Introducing G2.ai, the future of software buying.Try now

Best Software-Defined Perimeter (SDP) Software

Lauren Worth
LW
Researched and written by Lauren Worth

Software-defined perimeter (SDP) products are a specific type of network security solution which focus on network segmentation and user authentication. SDP itself is an architecture designed to allow access on a need-to-know basis, meaning every device and user must be verified before accessing either the network as a whole or specific systems and applications within a network. Unlike traditional network access controllers that utilize a lock and key approach, SDP segments networks by application use and analyzes user access permissions at a granular level across the network. SDP administrators can also customize and automate highly specific network security policies while enforcing them continuously.

Companies adopt SDP solutions because traditional network protection ecosystems are insufficient. If a hacker or unauthorized user obtains access to a traditional network, it’s uncertain what they can access. SDP, on the other hand, analyzes each access request at the application level, compares it to the user’s privileges, then grants or denies access. This verification process occurs continuously, increasing visibility into user behaviors and privileges.

SDP solutions differ from virtual private networks (VPN) because VPNs simply provide a barrier to network entry: an easy target for hackers. SDP, on the other hand, provides continuous authentication functionality and visibility into traffic and network activity. There is some overlap between zero-trust security solutions and SDP products as some SDP solutions utilize the zero-trust approach to continuous verification, simply hiding services, applications, networks, and devices until requests are verified. Still, SDP solutions help build specific network architectures that can be used to leverage the technology and increase the efficacy of zero-trust security solutions.

To qualify for inclusion in the Software-Defined Perimeter (SDP) category, a product must:

Provide adaptive, granular network segmentation functionality
Provide on-demand access to services, networks, and applications upon verification
Continuously monitor activity and verify network access requests

Best Software-Defined Perimeter (SDP) Software At A Glance

Leader:
Highest Performer:
Easiest to Use:
Best Free Software:
Show LessShow More
Easiest to Use:
Best Free Software:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
49 Listings in Software-Defined Perimeter (SDP) Available
(154)4.7 out of 5
1st Easiest To Use in Software-Defined Perimeter (SDP) software
Save to My Lists
Entry Level Price:Starting at $7.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    GoodAccess is a cybersecurity platform (SASE/SSE) that empowers medium-sized enterprises to easily implement Zero Trust Architecture (ZTA) in their infrastructure, regardless of its complexity or scal

    Users
    • CTO
    • CEO
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 78% Small-Business
    • 22% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • GoodAccess Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    70
    VPN Services
    45
    Reliability
    41
    Customer Support
    37
    Easy Setup
    31
    Cons
    Expensive
    23
    Connection Issues
    15
    Access Issues
    8
    Limited Location Options
    8
    Connectivity Issues
    7
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • GoodAccess features and usability ratings that predict user satisfaction
    9.5
    Ease of Use
    Average: 9.2
    9.3
    Quality of Support
    Average: 8.9
    9.4
    Has the product been a good partner in doing business?
    Average: 8.7
    9.2
    Network Segmentation
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2009
    HQ Location
    Usti nad Labem, Czech Republic, Europe
    LinkedIn® Page
    www.linkedin.com
    27 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

GoodAccess is a cybersecurity platform (SASE/SSE) that empowers medium-sized enterprises to easily implement Zero Trust Architecture (ZTA) in their infrastructure, regardless of its complexity or scal

Users
  • CTO
  • CEO
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 78% Small-Business
  • 22% Mid-Market
GoodAccess Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
70
VPN Services
45
Reliability
41
Customer Support
37
Easy Setup
31
Cons
Expensive
23
Connection Issues
15
Access Issues
8
Limited Location Options
8
Connectivity Issues
7
GoodAccess features and usability ratings that predict user satisfaction
9.5
Ease of Use
Average: 9.2
9.3
Quality of Support
Average: 8.9
9.4
Has the product been a good partner in doing business?
Average: 8.7
9.2
Network Segmentation
Average: 9.2
Seller Details
Company Website
Year Founded
2009
HQ Location
Usti nad Labem, Czech Republic, Europe
LinkedIn® Page
www.linkedin.com
27 employees on LinkedIn®
(67)4.3 out of 5
12th Easiest To Use in Software-Defined Perimeter (SDP) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Palo Alto Networks Prisma® Access protects the hybrid workforce with the superior security of ZTNA while providing exceptional user experiences from a simple, unified security product. Purpose-built

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 45% Enterprise
    • 30% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Prisma Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    30
    Secure Access
    23
    Internet Security
    18
    Protection
    18
    Threat Protection
    17
    Cons
    Complex Setup
    17
    Complex Configuration
    16
    Complex Implementation
    14
    Expensive
    12
    Difficult Learning Curve
    10
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Prisma Access features and usability ratings that predict user satisfaction
    8.4
    Ease of Use
    Average: 9.2
    8.1
    Quality of Support
    Average: 8.9
    8.5
    Has the product been a good partner in doing business?
    Average: 8.7
    8.5
    Network Segmentation
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    126,982 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17,221 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Palo Alto Networks Prisma® Access protects the hybrid workforce with the superior security of ZTNA while providing exceptional user experiences from a simple, unified security product. Purpose-built

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 45% Enterprise
  • 30% Mid-Market
Prisma Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
30
Secure Access
23
Internet Security
18
Protection
18
Threat Protection
17
Cons
Complex Setup
17
Complex Configuration
16
Complex Implementation
14
Expensive
12
Difficult Learning Curve
10
Prisma Access features and usability ratings that predict user satisfaction
8.4
Ease of Use
Average: 9.2
8.1
Quality of Support
Average: 8.9
8.5
Has the product been a good partner in doing business?
Average: 8.7
8.5
Network Segmentation
Average: 9.2
Seller Details
Company Website
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
126,982 Twitter followers
LinkedIn® Page
www.linkedin.com
17,221 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(13)4.4 out of 5
6th Easiest To Use in Software-Defined Perimeter (SDP) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A leading provider of next-generation network access solutions for the mobile enterprise.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 46% Enterprise
    • 46% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Aruba ESP Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Easy Integrations
    1
    Network Connectivity
    1
    Reliability
    1
    Cons
    Connection Issues
    1
    Poor Customer Support
    1
    Software Bugs
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Aruba ESP features and usability ratings that predict user satisfaction
    8.8
    Ease of Use
    Average: 9.2
    9.1
    Quality of Support
    Average: 8.9
    9.2
    Has the product been a good partner in doing business?
    Average: 8.7
    6.7
    Network Segmentation
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Santa Clara, California
    LinkedIn® Page
    www.linkedin.com
    5,621 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A leading provider of next-generation network access solutions for the mobile enterprise.

Users
No information available
Industries
No information available
Market Segment
  • 46% Enterprise
  • 46% Mid-Market
Aruba ESP Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Easy Integrations
1
Network Connectivity
1
Reliability
1
Cons
Connection Issues
1
Poor Customer Support
1
Software Bugs
1
Aruba ESP features and usability ratings that predict user satisfaction
8.8
Ease of Use
Average: 9.2
9.1
Quality of Support
Average: 8.9
9.2
Has the product been a good partner in doing business?
Average: 8.7
6.7
Network Segmentation
Average: 9.2
Seller Details
HQ Location
Santa Clara, California
LinkedIn® Page
www.linkedin.com
5,621 employees on LinkedIn®
(105)4.6 out of 5
5th Easiest To Use in Software-Defined Perimeter (SDP) software
Save to My Lists
30% off
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CloudConnexa®, powered by OpenVPN, is the leader in delivering premium, enterprise-grade network security accessible to businesses of all sizes. Easy to set up and simple to deploy, CloudConnexa's clo

    Users
    • CTO
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 48% Small-Business
    • 48% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • OpenVPN CloudConnexa is a service that provides secure connections for remote teams.
    • Reviewers like the platform's intuitive interface, robust security features, and responsive customer support, which have been praised for their quick and efficient problem-solving.
    • Users experienced issues with the lack of certain connectivity features, the complexity of the support pages' terminology, the inability to forcefully push updates to clients, and the time-consuming process of creating multiple new network connections.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • OpenVPN CloudConnexa Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    48
    Setup Ease
    23
    Customer Support
    22
    Easy Setup
    21
    Reliability
    20
    Cons
    Connection Issues
    12
    Poor Documentation
    12
    Connectivity Issues
    11
    Expensive
    8
    Insufficient Documentation
    8
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OpenVPN CloudConnexa features and usability ratings that predict user satisfaction
    9.1
    Ease of Use
    Average: 9.2
    9.0
    Quality of Support
    Average: 8.9
    9.3
    Has the product been a good partner in doing business?
    Average: 8.7
    9.6
    Network Segmentation
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OpenVPN
    Company Website
    Year Founded
    2002
    HQ Location
    Pleasanton, CA
    Twitter
    @OpenVPN
    20,699 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    171 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CloudConnexa®, powered by OpenVPN, is the leader in delivering premium, enterprise-grade network security accessible to businesses of all sizes. Easy to set up and simple to deploy, CloudConnexa's clo

