2022
Nothing but the best software. Find the best software for anything and everything you want to accomplish, as decided by software buyers on the world’s largest and most trusted software marketplace.
To qualify for the best Security software list, products must be listed under one or more of the Security child categories. G2's security software categories showcase products that enable both traditional security models to the latest in zero-trust security frameworks -- offering innovative security products from identity-management software, to cloud security software, to DevSecOps software, Email security, Network security, and more. Security solutions can be used to detect threats, evaluate vulnerabilities, protect devices, discover assets, manage access, prevent data loss, and secure network connections.
Check out our FAQs to learn more.
1
Okta
Identity and Access Management (IAM)
Okta is The World’s Identity Company™. As the leading independent Identity partner, we free everyone to safely use any technology — anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core
Okta is The World’s Identity Company™. As the leading independent Identity partner, we free everyone to safely use any technology — anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core
Categories
G2 Awards
Best Security Products 2022
Best Enterprise Products 2022
Best Mid-Market Products 2022
Best Software Products 2022
Relationship Leader Customer Identity and Access Management (CIAM) Winter 2023
Results Leader Customer Identity and Access Management (CIAM) Winter 2023
Grid Leader Customer Identity and Access Management (CIAM) Winter 2023
2
Cynet - All-in-One Cybersecurity Platform
Endpoint Detection & Response (EDR)
AutoXDR™ converges multiple technologies (EPP, EDR, UBA, Deception, Network Analytics and vulnerability management), with a 24/7 cyber SWAT team, to provide unparalleled visibility and defend all domains of your internal network: endpoints, network, files and users, from all types of attacks.
AutoXDR™ converges multiple technologies (EPP, EDR, UBA, Deception, Network Analytics and vulnerability management), with a 24/7 cyber SWAT team, to provide unparalleled visibility and defend all domains of your internal network: endpoints, network, files and users, from all types of attacks.
Categories
G2 Awards
Best Security Products 2022
Relationship Leader User and Entity Behavior Analytics (UEBA) Winter 2023
Implementation Leader User and Entity Behavior Analytics (UEBA) Winter 2023
Relationship Leader Extended Detection and Response (XDR) Platforms Winter 2023
Implementation Leader Extended Detection and Response (XDR) Platforms Winter 2023
Results Leader User and Entity Behavior Analytics (UEBA) Winter 2023
3
OneLogin
Identity and Access Management (IAM)
Extend enterprise security & compliance to all public and private cloud apps with secure single sign-on (SSO), multi-factor authentication & user provisioning.
Extend enterprise security & compliance to all public and private cloud apps with secure single sign-on (SSO), multi-factor authentication & user provisioning.
Categories
G2 Awards
Best Security Products 2022
Implementation Leader Customer Identity and Access Management (CIAM) Winter 2023
Usability Leader Customer Identity and Access Management (CIAM) Winter 2023
Usability Leader Multi-Factor Authentication (MFA) Winter 2023
Relationship Leader Customer Identity and Access Management (CIAM) Winter 2023
Grid High performer Cloud Directory Services Winter 2023
Usability Leader User Provisioning and Governance Tools Winter 2023
4
Avanan Cloud Email Security
Cloud Email Security
AVANAN protects your data in the cloud with the same industry-leading security you trust in your datacenter. The cloud-based platform is completely out-of-band, requires no proxy, and can be deployed in just 10 minutes.
AVANAN protects your data in the cloud with the same industry-leading security you trust in your datacenter. The cloud-based platform is completely out-of-band, requires no proxy, and can be deployed in just 10 minutes.
Categories
G2 Awards
Best Security Products 2022
Results Leader Data Security Winter 2023
Implementation Leader Cloud File Security Winter 2023
Implementation Leader Cloud Email Security Winter 2023
Implementation Leader Email Anti-spam Winter 2023
Relationship Leader Data Loss Prevention (DLP) Winter 2023
5
JumpCloud
Cloud Directory Services
The JumpCloud Directory Platform reimagines the directory as a complete platform for identity, access, and device management.
The JumpCloud Directory Platform reimagines the directory as a complete platform for identity, access, and device management.
Categories
G2 Awards
Best Global Sellers 2022
Best Security Products 2022
Best Software Products 2022
Highest Satisfaction Products 2022
Fastest Growing Products 2022
Grid Leader User Provisioning and Governance Tools Winter 2023
Relationship Leader Privileged Access Management (PAM) Winter 2023
Momentum Leader Privileged Access Management (PAM) Winter 2023
Usability Leader Identity and Access Management (IAM) Winter 2023
Grid Leader Cloud Directory Services Winter 2023
6
Rippling
Core HR
Categories
G2 Awards
Best Security Products 2022
Best Global Sellers 2022
Best HR Products 2022
Best Mid-Market Products 2022
Best Small Business Products 2022
Highest Satisfaction Products 2022
Best Software Products 2022
Implementation Leader Multi-Country Payroll Winter 2023
Implementation Leader Corporate Learning Management Systems Winter 2023
7
CrowdStrike Falcon Endpoint Protection Platform
Endpoint Protection Suites
CrowdStrike Falcon endpoint protection unifies the technologies required to successfully stop breaches: next-generation antivirus, endpoint detection and response, IT hygiene, 24/7 threat hunting and threat intelligence. They combine to provide continuous breach prevention in a single agent.
