You must be validated through LinkedIn or business email to access this page.

Best Security Products

2022

Nothing but the best software. Find the best software for anything and everything you want to accomplish, as decided by software buyers on the world’s largest and most trusted software marketplace.

G2 is proud to share our 2022 list of the Best Security Products

To qualify for the best Security software list, products must be listed under one or more of the Security child categories. G2's security software categories showcase products that enable both traditional security models to the latest in zero-trust security frameworks -- offering innovative security products from identity-management software, to cloud security software, to DevSecOps software, Email security, Network security, and more. Security solutions can be used to detect threats, evaluate vulnerabilities, protect devices, discover assets, manage access, prevent data loss, and secure network connections.

Check out our FAQs to learn more.

1

Product Avatar Image

Okta

Identity and Access Management (IAM)

Product Avatar Image
Okta

Okta is The World’s Identity Company™. As the leading independent Identity partner, we free everyone to safely use any technology — anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core

Okta is The World’s Identity Company™. As the leading independent Identity partner, we free everyone to safely use any technology — anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core

G2 Awards

Best Security Products 2022

Best Enterprise Products 2022

Best Mid-Market Products 2022

Best Software Products 2022

Relationship Leader Customer Identity and Access Management (CIAM) Winter 2023

Results Leader Customer Identity and Access Management (CIAM) Winter 2023

Grid Leader Customer Identity and Access Management (CIAM) Winter 2023

2

Product Avatar Image

Cynet - All-in-One Cybersecurity Platform

Endpoint Detection & Response (EDR)

Product Avatar Image
Cynet - All-in-One Cybersecurity Platform

AutoXDR™ converges multiple technologies (EPP, EDR, UBA, Deception, Network Analytics and vulnerability management), with a 24/7 cyber SWAT team, to provide unparalleled visibility and defend all domains of your internal network: endpoints, network, files and users, from all types of attacks.

AutoXDR™ converges multiple technologies (EPP, EDR, UBA, Deception, Network Analytics and vulnerability management), with a 24/7 cyber SWAT team, to provide unparalleled visibility and defend all domains of your internal network: endpoints, network, files and users, from all types of attacks.

G2 Awards

Best Security Products 2022

Relationship Leader User and Entity Behavior Analytics (UEBA) Winter 2023

Implementation Leader User and Entity Behavior Analytics (UEBA) Winter 2023

Relationship Leader Extended Detection and Response (XDR) Platforms Winter 2023

Implementation Leader Extended Detection and Response (XDR) Platforms Winter 2023

Results Leader User and Entity Behavior Analytics (UEBA) Winter 2023

3

Product Avatar Image

OneLogin

Identity and Access Management (IAM)

Product Avatar Image
OneLogin

Extend enterprise security & compliance to all public and private cloud apps with secure single sign-on (SSO), multi-factor authentication & user provisioning.

Extend enterprise security & compliance to all public and private cloud apps with secure single sign-on (SSO), multi-factor authentication & user provisioning.

G2 Awards

Best Security Products 2022

Implementation Leader Customer Identity and Access Management (CIAM) Winter 2023

Usability Leader Customer Identity and Access Management (CIAM) Winter 2023

Usability Leader Multi-Factor Authentication (MFA) Winter 2023

Relationship Leader Customer Identity and Access Management (CIAM) Winter 2023

Grid High performer Cloud Directory Services Winter 2023

Usability Leader User Provisioning and Governance Tools Winter 2023

4

Product Avatar Image

Avanan Cloud Email Security

Cloud Email Security

Product Avatar Image
Avanan Cloud Email Security

AVANAN protects your data in the cloud with the same industry-leading security you trust in your datacenter. The cloud-based platform is completely out-of-band, requires no proxy, and can be deployed in just 10 minutes.

AVANAN protects your data in the cloud with the same industry-leading security you trust in your datacenter. The cloud-based platform is completely out-of-band, requires no proxy, and can be deployed in just 10 minutes.

G2 Awards

Best Security Products 2022

Results Leader Data Security Winter 2023

Implementation Leader Cloud File Security Winter 2023

Implementation Leader Cloud Email Security Winter 2023

Implementation Leader Email Anti-spam Winter 2023

Relationship Leader Data Loss Prevention (DLP) Winter 2023

5

Product Avatar Image

JumpCloud

Cloud Directory Services

Product Avatar Image
JumpCloud

The JumpCloud Directory Platform reimagines the directory as a complete platform for identity, access, and device management.

The JumpCloud Directory Platform reimagines the directory as a complete platform for identity, access, and device management.

G2 Awards

Best Global Sellers 2022

Best Security Products 2022

Best Software Products 2022

Highest Satisfaction Products 2022

Fastest Growing Products 2022

Grid Leader User Provisioning and Governance Tools Winter 2023

Relationship Leader Privileged Access Management (PAM) Winter 2023

Momentum Leader Privileged Access Management (PAM) Winter 2023

Usability Leader Identity and Access Management (IAM) Winter 2023

Grid Leader Cloud Directory Services Winter 2023

6

Product Avatar Image

Rippling

Core HR

Product Avatar Image
Rippling

A Single, Modern System for Your Payroll, Benefits, HR & IT.

A Single, Modern System for Your Payroll, Benefits, HR & IT.

Categories

G2 Awards

Best Security Products 2022

Best Global Sellers 2022

Best HR Products 2022

Best Mid-Market Products 2022

Best Small Business Products 2022

Highest Satisfaction Products 2022

Best Software Products 2022

Implementation Leader Multi-Country Payroll Winter 2023

Implementation Leader Corporate Learning Management Systems Winter 2023

7

Product Avatar Image

CrowdStrike Falcon Endpoint Protection Platform

Endpoint Protection Suites

Product Avatar Image
CrowdStrike Falcon Endpoint Protection Platform

CrowdStrike Falcon endpoint protection unifies the technologies required to successfully stop breaches: next-generation antivirus, endpoint detection and response, IT hygiene, 24/7 threat hunting and threat intelligence. They combine to provide continuous breach prevention in a single agent.