Users
  • CTO
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 48% Small-Business
  • 48% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • OpenVPN CloudConnexa is a service that provides secure connections for remote teams.
  • Reviewers like the platform's intuitive interface, robust security features, and responsive customer support, which have been praised for their quick and efficient problem-solving.
  • Users experienced issues with the lack of certain connectivity features, the complexity of the support pages' terminology, the inability to forcefully push updates to clients, and the time-consuming process of creating multiple new network connections.
OpenVPN CloudConnexa Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
48
Setup Ease
23
Customer Support
22
Easy Setup
21
Reliability
20
Cons
Connection Issues
12
Poor Documentation
12
Connectivity Issues
11
Expensive
8
Insufficient Documentation
8
OpenVPN CloudConnexa features and usability ratings that predict user satisfaction
9.1
Ease of Use
Average: 9.2
9.0
Quality of Support
Average: 8.9
9.3
Has the product been a good partner in doing business?
Average: 8.7
9.6
Network Segmentation
Average: 9.2
Seller Details
Seller
OpenVPN
Company Website
Year Founded
2002
HQ Location
Pleasanton, CA
Twitter
@OpenVPN
20,699 Twitter followers
LinkedIn® Page
www.linkedin.com
171 employees on LinkedIn®
(30)4.8 out of 5
3rd Easiest To Use in Software-Defined Perimeter (SDP) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Appgate SDP is a leading Zero Trust Network Access solution that simplifies and strengthens access controls for all users, devices, and workloads. We deliver secure access for complex and hybrid enter

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 57% Enterprise
    • 27% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Appgate SDP Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    9
    Security
    9
    Reliability
    6
    Customer Support
    5
    Performance Efficiency
    5
    Cons
    Performance Issues
    5
    Connection Issues
    3
    Connectivity Issues
    3
    Complex Setup
    2
    Access Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Appgate SDP features and usability ratings that predict user satisfaction
    9.5
    Ease of Use
    Average: 9.2
    9.2
    Quality of Support
    Average: 8.9
    9.9
    Has the product been a good partner in doing business?
    Average: 8.7
    9.5
    Network Segmentation
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Appgate
    Year Founded
    2020
    HQ Location
    Coral Gables, US
    Twitter
    @AppgateSecurity
    916 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    394 employees on LinkedIn®
    Ownership
    OTC: APGT
Product Description
How are these determined?Information
This description is provided by the seller.

Appgate SDP is a leading Zero Trust Network Access solution that simplifies and strengthens access controls for all users, devices, and workloads. We deliver secure access for complex and hybrid enter

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 57% Enterprise
  • 27% Mid-Market
Appgate SDP Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
9
Security
9
Reliability
6
Customer Support
5
Performance Efficiency
5
Cons
Performance Issues
5
Connection Issues
3
Connectivity Issues
3
Complex Setup
2
Access Issues
1
Appgate SDP features and usability ratings that predict user satisfaction
9.5
Ease of Use
Average: 9.2
9.2
Quality of Support
Average: 8.9
9.9
Has the product been a good partner in doing business?
Average: 8.7
9.5
Network Segmentation
Average: 9.2
Seller Details
Seller
Appgate
Year Founded
2020
HQ Location
Coral Gables, US
Twitter
@AppgateSecurity
916 Twitter followers
LinkedIn® Page
www.linkedin.com
394 employees on LinkedIn®
Ownership
OTC: APGT
(56)4.4 out of 5
View top Consulting Services for Citrix Workspace
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Citrix Workspace Essentials provides a comprehensive, zero-trust approach to deliver secure and contextual access to corporate internal web apps, SaaS, and virtual applications. With Citrix Workspace

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 68% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Citrix Workspace Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    6
    Security
    4
    Access
    3
    Easy Access
    3
    Efficiency
    3
    Cons
    Slow Loading
    4
    Slow Performance
    4
    Delay Issues
    3
    Slow Internet
    3
    Complex Configuration
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Citrix Workspace features and usability ratings that predict user satisfaction
    8.6
    Ease of Use
    Average: 9.2
    8.7
    Quality of Support
    Average: 8.9
    9.0
    Has the product been a good partner in doing business?
    Average: 8.7
    9.7
    Network Segmentation
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Citrix
    Year Founded
    1989
    HQ Location
    Fort Lauderdale, FL
    Twitter
    @citrix
    203,540 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,634 employees on LinkedIn®
    Ownership
    NASDAQ:CTXS
Product Description
How are these determined?Information
This description is provided by the seller.

Citrix Workspace Essentials provides a comprehensive, zero-trust approach to deliver secure and contextual access to corporate internal web apps, SaaS, and virtual applications. With Citrix Workspace

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 68% Enterprise
  • 25% Mid-Market
Citrix Workspace Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
6
Security
4
Access
3
Easy Access
3
Efficiency
3
Cons
Slow Loading
4
Slow Performance
4
Delay Issues
3
Slow Internet
3
Complex Configuration
2
Citrix Workspace features and usability ratings that predict user satisfaction
8.6
Ease of Use
Average: 9.2
8.7
Quality of Support
Average: 8.9
9.0
Has the product been a good partner in doing business?
Average: 8.7
9.7
Network Segmentation
Average: 9.2
Seller Details
Seller
Citrix
Year Founded
1989
HQ Location
Fort Lauderdale, FL
Twitter
@citrix
203,540 Twitter followers
LinkedIn® Page
www.linkedin.com
4,634 employees on LinkedIn®
Ownership
NASDAQ:CTXS
(122)4.4 out of 5
8th Easiest To Use in Software-Defined Perimeter (SDP) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Zscaler Internet Access™ (ZIA) is the world’s leading secure web gateway (SWG), delivering cloud native, AI-powered cyberthreat protection and zero trust access to the internet and SaaS apps. Enter

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 54% Enterprise
    • 22% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Zscaler Internet Access is a cloud-delivered service that handles all internet traffic and provides security by preventing access to unwanted sites.
    • Users like the ease of use, the seamless integration with other security tools, the intuitive user interface, the real-time traffic monitoring and filtering, and the responsive customer support.
    • Users experienced occasional latency during high traffic times, sudden internet disconnections, difficulty in initial setup, and issues with the pricing being less affordable for smaller businesses.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Zscaler Internet Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    15
    Ease of Use
    12
    Internet Security
    11
    Protection
    8
    Access Control
    6
    Cons
    Connection Issues
    10
    Internet Connectivity
    10
    Connectivity Issues
    8
    Slow Performance
    5
    Complex Setup
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Zscaler Internet Access features and usability ratings that predict user satisfaction
    8.9
    Ease of Use
    Average: 9.2
    8.7
    Quality of Support
    Average: 8.9
    8.8
    Has the product been a good partner in doing business?
    Average: 8.7
    7.8
    Network Segmentation
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Zscaler
    Company Website
    Year Founded
    2008
    HQ Location
    San Jose, California
    Twitter
    @zscaler
    16,610 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,674 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Zscaler Internet Access™ (ZIA) is the world’s leading secure web gateway (SWG), delivering cloud native, AI-powered cyberthreat protection and zero trust access to the internet and SaaS apps. Enter

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 54% Enterprise
  • 22% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Zscaler Internet Access is a cloud-delivered service that handles all internet traffic and provides security by preventing access to unwanted sites.
  • Users like the ease of use, the seamless integration with other security tools, the intuitive user interface, the real-time traffic monitoring and filtering, and the responsive customer support.
  • Users experienced occasional latency during high traffic times, sudden internet disconnections, difficulty in initial setup, and issues with the pricing being less affordable for smaller businesses.
Zscaler Internet Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
15
Ease of Use
12
Internet Security
11
Protection
8
Access Control
6
Cons
Connection Issues
10
Internet Connectivity
10
Connectivity Issues
8
Slow Performance
5
Complex Setup
4
Zscaler Internet Access features and usability ratings that predict user satisfaction
8.9
Ease of Use
Average: 9.2
8.7
Quality of Support
Average: 8.9
8.8
Has the product been a good partner in doing business?
Average: 8.7
7.8
Network Segmentation
Average: 9.2
Seller Details
Seller
Zscaler
Company Website
Year Founded
2008
HQ Location
San Jose, California
Twitter
@zscaler
16,610 Twitter followers
LinkedIn® Page
www.linkedin.com
8,674 employees on LinkedIn®
(70)4.7 out of 5
Optimized for quick response
7th Easiest To Use in Software-Defined Perimeter (SDP) software
Save to My Lists
Entry Level Price:Starting at $5.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Twingate is a secure remote access solution for an organization’s private applications, data, and environments, whether they are on-premise or in the cloud. Built to make the lives of DevOps teams, IT

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 51% Mid-Market
    • 43% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Twingate Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    9
    Security
    9
    Easy Setup
    7
    Secure Access
    7
    Setup Ease
    7
    Cons
    Performance Issues
    11
    Limited Customization
    5
    Complex Implementation
    4
    Complex Configuration
    3
    Lacking Features
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Twingate features and usability ratings that predict user satisfaction
    9.8
    Ease of Use
    Average: 9.2
    9.2
    Quality of Support
    Average: 8.9
    9.3
    Has the product been a good partner in doing business?
    Average: 8.7
    9.4
    Network Segmentation
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    HQ Location
    Redwood City, California
    Twitter
    @TwingateHQ
    2,285 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    75 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Twingate is a secure remote access solution for an organization’s private applications, data, and environments, whether they are on-premise or in the cloud. Built to make the lives of DevOps teams, IT

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 51% Mid-Market
  • 43% Small-Business
Twingate Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
9
Security
9
Easy Setup
7
Secure Access
7
Setup Ease
7
Cons
Performance Issues
11
Limited Customization
5
Complex Implementation
4
Complex Configuration
3
Lacking Features
3
Twingate features and usability ratings that predict user satisfaction
9.8
Ease of Use
Average: 9.2
9.2
Quality of Support
Average: 8.9
9.3
Has the product been a good partner in doing business?
Average: 8.7
9.4
Network Segmentation
Average: 9.2
Seller Details
Company Website
HQ Location
Redwood City, California
Twitter
@TwingateHQ
2,285 Twitter followers
LinkedIn® Page
www.linkedin.com
75 employees on LinkedIn®
(54)4.6 out of 5
9th Easiest To Use in Software-Defined Perimeter (SDP) software
View top Consulting Services for FortiGate SD-WAN
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    FortiGate SD-WAN replaces separate WAN routers, WAN optimization, and security devices with a single solution that is application-aware, offers automatic WAN path control and multi-broadband support.