CrowdStrike Falcon endpoint protection unifies the technologies required to successfully stop breaches: next-generation antivirus, endpoint detection and response, IT hygiene, 24/7 threat hunting and threat intelligence. They combine to provide continuous breach prevention in a single agent.
Categories
G2 Awards
Best Security Products 2022
Best Office Products 2022
Fastest Growing Products 2022
Grid Leader Extended Detection and Response (XDR) Platforms Winter 2023
Usability Leader Endpoint Management Winter 2023
Implementation Leader Antivirus Winter 2023
Implementation Leader Threat Intelligence Winter 2023
Grid Leader Endpoint Protection Platforms Winter 2023
8
Sophos Endpoint
Endpoint Protection Suites
Sophos Intercept X is the world’s most comprehensive endpoint protection solution. Built to stop the widest range of attacks, Intercept X has been proven to prevent even the most advanced ransomware and malware by leveraging a unique combination of next-generation techniques. This includes the abili
Sophos Intercept X is the world’s most comprehensive endpoint protection solution. Built to stop the widest range of attacks, Intercept X has been proven to prevent even the most advanced ransomware and malware by leveraging a unique combination of next-generation techniques. This includes the abili
Categories
G2 Awards
Best Security Products 2022
Best EMEA Sellers 2022
Grid Leader Extended Detection and Response (XDR) Platforms Winter 2023
Grid Leader Endpoint Detection & Response (EDR) Winter 2023
Grid Leader Endpoint Protection Suites Winter 2023
Grid Leader Antivirus Winter 2023
Asia Leader Antivirus Winter 2023
9
Proofpoint Email Security and Protection
Secure Email Gateway
Proofpoint Email Security and Protection stops malware and non-malware threats such as impostor email.
Proofpoint Email Security and Protection stops malware and non-malware threats such as impostor email.
Categories
G2 Awards
Best Security Products 2022
Grid Leader Secure Email Gateway Winter 2023
Relationship Leader Secure Email Gateway Winter 2023
Grid Leader Intelligent Email Protection Winter 2023
Grid Leader Cloud Email Security Winter 2023
Relationship Leader Cloud Email Security Winter 2023
Grid Leader Email Anti-spam Winter 2023
Grid Leader Email Encryption Winter 2023
Usability Leader Cloud Email Security Winter 2023
10
InsightIDR
Incident Response
InsightIDR is designed to reduce risk of breach, detect and respond to attacks, and build effective cybersecurity programs.
InsightIDR is designed to reduce risk of breach, detect and respond to attacks, and build effective cybersecurity programs.
Categories
G2 Awards
Best Security Products 2022
Grid Leader Network Detection and Response (NDR) Winter 2023
Implementation Leader Extended Detection and Response (XDR) Platforms Winter 2023
Grid Leader Network Traffic Analysis (NTA) Winter 2023
Grid Leader Extended Detection and Response (XDR) Platforms Winter 2023
Usability Leader Extended Detection and Response (XDR) Platforms Winter 2023
Grid Leader Incident Response Winter 2023
Grid Leader Cloud Security Winter 2023
11
IBM QRadar SIEM
Security Information and Event Management (SIEM)
IBM QRadar is designed to collect logs, events, network flows and user behavior across your entire enterprise, correlates that against threat intelligence and vulnerability data to detect known threats, and applies advanced analytics to identify anomalies that may signal unknown threats. The solutio
IBM QRadar is designed to collect logs, events, network flows and user behavior across your entire enterprise, correlates that against threat intelligence and vulnerability data to detect known threats, and applies advanced analytics to identify anomalies that may signal unknown threats. The solutio
G2 Awards
Best Security Products 2022
Usability Leader Security Information and Event Management (SIEM) Winter 2023
Grid Leader Cloud Security Monitoring and Analytics Winter 2023
Usability Leader Incident Response Winter 2023
Results Leader Incident Response Winter 2023
Grid Leader Network Traffic Analysis (NTA) Winter 2023
Grid Leader Security Information and Event Management (SIEM) Winter 2023
12
GitLab
Version Control Hosting
Categories
G2 Awards
Best Development Products 2022
Best Global Sellers 2022
Best Security Products 2022
Best Software Products 2022
Asia Leader Continuous Integration Winter 2023
Grid Leader Value Stream Management Winter 2023
Momentum Leader DevOps Platforms Winter 2023
Usability Leader Continuous Integration Winter 2023
Grid Leader Application Release Orchestration Winter 2023
13
ESET PROTECT
Endpoint Protection Suites
ESET PROTECT is a cutting-edge cybersecurity platform that leverages the latest in AI, state-of-the-art technologies, and human expertise to safeguard your organization from emerging threats and zero-day attacks. As a cloud-first XDR solution, it integrates unique threat intelligence to deliver next
ESET PROTECT is a cutting-edge cybersecurity platform that leverages the latest in AI, state-of-the-art technologies, and human expertise to safeguard your organization from emerging threats and zero-day attacks. As a cloud-first XDR solution, it integrates unique threat intelligence to deliver next
Categories
G2 Awards
Best Security Products 2022
Best EMEA Sellers 2022
Usability Leader Mobile Data Security Winter 2023
Momentum Leader Mobile Data Security Winter 2023
Grid Leader Antivirus Winter 2023
Grid Leader Endpoint Protection Suites Winter 2023
Grid Leader Mobile Data Security Winter 2023
Grid High performer Cloud File Security Winter 2023
Grid Leader Email Anti-spam Winter 2023
14
LastPass
Password Managers
LastPass business solutions help teams & businesses take control of their identity management with password management, single sign-on (SSO), and adaptive multifactor authentication (MFA).
