Introducing G2.ai, the future of software buying.Try now

Best Zero Trust Networking Software for Small Business

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Products classified in the overall Zero Trust Networking category are similar in many regards and help companies of all sizes solve their business problems. However, small business features, pricing, setup, and installation differ from businesses of other sizes, which is why we match buyers to the right Small Business Zero Trust Networking to fit their needs. Compare product ratings based on reviews from enterprise users or connect with one of G2's buying advisors to find the right solutions within the Small Business Zero Trust Networking category.

In addition to qualifying for inclusion in the Zero Trust Networking Software category, to qualify for inclusion in the Small Business Zero Trust Networking Software category, a product must have at least 10 reviews left by a reviewer from a small business.

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

1 filter applied
Clear All

11 Listings in Small Business Zero Trust Networking Available

(94)4.6 out of 5
18th Easiest To Use in Zero Trust Networking software
View top Consulting Services for Cloudflare SSE & SASE Platform
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cloudflare Area 1 is a cloud-native email security platform that identifies and blocks attacks before they hit user inboxes, enabling more effective protection against spear phishing, Business Email C

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 37% Small-Business
    • 34% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cloudflare SSE & SASE Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    12
    Ease of Use
    10
    Performance Speed
    8
    Protection
    8
    Reliability
    7
    Cons
    Needs Improvement
    4
    Difficult Learning
    3
    Difficult Learning Curve
    3
    Expensive
    3
    Learning Difficulty
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cloudflare SSE & SASE Platform features and usability ratings that predict user satisfaction
    9.2
    Quality of Support
    Average: 8.8
    9.2
    Ease of Use
    Average: 8.9
    9.1
    Ease of Admin
    Average: 8.8
    8.9
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2009
    HQ Location
    San Francisco, California
    Twitter
    @Cloudflare
    222,890 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,449 employees on LinkedIn®
    Ownership
    NYSE: NET
Product Description
How are these determined?Information
This description is provided by the seller.

Cloudflare Area 1 is a cloud-native email security platform that identifies and blocks attacks before they hit user inboxes, enabling more effective protection against spear phishing, Business Email C

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 37% Small-Business
  • 34% Mid-Market
Cloudflare SSE & SASE Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
12
Ease of Use
10
Performance Speed
8
Protection
8
Reliability
7
Cons
Needs Improvement
4
Difficult Learning
3
Difficult Learning Curve
3
Expensive
3
Learning Difficulty
3
Cloudflare SSE & SASE Platform features and usability ratings that predict user satisfaction
9.2
Quality of Support
Average: 8.8
9.2
Ease of Use
Average: 8.9
9.1
Ease of Admin
Average: 8.8
8.9
Application Security
Average: 8.9
Seller Details
Year Founded
2009
HQ Location
San Francisco, California
Twitter
@Cloudflare
222,890 Twitter followers
LinkedIn® Page
www.linkedin.com
5,449 employees on LinkedIn®
Ownership
NYSE: NET
(154)4.7 out of 5
1st Easiest To Use in Zero Trust Networking software
Save to My Lists
Entry Level Price:Starting at $7.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    GoodAccess is a cybersecurity platform (SASE/SSE) that empowers medium-sized enterprises to easily implement Zero Trust Architecture (ZTA) in their infrastructure, regardless of its complexity or scal

    Users
    • CTO
    • CEO
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 78% Small-Business
    • 22% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • GoodAccess Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    70
    VPN Services
    45
    Reliability
    41
    Customer Support
    37
    Easy Setup
    31
    Cons
    Expensive
    23
    Connection Issues
    15
    Access Issues
    8
    Limited Location Options
    8
    Connectivity Issues
    7
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • GoodAccess features and usability ratings that predict user satisfaction
    9.3
    Quality of Support
    Average: 8.8
    9.5
    Ease of Use
    Average: 8.9
    9.4
    Ease of Admin
    Average: 8.8
    8.8
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2009
    HQ Location
    Usti nad Labem, Czech Republic, Europe
    LinkedIn® Page
    www.linkedin.com
    27 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