    Users
    • Network Engineer
    Industries
    • Information Technology and Services
    • Insurance
    Market Segment
    • 56% Mid-Market
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • FortiGate SD-WAN Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Configuration Ease
    2
    Ease of Use
    2
    Reliability
    2
    Automation
    1
    Cloud Technology
    1
    Cons
    Complex Implementation
    1
    Expensive
    1
    Slow Performance
    1
    Update Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FortiGate SD-WAN features and usability ratings that predict user satisfaction
    9.1
    Ease of Use
    Average: 9.2
    9.0
    Quality of Support
    Average: 8.9
    8.9
    Has the product been a good partner in doing business?
    Average: 8.7
    9.0
    Network Segmentation
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortinet
    Year Founded
    2000
    HQ Location
    Sunnyvale, CA
    Twitter
    @Fortinet
    151,611 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    14,832 employees on LinkedIn®
    Ownership
    NASDAQ: FTNT
Product Description
How are these determined?Information
This description is provided by the seller.

FortiGate SD-WAN replaces separate WAN routers, WAN optimization, and security devices with a single solution that is application-aware, offers automatic WAN path control and multi-broadband support.

Users
  • Network Engineer
Industries
  • Information Technology and Services
  • Insurance
Market Segment
  • 56% Mid-Market
  • 33% Enterprise
FortiGate SD-WAN Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Configuration Ease
2
Ease of Use
2
Reliability
2
Automation
1
Cloud Technology
1
Cons
Complex Implementation
1
Expensive
1
Slow Performance
1
Update Issues
1
FortiGate SD-WAN features and usability ratings that predict user satisfaction
9.1
Ease of Use
Average: 9.2
9.0
Quality of Support
Average: 8.9
8.9
Has the product been a good partner in doing business?
Average: 8.7
9.0
Network Segmentation
Average: 9.2
Seller Details
Seller
Fortinet
Year Founded
2000
HQ Location
Sunnyvale, CA
Twitter
@Fortinet
151,611 Twitter followers
LinkedIn® Page
www.linkedin.com
14,832 employees on LinkedIn®
Ownership
NASDAQ: FTNT
(51)4.3 out of 5
View top Consulting Services for Cisco DNA Center
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cisco DNA Center is the network management system, foundational controller, and analytics platform at the heart of Cisco’s intent-based network. Cisco DNA Center addresses the demands of digitization,

    Users
    No information available
    Industries
    • Hospital & Health Care
    • Computer & Network Security
    Market Segment
    • 37% Enterprise
    • 18% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cisco DNA Center Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    7
    Automation
    5
    Reliability
    4
    Centralized Management
    3
    Cybersecurity
    3
    Cons
    Complexity
    4
    Expensive
    4
    Compatibility Issues
    2
    Complex Implementation
    2
    Learning Curve
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco DNA Center features and usability ratings that predict user satisfaction
    8.5
    Ease of Use
    Average: 9.2
    8.9
    Quality of Support
    Average: 8.9
    8.8
    Has the product been a good partner in doing business?
    Average: 8.7
    9.4
    Network Segmentation
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    728,816 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,057 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Cisco DNA Center is the network management system, foundational controller, and analytics platform at the heart of Cisco’s intent-based network. Cisco DNA Center addresses the demands of digitization,

Users
No information available
Industries
  • Hospital & Health Care
  • Computer & Network Security
Market Segment
  • 37% Enterprise
  • 18% Mid-Market
Cisco DNA Center Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
7
Automation
5
Reliability
4
Centralized Management
3
Cybersecurity
3
Cons
Complexity
4
Expensive
4
Compatibility Issues
2
Complex Implementation
2
Learning Curve
2
Cisco DNA Center features and usability ratings that predict user satisfaction
8.5
Ease of Use
Average: 9.2
8.9
Quality of Support
Average: 8.9
8.8
Has the product been a good partner in doing business?
Average: 8.7
9.4
Network Segmentation
Average: 9.2
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
728,816 Twitter followers
LinkedIn® Page
www.linkedin.com
95,057 employees on LinkedIn®
Ownership
NASDAQ:CSCO
(87)4.3 out of 5
2nd Easiest To Use in Software-Defined Perimeter (SDP) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ivanti Connect Secure provides a seamless, cost-effective SSL VPN solution for remote and mobile users from any web-enabled device to corporate resources— anytime, anywhere.

    Users
    No information available
    Industries
    • Information Technology and Services
    • Banking
    Market Segment
    • 70% Enterprise
    • 23% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Ivanti Connect Secure Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Network Security
    1
    Remote Work
    1
    Security
    1
    VPN Efficiency
    1
    Cons
    Connection Issues
    1
    System Restart
    1
    System Restart Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Ivanti Connect Secure features and usability ratings that predict user satisfaction
    9.3
    Ease of Use
    Average: 9.2
    8.7
    Quality of Support
    Average: 8.9
    9.0
    Has the product been a good partner in doing business?
    Average: 8.7
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Ivanti
    Year Founded
    1985
    HQ Location
    South Jordan, UT
    Twitter
    @GoIvanti
    6,766 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,921 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Ivanti Connect Secure provides a seamless, cost-effective SSL VPN solution for remote and mobile users from any web-enabled device to corporate resources— anytime, anywhere.

Users
No information available
Industries
  • Information Technology and Services
  • Banking
Market Segment
  • 70% Enterprise
  • 23% Mid-Market
Ivanti Connect Secure Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Network Security
1
Remote Work
1
Security
1
VPN Efficiency
1
Cons
Connection Issues
1
System Restart
1
System Restart Issues
1
Ivanti Connect Secure features and usability ratings that predict user satisfaction
9.3
Ease of Use
Average: 9.2
8.7
Quality of Support
Average: 8.9
9.0
Has the product been a good partner in doing business?
Average: 8.7
0.0
No information available
Seller Details
Seller
Ivanti
Year Founded
1985
HQ Location
South Jordan, UT
Twitter
@GoIvanti
6,766 Twitter followers
LinkedIn® Page
www.linkedin.com
2,921 employees on LinkedIn®
(126)4.7 out of 5
11th Easiest To Use in Software-Defined Perimeter (SDP) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The internet is the new corporate network, leading organizations to transition to their network security to Secure Access Service Edge (SASE). However, current solutions break the user experience with

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 50% Mid-Market
    • 35% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point Harmony SASE Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    10
    Secure Access
    9
    Security
    9
    Reliability
    7
    Features
    5
    Cons
    Complex Configuration
    6
    Complex Implementation
    6
    Complex Setup
    5
    Connection Issues
    5
    Integration Issues
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point Harmony SASE features and usability ratings that predict user satisfaction
    9.4
    Ease of Use
    Average: 9.2
    9.2
    Quality of Support
    Average: 8.9
    9.0
    Has the product been a good partner in doing business?
    Average: 8.7
    8.8
    Network Segmentation
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,087 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,977 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

The internet is the new corporate network, leading organizations to transition to their network security to Secure Access Service Edge (SASE). However, current solutions break the user experience with

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 50% Mid-Market
  • 35% Small-Business
Check Point Harmony SASE Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
10
Secure Access
9
Security
9
Reliability
7
Features
5
Cons
Complex Configuration
6
Complex Implementation
6
Complex Setup
5
Connection Issues
5
Integration Issues
5
Check Point Harmony SASE features and usability ratings that predict user satisfaction
9.4
Ease of Use
Average: 9.2
9.2
Quality of Support
Average: 8.9
9.0
Has the product been a good partner in doing business?
Average: 8.7
8.8
Network Segmentation
Average: 9.2
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,087 Twitter followers
LinkedIn® Page
www.linkedin.com
7,977 employees on LinkedIn®
Ownership
NASDAQ:CHKP
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Symantec Secure Access Cloud is a SaaS solution that enables more secure and granular access management to any corporate resource hosted on-premises or in the cloud. It uses Zero Trust Access principl

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 71% Mid-Market
    • 24% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Symantec Secure Access Cloud features and usability ratings that predict user satisfaction
    9.4
    Ease of Use
    Average: 9.2
    9.5
    Quality of Support
    Average: 8.9
    8.3
    Has the product been a good partner in doing business?
    Average: 8.7
    9.8
    Network Segmentation
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    60,101 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    59,194 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

Symantec Secure Access Cloud is a SaaS solution that enables more secure and granular access management to any corporate resource hosted on-premises or in the cloud. It uses Zero Trust Access principl

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 71% Mid-Market
  • 24% Enterprise
Symantec Secure Access Cloud features and usability ratings that predict user satisfaction
9.4
Ease of Use
Average: 9.2
9.5
Quality of Support
Average: 8.9
8.3
Has the product been a good partner in doing business?
Average: 8.7
9.8
Network Segmentation
Average: 9.2
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
60,101 Twitter followers
LinkedIn® Page
www.linkedin.com
59,194 employees on LinkedIn®
Ownership
NASDAQ: CA
(222)4.7 out of 5
Optimized for quick response
10th Easiest To Use in Software-Defined Perimeter (SDP) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Absolute Secure Access (formerly NetMotion by Absolute) is one of the company’s core product lines, which was added through the acquisition of NetMotion in July 2021. The product portfolio provides re