LastPass business solutions help teams & businesses take control of their identity management with password management, single sign-on (SSO), and adaptive multifactor authentication (MFA).
Categories
G2 Awards
Best Security Products 2022
Results Leader Passwordless Authentication Winter 2023
Implementation Leader Passwordless Authentication Winter 2023
Relationship Leader Passwordless Authentication Winter 2023
Implementation Leader Multi-Factor Authentication (MFA) Winter 2023
15
Microsoft Entra ID
Identity and Access Management (IAM)
Entra ID is a comprehensive identity and access management cloud solution that provides a robust set of capabilities to manage users and groups and help secure access to applications including Microsoft online services like Office 365 and a world of non-Microsoft SaaS applications.
Entra ID is a comprehensive identity and access management cloud solution that provides a robust set of capabilities to manage users and groups and help secure access to applications including Microsoft online services like Office 365 and a world of non-Microsoft SaaS applications.
Categories
G2 Awards
Best Security Products 2022
Best Global Sellers 2022
Implementation Leader Self-Service Password Reset (SSPR) Tools Winter 2023
Grid Leader Privileged Access Management (PAM) Winter 2023
Relationship Leader Self-Service Password Reset (SSPR) Tools Winter 2023
Momentum Leader Self-Service Password Reset (SSPR) Tools Winter 2023
Grid Leader Self-Service Password Reset (SSPR) Tools Winter 2023
Grid Leader Cloud Directory Services Winter 2023
16
BetterCloud
SaaS Operations Management
BetterCloud provides critical insights, automated management, and intelligent data security for cloud office platforms.
BetterCloud provides critical insights, automated management, and intelligent data security for cloud office platforms.
Categories
G2 Awards
Best Security Products 2022
Best IT Management Products 2022
Grid Leader Cloud File Security Winter 2023
Grid Leader Data Loss Prevention (DLP) Winter 2023
Grid Leader SaaS Operations Management Winter 2023
Relationship Leader User Provisioning and Governance Tools Winter 2023
Implementation Leader User Provisioning and Governance Tools Winter 2023
17
CrowdSec
Intrusion Detection and Prevention Systems (IDPS)
CrowdSec is a collaborative, free and open source security automation platform relying on both IP behavior analysis and IP reputation. CrowdSec identifies threats and shares IP addresses behind malevolent behaviors across its community, to allow everyone to block them preventively. Used in 90 countr
CrowdSec is a collaborative, free and open source security automation platform relying on both IP behavior analysis and IP reputation. CrowdSec identifies threats and shares IP addresses behind malevolent behaviors across its community, to allow everyone to block them preventively. Used in 90 countr
G2 Awards
Best Security Products 2022
Results Leader Intrusion Detection and Prevention Systems (IDPS) Winter 2023
Relationship Leader Intrusion Detection and Prevention Systems (IDPS) Winter 2023
Results Leader Container Security Winter 2023
Momentum Leader Intrusion Detection and Prevention Systems (IDPS) Winter 2023
Results Leader Firewall Software Winter 2023
18
Cisco Duo
Zero Trust Networking
Duo is a cloud-based access security platform built to protect access to any application, from any device. Duo’s passwordless authentication, single sign-on (SSO) and user-friendly multi-factor authentication make secure logins easy for users, reducing friction to their workflow.
Categories
G2 Awards
Best Security Products 2022
Best Global Sellers 2022
Momentum Leader Passwordless Authentication Winter 2023
Relationship Leader Multi-Factor Authentication (MFA) Winter 2023
Momentum Leader Risk-Based Authentication (RBA) Winter 2023
Usability Leader Multi-Factor Authentication (MFA) Winter 2023
Grid Leader Multi-Factor Authentication (MFA) Winter 2023
Grid Leader Passwordless Authentication Winter 2023
Grid Leader Cloud Security Winter 2023
19
GitHub
Version Control Hosting
GitHub is the best place to share code with friends, co-workers, classmates, and complete strangers. Over two million people use GitHub to build amazing things together.
Categories
G2 Awards
Best Development Products 2022
Best Global Sellers 2022
Best Security Products 2022
Best Software Products 2022
Results Leader Continuous Delivery Winter 2023
Grid Leader Continuous Integration Winter 2023
20
Beagle Security
Website Security
Beagle Security is a web application penetration testing tool that helps you to identify vulnerabilities on your web application before hackers exploit them.
Beagle Security is a web application penetration testing tool that helps you to identify vulnerabilities on your web application before hackers exploit them.
Categories
G2 Awards
Best Security Products 2022
Grid Leader Website Security Winter 2023
Implementation Leader Dynamic Application Security Testing (DAST) Winter 2023
Grid High performer API Security Winter 2023
Momentum Leader Penetration Testing Winter 2023
Europe High performer Vulnerability Scanner Winter 2023
Grid High performer Penetration Testing Winter 2023
Momentum Leader Website Security Winter 2023
Implementation Leader Vulnerability Scanner Winter 2023
21
Symantec Protection Suite Enterprise Edition
Endpoint Management
Symantec Protection Suite Enterprise Edition combines best-of-breed products to secure your endpoint and email infrastructure. It delivers protection against complex malware, data loss, and spam threats along with industry-leading messaging protection.