GoodAccess is a cybersecurity platform (SASE/SSE) that empowers medium-sized enterprises to easily implement Zero Trust Architecture (ZTA) in their infrastructure, regardless of its complexity or scal

Users
  • CTO
  • CEO
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 78% Small-Business
  • 22% Mid-Market
GoodAccess Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
70
VPN Services
45
Reliability
41
Customer Support
37
Easy Setup
31
Cons
Expensive
23
Connection Issues
15
Access Issues
8
Limited Location Options
8
Connectivity Issues
7
GoodAccess features and usability ratings that predict user satisfaction
9.3
Quality of Support
Average: 8.8
9.5
Ease of Use
Average: 8.9
9.4
Ease of Admin
Average: 8.8
8.8
Application Security
Average: 8.9
Seller Details
Company Website
Year Founded
2009
HQ Location
Usti nad Labem, Czech Republic, Europe
LinkedIn® Page
www.linkedin.com
27 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    What is Palo Alto Networks IoT/OT Security? Palo Alto Networks IoT/OT Security is a comprehensive solution delivering ML-powered visibility, prevention, and zero-trust enforcement in a single platf

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 34% Mid-Market
    • 34% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Palo Alto Networks IoT/OT Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Threat Protection
    33
    Security
    30
    Ease of Use
    23
    Features
    21
    Monitoring
    15
    Cons
    Expensive
    27
    Complex Setup
    16
    Difficult Learning Curve
    12
    Required Expertise
    11
    Difficult Configuration
    9
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Palo Alto Networks IoT/OT Security features and usability ratings that predict user satisfaction
    8.3
    Quality of Support
    Average: 8.8
    8.1
    Ease of Use
    Average: 8.9
    8.4
    Ease of Admin
    Average: 8.8
    8.9
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    126,982 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17,221 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

What is Palo Alto Networks IoT/OT Security? Palo Alto Networks IoT/OT Security is a comprehensive solution delivering ML-powered visibility, prevention, and zero-trust enforcement in a single platf

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 34% Mid-Market
  • 34% Small-Business
Palo Alto Networks IoT/OT Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Threat Protection
33
Security
30
Ease of Use
23
Features
21
Monitoring
15
Cons
Expensive
27
Complex Setup
16
Difficult Learning Curve
12
Required Expertise
11
Difficult Configuration
9
Palo Alto Networks IoT/OT Security features and usability ratings that predict user satisfaction
8.3
Quality of Support
Average: 8.8
8.1
Ease of Use
Average: 8.9
8.4
Ease of Admin
Average: 8.8
8.9
Application Security
Average: 8.9
Seller Details
Company Website
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
126,982 Twitter followers
LinkedIn® Page
www.linkedin.com
17,221 employees on LinkedIn®
(284)4.8 out of 5
2nd Easiest To Use in Zero Trust Networking software
View top Consulting Services for ThreatLocker
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The ThreatLocker suite of security tools are powerful and designed so that everyone from businesses to government agencies to academic institutions can directly control exactly what applications run o

    Users
    • President
    • CEO
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 61% Small-Business
    • 32% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ThreatLocker Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    91
    Threat Detection
    86
    Ease of Use
    78
    Security
    71
    Features
    68
    Cons
    Learning Curve
    42
    Difficult Learning Curve
    27
    Difficult Configuration
    14
    Difficult Navigation
    14
    Complexity
    13
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatLocker features and usability ratings that predict user satisfaction
    9.8
    Quality of Support
    Average: 8.8
    8.4
    Ease of Use
    Average: 8.9
    8.6
    Ease of Admin
    Average: 8.8
    7.8
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2017
    HQ Location
    Orlando, Florida, United States
    Twitter
    @ThreatLocker
    2,217 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    580 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The ThreatLocker suite of security tools are powerful and designed so that everyone from businesses to government agencies to academic institutions can directly control exactly what applications run o