CrowdStrike Falcon endpoint protection unifies the technologies required to successfully stop breaches: next-generation antivirus, endpoint detection and response, IT hygiene, 24/7 threat hunting and threat intelligence. They combine to provide continuous breach prevention in a single agent.

G2 Awards

Best Security Products 2022

Best Office Products 2022

Fastest Growing Products 2022

Grid Leader Extended Detection and Response (XDR) Platforms Winter 2023

Usability Leader Endpoint Management Winter 2023

Implementation Leader Antivirus Winter 2023

Implementation Leader Threat Intelligence Winter 2023

Grid Leader Endpoint Protection Platforms Winter 2023

8

Product Avatar Image

Sophos Endpoint

Endpoint Protection Suites

Product Avatar Image
Sophos Endpoint

Sophos Intercept X is the world’s most comprehensive endpoint protection solution. Built to stop the widest range of attacks, Intercept X has been proven to prevent even the most advanced ransomware and malware by leveraging a unique combination of next-generation techniques. This includes the abili

Sophos Intercept X is the world’s most comprehensive endpoint protection solution. Built to stop the widest range of attacks, Intercept X has been proven to prevent even the most advanced ransomware and malware by leveraging a unique combination of next-generation techniques. This includes the abili

G2 Awards

Best Security Products 2022

Best EMEA Sellers 2022

Grid Leader Extended Detection and Response (XDR) Platforms Winter 2023

Grid Leader Endpoint Detection & Response (EDR) Winter 2023

Grid Leader Endpoint Protection Suites Winter 2023

Grid Leader Antivirus Winter 2023

Asia Leader Antivirus Winter 2023

9

Product Avatar Image

Proofpoint Email Security and Protection

Secure Email Gateway

Product Avatar Image
Proofpoint Email Security and Protection

Proofpoint Email Security and Protection stops malware and non-malware threats such as impostor email.

Proofpoint Email Security and Protection stops malware and non-malware threats such as impostor email.

G2 Awards

Best Security Products 2022

Grid Leader Secure Email Gateway Winter 2023

Relationship Leader Secure Email Gateway Winter 2023

Grid Leader Intelligent Email Protection Winter 2023

Grid Leader Cloud Email Security Winter 2023

Relationship Leader Cloud Email Security Winter 2023

Grid Leader Email Anti-spam Winter 2023

Grid Leader Email Encryption Winter 2023

Usability Leader Cloud Email Security Winter 2023

10

Product Avatar Image

InsightIDR

Incident Response

Product Avatar Image
InsightIDR

InsightIDR is designed to reduce risk of breach, detect and respond to attacks, and build effective cybersecurity programs.

InsightIDR is designed to reduce risk of breach, detect and respond to attacks, and build effective cybersecurity programs.

G2 Awards

Best Security Products 2022

Grid Leader Network Detection and Response (NDR) Winter 2023

Implementation Leader Extended Detection and Response (XDR) Platforms Winter 2023

Grid Leader Network Traffic Analysis (NTA) Winter 2023

Grid Leader Extended Detection and Response (XDR) Platforms Winter 2023

Usability Leader Extended Detection and Response (XDR) Platforms Winter 2023

Grid Leader Incident Response Winter 2023

Grid Leader Cloud Security Winter 2023

11

Product Avatar Image

IBM QRadar SIEM

Security Information and Event Management (SIEM)

Product Avatar Image
IBM QRadar SIEM

IBM QRadar is designed to collect logs, events, network flows and user behavior across your entire enterprise, correlates that against threat intelligence and vulnerability data to detect known threats, and applies advanced analytics to identify anomalies that may signal unknown threats. The solutio

IBM QRadar is designed to collect logs, events, network flows and user behavior across your entire enterprise, correlates that against threat intelligence and vulnerability data to detect known threats, and applies advanced analytics to identify anomalies that may signal unknown threats. The solutio

G2 Awards

Best Security Products 2022

Usability Leader Security Information and Event Management (SIEM) Winter 2023

Grid Leader Cloud Security Monitoring and Analytics Winter 2023

Usability Leader Incident Response Winter 2023

Results Leader Incident Response Winter 2023

Grid Leader Network Traffic Analysis (NTA) Winter 2023

Grid Leader Security Information and Event Management (SIEM) Winter 2023

12

Product Avatar Image

GitLab

Version Control Hosting

Product Avatar Image
GitLab

An open source web interface and source control platform based on Git.

An open source web interface and source control platform based on Git.

G2 Awards

Best Development Products 2022

Best Global Sellers 2022

Best Security Products 2022

Best Software Products 2022

Asia Leader Continuous Integration Winter 2023

Grid Leader Value Stream Management Winter 2023

Momentum Leader DevOps Platforms Winter 2023

Usability Leader Continuous Integration Winter 2023

Grid Leader Application Release Orchestration Winter 2023

13

Product Avatar Image

ESET PROTECT

Endpoint Protection Suites

Product Avatar Image
ESET PROTECT

ESET PROTECT is a cutting-edge cybersecurity platform that leverages the latest in AI, state-of-the-art technologies, and human expertise to safeguard your organization from emerging threats and zero-day attacks. As a cloud-first XDR solution, it integrates unique threat intelligence to deliver next

ESET PROTECT is a cutting-edge cybersecurity platform that leverages the latest in AI, state-of-the-art technologies, and human expertise to safeguard your organization from emerging threats and zero-day attacks. As a cloud-first XDR solution, it integrates unique threat intelligence to deliver next

G2 Awards

Best Security Products 2022

Best EMEA Sellers 2022

Usability Leader Mobile Data Security Winter 2023

Momentum Leader Mobile Data Security Winter 2023

Grid Leader Antivirus Winter 2023

Grid Leader Endpoint Protection Suites Winter 2023

Grid Leader Mobile Data Security Winter 2023

Grid High performer Cloud File Security Winter 2023

Grid Leader Email Anti-spam Winter 2023

14

Product Avatar Image

LastPass

Password Managers

Product Avatar Image
LastPass

LastPass business solutions help teams & businesses take control of their identity management with password management, single sign-on (SSO), and adaptive multifactor authentication (MFA).