Symantec Protection Suite Enterprise Edition combines best-of-breed products to secure your endpoint and email infrastructure. It delivers protection against complex malware, data loss, and spam threats along with industry-leading messaging protection.
Categories
G2 Awards
Best Security Products 2022
22
WatchGuard Endpoint Security
Endpoint Management
Panda Endpoint Protection provides centralized protection for all of your Windows, Mac and Linux workstations, including laptops, smartphones and the leading virtualization systems.
Panda Endpoint Protection provides centralized protection for all of your Windows, Mac and Linux workstations, including laptops, smartphones and the leading virtualization systems.
Categories
G2 Awards
Best Security Products 2022
Latin America High performer Antivirus Winter 2023
Grid High performer Endpoint Detection & Response (EDR) Winter 2023
Europe High performer Endpoint Protection Suites Winter 2023
Momentum Leader Antivirus Winter 2023
Europe High performer Antivirus Winter 2023
Grid Leader Antivirus Winter 2023
Grid High performer Antivirus Winter 2023
23
ThreatDown
Endpoint Protection Suites
Actively protect against all forms of Malware, Improve your protection without changing your AV, Renowned protection and cleanup technologies, Tool most recommended by techs and super users.
Actively protect against all forms of Malware, Improve your protection without changing your AV, Renowned protection and cleanup technologies, Tool most recommended by techs and super users.
Categories
G2 Awards
Best Security Products 2022
Usability Leader Endpoint Protection Suites Winter 2023
Grid Leader Endpoint Protection Suites Winter 2023
Usability Leader Endpoint Management Winter 2023
Relationship Leader Endpoint Protection Suites Winter 2023
Usability Leader Antivirus Winter 2023
Grid Leader Endpoint Management Winter 2023
24
Webroot Business Endpoint Protection
Endpoint Protection Suites
Webroot SecureAnywhere Business Endpoint Protection offers a revolutionary approach to malware protection.
Webroot SecureAnywhere Business Endpoint Protection offers a revolutionary approach to malware protection.
Categories
G2 Awards
Best Security Products 2022
Implementation Leader Endpoint Management Winter 2023
Implementation Leader Endpoint Protection Suites Winter 2023
Grid Leader Endpoint Management Winter 2023
Results Leader Antivirus Winter 2023
Usability Leader Endpoint Protection Suites Winter 2023
25
Microsoft System Center
Data Center Infrastructure Management (DCIM)
Microsoft System Center helps customers realize the benefits of the Microsoft Cloud Platform by delivering unified management. Experience fast time-to-value with out-of-the-box monitoring, provisioning, configuration, automation, protection and self-service.
Microsoft System Center helps customers realize the benefits of the Microsoft Cloud Platform by delivering unified management. Experience fast time-to-value with out-of-the-box monitoring, provisioning, configuration, automation, protection and self-service.
G2 Awards
Best IT Infrastructure Products 2022
Best Global Sellers 2022
Best Security Products 2022
Best IT Management Products 2022
Grid Leader Data Center Infrastructure Management (DCIM) Winter 2023
Usability Leader Data Center Infrastructure Management (DCIM) Winter 2023
Relationship Leader Data Center Infrastructure Management (DCIM) Winter 2023
Implementation Leader Data Center Infrastructure Management (DCIM) Winter 2023
Grid Leader Enterprise IT Management Winter 2023
Usability Leader Network Security Policy Management (NSPM) Winter 2023
26
Symantec End-user Endpoint Security
Endpoint Protection Suites
Proactively detect and block today's most advanced threats with an endpoint protection solution that goes beyond antivirus.
Proactively detect and block today's most advanced threats with an endpoint protection solution that goes beyond antivirus.
Categories
G2 Awards
Best Security Products 2022
Asia Pacific Leader Endpoint Protection Suites Winter 2023
Asia Leader Endpoint Protection Suites Winter 2023
Middle East & Africa Leader Antivirus Winter 2023
Europe Leader Antivirus Winter 2023
Results Leader Antivirus Winter 2023
Grid Leader Endpoint Protection Suites Winter 2023
Relationship Leader Endpoint Protection Suites Winter 2023
Asia Leader Antivirus Winter 2023
27
Hybrid Cloud Security
Cloud Workload Protection Platforms
Hybrid Cloud Security solution, powered by XGen security, delivers a blend of cross-generational threat defense techniques that have been optimized to protect physical, virtual, and cloud workloads.
Hybrid Cloud Security solution, powered by XGen security, delivers a blend of cross-generational threat defense techniques that have been optimized to protect physical, virtual, and cloud workloads.
Categories
G2 Awards
Best Security Products 2022
Grid Leader Cloud Workload Protection Platforms Winter 2023
Grid Leader Intrusion Detection and Prevention Systems (IDPS) Winter 2023
Results Leader Cloud Workload Protection Platforms Winter 2023
Grid Leader Cloud Data Security Winter 2023
Grid Leader Cloud Compliance Winter 2023
Asia Leader Vulnerability Scanner Winter 2023
28
FortiGate NGFW
Firewall Software
FortiGate offers a network security platform, designed to deliver threat protection and performance with reduced complexity.
FortiGate offers a network security platform, designed to deliver threat protection and performance with reduced complexity.
