Introducing G2.ai, the future of software buying.Try now
Virtual SD-Edge (Open Secure Routing)
Save to My Lists
Unclaimed
Unclaimed

Top Rated Virtual SD-Edge (Open Secure Routing) Alternatives

Virtual SD-Edge (Open Secure Routing) Reviews & Product Details

Virtual SD-Edge (Open Secure Routing) Overview

Virtual SD-Edge (Open Secure Routing) Details
Show LessShow More

Seller

IPInfusion

Description

IPInfusion is a provider of network software solutions, specializing in next-generation network technology. The company offers advanced network operating system (NOS) software that enables network operators, service providers, and enterprises to deploy scalable and efficient open networking solutions. Their flagship products, OcNOS® and VirNOS®, support a wide range of network functions and are designed to enhance network performance, flexibility, and sustainability. IPInfusion's solutions are built to support automation and interoperability, helping clients to reduce costs and optimize their network infrastructures.

Virtual SD-Edge (Open Secure Routing) Media

Answer a few questions to help the Virtual SD-Edge (Open Secure Routing) community
Have you used Virtual SD-Edge (Open Secure Routing) before?
Yes
G2 reviews are authentic and verified.

There are not enough reviews of Virtual SD-Edge (Open Secure Routing) for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Absolute Secure Access Logo
Absolute Secure Access
4.7
(222)
Absolute Secure Access delivers modern remote access for highly mobile workforces without sacrificing productivity. It provides reliable network connectivity for users to securely access critical resources in the public cloud, private data centers, or on-premises -- even in challenging environments. It is the only solution that proactively optimizes and improves the employee experience while offering deep visibility, control, and analytics to IT administrators.
2
GoodAccess Logo
GoodAccess
4.7
(154)
GoodAccess is a Zero Trust cybersecurity platform (SASE/SSE) built for medium-sized businesses (50–5000+ employees). It enables rapid, low-code/no-code deployment—without hardware or expert staff—to secure remote and hybrid teams. With identity-based access, BYOD protection, network segmentation, and full visibility, GoodAccess simplifies enterprise-grade security for modern, multi-cloud environments.
3
Check Point Harmony SASE Logo
Check Point Harmony SASE
4.7
(126)
Check Point Harmony SASE is a converged networking and network security platform which connects all users, in the office or remote, to all resources, located on-prem, cloud, SaaS or web. It delivers secure Zerto Trust Network Access (ZTNA) connectivity along web protection capabilities including Internet access control, malware protection, data loss prevention(DLP), and sandboxing, as well as a firewall as a service. The solution employs a hybrid architecture, combining on-device and cloud-based protections, which delivers market leading security and performance.
4
Zscaler Internet Access Logo
Zscaler Internet Access
4.4
(122)
Zscaler Internet Access delivers the complete security stack as a service from the cloud.
5
OpenVPN CloudConnexa Logo
OpenVPN CloudConnexa
4.6
(105)
CloudConnexa provides secure communication between an organization’s distributed workforce, IoT/IIoT devices, and the online services they rely on daily with a secure virtualized network, based on the market-proven OpenVPN protocol. Get started with 3 free connections.
6
Ivanti Connect Secure Logo
Ivanti Connect Secure
4.3
(87)
Ivanti Secure offers Always-On VPN and Lockdown Mode for compliance-focused businesses. These features protect all network traffic; from your team’s laptops at home to your corporate network, Ivanti Secure helps reduce the possibility of data loss or leakage. When an end user logs into their laptop using our Always-On VPN, our desktop client automatically makes a secure connection to the Ivanti Connect Secure gateway. Once connected, all traffic from the laptop is sent via a protected tunnel. Furthermore, the end user will remain constantly connected to the tunnel, ensuring that data-in-motion remains secure.
7
Citrix Secure Workspace Access Logo
Citrix Secure Workspace Access
4.5
(71)
Citrix Secure Workspace Access provides a comprehensive, zero-trust approach to deliver secure and contextual access to the corporate internal web apps, SaaS, and virtual applications. It enables the consolidation of traditional security products like VPN, single sign-on, and browser isolation technologies and provides advanced security controls for managed, unmanaged, and BYO devices. Citrix Secure Workspace Access provides a holistic security approach based on zero-trust principles, protecting users, applications, and corporate data against internet web threats and data exfiltration.
8
Twingate Logo
Twingate
4.7
(70)
Twingate secures remote access to private apps, data and environments, allowing businesses to replace corporate VPNs with a more secure, usable, performant and modern zero trust-based solution.
9
Prisma Access Logo
Prisma Access
4.3
(67)
Secure access service edge (SASE) for branch offices, retail locations and mobile users
10
Citrix Workspace Logo
Citrix Workspace
4.4
(56)
Citrix Workspace Essentials provides a comprehensive, zero-trust approach to deliver secure and contextual access to corporate internal web apps, SaaS, and virtual applications. With Citrix Workspace Essentials, IT can consolidate traditional security products such as VPN, single-sign on, multi-factor authentication, and provide usage analytics for Web and SaaS apps. Citrix Workspace Essentials provides end-users with simplified, secure, and VPN-less access to Web apps, SaaS, virtualized apps, and data.
Show More