LastPass business solutions help teams & businesses take control of their identity management with password management, single sign-on (SSO), and adaptive multifactor authentication (MFA).

G2 Awards

Best Security Products 2022

Results Leader Passwordless Authentication Winter 2023

Implementation Leader Passwordless Authentication Winter 2023

Relationship Leader Passwordless Authentication Winter 2023

Implementation Leader Multi-Factor Authentication (MFA) Winter 2023

15

Product Avatar Image

Microsoft Entra ID

Identity and Access Management (IAM)

Product Avatar Image
Microsoft Entra ID

Entra ID is a comprehensive identity and access management cloud solution that provides a robust set of capabilities to manage users and groups and help secure access to applications including Microsoft online services like Office 365 and a world of non-Microsoft SaaS applications.

Entra ID is a comprehensive identity and access management cloud solution that provides a robust set of capabilities to manage users and groups and help secure access to applications including Microsoft online services like Office 365 and a world of non-Microsoft SaaS applications.

G2 Awards

Best Security Products 2022

Best Global Sellers 2022

Implementation Leader Self-Service Password Reset (SSPR) Tools Winter 2023

Grid Leader Privileged Access Management (PAM) Winter 2023

Relationship Leader Self-Service Password Reset (SSPR) Tools Winter 2023

Momentum Leader Self-Service Password Reset (SSPR) Tools Winter 2023

Grid Leader Self-Service Password Reset (SSPR) Tools Winter 2023

Grid Leader Cloud Directory Services Winter 2023

16

Product Avatar Image

BetterCloud

SaaS Operations Management

Product Avatar Image
BetterCloud

BetterCloud provides critical insights, automated management, and intelligent data security for cloud office platforms.

BetterCloud provides critical insights, automated management, and intelligent data security for cloud office platforms.

G2 Awards

Best Security Products 2022

Best IT Management Products 2022

Grid Leader Cloud File Security Winter 2023

Grid Leader Data Loss Prevention (DLP) Winter 2023

Grid Leader SaaS Operations Management Winter 2023

Relationship Leader User Provisioning and Governance Tools Winter 2023

Implementation Leader User Provisioning and Governance Tools Winter 2023

17

Product Avatar Image

CrowdSec

Intrusion Detection and Prevention Systems (IDPS)

Product Avatar Image
CrowdSec

CrowdSec is a collaborative, free and open source security automation platform relying on both IP behavior analysis and IP reputation. CrowdSec identifies threats and shares IP addresses behind malevolent behaviors across its community, to allow everyone to block them preventively. Used in 90 countr

CrowdSec is a collaborative, free and open source security automation platform relying on both IP behavior analysis and IP reputation. CrowdSec identifies threats and shares IP addresses behind malevolent behaviors across its community, to allow everyone to block them preventively. Used in 90 countr

G2 Awards

Best Security Products 2022

Results Leader Intrusion Detection and Prevention Systems (IDPS) Winter 2023

Relationship Leader Intrusion Detection and Prevention Systems (IDPS) Winter 2023

Results Leader Container Security Winter 2023

Momentum Leader Intrusion Detection and Prevention Systems (IDPS) Winter 2023

Results Leader Firewall Software Winter 2023

18

Product Avatar Image

Cisco Duo

Zero Trust Networking

Product Avatar Image
Cisco Duo

Duo is a cloud-based access security platform built to protect access to any application, from any device. Duo’s passwordless authentication, single sign-on (SSO) and user-friendly multi-factor authentication make secure logins easy for users, reducing friction to their workflow.

Duo is a cloud-based access security platform built to protect access to any application, from any device. Duo’s passwordless authentication, single sign-on (SSO) and user-friendly multi-factor authentication make secure logins easy for users, reducing friction to their workflow.

G2 Awards

Best Security Products 2022

Best Global Sellers 2022

Momentum Leader Passwordless Authentication Winter 2023

Relationship Leader Multi-Factor Authentication (MFA) Winter 2023

Momentum Leader Risk-Based Authentication (RBA) Winter 2023

Usability Leader Multi-Factor Authentication (MFA) Winter 2023

Grid Leader Multi-Factor Authentication (MFA) Winter 2023

Grid Leader Passwordless Authentication Winter 2023

Grid Leader Cloud Security Winter 2023

19

Product Avatar Image

GitHub

Version Control Hosting

Product Avatar Image
GitHub

GitHub is the best place to share code with friends, co-workers, classmates, and complete strangers. Over two million people use GitHub to build amazing things together.

GitHub is the best place to share code with friends, co-workers, classmates, and complete strangers. Over two million people use GitHub to build amazing things together.

G2 Awards

Best Development Products 2022

Best Global Sellers 2022

Best Security Products 2022

Best Software Products 2022

Results Leader Continuous Delivery Winter 2023

Grid Leader Continuous Integration Winter 2023

20

Product Avatar Image

Beagle Security

Website Security

Product Avatar Image
Beagle Security

Beagle Security is a web application penetration testing tool that helps you to identify vulnerabilities on your web application before hackers exploit them.

Beagle Security is a web application penetration testing tool that helps you to identify vulnerabilities on your web application before hackers exploit them.