Categories
G2 Awards
Best Security Products 2022
Grid Leader Firewall Software Winter 2023
Momentum Leader Unified Threat Management (UTM) Winter 2023
Grid Leader Unified Threat Management (UTM) Winter 2023
Grid Leader Threat Intelligence Winter 2023
Relationship Leader Firewall Software Winter 2023
Usability Leader Firewall Software Winter 2023
29
Check Point Harmony Endpoint
Endpoint Protection Suites
Check Point Endpoint Security combines data security, network security, threat prevention technologies and remote access VPN into one package for complete Windows and Mac OS X protection.
Check Point Endpoint Security combines data security, network security, threat prevention technologies and remote access VPN into one package for complete Windows and Mac OS X protection.
Categories
G2 Awards
Best Security Products 2022
Europe Leader Endpoint Protection Suites Winter 2023
Europe Leader Endpoint Management Winter 2023
Asia High performer Endpoint Protection Suites Winter 2023
Europe Leader Antivirus Winter 2023
Asia Pacific High performer Endpoint Protection Suites Winter 2023
Results Leader Endpoint Protection Suites Winter 2023
Grid Leader Endpoint Protection Suites Winter 2023
Grid Leader Antivirus Winter 2023
30
Dynatrace
Application Performance Monitoring (APM)
Dynatrace has redefined how you monitor today’s digital ecosystems. AI-powered, full stack and completely automated, it’s the only solution that provides answers, not just data, based on deep insight into every user, every transaction, across every application. The world’s leading brands trust Dynat
Dynatrace has redefined how you monitor today’s digital ecosystems. AI-powered, full stack and completely automated, it’s the only solution that provides answers, not just data, based on deep insight into every user, every transaction, across every application. The world’s leading brands trust Dynat
Categories
G2 Awards
Best Global Sellers 2022
Best IT Infrastructure Products 2022
Best IT Management Products 2022
Best Security Products 2022
Best Software Products 2022
Grid Leader Container Monitoring Winter 2023
Grid Leader Database Monitoring Winter 2023
Grid Leader Log Analysis Winter 2023
Grid Leader Website Monitoring Winter 2023
Grid Leader Cloud Infrastructure Monitoring Winter 2023
31
WatchGuard Network Security
Unified Threat Management (UTM)
WatchGuard has deployed nearly a million integrated, multi-function threat management appliances worldwide. Our signature red boxes are architected to be the industry's smartest, fastest, and meanest security devices with every scanning engine running at full throttle.
WatchGuard has deployed nearly a million integrated, multi-function threat management appliances worldwide. Our signature red boxes are architected to be the industry's smartest, fastest, and meanest security devices with every scanning engine running at full throttle.
Categories
G2 Awards
Best Security Products 2022
Usability Leader Unified Threat Management (UTM) Winter 2023
Results Leader Unified Threat Management (UTM) Winter 2023
Usability Leader Encryption Winter 2023
Relationship Leader Unified Threat Management (UTM) Winter 2023
32
Tenable Security Center
Risk-Based Vulnerability Management
Tenable, Inc. is the Cyber Exposure company that provides solutions on reducing cyber risk
Tenable, Inc. is the Cyber Exposure company that provides solutions on reducing cyber risk
Categories
G2 Awards
Best Security Products 2022
Results Leader Risk-Based Vulnerability Management Winter 2023
Relationship Leader Risk-Based Vulnerability Management Winter 2023
Grid Leader Risk-Based Vulnerability Management Winter 2023
Grid Leader Vulnerability Scanner Winter 2023
Usability Leader Risk-Based Vulnerability Management Winter 2023
Asia Leader Vulnerability Scanner Winter 2023
33
FortiClient
Endpoint Protection Suites
FortiClient Fabric Agent integrates endpoints into the Security Fabric and provides endpoint telemetry, including user identity, protection status, risk scores, unpatched vulnerabilities, security events, and more.
FortiClient Fabric Agent integrates endpoints into the Security Fabric and provides endpoint telemetry, including user identity, protection status, risk scores, unpatched vulnerabilities, security events, and more.
Categories
G2 Awards
Best Security Products 2022
Grid Leader Endpoint Management Winter 2023
Momentum Leader Antivirus Winter 2023
Asia Pacific Leader Endpoint Protection Suites Winter 2023
Asia Leader Endpoint Protection Suites Winter 2023
Momentum Leader Endpoint Protection Suites Winter 2023
Asia Pacific Leader Antivirus Winter 2023
Latin America Leader Antivirus Winter 2023
Asia Pacific Leader Endpoint Management Winter 2023
34
Acronis Cyber Protect
Endpoint Management
Categories
G2 Awards
Best EMEA Sellers 2022
Best Security Products 2022
Grid Leader Patch Management Winter 2023
Best Global Sellers 2022
Implementation Leader Antivirus Winter 2023
Relationship Leader Patch Management Winter 2023
Usability Leader Patch Management Winter 2023
Momentum Leader Antivirus Winter 2023
Relationship Leader Endpoint Management Winter 2023
Relationship Leader Antivirus Winter 2023
Grid High performer Antivirus Winter 2023
35
InsightVM (Nexpose)
Cloud Security Monitoring and Analytics
Continuously identify and assess risk across your cloud, virtual, remote, local, and containerized infrastructure. Leverage unparalleled attacker analytics to prioritize vulns more precisely with a Real Risk score that goes beyond just CVSS. Break down the silos between IT, security, and development
Continuously identify and assess risk across your cloud, virtual, remote, local, and containerized infrastructure. Leverage unparalleled attacker analytics to prioritize vulns more precisely with a Real Risk score that goes beyond just CVSS. Break down the silos between IT, security, and development
Categories
G2 Awards
Best Security Products 2022
Results Leader Vulnerability Scanner Winter 2023
Implementation Leader Risk-Based Vulnerability Management Winter 2023
Implementation Leader Vulnerability Scanner Winter 2023
36
Virtru Email Encryption
Email Encryption
Virtru puts you in charge of how your digital information is shared. Combining control, convenience, and simplicity, Virtru makes it easy to keep your private communications private.
