Introducing G2.ai, the future of software buying.Try now
Seraphic Web Security
Show rating breakdown
Save to My Lists
Claimed
Claimed

Seraphic Web Security Pricing Overview

Pricing Insights

Averages based on real user reviews.

Time to Implement

1 month

Perceived Cost

$$$$$
Seraphic Web Security has not provided pricing information for this product or service. This is common practice for software sellers and service providers. Contact Seraphic Web Security to obtain current pricing.

Seraphic Web Security pricing & plans

Free Trial is available
Pricing information for Seraphic Web Security is supplied by the software provider or retrieved from publicly accessible pricing materials. Final cost negotiations to purchase Seraphic Web Security must be conducted with the seller.
Pricing information was last updated on March 14, 2023

Seraphic Web Security Alternatives Pricing

The following is a quick overview of editions offered by other Browser Isolation Software

BetterCloud
BetterCloud for Google
Contact Us1 User Per Year
For Help Desk teams who are fed up with how hard it is to admin their Google Workspace™.
  • Granular controls for your Google Workspace™
  • Visibility and automation of Google lifecycle management
FreePer Month
For personal or hobby projects that aren’t business-critical. This package includes:
  • Fast, Easy-to-use DNS
  • Unmetered DDoS Protection
  • CDN
  • Universal SSL Certificate
  • Free Managed Ruleset
Coro Cybersecurity
Coro Complete Suite
Starting at $15.001 User (5 endpoint devices per user) Per Month
Every Coro module at a price everyone can afford. For an extra $5/mo, we can even manage it all for you.
  • Endpoint Security (Device Posture, Next-gen Antivirus, Allow/Block Lists)
  • Email Security (Malware Scanning, Phishing Protection, Allow/Block Lists)
  • Network (ZTNA, Mobile App, DNS Filtering, Multilingual Support, Site-To-Site Tunnels, Remote Office Cluster, Cloud VPN, Cloud Firewall)
  • Cloud App Security (O365, GSuite, Dropbox, Box, Slack, Salesforce)
  • Endpoint Detection & Response (EDR)

Various alternatives pricing & plans

Free Trial is available
Pricing information for the above various Seraphic Web Security alternatives is supplied by the respective software provider or retrieved from publicly accessible pricing materials. Final cost negotiations to purchase any of these products must be conducted with the seller.

Seraphic Web Security Pricing Reviews

Verified User in Computer & Network Security
AC
Small-Business(50 or fewer emp.)
More Options
Validated Reviewer
Verified Current User
Review source: Organic
What do you like best about Seraphic Web Security?

Seraphic has an extremely intuitive set up process and does an excellent job of training their users on the few brief moments that can hang up first time integrations. Additionally, while we currently only use Seraphic for URL filtering and DLP solutions, there are a number of tools and telemetry options that we haven't yet scratched the surface on using. That said, the two tools we do use are easy to add or modify rules settings for, making it easy to integrate new changes in our client's environments. Review collected by and hosted on G2.com.

What do you dislike about Seraphic Web Security?

As a daily user of Seraphic across multiple clients and a variety of technology stacks, we have ran into situations where additional visibility would have been appreciated. However, the team at Seraphic has always been quick to respond to any questions or issues we've run into which has enabled us to ensure a minimum amount of downtime. Review collected by and hosted on G2.com.

What problems is Seraphic Web Security solving and how is that benefiting you?

Currently Seraphic has been effective at blocking two seperate critical malware attacks from the moment the user clicked on a malicious link as well as ensuring hundreds of other harmful sites remain out of our user's hands. We've also begun to test out and utilize Seraphic as an additional control to prevent PII and PHI from being moved out of critical applications in order to provide an additional layer of protection against data exfiltration. Review collected by and hosted on G2.com.

Explore More