  • Hospital & Health Care
  • Computer & Network Security
Market Segment
  • 37% Enterprise
  • 18% Mid-Market
Cisco DNA Center Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
7
Automation
5
Reliability
4
Centralized Management
3
Cybersecurity
3
Cons
Complexity
4
Expensive
4
Compatibility Issues
2
Complex Implementation
2
Learning Curve
2
Cisco DNA Center features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.0
8.7
Console
Average: 9.0
8.0
Policy Optimization
Average: 8.9
8.7
Network Mapping
Average: 8.9
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
728,816 Twitter followers
LinkedIn® Page
www.linkedin.com
95,057 employees on LinkedIn®
Ownership
NASDAQ:CSCO
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cyber Security Management features centralized management control across all networks and cloud environments, increasing operational efficiency and lowering the complexity of managing your security.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Enterprise
    • 25% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Quantum Titan features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.0
    9.7
    Console
    Average: 9.0
    9.8
    Policy Optimization
    Average: 8.9
    10.0
    Network Mapping
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,087 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,977 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

Cyber Security Management features centralized management control across all networks and cloud environments, increasing operational efficiency and lowering the complexity of managing your security.

Users
No information available
Industries
No information available
Market Segment
  • 75% Enterprise
  • 25% Mid-Market
Quantum Titan features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.0
9.7
Console
Average: 9.0
9.8
Policy Optimization
Average: 8.9
10.0
Network Mapping
Average: 8.9
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,087 Twitter followers
LinkedIn® Page
www.linkedin.com
7,977 employees on LinkedIn®
Ownership
NASDAQ:CHKP
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AWS Firewall Manager is a security management service that makes it easier to centrally configure and manage AWS WAF rules across your accounts and applications.

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 51% Enterprise
    • 20% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AWS Firewall Manager features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.0
    8.2
    Console
    Average: 9.0
    7.5
    Policy Optimization
    Average: 8.9
    7.4
    Network Mapping
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2006
    HQ Location
    Seattle, WA
    Twitter
    @awscloud
    2,229,471 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    143,150 employees on LinkedIn®
    Ownership
    NASDAQ: AMZN
Product Description
How are these determined?Information
This description is provided by the seller.

AWS Firewall Manager is a security management service that makes it easier to centrally configure and manage AWS WAF rules across your accounts and applications.

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 51% Enterprise
  • 20% Small-Business
AWS Firewall Manager features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.0
8.2
Console
Average: 9.0
7.5
Policy Optimization
Average: 8.9
7.4
Network Mapping
Average: 8.9
Seller Details
Year Founded
2006
HQ Location
Seattle, WA
Twitter
@awscloud
2,229,471 Twitter followers
LinkedIn® Page
www.linkedin.com
143,150 employees on LinkedIn®
Ownership
NASDAQ: AMZN
(15)4.5 out of 5
13th Easiest To Use in Network Security Policy Management (NSPM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 53% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Forescout Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    4
    Internet Security
    3
    IP Addressing
    3
    Monitoring
    3
    Customization
    2
    Cons
    Complex Implementation
    2
    Dependency Issues
    2
    Integration Issues
    2
    Performance Issues
    2
    Poor Customer Support
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Forescout Platform features and usability ratings that predict user satisfaction
    8.7
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2000
    HQ Location
    San Jose, CA
    Twitter
    @ForeScout
    23,429 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,142 employees on LinkedIn®
Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 53% Enterprise
  • 33% Mid-Market
Forescout Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
4
Internet Security
3
IP Addressing
3
Monitoring
3
Customization
2
Cons
Complex Implementation
2
Dependency Issues
2
Integration Issues
2
Performance Issues
2
Poor Customer Support
2
Forescout Platform features and usability ratings that predict user satisfaction
8.7
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2000
HQ Location
San Jose, CA
Twitter
@ForeScout
23,429 Twitter followers
LinkedIn® Page
www.linkedin.com
1,142 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cisco Security Cloud Control (formerly Cisco Defense Orchestrator) strengthens your security posture through centralized management, real-time visibility, and AI-driven automation. It streamlines oper

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 62% Enterprise
    • 31% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco Security Cloud Control features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.0
    9.0
    Console
    Average: 9.0
    8.3
    Policy Optimization
    Average: 8.9
    8.6
    Network Mapping
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    728,816 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,057 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Cisco Security Cloud Control (formerly Cisco Defense Orchestrator) strengthens your security posture through centralized management, real-time visibility, and AI-driven automation. It streamlines oper

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 62% Enterprise
  • 31% Mid-Market
Cisco Security Cloud Control features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.0
9.0
Console
Average: 9.0
8.3
Policy Optimization
Average: 8.9
8.6
Network Mapping
Average: 8.9
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
728,816 Twitter followers
LinkedIn® Page
www.linkedin.com
95,057 employees on LinkedIn®
Ownership
NASDAQ:CSCO
(789)4.3 out of 5
Optimized for quick response
10th Easiest To Use in Network Security Policy Management (NSPM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SolarWinds® Observability is a full-stack observability solution that addresses the needs of modern organizations of all sizes by providing deep visibility into their hybrid ecosystems while affording