Virtru puts you in charge of how your digital information is shared. Combining control, convenience, and simplicity, Virtru makes it easy to keep your private communications private.
Categories
G2 Awards
Best Security Products 2022
Momentum Leader Email Encryption Winter 2023
Relationship Leader Email Encryption Winter 2023
Momentum Leader Data-Centric Security Winter 2023
Grid Leader Email Encryption Winter 2023
Grid High performer Data-Centric Security Winter 2023
Momentum Leader Encryption Winter 2023
Momentum Leader Cloud File Security Winter 2023
37
Trend Vision One - Endpoint Security
Endpoint Protection Suites
Trend Micro Endpoint Security provides immediate protection for enterprise endpoints lowering infections by instantly securing end-points from sophisticated cybercriminal attacks
Trend Micro Endpoint Security provides immediate protection for enterprise endpoints lowering infections by instantly securing end-points from sophisticated cybercriminal attacks
Categories
G2 Awards
Best Security Products 2022
Grid Leader Endpoint Protection Suites Winter 2023
Grid Leader Endpoint Protection Suites Fall 2022
Grid High performer Extended Detection and Response (XDR) Platforms Fall 2022
Implementation Leader Endpoint Protection Suites Fall 2022
Grid Leader Extended Detection and Response (XDR) Platforms Summer 2022
38
CloudGuard Posture Management
Cloud Content Collaboration
Using CloudGuard Posture Management (Dome9), organizations can visualize and assess their security posture, detect misconfigurations, model and actively enforce security best practices, and protect against identity theft and data loss in the cloud.
Using CloudGuard Posture Management (Dome9), organizations can visualize and assess their security posture, detect misconfigurations, model and actively enforce security best practices, and protect against identity theft and data loss in the cloud.
Categories
G2 Awards
Best Security Products 2022
Grid Leader Cloud Compliance Winter 2023
Grid Leader Cloud Data Security Winter 2023
Grid High performer Cloud Workload Protection Platforms Winter 2023
Asia Leader Cloud Content Collaboration Winter 2023
India High performer Cloud Content Collaboration Winter 2023
Grid Leader Cloud Security Winter 2023
39
Tenable Nessus
Vulnerability Scanner
From the beginning, we've worked hand-in-hand with the security community. We continuously optimize Nessus based on community feedback to make it the most accurate and comprehensive vulnerability assessment solution in the market. 20 years later and we're still laser focused on community collaborati
From the beginning, we've worked hand-in-hand with the security community. We continuously optimize Nessus based on community feedback to make it the most accurate and comprehensive vulnerability assessment solution in the market. 20 years later and we're still laser focused on community collaborati
Categories
G2 Awards
Best Security Products 2022
Grid Leader Vulnerability Scanner Winter 2023
Asia Leader Vulnerability Scanner Winter 2023
Usability Leader Vulnerability Scanner Winter 2023
India Leader Vulnerability Scanner Winter 2023
Asia Pacific Leader Vulnerability Scanner Winter 2023
40
Citrix Workspace
Unified Workspaces
Citrix Workspace (featuring Citrix Virtual Apps and Desktops) is a complete secure digital workspace, designed to empower people to work better anytime, anywhere without distractions. It seamlessly integrates with your existing systems, so you can focus on driving digital transformation.
Citrix Workspace (featuring Citrix Virtual Apps and Desktops) is a complete secure digital workspace, designed to empower people to work better anytime, anywhere without distractions. It seamlessly integrates with your existing systems, so you can focus on driving digital transformation.