G2 Awards

Best Security Products 2022

Grid Leader Website Security Winter 2023

Implementation Leader Dynamic Application Security Testing (DAST) Winter 2023

Grid High performer API Security Winter 2023

Momentum Leader Penetration Testing Winter 2023

Europe High performer Vulnerability Scanner Winter 2023

Grid High performer Penetration Testing Winter 2023

Momentum Leader Website Security Winter 2023

Implementation Leader Vulnerability Scanner Winter 2023

21

Product Avatar Image

Symantec Protection Suite Enterprise Edition

Endpoint Management

Product Avatar Image
Symantec Protection Suite Enterprise Edition

Symantec Protection Suite Enterprise Edition combines best-of-breed products to secure your endpoint and email infrastructure. It delivers protection against complex malware, data loss, and spam threats along with industry-leading messaging protection.

Symantec Protection Suite Enterprise Edition combines best-of-breed products to secure your endpoint and email infrastructure. It delivers protection against complex malware, data loss, and spam threats along with industry-leading messaging protection.

G2 Awards

Best Security Products 2022

22

Product Avatar Image

WatchGuard Endpoint Security

Endpoint Management

Product Avatar Image
WatchGuard Endpoint Security

Panda Endpoint Protection provides centralized protection for all of your Windows, Mac and Linux workstations, including laptops, smartphones and the leading virtualization systems.

Panda Endpoint Protection provides centralized protection for all of your Windows, Mac and Linux workstations, including laptops, smartphones and the leading virtualization systems.

G2 Awards

Best Security Products 2022

Latin America High performer Antivirus Winter 2023

Grid High performer Endpoint Detection & Response (EDR) Winter 2023

Europe High performer Endpoint Protection Suites Winter 2023

Momentum Leader Antivirus Winter 2023

Europe High performer Antivirus Winter 2023

Grid Leader Antivirus Winter 2023

Grid High performer Antivirus Winter 2023

23

Product Avatar Image

ThreatDown

Endpoint Protection Suites

Product Avatar Image
ThreatDown

Actively protect against all forms of Malware, Improve your protection without changing your AV, Renowned protection and cleanup technologies, Tool most recommended by techs and super users.

Actively protect against all forms of Malware, Improve your protection without changing your AV, Renowned protection and cleanup technologies, Tool most recommended by techs and super users.

G2 Awards

Best Security Products 2022

Usability Leader Endpoint Protection Suites Winter 2023

Grid Leader Endpoint Protection Suites Winter 2023

Usability Leader Endpoint Management Winter 2023

Relationship Leader Endpoint Protection Suites Winter 2023

Usability Leader Antivirus Winter 2023

Grid Leader Endpoint Management Winter 2023

24

Product Avatar Image

Webroot Business Endpoint Protection

Endpoint Protection Suites

Product Avatar Image
Webroot Business Endpoint Protection

Webroot SecureAnywhere Business Endpoint Protection offers a revolutionary approach to malware protection.

Webroot SecureAnywhere Business Endpoint Protection offers a revolutionary approach to malware protection.

G2 Awards

Best Security Products 2022

Implementation Leader Endpoint Management Winter 2023

Implementation Leader Endpoint Protection Suites Winter 2023

Grid Leader Endpoint Management Winter 2023

Results Leader Antivirus Winter 2023

Usability Leader Endpoint Protection Suites Winter 2023

25

Product Avatar Image

Microsoft System Center

Data Center Infrastructure Management (DCIM)

Product Avatar Image
Microsoft System Center

Microsoft System Center helps customers realize the benefits of the Microsoft Cloud Platform by delivering unified management. Experience fast time-to-value with out-of-the-box monitoring, provisioning, configuration, automation, protection and self-service.

Microsoft System Center helps customers realize the benefits of the Microsoft Cloud Platform by delivering unified management. Experience fast time-to-value with out-of-the-box monitoring, provisioning, configuration, automation, protection and self-service.

G2 Awards

Best IT Infrastructure Products 2022

Best Global Sellers 2022

Best Security Products 2022

Best IT Management Products 2022

Grid Leader Data Center Infrastructure Management (DCIM) Winter 2023

Usability Leader Data Center Infrastructure Management (DCIM) Winter 2023

Relationship Leader Data Center Infrastructure Management (DCIM) Winter 2023

Implementation Leader Data Center Infrastructure Management (DCIM) Winter 2023

Grid Leader Enterprise IT Management Winter 2023

Usability Leader Network Security Policy Management (NSPM) Winter 2023

26

Product Avatar Image

Symantec End-user Endpoint Security

Endpoint Protection Suites

Product Avatar Image
Symantec End-user Endpoint Security

Proactively detect and block today's most advanced threats with an endpoint protection solution that goes beyond antivirus.

Proactively detect and block today's most advanced threats with an endpoint protection solution that goes beyond antivirus.

G2 Awards

Best Security Products 2022

Asia Pacific Leader Endpoint Protection Suites Winter 2023

Asia Leader Endpoint Protection Suites Winter 2023

Middle East & Africa Leader Antivirus Winter 2023

Europe Leader Antivirus Winter 2023

Results Leader Antivirus Winter 2023

Grid Leader Endpoint Protection Suites Winter 2023

Relationship Leader Endpoint Protection Suites Winter 2023

Asia Leader Antivirus Winter 2023

27

Product Avatar Image

Hybrid Cloud Security

Cloud Workload Protection Platforms

Product Avatar Image
Hybrid Cloud Security

Hybrid Cloud Security solution, powered by XGen security, delivers a blend of cross-generational threat defense techniques that have been optimized to protect physical, virtual, and cloud workloads.

Hybrid Cloud Security solution, powered by XGen security, delivers a blend of cross-generational threat defense techniques that have been optimized to protect physical, virtual, and cloud workloads.

G2 Awards

Best Security Products 2022

Grid Leader Cloud Workload Protection Platforms Winter 2023

Grid Leader Intrusion Detection and Prevention Systems (IDPS) Winter 2023

Results Leader Cloud Workload Protection Platforms Winter 2023

Grid Leader Cloud Data Security Winter 2023

Grid Leader Cloud Compliance Winter 2023

Asia Leader Vulnerability Scanner Winter 2023

28

Product Avatar Image

FortiGate NGFW

Firewall Software

Product Avatar Image
FortiGate NGFW

FortiGate offers a network security platform, designed to deliver threat protection and performance with reduced complexity.