    Users
    • Network Engineer
    • System Administrator
    Industries
    • Information Technology and Services
    • Hospital & Health Care
    Market Segment
    • 46% Enterprise
    • 37% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SolarWinds Observability Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    52
    Monitoring
    49
    Monitoring Performance
    48
    Monitoring Capabilities
    45
    Easy Monitoring
    31
    Cons
    Expensive
    28
    Integration Issues
    16
    Complex Setup
    13
    Configuration Difficulty
    13
    Learning Curve
    12
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SolarWinds Observability features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1999
    HQ Location
    Austin, TX
    Twitter
    @solarwinds
    19,827 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,713 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SolarWinds® Observability is a full-stack observability solution that addresses the needs of modern organizations of all sizes by providing deep visibility into their hybrid ecosystems while affording

Users
  • Network Engineer
  • System Administrator
Industries
  • Information Technology and Services
  • Hospital & Health Care
Market Segment
  • 46% Enterprise
  • 37% Mid-Market
SolarWinds Observability Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
52
Monitoring
49
Monitoring Performance
48
Monitoring Capabilities
45
Easy Monitoring
31
Cons
Expensive
28
Integration Issues
16
Complex Setup
13
Configuration Difficulty
13
Learning Curve
12
SolarWinds Observability features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Company Website
Year Founded
1999
HQ Location
Austin, TX
Twitter
@solarwinds
19,827 Twitter followers
LinkedIn® Page
www.linkedin.com
2,713 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Junos Space Security Director provides security policy management through an intuitive, centralized interface that offers enforcement across emerging and traditional risk vectors.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 64% Enterprise
    • 45% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Juniper Security Director features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1996
    HQ Location
    Sunnyvale, CA
    Twitter
    @JuniperNetworks
    105,379 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    11,845 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Junos Space Security Director provides security policy management through an intuitive, centralized interface that offers enforcement across emerging and traditional risk vectors.

Users
No information available
Industries
No information available
Market Segment
  • 64% Enterprise
  • 45% Small-Business
Juniper Security Director features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1996
HQ Location
Sunnyvale, CA
Twitter
@JuniperNetworks
105,379 Twitter followers
LinkedIn® Page
www.linkedin.com
11,845 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all netwo

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 24% Enterprise
    • 21% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point Infinity Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cybersecurity Protection
    3
    Artificial Intelligence
    2
    Centralized Management
    2
    Security
    2
    Backup Solutions
    1
    Cons
    Difficult Configuration
    1
    Difficult Navigation
    1
    Expensive
    1
    Learning Curve
    1
    Overwhelming Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point Infinity Platform features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.0
    9.0
    Console
    Average: 9.0
    9.2
    Policy Optimization
    Average: 8.9
    9.5
    Network Mapping
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,087 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,977 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all netwo

Users
No information available
Industries
No information available
Market Segment
  • 24% Enterprise
  • 21% Small-Business
Check Point Infinity Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cybersecurity Protection
3
Artificial Intelligence
2
Centralized Management
2
Security
2
Backup Solutions
1
Cons
Difficult Configuration
1
Difficult Navigation
1
Expensive
1
Learning Curve
1
Overwhelming Features
1
Check Point Infinity Platform features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.0
9.0
Console
Average: 9.0
9.2
Policy Optimization
Average: 8.9
9.5
Network Mapping
Average: 8.9
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,087 Twitter followers
LinkedIn® Page
www.linkedin.com
7,977 employees on LinkedIn®
Ownership
NASDAQ:CHKP
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ditno is an Australian owned company delivering a unique Network Security Management Platform with centralised visibility across hybrid networks, risk analysis, real-time compliance, and application d

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 62% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ditno Network Firewall Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Control
    4
    Network Security
    3
    Protection
    3
    Customization
    2
    Ease of Management
    2
    Cons
    Limited Features
    2
    Slow Performance
    2
    VPN Issues
    2
    Complexity
    1
    Connection Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ditno Network Firewall features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    10.0
    Console
    Average: 9.0
    10.0
    Policy Optimization
    Average: 8.9
    10.0
    Network Mapping
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ditno
    Year Founded
    2012
    HQ Location
    Sydney, New South Wales
    Twitter
    @DitnoAu
    172 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ditno is an Australian owned company delivering a unique Network Security Management Platform with centralised visibility across hybrid networks, risk analysis, real-time compliance, and application d

Users
No information available
Industries
No information available
Market Segment
  • 62% Enterprise
  • 38% Mid-Market
ditno Network Firewall Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Control
4
Network Security
3
Protection
3
Customization
2
Ease of Management
2
Cons
Limited Features
2
Slow Performance
2
VPN Issues
2
Complexity
1
Connection Issues
1
ditno Network Firewall features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
10.0
Console
Average: 9.0
10.0
Policy Optimization
Average: 8.9
10.0
Network Mapping
Average: 8.9
Seller Details
Seller
ditno
Year Founded
2012
HQ Location
Sydney, New South Wales
Twitter
@DitnoAu
172 Twitter followers
LinkedIn® Page
www.linkedin.com
8 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    F5 BIG-IP Advanced Firewall Manager (AFM) is a high-performance, full-proxy network security solution designed to protect networks and data centers against incoming threats that enter the network. Bui