Users
  • President
  • CEO
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 61% Small-Business
  • 32% Mid-Market
ThreatLocker Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
91
Threat Detection
86
Ease of Use
78
Security
71
Features
68
Cons
Learning Curve
42
Difficult Learning Curve
27
Difficult Configuration
14
Difficult Navigation
14
Complexity
13
ThreatLocker features and usability ratings that predict user satisfaction
9.8
Quality of Support
Average: 8.8
8.4
Ease of Use
Average: 8.9
8.6
Ease of Admin
Average: 8.8
7.8
Application Security
Average: 8.9
Seller Details
Company Website
Year Founded
2017
HQ Location
Orlando, Florida, United States
Twitter
@ThreatLocker
2,217 Twitter followers
LinkedIn® Page
www.linkedin.com
580 employees on LinkedIn®
(43)4.7 out of 5
12th Easiest To Use in Zero Trust Networking software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Todyl empowers businesses of any size with a complete, end-to-end security program. The Todyl Security Platform converges SASE, SIEM, Endpoint Security, GRC, MXDR, and more into a cloud-native, singl

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 88% Small-Business
    • 12% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Todyl Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    26
    Customer Support
    24
    Features
    19
    Security
    16
    Cybersecurity
    13
    Cons
    Technical Issues
    7
    Integration Issues
    6
    Limited Features
    6
    Lacking Features
    5
    Pricing Issues
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Todyl Security Platform features and usability ratings that predict user satisfaction
    9.6
    Quality of Support
    Average: 8.8
    8.5
    Ease of Use
    Average: 8.9
    8.8
    Ease of Admin
    Average: 8.8
    9.1
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Todyl
    Company Website
    Year Founded
    2015
    HQ Location
    Denver, CO
    LinkedIn® Page
    www.linkedin.com
    136 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Todyl empowers businesses of any size with a complete, end-to-end security program. The Todyl Security Platform converges SASE, SIEM, Endpoint Security, GRC, MXDR, and more into a cloud-native, singl

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 88% Small-Business
  • 12% Mid-Market
Todyl Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
26
Customer Support
24
Features
19
Security
16
Cybersecurity
13
Cons
Technical Issues
7
Integration Issues
6
Limited Features
6
Lacking Features
5
Pricing Issues
5
Todyl Security Platform features and usability ratings that predict user satisfaction
9.6
Quality of Support
Average: 8.8
8.5
Ease of Use
Average: 8.9
8.8
Ease of Admin
Average: 8.8
9.1
Application Security
Average: 8.9
Seller Details
Seller
Todyl
Company Website
Year Founded
2015
HQ Location
Denver, CO
LinkedIn® Page
www.linkedin.com
136 employees on LinkedIn®
(69)4.5 out of 5
16th Easiest To Use in Zero Trust Networking software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Zscaler Private Access™ (ZPA) gives users the fastest, most secure access to private apps and OT devices while enabling zero trust connectivity for workloads. As the world’s most deployed zero trust

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 46% Enterprise
    • 23% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Zscaler Private Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    18
    Secure Access
    10
    Ease of Use
    7
    Reliability
    7
    Flexibility
    6
    Cons
    Connection Issues
    4
    Expensive
    4
    Slow Internet
    4
    Delay Issues
    3
    Slow Loading
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Zscaler Private Access features and usability ratings that predict user satisfaction
    8.9
    Quality of Support
    Average: 8.8
    8.9
    Ease of Use
    Average: 8.9
    9.0
    Ease of Admin
    Average: 8.8
    9.2
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Zscaler
    Company Website
    Year Founded
    2008
    HQ Location
    San Jose, California
    Twitter
    @zscaler
    16,610 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,674 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Zscaler Private Access™ (ZPA) gives users the fastest, most secure access to private apps and OT devices while enabling zero trust connectivity for workloads. As the world’s most deployed zero trust

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 46% Enterprise
  • 23% Mid-Market
Zscaler Private Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
18
Secure Access
10
Ease of Use
7
Reliability
7
Flexibility
6
Cons
Connection Issues
4
Expensive
4
Slow Internet
4
Delay Issues
3
Slow Loading
3
Zscaler Private Access features and usability ratings that predict user satisfaction
8.9
Quality of Support
Average: 8.8
8.9
Ease of Use
Average: 8.9
9.0
Ease of Admin
Average: 8.8
9.2
Application Security
Average: 8.9
Seller Details
Seller
Zscaler
Company Website
Year Founded
2008
HQ Location
San Jose, California
Twitter
@zscaler
16,610 Twitter followers
LinkedIn® Page
www.linkedin.com
8,674 employees on LinkedIn®
(952)4.5 out of 5
5th Easiest To Use in Zero Trust Networking software
View top Consulting Services for Okta
Save to My Lists
Entry Level Price:$6.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Okta is The World’s Identity Company™. As the leading independent Identity partner, we free everyone to safely use any technology — anywhere, on any device or app. The most trusted brands trust Okta t

    Users
    • Software Engineer
    • Account Executive
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 53% Mid-Market
    • 41% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Okta Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    112
    Security
    72
    Authentication
    54
    Easy Access
    54
    Single Sign-On
    52
    Cons
    Authentication Issues
    44
    Login Issues
    27
    Frequent Authentication
    24
    Password Issues
    15
    Error Handling
    10
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Okta features and usability ratings that predict user satisfaction
    8.8
    Quality of Support
    Average: 8.8
    9.3
    Ease of Use
    Average: 8.9
    9.0
    Ease of Admin
    Average: 8.8
    9.3
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Okta
    Company Website
    Year Founded
    2009
    HQ Location
    San Francisco, California
    Twitter
    @okta
    42,497 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,292 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Okta is The World’s Identity Company™. As the leading independent Identity partner, we free everyone to safely use any technology — anywhere, on any device or app. The most trusted brands trust Okta t

Users
  • Software Engineer
  • Account Executive
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 53% Mid-Market
  • 41% Enterprise
Okta Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
112
Security
72
Authentication
54
Easy Access
54
Single Sign-On
52
Cons
Authentication Issues
44
Login Issues
27
Frequent Authentication
24
Password Issues
15
Error Handling
10
Okta features and usability ratings that predict user satisfaction
8.8
Quality of Support
Average: 8.8
9.3
Ease of Use
Average: 8.9
9.0
Ease of Admin
Average: 8.8
9.3
Application Security
Average: 8.9
Seller Details
Seller
Okta
Company Website
Year Founded
2009
HQ Location
San Francisco, California
Twitter
@okta
42,497 Twitter followers
LinkedIn® Page
www.linkedin.com
8,292 employees on LinkedIn®
(70)4.7 out of 5
Optimized for quick response
10th Easiest To Use in Zero Trust Networking software
Save to My Lists
Entry Level Price:Starting at $5.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Twingate is a secure remote access solution for an organization’s private applications, data, and environments, whether they are on-premise or in the cloud. Built to make the lives of DevOps teams, IT

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 51% Mid-Market
    • 43% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Twingate Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    9
    Security
    9
    Easy Setup
    7
    Secure Access
    7
    Setup Ease
    7
    Cons
    Performance Issues
    11
    Limited Customization
    5
    Complex Implementation
    4
    Complex Configuration
    3
    Lacking Features
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Twingate features and usability ratings that predict user satisfaction
    9.2
    Quality of Support
    Average: 8.8
    9.8
    Ease of Use
    Average: 8.9
    9.1
    Ease of Admin
    Average: 8.8
    8.9
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    HQ Location
    Redwood City, California
    Twitter
    @TwingateHQ
    2,285 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    75 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Twingate is a secure remote access solution for an organization’s private applications, data, and environments, whether they are on-premise or in the cloud. Built to make the lives of DevOps teams, IT

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 51% Mid-Market
  • 43% Small-Business
Twingate Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
9
Security
9
Easy Setup
7
Secure Access
7
Setup Ease
7
Cons
Performance Issues
11
Limited Customization
5
Complex Implementation
4
Complex Configuration
3
Lacking Features
3
Twingate features and usability ratings that predict user satisfaction
9.2
Quality of Support
Average: 8.8
9.8
Ease of Use
Average: 8.9
9.1
Ease of Admin
Average: 8.8
8.9
Application Security
Average: 8.9
Seller Details
Company Website
HQ Location
Redwood City, California
Twitter
@TwingateHQ
2,285 Twitter followers
LinkedIn® Page
www.linkedin.com
75 employees on LinkedIn®
(222)4.7 out of 5
Optimized for quick response
8th Easiest To Use in Zero Trust Networking software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Absolute Secure Access (formerly NetMotion by Absolute) is one of the company’s core product lines, which was added through the acquisition of NetMotion in July 2021. The product portfolio provides re

    Users
    • IT Director
    • System Administrator
    Industries
    • Law Enforcement
    • Government Administration
    Market Segment
    • 63% Mid-Market
    • 26% Enterprise
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • The product is a software that offers features such as customizations, MFA support, device profiling/grouping, failover capabilities, and optimizes network traffic to improve performance, especially for bandwidth-intensive applications.
    • Users frequently mention the ease of use, the software's user-friendly nature, the ability to deploy specific profiles, the caching functionality when clients are in dead zones, and the bi-directional aspect of the technology that eliminates many problems associated with managing workstations.
    • Users mentioned issues such as disconnects in situations where there is a constant connection to devices that go in-and-out of cellular service areas, complexity in the licensing model, extra steps required for MFA, issues with mobile device management, and difficulties with sales and renewals.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Absolute Secure Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    25
    Secure Access
    15
    Customer Support
    13
    Reliability
    13
    User Interface
    13
    Cons
    Access Issues
    7
    Connection Issues
    6
    Expensive
    5
    Complex Implementation
    4
    Integration Issues
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Absolute Secure Access features and usability ratings that predict user satisfaction
    9.3
    Quality of Support
    Average: 8.8
    9.1
    Ease of Use
    Average: 8.9
    8.7
    Ease of Admin
    Average: 8.8
    9.0
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1993
    HQ Location
    British Columbia, Canada
    Twitter
    @absolutecorp
    3,949 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,167 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Absolute Secure Access (formerly NetMotion by Absolute) is one of the company’s core product lines, which was added through the acquisition of NetMotion in July 2021. The product portfolio provides re

Users
  • IT Director
  • System Administrator
Industries
  • Law Enforcement
  • Government Administration
Market Segment
  • 63% Mid-Market
  • 26% Enterprise
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • The product is a software that offers features such as customizations, MFA support, device profiling/grouping, failover capabilities, and optimizes network traffic to improve performance, especially for bandwidth-intensive applications.
  • Users frequently mention the ease of use, the software's user-friendly nature, the ability to deploy specific profiles, the caching functionality when clients are in dead zones, and the bi-directional aspect of the technology that eliminates many problems associated with managing workstations.
  • Users mentioned issues such as disconnects in situations where there is a constant connection to devices that go in-and-out of cellular service areas, complexity in the licensing model, extra steps required for MFA, issues with mobile device management, and difficulties with sales and renewals.
Absolute Secure Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
25
Secure Access
15
Customer Support
13
Reliability
13
User Interface
13
Cons
Access Issues
7
Connection Issues
6
Expensive
5
Complex Implementation
4
Integration Issues
4
Absolute Secure Access features and usability ratings that predict user satisfaction
9.3
Quality of Support
Average: 8.8
9.1
Ease of Use
Average: 8.9
8.7
Ease of Admin
Average: 8.8
9.0
Application Security
Average: 8.9
Seller Details
Company Website
Year Founded
1993
HQ Location
British Columbia, Canada
Twitter
@absolutecorp
3,949 Twitter followers
LinkedIn® Page
www.linkedin.com
1,167 employees on LinkedIn®
(409)4.5 out of 5
Optimized for quick response
9th Easiest To Use in Zero Trust Networking software
View top Consulting Services for Cisco Duo
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Duo stops identity-based threats and boosts workforce productivity. Our Continuous Identity Security solution provides the best access management experience across users, devices, and applications whi

    Users
    • Software Engineer
    • Consultant
    Industries
    • Information Technology and Services
    • Higher Education
    Market Segment
    • 44% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cisco Duo Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    71
    Authentication Ease
    52
    Security
    51
    Authentication
    48
    Easy Access
    36
    Cons
    Authentication Issues
    28
    Access Limitations
    19
    Login Issues
    18
    Notification Issues
    13
    Slow Performance
    12
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco Duo features and usability ratings that predict user satisfaction
    8.8
    Quality of Support
    Average: 8.8
    9.3
    Ease of Use
    Average: 8.9
    9.2
    Ease of Admin
    Average: 8.8
    9.2
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Company Website
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    728,816 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,057 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Duo stops identity-based threats and boosts workforce productivity. Our Continuous Identity Security solution provides the best access management experience across users, devices, and applications whi

Users
  • Software Engineer
  • Consultant
Industries
  • Information Technology and Services
  • Higher Education
Market Segment
  • 44% Enterprise
  • 38% Mid-Market
Cisco Duo Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
71
Authentication Ease
52
Security
51
Authentication
48
Easy Access
36
Cons
Authentication Issues
28
Access Limitations
19
Login Issues
18
Notification Issues
13
Slow Performance
12
Cisco Duo features and usability ratings that predict user satisfaction
8.8
Quality of Support
Average: 8.8
9.3
Ease of Use
Average: 8.9
9.2
Ease of Admin
Average: 8.8
9.2
Application Security
Average: 8.9
Seller Details
Seller
Cisco
Company Website
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
728,816 Twitter followers
LinkedIn® Page
www.linkedin.com
95,057 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The internet is the new corporate network, leading organizations to transition to their network security to Secure Access Service Edge (SASE). However, current solutions break the user experience with

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 50% Mid-Market
    • 35% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point Harmony SASE Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    10
    Secure Access
    9
    Security
    9
    Reliability
    7
    Features
    5
    Cons
    Complex Configuration
    6
    Complex Implementation
    6
    Complex Setup
    5
    Connection Issues
    5
    Integration Issues
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point Harmony SASE features and usability ratings that predict user satisfaction
    9.2
    Quality of Support
    Average: 8.8
    9.4
    Ease of Use
    Average: 8.9
    9.1
    Ease of Admin
    Average: 8.8
    7.5
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,087 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,977 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

The internet is the new corporate network, leading organizations to transition to their network security to Secure Access Service Edge (SASE). However, current solutions break the user experience with

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 50% Mid-Market
  • 35% Small-Business
Check Point Harmony SASE Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
10
Secure Access
9
Security
9
Reliability
7
Features
5
Cons
Complex Configuration
6
Complex Implementation
6
Complex Setup
5
Connection Issues
5
Integration Issues
5
Check Point Harmony SASE features and usability ratings that predict user satisfaction
9.2
Quality of Support
Average: 8.8
9.4
Ease of Use
Average: 8.9
9.1
Ease of Admin
Average: 8.8
7.5
Application Security
Average: 8.9
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,087 Twitter followers
LinkedIn® Page
www.linkedin.com
7,977 employees on LinkedIn®
Ownership
NASDAQ:CHKP