    Users
    • IT Director
    • System Administrator
    Industries
    • Law Enforcement
    • Government Administration
    Market Segment
    • 63% Mid-Market
    • 26% Enterprise
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • The product is a software that offers features such as customizations, MFA support, device profiling/grouping, failover capabilities, and optimizes network traffic to improve performance, especially for bandwidth-intensive applications.
    • Users frequently mention the ease of use, the software's user-friendly nature, the ability to deploy specific profiles, the caching functionality when clients are in dead zones, and the bi-directional aspect of the technology that eliminates many problems associated with managing workstations.
    • Users mentioned issues such as disconnects in situations where there is a constant connection to devices that go in-and-out of cellular service areas, complexity in the licensing model, extra steps required for MFA, issues with mobile device management, and difficulties with sales and renewals.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Absolute Secure Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    25
    Secure Access
    15
    Customer Support
    13
    Reliability
    13
    User Interface
    13
    Cons
    Access Issues
    7
    Connection Issues
    6
    Expensive
    5
    Complex Implementation
    4
    Integration Issues
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Absolute Secure Access features and usability ratings that predict user satisfaction
    9.1
    Ease of Use
    Average: 9.2
    9.3
    Quality of Support
    Average: 8.9
    9.2
    Has the product been a good partner in doing business?
    Average: 8.7
    9.1
    Network Segmentation
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1993
    HQ Location
    British Columbia, Canada
    Twitter
    @absolutecorp
    3,949 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,167 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Absolute Secure Access (formerly NetMotion by Absolute) is one of the company’s core product lines, which was added through the acquisition of NetMotion in July 2021. The product portfolio provides re

Users
  • IT Director
  • System Administrator
Industries
  • Law Enforcement
  • Government Administration
Market Segment
  • 63% Mid-Market
  • 26% Enterprise
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • The product is a software that offers features such as customizations, MFA support, device profiling/grouping, failover capabilities, and optimizes network traffic to improve performance, especially for bandwidth-intensive applications.
  • Users frequently mention the ease of use, the software's user-friendly nature, the ability to deploy specific profiles, the caching functionality when clients are in dead zones, and the bi-directional aspect of the technology that eliminates many problems associated with managing workstations.
  • Users mentioned issues such as disconnects in situations where there is a constant connection to devices that go in-and-out of cellular service areas, complexity in the licensing model, extra steps required for MFA, issues with mobile device management, and difficulties with sales and renewals.
Absolute Secure Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
25
Secure Access
15
Customer Support
13
Reliability
13
User Interface
13
Cons
Access Issues
7
Connection Issues
6
Expensive
5
Complex Implementation
4
Integration Issues
4
Absolute Secure Access features and usability ratings that predict user satisfaction
9.1
Ease of Use
Average: 9.2
9.3
Quality of Support
Average: 8.9
9.2
Has the product been a good partner in doing business?
Average: 8.7
9.1
Network Segmentation
Average: 9.2
Seller Details
Company Website
Year Founded
1993
HQ Location
British Columbia, Canada
Twitter
@absolutecorp
3,949 Twitter followers
LinkedIn® Page
www.linkedin.com
1,167 employees on LinkedIn®
(45)4.8 out of 5
4th Easiest To Use in Software-Defined Perimeter (SDP) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    InstaSafe is redefining the challenge of secure access to modern networks by leveraging Zero Trust principles with its security solutions, that ensure seamless access to cloud applications, SAP applic

    Users
    No information available
    Industries
    • Information Technology and Services
    • Banking
    Market Segment
    • 53% Mid-Market
    • 31% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Instasafe ZTAA Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Cloud Services
    2
    Customer Support
    2
    Easy Integrations
    2
    Security
    2
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Instasafe ZTAA features and usability ratings that predict user satisfaction
    9.2
    Ease of Use
    Average: 9.2
    9.3
    Quality of Support
    Average: 8.9
    9.5
    Has the product been a good partner in doing business?
    Average: 8.7
    9.3
    Network Segmentation
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2012
    HQ Location
    San Francisco, Walnut, CA
    Twitter
    @InstaSafe
    727 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    73 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

InstaSafe is redefining the challenge of secure access to modern networks by leveraging Zero Trust principles with its security solutions, that ensure seamless access to cloud applications, SAP applic

Users
No information available
Industries
  • Information Technology and Services
  • Banking
Market Segment
  • 53% Mid-Market
  • 31% Enterprise
Instasafe ZTAA Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Cloud Services
2
Customer Support
2
Easy Integrations
2
Security
2
Cons
This product has not yet received any negative sentiments.
Instasafe ZTAA features and usability ratings that predict user satisfaction
9.2
Ease of Use
Average: 9.2
9.3
Quality of Support
Average: 8.9
9.5
Has the product been a good partner in doing business?
Average: 8.7
9.3
Network Segmentation
Average: 9.2
Seller Details
Year Founded
2012
HQ Location
San Francisco, Walnut, CA
Twitter
@InstaSafe
727 Twitter followers
LinkedIn® Page
www.linkedin.com
73 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Citrix Secure Workspace Access provides a comprehensive, zero-trust approach to deliver secure and contextual access to the corporate internal web apps, SaaS, and virtual applications. It enables the

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 48% Enterprise
    • 24% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Citrix Secure Workspace Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Cloud Management
    1
    Customer Support
    1
    Daily Use
    1
    Easy Integrations
    1
    Cons
    Connection Issues
    2
    Delay Issues
    2
    Connectivity Issues
    1
    Error Handling
    1
    Performance Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Citrix Secure Workspace Access features and usability ratings that predict user satisfaction
    9.0
    Ease of Use
    Average: 9.2
    8.6
    Quality of Support
    Average: 8.9
    8.9
    Has the product been a good partner in doing business?
    Average: 8.7
    10.0
    Network Segmentation
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Citrix
    Year Founded
    1989
    HQ Location
    Fort Lauderdale, FL
    Twitter
    @citrix
    203,540 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,634 employees on LinkedIn®
    Ownership
    NASDAQ:CTXS
Product Description
How are these determined?Information
This description is provided by the seller.

Citrix Secure Workspace Access provides a comprehensive, zero-trust approach to deliver secure and contextual access to the corporate internal web apps, SaaS, and virtual applications. It enables the

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 48% Enterprise
  • 24% Mid-Market
Citrix Secure Workspace Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Cloud Management
1
Customer Support
1
Daily Use
1
Easy Integrations
1
Cons
Connection Issues
2
Delay Issues
2
Connectivity Issues
1
Error Handling
1
Performance Issues
1
Citrix Secure Workspace Access features and usability ratings that predict user satisfaction
9.0
Ease of Use
Average: 9.2
8.6
Quality of Support
Average: 8.9
8.9
Has the product been a good partner in doing business?
Average: 8.7
10.0
Network Segmentation
Average: 9.2
Seller Details
Seller
Citrix
Year Founded
1989
HQ Location
Fort Lauderdale, FL
Twitter
@citrix
203,540 Twitter followers
LinkedIn® Page
www.linkedin.com
4,634 employees on LinkedIn®
Ownership
NASDAQ:CTXS
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    UTunnel offers scalable Cloud VPN and Zero-Trust Network Access (ZTNA) solutions that enable secure connectivity and seamless remote access to your business network resources. With automated deploymen

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 71% Small-Business
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • UTunnel VPN and ZTNA Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    14
    Setup Ease
    13
    Easy Setup
    12
    VPN Services
    11
    Secure Access
    10
    Cons
    Poor Interface Design
    3
    UX Improvement
    3
    Complex Setup
    2
    Expensive
    2
    Poor Customer Support
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • UTunnel VPN and ZTNA features and usability ratings that predict user satisfaction
    9.6
    Ease of Use
    Average: 9.2
    9.4
    Quality of Support
    Average: 8.9
    9.8
    Has the product been a good partner in doing business?
    Average: 8.7
    10.0
    Network Segmentation
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2019
    HQ Location
    West Chester, Pennsylvania
    LinkedIn® Page
    www.linkedin.com
    6 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

UTunnel offers scalable Cloud VPN and Zero-Trust Network Access (ZTNA) solutions that enable secure connectivity and seamless remote access to your business network resources. With automated deploymen

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 71% Small-Business
  • 25% Mid-Market
UTunnel VPN and ZTNA Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
14
Setup Ease
13
Easy Setup
12
VPN Services
11
Secure Access
10
Cons
Poor Interface Design
3
UX Improvement
3
Complex Setup
2
Expensive
2
Poor Customer Support
2
UTunnel VPN and ZTNA features and usability ratings that predict user satisfaction
9.6
Ease of Use
Average: 9.2
9.4
Quality of Support
Average: 8.9
9.8
Has the product been a good partner in doing business?
Average: 8.7
10.0
Network Segmentation
Average: 9.2
Seller Details
Year Founded
2019
HQ Location
West Chester, Pennsylvania
LinkedIn® Page
www.linkedin.com
6 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    To address today’s EVER-CHANGING threat landscape, Check Point has introduced a MODULAR and dynamic security architecture that envisions a THREE-LAYER infrastructure that provides operational RESILIEN

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 63% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point SDP Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Access
    1
    Protection
    1
    Scalability
    1
    Zero Trust Security
    1
    Cons
    Complex Implementation
    1
    Complex Setup
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point SDP features and usability ratings that predict user satisfaction
    7.9
    Ease of Use
    Average: 9.2
    8.8
    Quality of Support
    Average: 8.9
    8.3
    Has the product been a good partner in doing business?
    Average: 8.7
    9.4
    Network Segmentation
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,087 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,977 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

To address today’s EVER-CHANGING threat landscape, Check Point has introduced a MODULAR and dynamic security architecture that envisions a THREE-LAYER infrastructure that provides operational RESILIEN