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 53% Enterprise
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • F5 BIG-IP Advanced Firewall Manager (AFM) features and usability ratings that predict user satisfaction
    8.1
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Console
    Average: 9.0
    10.0
    Policy Optimization
    Average: 8.9
    10.0
    Network Mapping
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    F5
    HQ Location
    Seattle, Washington
    Twitter
    @F5Networks
    1,401 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    6,142 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

F5 BIG-IP Advanced Firewall Manager (AFM) is a high-performance, full-proxy network security solution designed to protect networks and data centers against incoming threats that enter the network. Bui

Users
No information available
Industries
No information available
Market Segment
  • 53% Enterprise
  • 33% Mid-Market
F5 BIG-IP Advanced Firewall Manager (AFM) features and usability ratings that predict user satisfaction
8.1
Has the product been a good partner in doing business?
Average: 9.0
8.3
Console
Average: 9.0
10.0
Policy Optimization
Average: 8.9
10.0
Network Mapping
Average: 8.9
Seller Details
Seller
F5
HQ Location
Seattle, Washington
Twitter
@F5Networks
1,401 Twitter followers
LinkedIn® Page
www.linkedin.com
6,142 employees on LinkedIn®
(14)4.4 out of 5
12th Easiest To Use in Network Security Policy Management (NSPM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BlueCat Infrastructure Assurance (BCIA) is a proactive monitoring and automation solution. Think of it as a virtual DDI expert, on duty 24/7. Infrastructure Assurance provides deep visibility into Blu

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 57% Enterprise
    • 29% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BlueCat Infrastructure Assurance (BCIA) features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    BlueCat
    Year Founded
    2001
    HQ Location
    Toronto, Ontario
    Twitter
    @BlueCatNetworks
    2,275 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    647 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

BlueCat Infrastructure Assurance (BCIA) is a proactive monitoring and automation solution. Think of it as a virtual DDI expert, on duty 24/7. Infrastructure Assurance provides deep visibility into Blu

Users
No information available
Industries
No information available
Market Segment
  • 57% Enterprise
  • 29% Mid-Market
BlueCat Infrastructure Assurance (BCIA) features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
BlueCat
Year Founded
2001
HQ Location
Toronto, Ontario
Twitter
@BlueCatNetworks
2,275 Twitter followers
LinkedIn® Page
www.linkedin.com
647 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Stealthwatch is the only solution that detects threats across your private network, public clouds, and even in encrypted traffic.

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 52% Enterprise
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco Secure Network Analytics features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Console
    Average: 9.0
    8.9
    Policy Optimization
    Average: 8.9
    8.3
    Network Mapping
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    728,816 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,057 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Stealthwatch is the only solution that detects threats across your private network, public clouds, and even in encrypted traffic.

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 52% Enterprise
  • 33% Small-Business
Cisco Secure Network Analytics features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.0
8.3
Console
Average: 9.0
8.9
Policy Optimization
Average: 8.9
8.3
Network Mapping
Average: 8.9
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
728,816 Twitter followers
LinkedIn® Page
www.linkedin.com
95,057 employees on LinkedIn®
Ownership
NASDAQ:CSCO
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    F5® BIG-IQ® Centralized Management provides an application-centric and unified point of visibility and control for F5 BIG-IP products and features. BIG-IQ Centralized Management significantly eases th

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 55% Small-Business
    • 27% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • F5 BIG-IQ Centralized Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Centralized Management
    3
    Security
    3
    User Interface
    3
    Monitoring
    2
    Cloud Management
    1
    Cons
    Insufficient Documentation
    1
    Limited Reporting
    1
    Limited Visibility
    1
    Poor Customer Support
    1
    Training Required
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • F5 BIG-IQ Centralized Management features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Console
    Average: 9.0
    7.9
    Policy Optimization
    Average: 8.9
    7.9
    Network Mapping
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    F5
    HQ Location
    Seattle, Washington
    Twitter
    @F5Networks
    1,401 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    6,142 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

F5® BIG-IQ® Centralized Management provides an application-centric and unified point of visibility and control for F5 BIG-IP products and features. BIG-IQ Centralized Management significantly eases th

Users
No information available
Industries
No information available
Market Segment
  • 55% Small-Business
  • 27% Enterprise
F5 BIG-IQ Centralized Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Centralized Management
3
Security
3
User Interface
3
Monitoring
2
Cloud Management
1
Cons
Insufficient Documentation
1
Limited Reporting
1
Limited Visibility
1
Poor Customer Support
1
Training Required
1
F5 BIG-IQ Centralized Management features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.0
8.3
Console
Average: 9.0
7.9
Policy Optimization
Average: 8.9
7.9
Network Mapping
Average: 8.9
Seller Details
Seller
F5
HQ Location
Seattle, Washington
Twitter
@F5Networks
1,401 Twitter followers
LinkedIn® Page
www.linkedin.com
6,142 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Trend Micro TippingPoint integrates with the Deep Discovery Advanced Threat Protection Solution to detect and block targeted attacks and malware through preemptive threat prevention, threat insight an

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 38% Small-Business
    • 31% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trend Micro TippingPoint features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.0
    8.8
    Console
    Average: 9.0
    9.0
    Policy Optimization
    Average: 8.9
    8.7
    Network Mapping
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Tokyo
    Twitter
    @trendmicro
    112,808 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,690 employees on LinkedIn®
    Ownership
    OTCMKTS:TMICY
Product Description
How are these determined?Information
This description is provided by the seller.