Categories
G2 Awards
Best IT Infrastructure Products 2022
Best Security Products 2022
Grid Leader Unified Endpoint Management (UEM) Spring 2022
Usability Leader Unified Endpoint Management (UEM) Spring 2022
Grid Leader Virtual Desktop Infrastructure (VDI) Spring 2022
Relationship Leader Unified Endpoint Management (UEM) Spring 2022
Relationship Leader Virtual Desktop Infrastructure (VDI) Spring 2022
Grid Leader Desktop as a Service (DaaS) Spring 2022
41
KnowBe4 PhishER/PhishER Plus
Security Orchestration, Automation, and Response (SOAR)
KnowBe4 PhishER is the key ingredient of an essential security workstream. It's your lightweight Security Orchestration, Automation and Response (SOAR) platform to orchestrate your threat response and manage the high volume of potentially malicious email messages reported by your users. And, with a
KnowBe4 PhishER is the key ingredient of an essential security workstream. It's your lightweight Security Orchestration, Automation and Response (SOAR) platform to orchestrate your threat response and manage the high volume of potentially malicious email messages reported by your users. And, with a
G2 Awards
Best Security Products 2022
Grid Leader Incident Response Winter 2023
Implementation Leader Incident Response Winter 2023
Momentum Leader Incident Response Winter 2023
Grid Leader Security Orchestration, Automation, and Response (SOAR) Winter 2023
Relationship Leader Incident Response Winter 2023
42
Acronis Cyber Protect Cloud
Cloud Data Security
Acronis Cyber Protect Cloud unites backup and next-generation, AI-based anti-malware, antivirus, and endpoint protection management in one solution. Integration and automation provide unmatched ease for service providers — reducing complexity while increasing productivity and decreasing operating co
Acronis Cyber Protect Cloud unites backup and next-generation, AI-based anti-malware, antivirus, and endpoint protection management in one solution. Integration and automation provide unmatched ease for service providers — reducing complexity while increasing productivity and decreasing operating co
Categories
G2 Awards
Best IT Management Products 2022
Best Global Sellers 2022
Best Security Products 2022
Best EMEA Sellers 2022
Europe Leader SaaS Backup Winter 2023
Grid Leader Patch Management Winter 2023
Momentum Leader SaaS Backup Winter 2023
Usability Leader SaaS Backup Winter 2023
Grid Leader Cloud Data Security Winter 2023
Grid Leader Cloud Security Winter 2023
Relationship Leader Cloud Data Security Winter 2023
43
Tenable Vulnerability Management
Risk-Based Vulnerability Management
Tenable.io is the only cybersecurity company that empowers customers to gain control of their risk by knowing and prioritizing vulnerabilities across their entire attack surface including traditional, cloud, mobile and DevOps environments.
Tenable.io is the only cybersecurity company that empowers customers to gain control of their risk by knowing and prioritizing vulnerabilities across their entire attack surface including traditional, cloud, mobile and DevOps environments.
Categories
G2 Awards
Best Security Products 2022
Grid Leader Risk-Based Vulnerability Management Winter 2023
Grid Leader Vulnerability Scanner Winter 2023
Implementation Leader Risk-Based Vulnerability Management Winter 2023
Grid Leader Risk-Based Vulnerability Management Summer 2022
Grid Leader Risk-Based Vulnerability Management Spring 2022
44
PingFederate
Single Sign-On (SSO)
PingFederate is an enterprise federation server that enables user authentication and single sign-on. It serves as a global authentication authority that allows employees, customers and partners to securely access all the applications they need from any device.
PingFederate is an enterprise federation server that enables user authentication and single sign-on. It serves as a global authentication authority that allows employees, customers and partners to securely access all the applications they need from any device.
Categories
G2 Awards
Best Security Products 2022
Grid High performer Self-Service Password Reset (SSPR) Tools Winter 2023
Implementation Leader Single Sign-On (SSO) Winter 2023
Grid High performer Single Sign-On (SSO) Winter 2023
Grid Leader Single Sign-On (SSO) Winter 2023
Grid High performer Self-Service Password Reset (SSPR) Tools Fall 2022
Implementation Leader Single Sign-On (SSO) Fall 2022
Grid High performer Single Sign-On (SSO) Fall 2022
Grid Leader Single Sign-On (SSO) Fall 2022
45
NinjaOne
Endpoint Management
NinjaOne, the automated endpoint management platform, delivers real-time visibility, security, and control over all endpoints to increase productivity for more than 20,000 customers.
NinjaOne, the automated endpoint management platform, delivers real-time visibility, security, and control over all endpoints to increase productivity for more than 20,000 customers.
Categories
G2 Awards
Best IT Management Products 2022
Best IT Infrastructure Products 2022
Fastest Growing Products 2022
Best Security Products 2022
Relationship Leader Remote Monitoring & Management (RMM) Winter 2023
Usability Leader Incident Management Winter 2023
Relationship Leader Incident Management Winter 2023
Relationship Leader Endpoint Management Winter 2023
46
Palo Alto Networks Panorama
Network Security Policy Management (NSPM)
Panorama network security management provides static rules and dynamic security updates in an ever-changing threat landscape. Reduce administrator workload and improve your overall security posture with a single rule base for firewall, threat prevention, URL filtering, application awareness, iser id
Panorama network security management provides static rules and dynamic security updates in an ever-changing threat landscape. Reduce administrator workload and improve your overall security posture with a single rule base for firewall, threat prevention, URL filtering, application awareness, iser id
G2 Awards
Best Security Products 2022
Momentum Leader Network Security Policy Management (NSPM) Winter 2023
Grid Leader Network Security Policy Management (NSPM) Winter 2023
Implementation Leader Zero Trust Networking Winter 2023
Grid Leader Network Security Policy Management (NSPM) Fall 2022
Grid Leader Network Security Policy Management (NSPM) Summer 2022
Grid Leader Network Security Policy Management (NSPM) Spring 2022
47
Absolute Secure Endpoint
Endpoint Protection Platforms
Absolute accelerates its customers’ shift to work-from-anywhere through the industry’s first self-healing Zero Trust platform, helping to ensure maximum security and uncompromised productivity. Absolute is the only solution embedded in more than half a billion devices, offering a permanent digital c
Absolute accelerates its customers’ shift to work-from-anywhere through the industry’s first self-healing Zero Trust platform, helping to ensure maximum security and uncompromised productivity. Absolute is the only solution embedded in more than half a billion devices, offering a permanent digital c
Categories
G2 Awards
Best Security Products 2022
Implementation Leader Unified Endpoint Management (UEM) Winter 2023
Usability Leader Unified Endpoint Management (UEM) Winter 2023
Relationship Leader Unified Endpoint Management (UEM) Winter 2023
Results Leader Unified Endpoint Management (UEM) Winter 2023
Grid Leader Unified Endpoint Management (UEM) Winter 2023
48
Fortra VM
Risk-Based Vulnerability Management
Fortra VM, a Frontline.Cloud™ system, is the industry’s most comprehensive, accurate, and easy-to-use SaaS vulnerability management solution—bar none. Using our proprietary scanning technology, our vulnerability management solution performs comprehensive security assessments and helps prioritize and
Fortra VM, a Frontline.Cloud™ system, is the industry’s most comprehensive, accurate, and easy-to-use SaaS vulnerability management solution—bar none. Using our proprietary scanning technology, our vulnerability management solution performs comprehensive security assessments and helps prioritize and
Categories
G2 Awards
Best Security Products 2022
Usability Leader Vulnerability Scanner Winter 2023
Implementation Leader Vulnerability Scanner Winter 2023
Implementation Leader Risk-Based Vulnerability Management Winter 2023
Momentum Leader Risk-Based Vulnerability Management Winter 2023
Relationship Leader Risk-Based Vulnerability Management Winter 2023
Usability Leader Risk-Based Vulnerability Management Winter 2023
Grid High performer Risk-Based Vulnerability Management Winter 2023
49
Microsoft Authenticator
Multi-Factor Authentication (MFA)
Conveniently and securely sign in to all your online accounts using multifactor authentication, passwordless sign-in or password autofill with Microsoft Authenticator.