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 63% Enterprise
  • 25% Mid-Market
Check Point SDP Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Access
1
Protection
1
Scalability
1
Zero Trust Security
1
Cons
Complex Implementation
1
Complex Setup
1
Check Point SDP features and usability ratings that predict user satisfaction
7.9
Ease of Use
Average: 9.2
8.8
Quality of Support
Average: 8.9
8.3
Has the product been a good partner in doing business?
Average: 8.7
9.4
Network Segmentation
Average: 9.2
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,087 Twitter followers
LinkedIn® Page
www.linkedin.com
7,977 employees on LinkedIn®
Ownership
NASDAQ:CHKP
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Zero-Trust Access (ZTA), an approach that considers all entities untrusted by default, is rapidly becoming the industry standard and being mandated by regulatory bodies including governments. Leveragi

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 43% Mid-Market
    • 36% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • MetaAccess Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Dashboard Usability
    1
    Deployment Ease
    1
    Easy Deployment
    1
    Performance Efficiency
    1
    User Interface
    1
    Cons
    Performance Issues
    1
    Poor Customer Support
    1
    Software Bugs
    1
    Software Glitches
    1
    Unreliable Connectivity
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • MetaAccess features and usability ratings that predict user satisfaction
    7.7
    Ease of Use
    Average: 9.2
    5.7
    Quality of Support
    Average: 8.9
    5.8
    Has the product been a good partner in doing business?
    Average: 8.7
    7.5
    Network Segmentation
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OPSWAT
    Year Founded
    2002
    HQ Location
    Tampa, Florida
    Twitter
    @OPSWAT
    7,232 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    982 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Zero-Trust Access (ZTA), an approach that considers all entities untrusted by default, is rapidly becoming the industry standard and being mandated by regulatory bodies including governments. Leveragi

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 43% Mid-Market
  • 36% Enterprise
MetaAccess Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Dashboard Usability
1
Deployment Ease
1
Easy Deployment
1
Performance Efficiency
1
User Interface
1
Cons
Performance Issues
1
Poor Customer Support
1
Software Bugs
1
Software Glitches
1
Unreliable Connectivity
1
MetaAccess features and usability ratings that predict user satisfaction
7.7
Ease of Use
Average: 9.2
5.7
Quality of Support
Average: 8.9
5.8
Has the product been a good partner in doing business?
Average: 8.7
7.5
Network Segmentation
Average: 9.2
Seller Details
Seller
OPSWAT
Year Founded
2002
HQ Location
Tampa, Florida
Twitter
@OPSWAT
7,232 Twitter followers
LinkedIn® Page
www.linkedin.com
982 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Barracuda CloudGen Access makes it easy to simplify compliance and secure third-party access to your systems, providing Zero Trust Access to all your apps and data from any device and location. Barrac

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 45% Mid-Market
    • 35% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Barracuda CloudGen Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cloud Technology
    3
    Data Security
    3
    Ease of Use
    3
    Protection
    3
    Affordable Pricing
    2
    Cons
    Slow Performance
    3
    Expensive
    2
    Complex Configuration
    1
    Complex Implementation
    1
    Difficult Learning
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Barracuda CloudGen Access features and usability ratings that predict user satisfaction
    8.8
    Ease of Use
    Average: 9.2
    8.6
    Quality of Support
    Average: 8.9
    8.9
    Has the product been a good partner in doing business?
    Average: 8.7
    7.5
    Network Segmentation
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Barracuda
    Year Founded
    2002
    HQ Location
    Campbell, CA
    Twitter
    @Barracuda
    15,550 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,135 employees on LinkedIn®
    Ownership
    Private
Product Description
How are these determined?Information
This description is provided by the seller.

Barracuda CloudGen Access makes it easy to simplify compliance and secure third-party access to your systems, providing Zero Trust Access to all your apps and data from any device and location. Barrac

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 45% Mid-Market
  • 35% Small-Business
Barracuda CloudGen Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cloud Technology
3
Data Security
3
Ease of Use
3
Protection
3
Affordable Pricing
2
Cons
Slow Performance
3
Expensive
2
Complex Configuration
1
Complex Implementation
1
Difficult Learning
1
Barracuda CloudGen Access features and usability ratings that predict user satisfaction
8.8
Ease of Use
Average: 9.2
8.6
Quality of Support
Average: 8.9
8.9
Has the product been a good partner in doing business?
Average: 8.7
7.5
Network Segmentation
Average: 9.2
Seller Details
Seller
Barracuda
Year Founded
2002
HQ Location
Campbell, CA
Twitter
@Barracuda
15,550 Twitter followers
LinkedIn® Page
www.linkedin.com
2,135 employees on LinkedIn®
Ownership
Private
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IT wants to minimize the costs of managing network infrastructure, but needs control of secure, high performance networking. That's why NetFoundry reinvented NaaS to remove the telco, hardware and cir

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 63% Enterprise
    • 25% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • NetFoundry Network as a Service (NaaS) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    App Integration
    1
    Centralized Management
    1
    Connectivity Stability
    1
    Customer Support
    1
    Cons
    Limited Customization
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • NetFoundry Network as a Service (NaaS) features and usability ratings that predict user satisfaction
    8.1
    Ease of Use
    Average: 9.2
    8.1
    Quality of Support
    Average: 8.9
    5.0
    Has the product been a good partner in doing business?
    Average: 8.7
    7.5
    Network Segmentation
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    Charlotte, NC
    Twitter
    @netfoundry
    1,461 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    76 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

IT wants to minimize the costs of managing network infrastructure, but needs control of secure, high performance networking. That's why NetFoundry reinvented NaaS to remove the telco, hardware and cir

Users
No information available
Industries
No information available
Market Segment
  • 63% Enterprise
  • 25% Small-Business
NetFoundry Network as a Service (NaaS) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
App Integration
1
Centralized Management
1
Connectivity Stability
1
Customer Support
1
Cons
Limited Customization
1
NetFoundry Network as a Service (NaaS) features and usability ratings that predict user satisfaction
8.1
Ease of Use
Average: 9.2
8.1
Quality of Support
Average: 8.9
5.0
Has the product been a good partner in doing business?
Average: 8.7
7.5
Network Segmentation
Average: 9.2
Seller Details
Year Founded
2017
HQ Location
Charlotte, NC
Twitter
@netfoundry
1,461 Twitter followers
LinkedIn® Page
www.linkedin.com
76 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BeyondCorp is a Zero Trust security framework modeled by Google that shifts access controls from the perimeter to individual devices and users. The end result allows employees to work securely from an

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BeyondCorp features and usability ratings that predict user satisfaction
    10.0
    Ease of Use
    Average: 9.2
    10.0
    Quality of Support
    Average: 8.9
    10.0
    Has the product been a good partner in doing business?
    Average: 8.7
    10.0
    Network Segmentation
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Google
    Year Founded
    1998
    HQ Location
    Mountain View, CA
    Twitter
    @google
    32,750,646 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    310,061 employees on LinkedIn®
    Ownership
    NASDAQ:GOOG
Product Description
How are these determined?Information
This description is provided by the seller.

BeyondCorp is a Zero Trust security framework modeled by Google that shifts access controls from the perimeter to individual devices and users. The end result allows employees to work securely from an

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
BeyondCorp features and usability ratings that predict user satisfaction
10.0
Ease of Use
Average: 9.2
10.0
Quality of Support
Average: 8.9
10.0
Has the product been a good partner in doing business?
Average: 8.7
10.0
Network Segmentation
Average: 9.2
Seller Details
Seller
Google
Year Founded
1998
HQ Location
Mountain View, CA
Twitter
@google
32,750,646 Twitter followers
LinkedIn® Page
www.linkedin.com
310,061 employees on LinkedIn®
Ownership
NASDAQ:GOOG
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BloxOne™ Threat Defense extends security and visibility across even the most globally dispersed network to proactively protect users, data and infrastructure wherever they are.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 40% Small-Business
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BloxOne Threat Defense Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    1
    Ease of Use
    1
    Internet Security
    1
    Protection
    1
    Security
    1
    Cons
    Complex Setup
    1
    Expensive
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BloxOne Threat Defense features and usability ratings that predict user satisfaction
    10.0
    Ease of Use
    Average: 9.2
    9.6
    Quality of Support
    Average: 8.9
    8.3
    Has the product been a good partner in doing business?
    Average: 8.7
    10.0
    Network Segmentation
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Infoblox
    Year Founded
    1999
    HQ Location
    Santa Clara, California
    Twitter
    @Infoblox
    11,117 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,618 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

BloxOne™ Threat Defense extends security and visibility across even the most globally dispersed network to proactively protect users, data and infrastructure wherever they are.