FortiGate offers a network security platform, designed to deliver threat protection and performance with reduced complexity.

G2 Awards

Best Security Products 2022

Grid Leader Firewall Software Winter 2023

Momentum Leader Unified Threat Management (UTM) Winter 2023

Grid Leader Unified Threat Management (UTM) Winter 2023

Grid Leader Threat Intelligence Winter 2023

Relationship Leader Firewall Software Winter 2023

Usability Leader Firewall Software Winter 2023

29

Product Avatar Image

Check Point Harmony Endpoint

Endpoint Protection Suites

Product Avatar Image
Check Point Harmony Endpoint

Check Point Endpoint Security combines data security, network security, threat prevention technologies and remote access VPN into one package for complete Windows and Mac OS X protection.

Check Point Endpoint Security combines data security, network security, threat prevention technologies and remote access VPN into one package for complete Windows and Mac OS X protection.

G2 Awards

Best Security Products 2022

Europe Leader Endpoint Protection Suites Winter 2023

Europe Leader Endpoint Management Winter 2023

Asia High performer Endpoint Protection Suites Winter 2023

Europe Leader Antivirus Winter 2023

Asia Pacific High performer Endpoint Protection Suites Winter 2023

Results Leader Endpoint Protection Suites Winter 2023

Grid Leader Endpoint Protection Suites Winter 2023

Grid Leader Antivirus Winter 2023

30

Product Avatar Image

Dynatrace

Application Performance Monitoring (APM)

Product Avatar Image
Dynatrace

Dynatrace has redefined how you monitor today’s digital ecosystems. AI-powered, full stack and completely automated, it’s the only solution that provides answers, not just data, based on deep insight into every user, every transaction, across every application. The world’s leading brands trust Dynat

Dynatrace has redefined how you monitor today’s digital ecosystems. AI-powered, full stack and completely automated, it’s the only solution that provides answers, not just data, based on deep insight into every user, every transaction, across every application. The world’s leading brands trust Dynat

G2 Awards

Best Global Sellers 2022

Best IT Infrastructure Products 2022

Best IT Management Products 2022

Best Security Products 2022

Best Software Products 2022

Grid Leader Container Monitoring Winter 2023

Grid Leader Database Monitoring Winter 2023

Grid Leader Log Analysis Winter 2023

Grid Leader Website Monitoring Winter 2023

Grid Leader Cloud Infrastructure Monitoring Winter 2023

31

Product Avatar Image

WatchGuard Network Security

Unified Threat Management (UTM)

Product Avatar Image
WatchGuard Network Security

WatchGuard has deployed nearly a million integrated, multi-function threat management appliances worldwide. Our signature red boxes are architected to be the industry's smartest, fastest, and meanest security devices with every scanning engine running at full throttle.

WatchGuard has deployed nearly a million integrated, multi-function threat management appliances worldwide. Our signature red boxes are architected to be the industry's smartest, fastest, and meanest security devices with every scanning engine running at full throttle.

G2 Awards

Best Security Products 2022

Usability Leader Unified Threat Management (UTM) Winter 2023

Results Leader Unified Threat Management (UTM) Winter 2023

Usability Leader Encryption Winter 2023

Relationship Leader Unified Threat Management (UTM) Winter 2023

32

Product Avatar Image

Tenable Security Center

Risk-Based Vulnerability Management

Product Avatar Image
Tenable Security Center

Tenable, Inc. is the Cyber Exposure company that provides solutions on reducing cyber risk

Tenable, Inc. is the Cyber Exposure company that provides solutions on reducing cyber risk

G2 Awards

Best Security Products 2022

Results Leader Risk-Based Vulnerability Management Winter 2023

Relationship Leader Risk-Based Vulnerability Management Winter 2023

Grid Leader Risk-Based Vulnerability Management Winter 2023

Grid Leader Vulnerability Scanner Winter 2023

Usability Leader Risk-Based Vulnerability Management Winter 2023

Asia Leader Vulnerability Scanner Winter 2023

33

Product Avatar Image

FortiClient

Endpoint Protection Suites

Product Avatar Image
FortiClient

FortiClient Fabric Agent integrates endpoints into the Security Fabric and provides endpoint telemetry, including user identity, protection status, risk scores, unpatched vulnerabilities, security events, and more.

FortiClient Fabric Agent integrates endpoints into the Security Fabric and provides endpoint telemetry, including user identity, protection status, risk scores, unpatched vulnerabilities, security events, and more.

G2 Awards

Best Security Products 2022

Grid Leader Endpoint Management Winter 2023

Momentum Leader Antivirus Winter 2023

Asia Pacific Leader Endpoint Protection Suites Winter 2023

Asia Leader Endpoint Protection Suites Winter 2023

Momentum Leader Endpoint Protection Suites Winter 2023

Asia Pacific Leader Antivirus Winter 2023

Latin America Leader Antivirus Winter 2023

Asia Pacific Leader Endpoint Management Winter 2023

34

Product Avatar Image

Acronis Cyber Protect

Endpoint Management

G2 Awards

Best EMEA Sellers 2022

Best Security Products 2022

Grid Leader Patch Management Winter 2023

Best Global Sellers 2022

Implementation Leader Antivirus Winter 2023

Relationship Leader Patch Management Winter 2023

Usability Leader Patch Management Winter 2023

Momentum Leader Antivirus Winter 2023

Relationship Leader Endpoint Management Winter 2023

Relationship Leader Antivirus Winter 2023

Grid High performer Antivirus Winter 2023

35

Product Avatar Image

InsightVM (Nexpose)

Cloud Security Monitoring and Analytics

Product Avatar Image
InsightVM (Nexpose)