Trend Micro TippingPoint integrates with the Deep Discovery Advanced Threat Protection Solution to detect and block targeted attacks and malware through preemptive threat prevention, threat insight an

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 38% Small-Business
  • 31% Enterprise
Trend Micro TippingPoint features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.0
8.8
Console
Average: 9.0
9.0
Policy Optimization
Average: 8.9
8.7
Network Mapping
Average: 8.9
Seller Details
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
112,808 Twitter followers
LinkedIn® Page
www.linkedin.com
7,690 employees on LinkedIn®
Ownership
OTCMKTS:TMICY
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Security Management and Multi-Domain Security Management (Provider-1) delivers more security and control by segmenting your security management into multiple virtual domains. Businesses of all sizes c

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 82% Enterprise
    • 18% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Multi-Domain Security Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cybersecurity
    1
    Network Management
    1
    Troubleshooting
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Multi-Domain Security Management features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.0
    9.6
    Console
    Average: 9.0
    9.4
    Policy Optimization
    Average: 8.9
    7.8
    Network Mapping
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,087 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,977 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

Security Management and Multi-Domain Security Management (Provider-1) delivers more security and control by segmenting your security management into multiple virtual domains. Businesses of all sizes c

Users
No information available
Industries
No information available
Market Segment
  • 82% Enterprise
  • 18% Small-Business
Multi-Domain Security Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cybersecurity
1
Network Management
1
Troubleshooting
1
Cons
This product has not yet received any negative sentiments.
Multi-Domain Security Management features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.0
9.6
Console
Average: 9.0
9.4
Policy Optimization
Average: 8.9
7.8
Network Mapping
Average: 8.9
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,087 Twitter followers
LinkedIn® Page
www.linkedin.com
7,977 employees on LinkedIn®
Ownership
NASDAQ:CHKP
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

     Illumio Zero Trust Segmentation is the first platform for breach containment. Visualize all communication between workloads and devices, set granular segmentation policies to control communications,

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 50% Mid-Market
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Illumio Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Security
    1
    Malware Protection
    1
    Security
    1
    Threat Protection
    1
    Cons
    Expensive
    1
    Integration Issues
    1
    Time-Consumption
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Illumio features and usability ratings that predict user satisfaction
    7.8
    Has the product been a good partner in doing business?
    Average: 9.0
    9.4
    Console
    Average: 9.0
    9.4
    Policy Optimization
    Average: 8.9
    10.0
    Network Mapping
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Illumio
    Year Founded
    2013
    HQ Location
    Sunnyvale, California
    Twitter
    @illumio
    3,409 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    792 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

 Illumio Zero Trust Segmentation is the first platform for breach containment. Visualize all communication between workloads and devices, set granular segmentation policies to control communications,

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 50% Mid-Market
  • 33% Enterprise
Illumio Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Security
1
Malware Protection
1
Security
1
Threat Protection
1
Cons
Expensive
1
Integration Issues
1
Time-Consumption
1
Illumio features and usability ratings that predict user satisfaction
7.8
Has the product been a good partner in doing business?
Average: 9.0
9.4
Console
Average: 9.0
9.4
Policy Optimization
Average: 8.9
10.0
Network Mapping
Average: 8.9
Seller Details
Seller
Illumio
Year Founded
2013
HQ Location
Sunnyvale, California
Twitter
@illumio
3,409 Twitter followers
LinkedIn® Page
www.linkedin.com
792 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    FireMon Policy Manager is a comprehensive firewall policy management platform that helps organizations quickly adapt to change, manage risk, and achieve continuous compliance. By standardizing and

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Policy Manager Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Easy Access
    1
    Easy Integrations
    1
    Features
    1
    Integrations
    1
    Cons
    Performance Issues
    1
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Policy Manager features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Console
    Average: 9.0
    10.0
    Policy Optimization
    Average: 8.9
    8.9
    Network Mapping
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    FireMon
    Year Founded
    2004
    HQ Location
    Overland Park, KS
    Twitter
    @FireMon
    2,454 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    243 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

FireMon Policy Manager is a comprehensive firewall policy management platform that helps organizations quickly adapt to change, manage risk, and achieve continuous compliance. By standardizing and