Users
No information available
Industries
No information available
Market Segment
  • 40% Small-Business
  • 40% Mid-Market
BloxOne Threat Defense Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
1
Ease of Use
1
Internet Security
1
Protection
1
Security
1
Cons
Complex Setup
1
Expensive
1
BloxOne Threat Defense features and usability ratings that predict user satisfaction
10.0
Ease of Use
Average: 9.2
9.6
Quality of Support
Average: 8.9
8.3
Has the product been a good partner in doing business?
Average: 8.7
10.0
Network Segmentation
Average: 9.2
Seller Details
Seller
Infoblox
Year Founded
1999
HQ Location
Santa Clara, California
Twitter
@Infoblox
11,117 Twitter followers
LinkedIn® Page
www.linkedin.com
2,618 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Dispel provides secure remote access to industrial control systems, also known as OT infrastructure. Dispel's platform offers unified identity & access management (IAM); logging and session record

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 38% Mid-Market
    • 38% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Dispel features and usability ratings that predict user satisfaction
    9.4
    Ease of Use
    Average: 9.2
    9.6
    Quality of Support
    Average: 8.9
    9.8
    Has the product been a good partner in doing business?
    Average: 8.7
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Dispel
    Company Website
    Year Founded
    2014
    HQ Location
    Austin, TX
    Twitter
    @dispelhq
    722 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    84 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Dispel provides secure remote access to industrial control systems, also known as OT infrastructure. Dispel's platform offers unified identity & access management (IAM); logging and session record

Users
No information available
Industries
No information available
Market Segment
  • 38% Mid-Market
  • 38% Enterprise
Dispel features and usability ratings that predict user satisfaction
9.4
Ease of Use
Average: 9.2
9.6
Quality of Support
Average: 8.9
9.8
Has the product been a good partner in doing business?
Average: 8.7
0.0
No information available
Seller Details
Seller
Dispel
Company Website
Year Founded
2014
HQ Location
Austin, TX
Twitter
@dispelhq
722 Twitter followers
LinkedIn® Page
www.linkedin.com
84 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Atmos is a modern Security Service Edge (SSE) platform powered by Axis. Atmos securely connects users to the business resources needed in order to get work done, regardless of application, device, or

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 38% Enterprise
    • 38% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Axis Security features and usability ratings that predict user satisfaction
    9.6
    Ease of Use
    Average: 9.2
    9.4
    Quality of Support
    Average: 8.9
    9.2
    Has the product been a good partner in doing business?
    Average: 8.7
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    HQ Location
    San Mateo, CA
    Twitter
    @AxisSecurityHQ
    456 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    260 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Atmos is a modern Security Service Edge (SSE) platform powered by Axis. Atmos securely connects users to the business resources needed in order to get work done, regardless of application, device, or

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 38% Enterprise
  • 38% Mid-Market
Axis Security features and usability ratings that predict user satisfaction
9.6
Ease of Use
Average: 9.2
9.4
Quality of Support
Average: 8.9
9.2
Has the product been a good partner in doing business?
Average: 8.7
0.0
No information available
Seller Details
Year Founded
2018
HQ Location
San Mateo, CA
Twitter
@AxisSecurityHQ
456 Twitter followers
LinkedIn® Page
www.linkedin.com
260 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CryptoFlow Net Creator (CFNC) is a centralized key management system that provides full control of your security posture. With a user-friendly GUI and drag-and-drop tool, you have the ability to defi

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CryptoFlow Net Creator (CFNC) features and usability ratings that predict user satisfaction
    8.3
    Ease of Use
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
    10.0
    Network Segmentation
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    LinkedIn® Page
    www.linkedin.com
    54 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CryptoFlow Net Creator (CFNC) is a centralized key management system that provides full control of your security posture. With a user-friendly GUI and drag-and-drop tool, you have the ability to defi

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
CryptoFlow Net Creator (CFNC) features and usability ratings that predict user satisfaction
8.3
Ease of Use
Average: 9.2
0.0
No information available
0.0
No information available
10.0
Network Segmentation
Average: 9.2
Seller Details
LinkedIn® Page
www.linkedin.com
54 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Securely connecting any user from any device​. Trusted access to any system on any network and platform.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 25% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cyolo features and usability ratings that predict user satisfaction
    7.2
    Ease of Use
    Average: 9.2
    5.6
    Quality of Support
    Average: 8.9
    7.5
    Has the product been a good partner in doing business?
    Average: 8.7
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cyolo
    Year Founded
    2020
    HQ Location
    Mountain View, US
    LinkedIn® Page
    www.linkedin.com
    85 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Securely connecting any user from any device​. Trusted access to any system on any network and platform.

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 25% Small-Business
Cyolo features and usability ratings that predict user satisfaction
7.2
Ease of Use
Average: 9.2
5.6
Quality of Support
Average: 8.9
7.5
Has the product been a good partner in doing business?
Average: 8.7
0.0
No information available
Seller Details
Seller
Cyolo
Year Founded
2020
HQ Location
Mountain View, US
LinkedIn® Page
www.linkedin.com
85 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Proofpoint Meta providez the most effective cybersecurity and compliance solutions to protect people on every channel including email, the web, the cloud, and social media.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Proofpoint Meta features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Sunnyvale, CA
    Twitter
    @proofpoint
    30,886 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,756 employees on LinkedIn®
    Ownership
    NASDAQ: PFPT
Product Description
How are these determined?Information
This description is provided by the seller.

Proofpoint Meta providez the most effective cybersecurity and compliance solutions to protect people on every channel including email, the web, the cloud, and social media.

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Proofpoint Meta features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2002
HQ Location
Sunnyvale, CA
Twitter
@proofpoint
30,886 Twitter followers
LinkedIn® Page
www.linkedin.com
4,756 employees on LinkedIn®
Ownership
NASDAQ: PFPT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Safe-T’s Software Defined Perimeter (SDP) transforms access challenges into access advantages. Secure Application Access grants access to applications on a need-to-know basis ONLY, while giving your u

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Safe-T features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Safe-T
    Year Founded
    2005
    HQ Location
    Sydney, AU
    LinkedIn® Page
    au.linkedin.com
    2 employees on LinkedIn®
    Ownership
    NASDAQ: SFET
Product Description
How are these determined?Information
This description is provided by the seller.

Safe-T’s Software Defined Perimeter (SDP) transforms access challenges into access advantages. Secure Application Access grants access to applications on a need-to-know basis ONLY, while giving your u

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Safe-T features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Safe-T
Year Founded
2005
HQ Location
Sydney, AU
LinkedIn® Page
au.linkedin.com
2 employees on LinkedIn®
Ownership
NASDAQ: SFET
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 38% Mid-Market
    • 34% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Symantec Integrated Cyber Defense Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Alert Notifications
    3
    Ease of Use
    3
    Security
    3
    Cybersecurity
    2
    Cybersecurity Protection
    2
    Cons
    Slow Performance
    4
    Performance Issues
    3
    Complexity
    2
    Delays
    2
    High Resource Consumption
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Symantec Integrated Cyber Defense features and usability ratings that predict user satisfaction
    8.8
    Ease of Use
    Average: 9.2
    8.3
    Quality of Support
    Average: 8.9
    8.7
    Has the product been a good partner in doing business?
    Average: 8.7
    10.0
    Network Segmentation
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    60,101 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    59,194 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 38% Mid-Market
  • 34% Enterprise
Symantec Integrated Cyber Defense Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Alert Notifications
3
Ease of Use
3
Security
3
Cybersecurity
2
Cybersecurity Protection
2
Cons
Slow Performance
4
Performance Issues
3
Complexity
2
Delays
2
High Resource Consumption
2
Symantec Integrated Cyber Defense features and usability ratings that predict user satisfaction
8.8
Ease of Use
Average: 9.2
8.3
Quality of Support
Average: 8.9
8.7
Has the product been a good partner in doing business?
Average: 8.7
10.0
Network Segmentation
Average: 9.2
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
60,101 Twitter followers
LinkedIn® Page
www.linkedin.com
59,194 employees on LinkedIn®
Ownership
NASDAQ: CA
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Trustgrid platform uniquely addresses the needs of SaaS application providers who rely on remote systems. By combining an SD-WAN 2.0, edge computing, and zero trust remote access into a single pla

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 33% Small-Business
    • 33% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trustgrid features and usability ratings that predict user satisfaction
    10.0
    Ease of Use
    Average: 9.2
    10.0
    Quality of Support
    Average: 8.9
    0.0
    No information available
    10.0
    Network Segmentation
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Trustgrid
    Year Founded
    2016
    HQ Location
    Austin, US
    LinkedIn® Page
    www.linkedin.com
    14 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Trustgrid platform uniquely addresses the needs of SaaS application providers who rely on remote systems. By combining an SD-WAN 2.0, edge computing, and zero trust remote access into a single pla

Users
No information available
Industries
No information available
Market Segment
  • 33% Small-Business
  • 33% Enterprise
Trustgrid features and usability ratings that predict user satisfaction
10.0
Ease of Use
Average: 9.2
10.0
Quality of Support
Average: 8.9
0.0
No information available
10.0
Network Segmentation
Average: 9.2
Seller Details
Seller
Trustgrid
Year Founded
2016
HQ Location
Austin, US
LinkedIn® Page
www.linkedin.com
14 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Verizon further enhanced its best-in-class Software Defined Perimeter (SDP) security service by acquiring PrecisionAccess solution from Vidder. Verizon's SDP service creates a network boundary that pr

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Vidder Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Access
    1
    Cloud Technology
    1
    Customer Support
    1
    Protection
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Vidder features and usability ratings that predict user satisfaction
    10.0
    Ease of Use
    Average: 9.2
    10.0
    Quality of Support
    Average: 8.9
    0.0
    No information available
    10.0
    Network Segmentation
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Verizon
    Year Founded
    1983
    HQ Location
    Basking RIdge, NJ
    Twitter
    @Verizon
    1,538,284 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    96,304 employees on LinkedIn®
    Ownership
    NYSE:VZ
Product Description
How are these determined?Information
This description is provided by the seller.