Continuously identify and assess risk across your cloud, virtual, remote, local, and containerized infrastructure. Leverage unparalleled attacker analytics to prioritize vulns more precisely with a Real Risk score that goes beyond just CVSS. Break down the silos between IT, security, and development

Continuously identify and assess risk across your cloud, virtual, remote, local, and containerized infrastructure. Leverage unparalleled attacker analytics to prioritize vulns more precisely with a Real Risk score that goes beyond just CVSS. Break down the silos between IT, security, and development

G2 Awards

Best Security Products 2022

Results Leader Vulnerability Scanner Winter 2023

Implementation Leader Risk-Based Vulnerability Management Winter 2023

Implementation Leader Vulnerability Scanner Winter 2023

36

Product Avatar Image

Virtru Email Encryption

Email Encryption

Product Avatar Image
Virtru Email Encryption

Virtru puts you in charge of how your digital information is shared. Combining control, convenience, and simplicity, Virtru makes it easy to keep your private communications private.

Virtru puts you in charge of how your digital information is shared. Combining control, convenience, and simplicity, Virtru makes it easy to keep your private communications private.

G2 Awards

Best Security Products 2022

Momentum Leader Email Encryption Winter 2023

Relationship Leader Email Encryption Winter 2023

Momentum Leader Data-Centric Security Winter 2023

Grid Leader Email Encryption Winter 2023

Grid High performer Data-Centric Security Winter 2023

Momentum Leader Encryption Winter 2023

Momentum Leader Cloud File Security Winter 2023

37

Product Avatar Image

Trend Vision One - Endpoint Security

Endpoint Protection Suites

Product Avatar Image
Trend Vision One - Endpoint Security

Trend Micro Endpoint Security provides immediate protection for enterprise endpoints lowering infections by instantly securing end-points from sophisticated cybercriminal attacks

Trend Micro Endpoint Security provides immediate protection for enterprise endpoints lowering infections by instantly securing end-points from sophisticated cybercriminal attacks

G2 Awards

Best Security Products 2022

Grid Leader Endpoint Protection Suites Winter 2023

Grid Leader Endpoint Protection Suites Fall 2022

Grid High performer Extended Detection and Response (XDR) Platforms Fall 2022

Implementation Leader Endpoint Protection Suites Fall 2022

Grid Leader Extended Detection and Response (XDR) Platforms Summer 2022

38

Product Avatar Image

CloudGuard Posture Management

Cloud Content Collaboration

Product Avatar Image
CloudGuard Posture Management

Using CloudGuard Posture Management (Dome9), organizations can visualize and assess their security posture, detect misconfigurations, model and actively enforce security best practices, and protect against identity theft and data loss in the cloud.

Using CloudGuard Posture Management (Dome9), organizations can visualize and assess their security posture, detect misconfigurations, model and actively enforce security best practices, and protect against identity theft and data loss in the cloud.

G2 Awards

Best Security Products 2022

Grid Leader Cloud Compliance Winter 2023

Grid Leader Cloud Data Security Winter 2023

Grid High performer Cloud Workload Protection Platforms Winter 2023

Asia Leader Cloud Content Collaboration Winter 2023

India High performer Cloud Content Collaboration Winter 2023

Grid Leader Cloud Security Winter 2023

39

Product Avatar Image

Tenable Nessus

Vulnerability Scanner

Product Avatar Image
Tenable Nessus

From the beginning, we've worked hand-in-hand with the security community. We continuously optimize Nessus based on community feedback to make it the most accurate and comprehensive vulnerability assessment solution in the market. 20 years later and we're still laser focused on community collaborati

From the beginning, we've worked hand-in-hand with the security community. We continuously optimize Nessus based on community feedback to make it the most accurate and comprehensive vulnerability assessment solution in the market. 20 years later and we're still laser focused on community collaborati

G2 Awards

Best Security Products 2022

Grid Leader Vulnerability Scanner Winter 2023

Asia Leader Vulnerability Scanner Winter 2023

Usability Leader Vulnerability Scanner Winter 2023

India Leader Vulnerability Scanner Winter 2023

Asia Pacific Leader Vulnerability Scanner Winter 2023

40

Product Avatar Image

Citrix Workspace

Unified Workspaces

Product Avatar Image
Citrix Workspace

Citrix Workspace (featuring Citrix Virtual Apps and Desktops) is a complete secure digital workspace, designed to empower people to work better anytime, anywhere without distractions. It seamlessly integrates with your existing systems, so you can focus on driving digital transformation.

Citrix Workspace (featuring Citrix Virtual Apps and Desktops) is a complete secure digital workspace, designed to empower people to work better anytime, anywhere without distractions. It seamlessly integrates with your existing systems, so you can focus on driving digital transformation.

G2 Awards

Best IT Infrastructure Products 2022

Best Security Products 2022

Grid Leader Unified Endpoint Management (UEM) Spring 2022

Usability Leader Unified Endpoint Management (UEM) Spring 2022

Grid Leader Virtual Desktop Infrastructure (VDI) Spring 2022

Relationship Leader Unified Endpoint Management (UEM) Spring 2022

Relationship Leader Virtual Desktop Infrastructure (VDI) Spring 2022

Grid Leader Desktop as a Service (DaaS) Spring 2022

41

Product Avatar Image

KnowBe4 PhishER/PhishER Plus

Security Orchestration, Automation, and Response (SOAR)

Product Avatar Image
KnowBe4 PhishER/PhishER Plus

KnowBe4 PhishER is the key ingredient of an essential security workstream. It's your lightweight Security Orchestration, Automation and Response (SOAR) platform to orchestrate your threat response and manage the high volume of potentially malicious email messages reported by your users. And, with a

KnowBe4 PhishER is the key ingredient of an essential security workstream. It's your lightweight Security Orchestration, Automation and Response (SOAR) platform to orchestrate your threat response and manage the high volume of potentially malicious email messages reported by your users. And, with a