Users
No information available
Industries
No information available
Market Segment
  • 67% Enterprise
  • 33% Mid-Market
Policy Manager Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Easy Access
1
Easy Integrations
1
Features
1
Integrations
1
Cons
Performance Issues
1
Slow Performance
1
Policy Manager features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.0
8.3
Console
Average: 9.0
10.0
Policy Optimization
Average: 8.9
8.9
Network Mapping
Average: 8.9
Seller Details
Seller
FireMon
Year Founded
2004
HQ Location
Overland Park, KS
Twitter
@FireMon
2,454 Twitter followers
LinkedIn® Page
www.linkedin.com
243 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Network Configuration Manager is a comprehensive solution designed to empower netwaork organizations with efficient network configuration and change management capabilities. It supports a wide range o

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 50% Mid-Market
    • 35% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ManageEngine Network Configuration Manager Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Backup
    8
    Configuration Management
    8
    Automation
    7
    Configuration Ease
    6
    Security Compliance
    6
    Cons
    Limited Features
    5
    Expensive
    4
    Compatibility Issues
    3
    Lack of Features
    3
    Complexity
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ManageEngine Network Configuration Manager features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.0
    8.8
    Console
    Average: 9.0
    8.3
    Policy Optimization
    Average: 8.9
    8.3
    Network Mapping
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Del Valle, Texas
    Twitter
    @manageengine
    7,677 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    464 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Network Configuration Manager is a comprehensive solution designed to empower netwaork organizations with efficient network configuration and change management capabilities. It supports a wide range o

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 50% Mid-Market
  • 35% Enterprise
ManageEngine Network Configuration Manager Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Backup
8
Configuration Management
8
Automation
7
Configuration Ease
6
Security Compliance
6
Cons
Limited Features
5
Expensive
4
Compatibility Issues
3
Lack of Features
3
Complexity
2
ManageEngine Network Configuration Manager features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.0
8.8
Console
Average: 9.0
8.3
Policy Optimization
Average: 8.9
8.3
Network Mapping
Average: 8.9
Seller Details
Year Founded
2002
HQ Location
Del Valle, Texas
Twitter
@manageengine
7,677 Twitter followers
LinkedIn® Page
www.linkedin.com
464 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Firewalls and security groups are important in securing your cloud environment and the information stored in it, as well as preventing malicious activity from reaching your servers or users.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM Cloud Network Security features and usability ratings that predict user satisfaction
    0.0
    No information available
    9.2
    Console
    Average: 9.0
    8.3
    Policy Optimization
    Average: 8.9
    8.3
    Network Mapping
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IBM
    Year Founded
    1911
    HQ Location
    Armonk, NY
    Twitter
    @IBM
    709,764 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    331,391 employees on LinkedIn®
    Ownership
    SWX:IBM
Product Description
How are these determined?Information
This description is provided by the seller.

Firewalls and security groups are important in securing your cloud environment and the information stored in it, as well as preventing malicious activity from reaching your servers or users.

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Mid-Market
IBM Cloud Network Security features and usability ratings that predict user satisfaction
0.0
No information available
9.2
Console
Average: 9.0
8.3
Policy Optimization
Average: 8.9
8.3
Network Mapping
Average: 8.9
Seller Details
Seller
IBM
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
709,764 Twitter followers
LinkedIn® Page
www.linkedin.com
331,391 employees on LinkedIn®
Ownership
SWX:IBM
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    "Networks get hacked, become slow & go down more often than you think. Are you using the right tool to control your network?" BhaiFi is a Global Cybersecurity startup based out of India that off

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 64% Small-Business
    • 23% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BhaiFi.ai features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Console
    Average: 9.0
    6.7
    Policy Optimization
    Average: 8.9
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    BhaiFi
    Year Founded
    2017
    HQ Location
    Gurgaon, Haryana
    Twitter
    @bhaifi
    71 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    24 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

"Networks get hacked, become slow & go down more often than you think. Are you using the right tool to control your network?" BhaiFi is a Global Cybersecurity startup based out of India that off

Users
No information available
Industries
No information available
Market Segment
  • 64% Small-Business
  • 23% Mid-Market
BhaiFi.ai features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
8.3
Console
Average: 9.0
6.7
Policy Optimization
Average: 8.9
0.0
No information available
Seller Details
Seller
BhaiFi
Year Founded
2017
HQ Location
Gurgaon, Haryana
Twitter
@bhaifi
71 Twitter followers
LinkedIn® Page
www.linkedin.com
24 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    FireMon Asset Manager (formerly Lumeta) is a real-time network visibility solution that provides comprehensive, continuous asset intelligence across the enterprise. In contrast to other solutions, Ass

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FireMon Asset Manager features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Console
    Average: 9.0
    10.0
    Policy Optimization
    Average: 8.9
    8.3
    Network Mapping
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    FireMon
    Year Founded
    2004
    HQ Location
    Overland Park, KS
    Twitter
    @FireMon
    2,454 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    243 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

FireMon Asset Manager (formerly Lumeta) is a real-time network visibility solution that provides comprehensive, continuous asset intelligence across the enterprise. In contrast to other solutions, Ass