Verizon further enhanced its best-in-class Software Defined Perimeter (SDP) security service by acquiring PrecisionAccess solution from Vidder. Verizon's SDP service creates a network boundary that pr

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Vidder Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Access
1
Cloud Technology
1
Customer Support
1
Protection
1
Cons
This product has not yet received any negative sentiments.
Vidder features and usability ratings that predict user satisfaction
10.0
Ease of Use
Average: 9.2
10.0
Quality of Support
Average: 8.9
0.0
No information available
10.0
Network Segmentation
Average: 9.2
Seller Details
Seller
Verizon
Year Founded
1983
HQ Location
Basking RIdge, NJ
Twitter
@Verizon
1,538,284 Twitter followers
LinkedIn® Page
www.linkedin.com
96,304 employees on LinkedIn®
Ownership
NYSE:VZ
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Waverley Labs then worked closely with CSA and DHS to develop the industry’s first Open Source reference implementation for version 1 specification for DDoS.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Waverley Labs SDP features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2012
    HQ Location
    Leesburg, US
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Waverley Labs then worked closely with CSA and DHS to develop the industry’s first Open Source reference implementation for version 1 specification for DDoS.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Waverley Labs SDP features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2012
HQ Location
Leesburg, US
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Big Network helps Internet Service Providers (ISPs), Managed Service Providers (MSPs), and Data Center Operators deploy next-generation Cloud Networks that run across any mix of internet connections e

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Big Network features and usability ratings that predict user satisfaction
    10.0
    Ease of Use
    Average: 9.2
    10.0
    Quality of Support
    Average: 8.9
    0.0
    No information available
    10.0
    Network Segmentation
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Big Network helps Internet Service Providers (ISPs), Managed Service Providers (MSPs), and Data Center Operators deploy next-generation Cloud Networks that run across any mix of internet connections e

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Big Network features and usability ratings that predict user satisfaction
10.0
Ease of Use
Average: 9.2
10.0
Quality of Support
Average: 8.9
0.0
No information available
10.0
Network Segmentation
Average: 9.2
Seller Details
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BlackRidge TAC uses a highly scalable, non-interactive authentication protocol that does not rely on signatures, sandboxing, or deep packet inspection.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BlackRidge Transport Access Control (TAC) features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Reno, NV
    LinkedIn® Page
    www.linkedin.com
    64 employees on LinkedIn®
    Ownership
    OTC: BRIT
Product Description
How are these determined?Information
This description is provided by the seller.

BlackRidge TAC uses a highly scalable, non-interactive authentication protocol that does not rely on signatures, sandboxing, or deep packet inspection.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
BlackRidge Transport Access Control (TAC) features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
HQ Location
Reno, NV
LinkedIn® Page
www.linkedin.com
64 employees on LinkedIn®
Ownership
OTC: BRIT
  • Overview
    Expand/Collapse Overview
  • We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BlastWave features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    BlastWave
    LinkedIn® Page
    www.linkedin.com
We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
BlastWave features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
BlastWave
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Secure your workloads, users and critical assets from zero-day and advanced persistent threats in minutes

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ColorTokens Xtended ZeroTrust Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Intuitive
    1
    User Interface
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ColorTokens Xtended ZeroTrust Security Platform features and usability ratings that predict user satisfaction
    8.3
    Ease of Use
    Average: 9.2
    8.3
    Quality of Support
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Twitter
    @ColorTokensInc
    415 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    151 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Secure your workloads, users and critical assets from zero-day and advanced persistent threats in minutes

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
ColorTokens Xtended ZeroTrust Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Intuitive
1
User Interface
1
Cons
This product has not yet received any negative sentiments.
ColorTokens Xtended ZeroTrust Security Platform features and usability ratings that predict user satisfaction
8.3
Ease of Use
Average: 9.2
8.3
Quality of Support
Average: 8.9
0.0
No information available
0.0
No information available
Seller Details
Twitter
@ColorTokensInc
415 Twitter followers
LinkedIn® Page
www.linkedin.com
151 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DxOdyssey is a Software-Defined Perimeter (SDP) network security solution built on patented technology that is a critical component to achieving a Zero Trust architecture. DxOdyssey enables highly ava

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DxOdyssey features and usability ratings that predict user satisfaction
    8.3
    Ease of Use
    Average: 9.2
    6.7
    Quality of Support
    Average: 8.9
    8.3
    Has the product been a good partner in doing business?
    Average: 8.7
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    DH2i
    Year Founded
    2010
    HQ Location
    Fort Collins, CO
    Twitter
    @DH2i
    1,320 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

DxOdyssey is a Software-Defined Perimeter (SDP) network security solution built on patented technology that is a critical component to achieving a Zero Trust architecture. DxOdyssey enables highly ava

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
DxOdyssey features and usability ratings that predict user satisfaction
8.3
Ease of Use
Average: 9.2
6.7
Quality of Support
Average: 8.9
8.3
Has the product been a good partner in doing business?
Average: 8.7
0.0
No information available
Seller Details
Seller
DH2i
Year Founded
2010
HQ Location
Fort Collins, CO
Twitter
@DH2i
1,320 Twitter followers
LinkedIn® Page
www.linkedin.com
10 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    enforza is a cloud-managed firewall platform that helps you build a unified multi-cloud perimeter with powerful firewall, egress filtering and NAT Gateway capabilities. With easy cloud management

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • enforza Multi-cloud Firewall Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    enforza
    Year Founded
    2023
    HQ Location
    London, GB
    LinkedIn® Page
    linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

enforza is a cloud-managed firewall platform that helps you build a unified multi-cloud perimeter with powerful firewall, egress filtering and NAT Gateway capabilities. With easy cloud management

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
enforza Multi-cloud Firewall Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
enforza
Year Founded
2023
HQ Location
London, GB
LinkedIn® Page
linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CloudPassage is a security and compliance automation platform designed to provide instant visibility and continuous protection for servers in any combination of data centers, private clouds and public

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Enterprise
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Fidelis Halo Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Detection Efficiency
    2
    Internet Security
    2
    Protection
    2
    Real-time Monitoring
    2
    Security
    2
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Fidelis Halo features and usability ratings that predict user satisfaction
    9.4
    Ease of Use
    Average: 9.2
    8.3
    Quality of Support
    Average: 8.9
    10.0
    Has the product been a good partner in doing business?
    Average: 8.7
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Bethesda, MD
    Twitter
    @FidelisCyber
    2,246 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    197 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CloudPassage is a security and compliance automation platform designed to provide instant visibility and continuous protection for servers in any combination of data centers, private clouds and public

Users
No information available
Industries
No information available
Market Segment
  • 67% Enterprise
  • 33% Small-Business
Fidelis Halo Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Detection Efficiency
2
Internet Security
2
Protection
2
Real-time Monitoring
2
Security
2
Cons
This product has not yet received any negative sentiments.
Fidelis Halo features and usability ratings that predict user satisfaction
9.4
Ease of Use
Average: 9.2
8.3
Quality of Support
Average: 8.9
10.0
Has the product been a good partner in doing business?
Average: 8.7
0.0
No information available
Seller Details
Year Founded
2002
HQ Location
Bethesda, MD
Twitter
@FidelisCyber
2,246 Twitter followers
LinkedIn® Page
www.linkedin.com
197 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sweepatic is a cybersecurity start-up operating on a global scale making our customers cyber resilient.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Outpost24 External Attack Surface Management features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Outpost24
    HQ Location
    Karlskrona, SE
    LinkedIn® Page
    www.linkedin.com
    252 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Sweepatic is a cybersecurity start-up operating on a global scale making our customers cyber resilient.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Outpost24 External Attack Surface Management features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Outpost24
HQ Location
Karlskrona, SE
LinkedIn® Page
www.linkedin.com
252 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SAIFE Connect eliminates the concepts of a traditional network perimeter and trusted users and devices. Instead, creating on-demand, zero trust network micro-perimeters for each connected device based

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SAIFE Connect features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SAIFE
    HQ Location
    San Juan, Brazil
    LinkedIn® Page
    www.linkedin.com
    6 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SAIFE Connect eliminates the concepts of a traditional network perimeter and trusted users and devices. Instead, creating on-demand, zero trust network micro-perimeters for each connected device based

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
SAIFE Connect features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
SAIFE
HQ Location
San Juan, Brazil
LinkedIn® Page
www.linkedin.com
6 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SecurityTrails strives to make the biggest treasure-trove of cyber intelligence data readily available in an instant.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Security Trails ASR features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    Los Angeles, California
    Twitter
    @securitytrails
    13,174 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    25 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SecurityTrails strives to make the biggest treasure-trove of cyber intelligence data readily available in an instant.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Security Trails ASR features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2017
HQ Location
Los Angeles, California
Twitter
@securitytrails
13,174 Twitter followers
LinkedIn® Page
www.linkedin.com
25 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CloudLAN is a business VPN that helps remote teams access their business data and resources more securely from anywhere. It helps bring all the user computers into a single virtual network & acces

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Simply5 CloudLAN features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2020
    HQ Location
    MiddleTown, US
    LinkedIn® Page
    www.linkedin.com
    3 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CloudLAN is a business VPN that helps remote teams access their business data and resources more securely from anywhere. It helps bring all the user computers into a single virtual network & acces

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Simply5 CloudLAN features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2020
HQ Location
MiddleTown, US
LinkedIn® Page
www.linkedin.com
3 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Tempered Airwall™ creates hyper-secure networks across a complex infrastructure with our overlay technology that layers on top of any IP network allowing you to build a trusted identity based network

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Tempered Airwall Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Access
    1
    Customer Support
    1
    Ease of Use
    1
    Internet Security
    1
    IP Addressing
    1
    Cons
    Complex Implementation
    1
    Difficult Learning Curve
    1
    Feature Complexity
    1
    Onboarding Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tempered Airwall features and usability ratings that predict user satisfaction
    6.7
    Ease of Use
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Seattle, WA
    Twitter
    @TemperedNW
    606 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    68 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Tempered Airwall™ creates hyper-secure networks across a complex infrastructure with our overlay technology that layers on top of any IP network allowing you to build a trusted identity based network

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Tempered Airwall Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Access
1
Customer Support
1
Ease of Use
1
Internet Security
1
IP Addressing
1
Cons
Complex Implementation
1
Difficult Learning Curve
1
Feature Complexity
1
Onboarding Issues
1
Tempered Airwall features and usability ratings that predict user satisfaction
6.7
Ease of Use
Average: 9.2
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
HQ Location
Seattle, WA
Twitter
@TemperedNW
606 Twitter followers
LinkedIn® Page
www.linkedin.com
68 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Protector Air is focused on protecting individual sessions and the transactions within those sessions. Protector Web further protects the web server with enterprise-grade web application security and