G2 Awards

Best Security Products 2022

Grid Leader Incident Response Winter 2023

Implementation Leader Incident Response Winter 2023

Momentum Leader Incident Response Winter 2023

Grid Leader Security Orchestration, Automation, and Response (SOAR) Winter 2023

Relationship Leader Incident Response Winter 2023

42

Product Avatar Image

Acronis Cyber Protect Cloud

Cloud Data Security

Product Avatar Image
Acronis Cyber Protect Cloud

Acronis Cyber Protect Cloud unites backup and next-generation, AI-based anti-malware, antivirus, and endpoint protection management in one solution. Integration and automation provide unmatched ease for service providers — reducing complexity while increasing productivity and decreasing operating co

Acronis Cyber Protect Cloud unites backup and next-generation, AI-based anti-malware, antivirus, and endpoint protection management in one solution. Integration and automation provide unmatched ease for service providers — reducing complexity while increasing productivity and decreasing operating co

G2 Awards

Best IT Management Products 2022

Best Global Sellers 2022

Best Security Products 2022

Best EMEA Sellers 2022

Europe Leader SaaS Backup Winter 2023

Grid Leader Patch Management Winter 2023

Momentum Leader SaaS Backup Winter 2023

Usability Leader SaaS Backup Winter 2023

Grid Leader Cloud Data Security Winter 2023

Grid Leader Cloud Security Winter 2023

Relationship Leader Cloud Data Security Winter 2023

43

Product Avatar Image

Tenable Vulnerability Management

Risk-Based Vulnerability Management

Product Avatar Image
Tenable Vulnerability Management

Tenable.io is the only cybersecurity company that empowers customers to gain control of their risk by knowing and prioritizing vulnerabilities across their entire attack surface including traditional, cloud, mobile and DevOps environments.

Tenable.io is the only cybersecurity company that empowers customers to gain control of their risk by knowing and prioritizing vulnerabilities across their entire attack surface including traditional, cloud, mobile and DevOps environments.

G2 Awards

Best Security Products 2022

Grid Leader Risk-Based Vulnerability Management Winter 2023

Grid Leader Vulnerability Scanner Winter 2023

Implementation Leader Risk-Based Vulnerability Management Winter 2023

Grid Leader Risk-Based Vulnerability Management Summer 2022

Grid Leader Risk-Based Vulnerability Management Spring 2022

44

Product Avatar Image

PingFederate

Single Sign-On (SSO)

Product Avatar Image
PingFederate

PingFederate is an enterprise federation server that enables user authentication and single sign-on. It serves as a global authentication authority that allows employees, customers and partners to securely access all the applications they need from any device.

PingFederate is an enterprise federation server that enables user authentication and single sign-on. It serves as a global authentication authority that allows employees, customers and partners to securely access all the applications they need from any device.

G2 Awards

Best Security Products 2022

Grid High performer Self-Service Password Reset (SSPR) Tools Winter 2023

Implementation Leader Single Sign-On (SSO) Winter 2023

Grid High performer Single Sign-On (SSO) Winter 2023

Grid Leader Single Sign-On (SSO) Winter 2023

Grid High performer Self-Service Password Reset (SSPR) Tools Fall 2022

Implementation Leader Single Sign-On (SSO) Fall 2022

Grid High performer Single Sign-On (SSO) Fall 2022

Grid Leader Single Sign-On (SSO) Fall 2022

45

Product Avatar Image

NinjaOne

Endpoint Management

Product Avatar Image
NinjaOne

NinjaOne, the automated endpoint management platform, delivers real-time visibility, security, and control over all endpoints to increase productivity for more than 20,000 customers.

NinjaOne, the automated endpoint management platform, delivers real-time visibility, security, and control over all endpoints to increase productivity for more than 20,000 customers.

G2 Awards

Best IT Management Products 2022

Best IT Infrastructure Products 2022

Fastest Growing Products 2022

Best Security Products 2022

Relationship Leader Remote Monitoring & Management (RMM) Winter 2023

Usability Leader Incident Management Winter 2023

Relationship Leader Incident Management Winter 2023

Relationship Leader Endpoint Management Winter 2023

46

Product Avatar Image

Palo Alto Networks Panorama

Network Security Policy Management (NSPM)

Product Avatar Image
Palo Alto Networks Panorama

Panorama network security management provides static rules and dynamic security updates in an ever-changing threat landscape. Reduce administrator workload and improve your overall security posture with a single rule base for firewall, threat prevention, URL filtering, application awareness, iser id

Panorama network security management provides static rules and dynamic security updates in an ever-changing threat landscape. Reduce administrator workload and improve your overall security posture with a single rule base for firewall, threat prevention, URL filtering, application awareness, iser id

G2 Awards

Best Security Products 2022

Momentum Leader Network Security Policy Management (NSPM) Winter 2023

Grid Leader Network Security Policy Management (NSPM) Winter 2023

Implementation Leader Zero Trust Networking Winter 2023

Grid Leader Network Security Policy Management (NSPM) Fall 2022

Grid Leader Network Security Policy Management (NSPM) Summer 2022

Grid Leader Network Security Policy Management (NSPM) Spring 2022

47

Product Avatar Image

Absolute Secure Endpoint

Endpoint Protection Platforms

Product Avatar Image
Absolute Secure Endpoint

Absolute accelerates its customers’ shift to work-from-anywhere through the industry’s first self-healing Zero Trust platform, helping to ensure maximum security and uncompromised productivity. Absolute is the only solution embedded in more than half a billion devices, offering a permanent digital c

Absolute accelerates its customers’ shift to work-from-anywhere through the industry’s first self-healing Zero Trust platform, helping to ensure maximum security and uncompromised productivity. Absolute is the only solution embedded in more than half a billion devices, offering a permanent digital c