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
FireMon Asset Manager features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Console
Average: 9.0
10.0
Policy Optimization
Average: 8.9
8.3
Network Mapping
Average: 8.9
Seller Details
Seller
FireMon
Year Founded
2004
HQ Location
Overland Park, KS
Twitter
@FireMon
2,454 Twitter followers
LinkedIn® Page
www.linkedin.com
243 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Zeguro offers cyber insurance and an easy-to-use cyber risk management solution, Zeguro Cyber Safety. Designed for small to midsize businesses, our Cyber Safety platform includes: cybersecurity traini

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Zeguro Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    User Interface
    1
    Cons
    Deployment Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Zeguro features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.0
    10.0
    Console
    Average: 9.0
    10.0
    Policy Optimization
    Average: 8.9
    10.0
    Network Mapping
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Zeguro
    Twitter
    @Zeguroinc
    210 Twitter followers
    LinkedIn® Page
    linkedin.com
    19 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Zeguro offers cyber insurance and an easy-to-use cyber risk management solution, Zeguro Cyber Safety. Designed for small to midsize businesses, our Cyber Safety platform includes: cybersecurity traini

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Zeguro Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
User Interface
1
Cons
Deployment Issues
1
Zeguro features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.0
10.0
Console
Average: 9.0
10.0
Policy Optimization
Average: 8.9
10.0
Network Mapping
Average: 8.9
Seller Details
Seller
Zeguro
Twitter
@Zeguroinc
210 Twitter followers
LinkedIn® Page
linkedin.com
19 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Elisity is a leap forward in network segmentation architecture and is leading the enterprise effort to achieve Zero Trust maturity, proactively prevent security risks, and reduce network complexity. D

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Elisity features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Elisity
    HQ Location
    San Jose, US
    LinkedIn® Page
    www.linkedin.com
    106 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Elisity is a leap forward in network segmentation architecture and is leading the enterprise effort to achieve Zero Trust maturity, proactively prevent security risks, and reduce network complexity. D

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Elisity features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Elisity
HQ Location
San Jose, US
LinkedIn® Page
www.linkedin.com
106 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Faronics is a Canadian software company based in Vancouver, providing IT management and security solutions since 1996. With a presence in over 150 countries, Faronics supports thousands of organisatio

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Faronics Cloud Anti-Executable features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1996
    HQ Location
    Vancouver, Canada
    Twitter
    @faronics
    1,467 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    116 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Faronics is a Canadian software company based in Vancouver, providing IT management and security solutions since 1996. With a presence in over 150 countries, Faronics supports thousands of organisatio

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Faronics Cloud Anti-Executable features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1996
HQ Location
Vancouver, Canada
Twitter
@faronics
1,467 Twitter followers
LinkedIn® Page
www.linkedin.com
116 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Firesec is a Security Analysis and Orchestration platform. It is designed solve problems of these personas - CISO, Security Consultant, Security Auditor and Network Administrator. It is an automated s

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Firesec features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Twitter
    @niiconsulting
    2,346 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    499 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Firesec is a Security Analysis and Orchestration platform. It is designed solve problems of these personas - CISO, Security Consultant, Security Auditor and Network Administrator. It is an automated s

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Firesec features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Twitter
@niiconsulting
2,346 Twitter followers
LinkedIn® Page
www.linkedin.com
499 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IP Fabric is a vendor-neutral network assurance platform that automates the holistic discovery, verification, visualization, and documentation of large-scale enterprise networks, reducing the associat

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IP Fabric features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IP Fabric
    Year Founded
    2015
    HQ Location
    IP Fabric, Inc. 115 BROADWAY, 5th Floor NEW YORK NY, 10006 United States
    Twitter
    @IPFabric
    932 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    119 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

IP Fabric is a vendor-neutral network assurance platform that automates the holistic discovery, verification, visualization, and documentation of large-scale enterprise networks, reducing the associat

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
IP Fabric features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
IP Fabric
Year Founded
2015
HQ Location
IP Fabric, Inc. 115 BROADWAY, 5th Floor NEW YORK NY, 10006 United States
Twitter
@IPFabric
932 Twitter followers
LinkedIn® Page
www.linkedin.com
119 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    NP-View performs a comprehensive analysis of firewall, router, and switch configurations to determine connectivity and identify any deviation from security policies, standards, and best-practices. The

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • NP-View features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    Chicago, US
    LinkedIn® Page
    www.linkedin.com
    16 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

NP-View performs a comprehensive analysis of firewall, router, and switch configurations to determine connectivity and identify any deviation from security policies, standards, and best-practices. The

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
NP-View features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2014
HQ Location
Chicago, US
LinkedIn® Page
www.linkedin.com
16 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A Key Part of Fortra (the new face of HelpSystems) Powertech is proud to be part of Fortra’s comprehensive cybersecurity portfolio. Fortra simplifies today’s complex cybersecurity landscape by bringin

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Powertech Policy Manager for IBM i features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortra
    Year Founded
    1982
    HQ Location
    Eden Prairie, Minnesota
    Twitter
    @fortraofficial
    2,461 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,643 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A Key Part of Fortra (the new face of HelpSystems) Powertech is proud to be part of Fortra’s comprehensive cybersecurity portfolio. Fortra simplifies today’s complex cybersecurity landscape by bringin