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • TrustedKnight Protector Web features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2010
    HQ Location
    Annapolis , US
    Twitter
    @trustedknight
    167 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Protector Air is focused on protecting individual sessions and the transactions within those sessions. Protector Web further protects the web server with enterprise-grade web application security and

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
TrustedKnight Protector Web features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2010
HQ Location
Annapolis , US
Twitter
@trustedknight
167 Twitter followers
LinkedIn® Page
www.linkedin.com
7 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Software Defined Perimeter acts as your bouncer, allowing only approved users to access network resources. It authenticates identities and devices, letting you “hide” enterprise apps and resources fro

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
    • 50% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Verizon Software Defined Perimeter features and usability ratings that predict user satisfaction
    8.3
    Ease of Use
    Average: 9.2
    8.3
    Quality of Support
    Average: 8.9
    9.2
    Has the product been a good partner in doing business?
    Average: 8.7
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Basking Ridge, NJ
    Twitter
    @VerizonEnterpr
    6 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    16,671 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Software Defined Perimeter acts as your bouncer, allowing only approved users to access network resources. It authenticates identities and devices, letting you “hide” enterprise apps and resources fro

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
  • 50% Enterprise
Verizon Software Defined Perimeter features and usability ratings that predict user satisfaction
8.3
Ease of Use
Average: 9.2
8.3
Quality of Support
Average: 8.9
9.2
Has the product been a good partner in doing business?
Average: 8.7
0.0
No information available
Seller Details
Year Founded
1988
HQ Location
Basking Ridge, NJ
Twitter
@VerizonEnterpr
6 Twitter followers
LinkedIn® Page
www.linkedin.com
16,671 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Virtual SD-Edge (Open Secure Routing) features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1999
    HQ Location
    Santa Clara, California
    Twitter
    @IPInfusion
    1,109 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    470 employees on LinkedIn®
We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Virtual SD-Edge (Open Secure Routing) features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1999
HQ Location
Santa Clara, California
Twitter
@IPInfusion
1,109 Twitter followers
LinkedIn® Page
www.linkedin.com
470 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    VNS3:turret is a secure, redundant network with integrated dataflow and compliance tools.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • VNS3:turret features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2008
    HQ Location
    Chicago, US
    Twitter
    @cohesivenet
    1,451 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    18 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

VNS3:turret is a secure, redundant network with integrated dataflow and compliance tools.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
VNS3:turret features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2008
HQ Location
Chicago, US
Twitter
@cohesivenet
1,451 Twitter followers
LinkedIn® Page
www.linkedin.com
18 employees on LinkedIn®

Learn More About Software-Defined Perimeter (SDP) Software

What is Software-Defined Perimeter (SDP) Software?

A software-defined perimeter (SDP) software helps create a blanket of security around a company's assets by applying a security boundary at the network layer.

SDP helps secure network perimeter, services, routers, applications, and systems in hybrid cloud, multi-cloud, and public cloud environments by applying virtual controls on software instead of hardware.

SDP works on the least privilege principle. When a user tries to enter a company’s network, the user and device are authenticated, irrespective of their location. Once authenticated, they are not allowed access to the entire network but only to those routers, services, or SaaS applications they need and are approved to access. SDP provides granular application-level segmentation instead of more complex network segmentation.

The cloud security alliance first introduced SDP. Cloud security alliance is a not-for-profit organization that promotes best practices for security in the cloud. 

SDP architecture consists of a receiving host, an initiating host, and a controller. Initiating host communicates with the controller to provide information on devices looking to connect with the network. Using an identification system, the SDP controller validates device and user identity based on pre-configured rules. Once it approves the device and user, it passes the approval to the SDP gateway. Once approved, it opens the virtual door for authorized users. The accepting host connects the devices to approved applications.

What does SDP stand for?

SDP stands for software-defined perimeter, a security solution that creates a perimeter around a company's IT assets.

What are the Common Features of Software-Defined Perimeter (SDP) Software?

The following are some core features of the software-defined perimeter solutions:

Application-level access: SDP allows access only to applications approved for a user and device, unlike virtual private network (VPN) software that provides remote access to the whole network once approved. So even if an intruder enters the system, their access is minimal, thus reducing the attack surface exposure and data breaches.

Granular access control: Once validated, the software provides a separate secure connection to each user. 

Infrastructure agnostic: Software-defined perimeter is agnostic of infrastructure since it is software defined and not hardware defined. So they can be deployed anywhere—on-premises, private, or public cloud environments.

Location agnostic: Devices and remote users do not have to be in the physical perimeter to get a secure connection through SDP. This feature is extremely useful in the remote work scenario.

What are the Benefits of Software-Defined Perimeter (SDP) Software?

SDP provides a security blanket around the system infrastructure, shrouding it from unregulated external access.

Internet security: Software-defined perimeter provides a security cover around the software perimeter. This helps eliminate security risks when external users or devices connect to the network.

Multi-cloud security: Today, companies usually have multiple cloud environments from different vendors. SDP helps secure entry to all of them through one solution.

Zero trust network security access (ZTNA) across devices: SDP provides zero trust network security access (ZTNA) for each device and user, irrespective of location. 

Restrict broad network access: Unlike VPN, SDP restricts access to broader networks. This way, even if a segment is compromised, other parts of the network are safe. 

Support a wide variety of devices: SDP supports a wide range of devices such as laptops, desktops, mobiles, and even Internet of Things (IoT) devices. This wide range provides good security coverage to the network.

Who Uses Software-Defined Perimeter (SDP) Software?

Network administrators: SDP helps network admins ensure malicious devices and unauthorized users do not enter the system.

IT teams: SDP software helps IT administrators give a specific remote user access to third parties irrespective of their devices and locations.

What are the Alternatives to Software-Defined Perimeter (SDP) Software?

Alternative security solutions to SDP solutions include:

Virtual private network (VPN): Virtual private networks or VPNs provide company employees with secure access to the network. They create a barrier to the network to prevent hackers, malware, and unauthorized users from entering the network perimeter. But SDP is more powerful as it provides privileged access to very specific SaaS applications, unlike VPN.

Zero trust networking software: This software follows the zero trust security approach where a user, internal or external, is considered a threat until they are thoroughly verified. Zero trust network access (ZTNA) software provides privileged access control to the network connections. 

Software Related to Software-Defined Perimeter (SDP) Software

Related solutions that can be used together with SDP include:

Multi-factor authentication (MFA): This software helps authenticate users in two or more ways to ensure that only authorized users and devices are logging on to the system. IT teams use push notifications, tokens, and one-time passwords ( OTPs) to authenticate users.

Firewall software: This software helps create a barrier between the network and the internet to prevent hackers and unauthorized users from entering the corporate network. It validates access based on pre-configured security policies to decide which remote users should be let into the network.

Challenges With Software-Defined Perimeter (SDP) Software

Software solutions can come with their own set of challenges. 

Device compatibility: Although vendors generally ensure maximum compatibility, the software might not be able to connect some of the devices to the network. 

Network and app reconfiguration: When SDP is deployed, all network connections and application settings must be reconfigured, causing disruptions during deployment.

SDP Controller uptime: One of the biggest challenges of SDP is that if the controller is down, users and devices cannot be connected to the network.

How to Buy Software-Defined Perimeter (SDP) Software?

Requirements Gathering (RFI/RFP) For Software-Defined Perimeter (SDP) Software

One important thing to consider while buying an SDP solution is the software’s ability to integrate with all devices. Buyers should be careful about the availability of the SDP controller and time for implementation, as implementation requires reconfiguration. 

It is advantageous if the vendor offers a free trial so that the buyer can evaluate the product before making a long-term investment.

Compare Software-Defined Perimeter Software (SDP) Products

Create a long list

Buyers need to identify features that they need from their software-defined perimeter tools and start with a large pool of SDP vendors. Buyers must then evaluate the pros and cons of each product.

Create a short list

Short lists help cross-reference the results of initial SDP vendor evaluations with other buyer reviews on third-party review sites such as g2.com, which will help the buyer narrow in on a three to five-product list. From there, buyers can compare pricing and features to determine the best fit.

Conduct demos

Companies should demo all of the SDP products on their short list. During demos, buyers should ask specific questions about the functionalities they care about most; for example, one might ask for a demo of how the tool would behave when it detects a policy change.

Selection of Software-Defined Perimeter (SDP) Software

Choose a selection team

Regardless of a company’s size, involving the most relevant personnel is crucial during the software selection process. The team should include relevant company stakeholders who can use the security solution, scrutinize it, and check whether it will meet the organization’s requirements. The individuals responsible for the day-to-day use of SDP software must be a part of the selection team. IT admins, security teams, and decision makers could be the primary personas included in the group.

Negotiation

To get the best price, buyers looking to trim costs should try to negotiate the specific functions that matter to them. More often than not, the price and specifications mentioned on the vendor’s pricing page can be negotiated. Negotiation on SDP software implementation, support, and other professional services are also crucial. Buyers should ensure they receive adequate support to get the product up and running. The cost of SDP software typically depends on the number of users per month. Some even offer free trial periods to start with. 

Final decision

Before deciding to purchase the software, testing it for a short period is advisable. The day-to-day users of the software are the best individuals to perform this test. They can use and analyze the software product's capabilities and offer valuable feedback.

In most cases, software service providers offer a short-term product trial. If the selection team is satisfied with what the software offers, buyers can proceed with the purchase or contracting process.