G2 Awards

Best Security Products 2022

Implementation Leader Unified Endpoint Management (UEM) Winter 2023

Usability Leader Unified Endpoint Management (UEM) Winter 2023

Relationship Leader Unified Endpoint Management (UEM) Winter 2023

Results Leader Unified Endpoint Management (UEM) Winter 2023

Grid Leader Unified Endpoint Management (UEM) Winter 2023

48

Product Avatar Image

Fortra VM

Risk-Based Vulnerability Management

Product Avatar Image
Fortra VM

Fortra VM, a Frontline.Cloud™ system, is the industry’s most comprehensive, accurate, and easy-to-use SaaS vulnerability management solution—bar none. Using our proprietary scanning technology, our vulnerability management solution performs comprehensive security assessments and helps prioritize and

Fortra VM, a Frontline.Cloud™ system, is the industry’s most comprehensive, accurate, and easy-to-use SaaS vulnerability management solution—bar none. Using our proprietary scanning technology, our vulnerability management solution performs comprehensive security assessments and helps prioritize and

G2 Awards

Best Security Products 2022

Usability Leader Vulnerability Scanner Winter 2023

Implementation Leader Vulnerability Scanner Winter 2023

Implementation Leader Risk-Based Vulnerability Management Winter 2023

Momentum Leader Risk-Based Vulnerability Management Winter 2023

Relationship Leader Risk-Based Vulnerability Management Winter 2023

Usability Leader Risk-Based Vulnerability Management Winter 2023

Grid High performer Risk-Based Vulnerability Management Winter 2023

49

Product Avatar Image

Microsoft Authenticator

Multi-Factor Authentication (MFA)

Product Avatar Image
Microsoft Authenticator

Conveniently and securely sign in to all your online accounts using multifactor authentication, passwordless sign-in or password autofill with Microsoft Authenticator.

Conveniently and securely sign in to all your online accounts using multifactor authentication, passwordless sign-in or password autofill with Microsoft Authenticator.

G2 Awards

Best Global Sellers 2022

Best Security Products 2022

Grid Leader Multi-Factor Authentication (MFA) Winter 2023

Relationship Leader Multi-Factor Authentication (MFA) Winter 2023

Momentum Leader Passwordless Authentication Winter 2023

Momentum Leader Multi-Factor Authentication (MFA) Winter 2023

50

Product Avatar Image

Atera

Remote Monitoring & Management (RMM)

Product Avatar Image
Atera

Atera offers an all-in-one IT management platform that combines Remote Monitoring and Management (RMM), Helpdesk, Ticketing, and automation tools, providing efficient infrastructure management, enhanced service quality, and comprehensive features like patch management and AI-driven analytics, all un

Atera offers an all-in-one IT management platform that combines Remote Monitoring and Management (RMM), Helpdesk, Ticketing, and automation tools, providing efficient infrastructure management, enhanced service quality, and comprehensive features like patch management and AI-driven analytics, all un

G2 Awards

Best IT Infrastructure Products 2022

Best Security Products 2022

Results Leader Endpoint Management Winter 2023

Usability Leader Remote Monitoring & Management (RMM) Winter 2023

Results Leader Remote Monitoring & Management (RMM) Winter 2023

Implementation Leader Remote Support Winter 2023

Results Leader Patch Management Winter 2023

FAQs

What are the G2 Best Software Awards?

G2’s Annual Best Software Awards ranks the world’s best software companies and products based on authentic, timely reviews from real users.

How are the winners determined?

30 different lists are generated using G2’s proprietary algorithm based on G2’s verified user reviews and publicly available market presence data. The top 100 software companies are ranked based on a combination of Satisfaction and Market Presence scores. The top 100 products are ranked based on reviews across all categories they are a part of. Satisfaction is an aggregate score based on a company’s products across their assigned categories. More tailored company and product lists (e.g., "India Software Companies" and "Products for Small Businesses") feature a smaller set of winners at 50 appearing on each list.

Read more about the methodology used to calculate G2’s Best Software Awards here.

How many reviews does a vendor need to be eligible?

To be included in one of G2’s Best Software Sellers or Best Software Products Lists, a software seller or product must receive at least 50 approved and published reviews during the 2021 calendar year. Scores reflect only data from reviews submitted during this evaluation period.

How are the Best Software Awards different from quarterly badge lists?

For G2’s annual Best Software Awards, the scores reflect reviews submitted in the evaluation period - in this case, the calendar year 2021. Other G2 reports might include more or less data which would potentially show different rankings for software sellers and software products. Also, broadly-defined “Other” categories such as “Other Marketing Software” and “Other IT Security Software” were excluded to ensure we were evaluating products with relevant comparative scoring.

Read more about G2’s research scoring methodologies.

Can software sellers and products win multiple awards?

Yes. A software seller and/or product has the potential to be named on multiple lists based on its eligibility and rankings.

How are reviews verified and vetted?

It is important to us at G2 to be objective and trustworthy, with reviews being thoroughly vetted. To ensure this, we require the use of a LinkedIn™ account or verified business email address to validate a G2 reviewer’s identity and current employer. We also validate reviewers by partnering with sellers and organizations to securely authenticate users through select platforms. We do not allow users to leave reviews for their current employers, former employers, or competitors.

For more information on the reviews process, view G2’s community guidelines.

Were G2’s 2022 Best Software Lists researched and published using the same methodology and criteria as past years? If not, what is new?

There are a few changes to G2's Best Software Lists this year. To be more inclusive of software sellers and products, we reduced the number of vendor-level reviews per calendar year to be eligible - from 100 to 50. Being eligible of course does not guarantee inclusion on a list.

We also added new persona-based lists, such as "Best software for professionals in marketing." Net-new categories this year that enable greater segmentation include those for:

  • CAD & PLM Products
  • Collaboration & Productivity Products
  • Commerce Products
  • Content Management Products
  • Design Products
  • Development Products
  • IT Infrastructure Products
  • Office Products
  • Security Products