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Powertech Policy Manager for IBM i features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Fortra
Year Founded
1982
HQ Location
Eden Prairie, Minnesota
Twitter
@fortraofficial
2,461 Twitter followers
LinkedIn® Page
www.linkedin.com
1,643 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Providing comprehensive security, encryption and compliance management solution for IBM i environments.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Precisely Enforcive Enterprise Security Suite features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Precisely
    HQ Location
    Burlington, Massachusetts
    Twitter
    @PreciselyData
    3,981 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,990 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Providing comprehensive security, encryption and compliance management solution for IBM i environments.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Precisely Enforcive Enterprise Security Suite features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Precisely
HQ Location
Burlington, Massachusetts
Twitter
@PreciselyData
3,981 Twitter followers
LinkedIn® Page
www.linkedin.com
2,990 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Deploy and manage all your firewalls, connected switches and access points, from one easy-to-use dashboard.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SonicWall Network Security Manager features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SonicWall
    Year Founded
    1991
    HQ Location
    Milpitas, CA
    Twitter
    @SonicWall
    29,682 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,997 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Deploy and manage all your firewalls, connected switches and access points, from one easy-to-use dashboard.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
SonicWall Network Security Manager features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
SonicWall
Year Founded
1991
HQ Location
Milpitas, CA
Twitter
@SonicWall
29,682 Twitter followers
LinkedIn® Page
www.linkedin.com
1,997 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Stormshield Management Center is a software that helps to monitor and secure interconnections between several hundred sites.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Stormshield Management Center features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    N/A
    Twitter
    @Stormshield
    5,659 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    362 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Stormshield Management Center is a software that helps to monitor and secure interconnections between several hundred sites.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Stormshield Management Center features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
HQ Location
N/A
Twitter
@Stormshield
5,659 Twitter followers
LinkedIn® Page
www.linkedin.com
362 employees on LinkedIn®

Learn More About Network Security Policy Management (NSPM) Software

What is Network Security Policy Management (NSPM) Software?

Network security policy management (NSPM) software helps companies streamline the orchestration of security policies across hybrid networks. It helps companies stay up-to-date on their security policies and protects them from evolving cyber attack threats.

As the network of IT systems grows in an organization, so does the cybersecurity challenge. New firewall rules and cloud security policies get added frequently. The size and complexity make it difficult for people to understand and keep track of these policies. There is also a possibility of obsolete policies staying in the system as administrators are not sure what the repercussions of removing them might be.

NSPM provides an array of tools to enforce security policies in the network. NSPM software manages policy changes by creating an audit log of changes and updates. It also helps automate and manage firewall configurations and network configurations.

NSPM alerts administrators of any policy changes, helps them remove obsolete security policies, and maintains compliance standards. 

What are the Common Features of Network Security Policy Management (NSPM) Software?

The following are some core features in NSPM software that provides a management system for security policies across the network:

Policy optimization: NSPM software identifies redundant processes and policies and automates changes to reduce unnecessary policy enforcement.

Auditing: The software allows for deep examination into apps, routers, network-connected devices,cloud-based networks, their policies, and protocols. This helps organizations stay compliant and up to date on security policies.

Automated security configuration management: Network security policy management tools can help monitor configuration rule sets and policy enforcement measures and document changes to maintain compliance.

Automation of policy changes: It can be tedious to manually implement policy changes across the network. NSPM completely automates end-to-end policy enforcement workflows across hybrid- and multi-cloud environments.

Document policy changes: NSPM creates logs of any change in policies. This is extremely helpful in creating audit reports.

Dashboard: NSPM software provides a single dashboard from where firewall and security configuration management can be orchestrated. This provides insights at multiple levels of granularity.

Alerting: The tool can send automated alerts to stakeholders when a policy or setting is changed.

Compliance monitoring: NSPM monitors configuration rule sets and policy enforcement measures and documents changes to maintain compliance.

Risk analysis: It helps manage security risk by identifying potential network security risks, vulnerabilities, and compliance impacts. 

What are the Benefits of Network Security Policy Management (NSPM) Software?

Network security policy management provides the organization with a management platform for their security infrastructure policies across their networks and aids in dodging cyber threats. It also provides a host of other benefits listed below.

Assistance in policy creation: NSPM software makes policy management scalable as the business and network expand. Some NSPM software assist in policy creation and orchestration across the network.

Automation: Many NSPM tools provide an automated alerting mechanism that alerts the administrators and relevant teams whenever policy changes occur. NSPM automates implementation workflows. This eases the enforcement of policies across the network. 

Compliance: Each country and region has its own governance rules, which can be challenging to keep up with. Network security policy management software provides frameworks to meet data protection compliance standards.

Saves time: Keeping track of all policy changes and configurations is humanly impossible as the organization grows. Multi-vendor situations for cloud systems further complicate the network landscape. Manual management might lead to errors like missed updates and obsolete policies not being deleted. NSPM helps identify any issues for quick troubleshooting.

Visualization: NSPM software enables companies to manage security policies across their hybrid cloud environment through a single console.

Change management: Network security policy management software logs all policy updates and changes. This can help the administrators take the right security control actions. This makes it easy to create reports for data protection and security audits. 

Who Uses Network Security Policy Management (NSPM) Software?

Network administrators: Network administrators use NSPM to define, update, and centrally manage network security operations for their organizations.

IT teams: IT departments use NPSM to enforce security policies and firewall configurations across their multi-cloud environments.

What are the Alternatives to Network Security Policy Management (NSPM) Software?

Following are the alternatives to the network security policy management that can replace this type of software, either partially or completely:

Network monitoring software: Network monitoring software helps detect problems with the computer network by comparing the performance against set benchmarks. This helps in quicker remediation of issues. They also establish checkpoints and measure response time, availability, consistency, reliability, and the overall traffic of a network based on real-time and historical performance data.

Network management software: This is used to manage and control IT systems by providing information on the organization of the network, its performance, and its users. Network management tools are used to administrate, provision, and control IT. 

Software Related to Network Security Policy Management (NSPM) Software

Related solutions that can be used together with network security policy management include:

Network automation software: Network automation software automates the process of managing, configuring, testing, deploying, and operating endpoints and physical and virtual devices within a network. It increases productivity by preventing human errors and reducing operating expenses associated with manual network management. Network automation tools are used by IT teams for network resource provisioning, network configuration, network audits, and network device mapping, among others.

Microsegmentation software: Microsegmentation software helps segment workloads and helps individually control them through policy-driven, application-level security, reducing the attack surface. These tools isolate components of data centers and cloud workloads using network virtualization to deploy and protect them independently. 

Challenges with Network Security Policy Management (NSPM) Software

Software solutions can come with their own set of challenges. Here are some challenges that users of NSPM software may encounter:

Manual changes: Though many operations are automated, not all tasks fall under that umbrella. Manual involvement is still required in many places. This reduces the impact of the software.

Configuration complexity: Configurations required for this software can be complex and lengthy. This can be tedious and confusing for administrators and increase the setup and ROI time.

Integration: Many NSPM tools do not integrate with products of all brands in the network. This can limit the scope of robust network policy management of the entire network.

How to Buy Network Security Policy Management (NSPM) Software

Requirements Gathering (RFI/RFP) for Network Security Policy Management (NSPM) Software

One important thing to consider while buying an NSPM solution is the software’s ability to integrate with all apps, endpoint devices, equipment, and technologies in the network. The software should also be able to assist with automatic policy creation and implementation. 

It should also support compliance with data protection standards. The tool must provide easy log management as well as alerting and visualization capabilities to keep track of policy changes. It is an added advantage if the vendor offers a free trial so that the buyer can evaluate the product before making a long-term investment. Depending on the scope of the deployment, it might be helpful to produce an RFI, a one-page list with a few bullet points describing what is needed from the software.

Compare Network Security Policy Management (NSPM) Software Products

Create a long list

Buyers need to identify features that they need from their NSPM tools and start with a large pool of NSPM vendors. They must then evaluate the pros and cons of each product.

Create a short list

Short lists help cross-reference the results of initial vendor evaluations with other buyer reviews on third-party review sites such as g2.com, which will help the buyer narrow in on a list with three to five products. From there, buyers can compare pricing and features to determine the best fit.

Conduct demos

Companies should demo all of the products on their short list. During demos, buyers should ask specific questions about the functionalities they care about most; for example, one might ask for a demo of how the tool would behave when it detects a policy change.

Selection of Network Security Policy Management (NSPM) Software

Choose a selection team

Regardless of a company’s size, involving the most relevant personnel is crucial during the software selection process. The team should include relevant company stakeholders who can use the software, scrutinize it, and check whether it will meet the organization’s requirements. The individuals responsible for the day-to-day use of NSPM software must be a part of the selection team. IT administrators, cybersecurity teams, and decision makers could be the primary personas included in the group.

Negotiation

The cost of the software varies based on the features offered, the number of instances, and users. Buyers looking to trim costs should try to negotiate down to the specific functions that matter to them to get the best price. More often than not, the price and specifications mentioned on the vendor’s pricing page can be negotiated. Negotiation on implementation, support, and other professional services are also crucial. Buyers should ensure they’ll receive adequate support to get the product up and running.

Final decision

Before deciding to purchase the software, testing it for a short period is advisable. The day-to-day users of the software are the best individuals to perform this test. They can use and analyze the software product's capabilities and offer valuable feedback. In most cases, software service providers offer a short-term product trial. If the selection team is satisfied with what the software offers, buyers can proceed with the purchase or contracting process.

What Does Network Security Policy Management (NSPM) Software Cost?

The cost of NSPM software typically depends on the number of instances, users, and features required. Some even offer free trial periods to start with. Buyers can reduce costs by evaluating the company's most required features and investing in only them instead of splurging on the all-inclusive versions.