Introducing G2.ai, the future of software buying.Try now
AWS Verified access
Show rating breakdown
Save to My Lists
Unclaimed
Unclaimed

Top Rated AWS Verified access Alternatives

Okta
(956)
4.5 out of 5
BetterCloud
(466)
4.4 out of 5

AWS Verified access Reviews & Product Details

AWS Verified access Overview

AWS Verified access Details
Show LessShow More

Seller

Amazon Web Services (AWS)

Description

By giving customers more of what they want - low prices, vast selection, and convenience - Amazon continues to grow and evolve as a world-class e-commerce platform.

Recent AWS Verified access Reviews

Vishal G.
VG
Vishal G.Enterprise (> 1000 emp.)
4.5 out of 5
"Single sign on tool for application access"
Aws access provides a good service to use single sign in and provides access to all applications without any interuption.This tool is very helpful ...
Lovkesh B.
LB
Lovkesh B.Enterprise (> 1000 emp.)
4.5 out of 5
"AWS Security Reviews"
AWS Security services, features and platform is pretty matured.
MK
Meenakshi K.Enterprise (> 1000 emp.)
4.5 out of 5
"Ensure Secure and Access Control Accessing of Database using AWS Verified Access"
It follows the zero trust policy and thus mandates the verification of each personnel through it's multi layer authentication feature. It's also re...

AWS Verified access Media

Answer a few questions to help the AWS Verified access community
Have you used AWS Verified access before?
Yes

3 AWS Verified access Reviews

4.5 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
3 AWS Verified access Reviews
4.5 out of 5
3 AWS Verified access Reviews
4.5 out of 5

AWS Verified access Pros and Cons

How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cons
G2 reviews are authentic and verified.
Vishal G.
VG
Wintel Administrator
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about AWS Verified access?

Aws access provides a good service to use single sign in and provides access to all applications without any interuption.This tool is very helpful because it can be used without use of VPN.The best part of this tool is that it can evaluate the access for each application in realtime. Review collected by and hosted on G2.com.

What do you dislike about AWS Verified access?

The value cost of this tool is little bit high as it charges for hourly based. And sometimes I have faced issue of session disconnected in case of ideal time. Review collected by and hosted on G2.com.

What problems is AWS Verified access solving and how is that benefiting you?

This tool helped to avoid the problems to login on each application every time and it also ensure to evaluate access of each application in real time while logging that has minized the efforts of user logged in. Review collected by and hosted on G2.com.

MK
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about AWS Verified access?

It follows the zero trust policy and thus mandates the verification of each personnel through it's multi layer authentication feature. It's also reduces the user dependency on VPN for remote accessing of database by providing a local network accessing to the user and thus promote remote working methodologies. Review collected by and hosted on G2.com.

What do you dislike about AWS Verified access?

It considered as a new and advanced software and thus require the server and hardware upgradation within the organization which might lead to the additional investment. Also, sudden unexpected downtime is experiencing while using this product which might compromise the organization confidential data for short span of time. Review collected by and hosted on G2.com.

What problems is AWS Verified access solving and how is that benefiting you?

It's enabled notification automatically shuts and notify users if any external or unauthorized activity is observed on the server which helps us to securing of database. It also maintains a alternate database to recover the file in case of any unexpected server crash within organization. Review collected by and hosted on G2.com.

Lovkesh B.
LB
Senior Consultant
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about AWS Verified access?

AWS Security services, features and platform is pretty matured. Review collected by and hosted on G2.com.

What do you dislike about AWS Verified access?

Not much in Dislike. As enviornment is pretty matured from Security prospective. Review collected by and hosted on G2.com.

What problems is AWS Verified access solving and how is that benefiting you?

As a service for SASE. I have worked on all leading OEM of SASE and AWS concept of AWS verified access is great.

Yes, it is require more maturity but AWS is doing great to lauch this service. Review collected by and hosted on G2.com.

There are not enough reviews of AWS Verified access for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Okta Logo
Okta
4.5
(956)
Okta is The World’s Identity Company™. As the leading independent Identity partner, we free everyone to safely use any technology — anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.
2
BetterCloud Logo
BetterCloud
4.4
(466)
BetterCloud provides critical insights, automated management, and intelligent data security for cloud office platforms.
3
Cisco Duo Logo
Cisco Duo
4.5
(411)
Duo is a cloud-based access security platform built to protect access to any application, from any device. Duo’s passwordless authentication, single sign-on (SSO) and user-friendly multi-factor authentication make secure logins easy for users, reducing friction to their workflow.
4
ThreatLocker Logo
ThreatLocker
4.8
(284)
Get unprecedented visibility and control of your cybersecurity, quickly, easily, and cost-effectively. Schedule a free product demonstration and ThreatLocker will show you how.
5
Absolute Secure Access Logo
Absolute Secure Access
4.7
(222)
Absolute Secure Access delivers modern remote access for highly mobile workforces without sacrificing productivity. It provides reliable network connectivity for users to securely access critical resources in the public cloud, private data centers, or on-premises -- even in challenging environments. It is the only solution that proactively optimizes and improves the employee experience while offering deep visibility, control, and analytics to IT administrators.
6
FortiClient Logo
FortiClient
4.4
(205)
FortiClient Fabric Agent integrates endpoints into the Security Fabric and provides endpoint telemetry, including user identity, protection status, risk scores, unpatched vulnerabilities, security events, and more.
7
Trend Vision One Logo
Trend Vision One
4.7
(205)
Trend Micro Vision One (XDR) collects and correlates deep activity data across multiple vectors - email, endpoints, servers, cloud workloads, and networks - enabling a level of detection and investigation that is difficult or impossible to achieve with SIEM or individual point solutions.
8
GoodAccess Logo
GoodAccess
4.7
(154)
GoodAccess is a Zero Trust cybersecurity platform (SASE/SSE) built for medium-sized businesses (50–5000+ employees). It enables rapid, low-code/no-code deployment—without hardware or expert staff—to secure remote and hybrid teams. With identity-based access, BYOD protection, network segmentation, and full visibility, GoodAccess simplifies enterprise-grade security for modern, multi-cloud environments.
9
Check Point Harmony SASE Logo
Check Point Harmony SASE
4.7
(126)
Check Point Harmony SASE is a converged networking and network security platform which connects all users, in the office or remote, to all resources, located on-prem, cloud, SaaS or web. It delivers secure Zerto Trust Network Access (ZTNA) connectivity along web protection capabilities including Internet access control, malware protection, data loss prevention(DLP), and sandboxing, as well as a firewall as a service. The solution employs a hybrid architecture, combining on-device and cloud-based protections, which delivers market leading security and performance.
10
Check Point CloudGuard Network Security Logo
Check Point CloudGuard Network Security
4.5
(125)
Check Point CloudGuard Network Security for private and public cloud platforms is designed to protect assets in the cloud against the most sophisticated threats.
Show More