Conveniently and securely sign in to all your online accounts using multifactor authentication, passwordless sign-in or password autofill with Microsoft Authenticator.
Categories
G2 Awards
Best Global Sellers 2022
Best Security Products 2022
Grid Leader Multi-Factor Authentication (MFA) Winter 2023
Relationship Leader Multi-Factor Authentication (MFA) Winter 2023
Momentum Leader Passwordless Authentication Winter 2023
Momentum Leader Multi-Factor Authentication (MFA) Winter 2023
50
Atera
Remote Monitoring & Management (RMM)
Atera offers an all-in-one IT management platform that combines Remote Monitoring and Management (RMM), Helpdesk, Ticketing, and automation tools, providing efficient infrastructure management, enhanced service quality, and comprehensive features like patch management and AI-driven analytics, all un
Atera offers an all-in-one IT management platform that combines Remote Monitoring and Management (RMM), Helpdesk, Ticketing, and automation tools, providing efficient infrastructure management, enhanced service quality, and comprehensive features like patch management and AI-driven analytics, all un
Categories
G2 Awards
Best IT Infrastructure Products 2022
Best Security Products 2022
Results Leader Endpoint Management Winter 2023
Usability Leader Remote Monitoring & Management (RMM) Winter 2023
Results Leader Remote Monitoring & Management (RMM) Winter 2023
Implementation Leader Remote Support Winter 2023
Results Leader Patch Management Winter 2023
What are the G2 Best Software Awards?
G2’s Annual Best Software Awards ranks the world’s best software companies and products based on authentic, timely reviews from real users.
How are the winners determined?
30 different lists are generated using G2’s proprietary algorithm based on G2’s verified user reviews and publicly available market presence data. The top 100 software companies are ranked based on a combination of Satisfaction and Market Presence scores. The top 100 products are ranked based on reviews across all categories they are a part of. Satisfaction is an aggregate score based on a company’s products across their assigned categories. More tailored company and product lists (e.g., "India Software Companies" and "Products for Small Businesses") feature a smaller set of winners at 50 appearing on each list.
Read more about the methodology used to calculate G2’s Best Software Awards here.
How many reviews does a vendor need to be eligible?
To be included in one of G2’s Best Software Sellers or Best Software Products Lists, a software seller or product must receive at least 50 approved and published reviews during the 2021 calendar year. Scores reflect only data from reviews submitted during this evaluation period.
How are the Best Software Awards different from quarterly badge lists?
For G2’s annual Best Software Awards, the scores reflect reviews submitted in the evaluation period - in this case, the calendar year 2021. Other G2 reports might include more or less data which would potentially show different rankings for software sellers and software products. Also, broadly-defined “Other” categories such as “Other Marketing Software” and “Other IT Security Software” were excluded to ensure we were evaluating products with relevant comparative scoring.
Read more about G2’s research scoring methodologies.
Can software sellers and products win multiple awards?
Yes. A software seller and/or product has the potential to be named on multiple lists based on its eligibility and rankings.
How are reviews verified and vetted?
It is important to us at G2 to be objective and trustworthy, with reviews being thoroughly vetted. To ensure this, we require the use of a LinkedIn™ account or verified business email address to validate a G2 reviewer’s identity and current employer. We also validate reviewers by partnering with sellers and organizations to securely authenticate users through select platforms. We do not allow users to leave reviews for their current employers, former employers, or competitors.
For more information on the reviews process, view G2’s community guidelines.
Were G2’s 2022 Best Software Lists researched and published using the same methodology and criteria as past years? If not, what is new?
There are a few changes to G2's Best Software Lists this year. To be more inclusive of software sellers and products, we reduced the number of vendor-level reviews per calendar year to be eligible - from 100 to 50. Being eligible of course does not guarantee inclusion on a list.
We also added new persona-based lists, such as "Best software for professionals in marketing." Net-new categories this year that enable greater segmentation include those for: