|| products.size

Best Cloud Edge Security Software for for Small Business

Lauren Worth
LW
Researched and written by Lauren Worth

Products classified in the overall Cloud Edge Security category are similar in many regards and help companies of all sizes solve their business problems. However, small business features, pricing, setup, and installation differ from businesses of other sizes, which is why we match buyers to the right Small Business Cloud Edge Security to fit their needs. Compare product ratings based on reviews from enterprise users or connect with one of G2's buying advisors to find the right solutions within the Small Business Cloud Edge Security category.

In addition to qualifying for inclusion in the Cloud Edge Security Software category, to qualify for inclusion in the Small Business Cloud Edge Security Software category, a product must have at least 10 reviews left by a reviewer from a small business.

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

1 filter applied
Clear All

6 Listings in Small Business Cloud Edge Security Available

(43)4.7 out of 5
5th Easiest To Use in Cloud Edge Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Todyl empowers businesses of any size with a complete, end-to-end security program. The Todyl Security Platform converges SASE, SIEM, Endpoint Security, GRC, MXDR, and more into a cloud-native, singl

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 88% Small-Business
    • 12% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Todyl Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    26
    Customer Support
    24
    Features
    19
    Security
    16
    Cybersecurity
    13
    Cons
    Technical Issues
    7
    Integration Issues
    6
    Limited Features
    6
    Lacking Features
    5
    Pricing Issues
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Todyl Security Platform features and usability ratings that predict user satisfaction
    8.9
    Anomaly Detection
    Average: 8.3
    8.1
    Cloud Application Brokerage
    Average: 8.4
    8.7
    Policy Enforcement
    Average: 8.5
    8.5
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Todyl
    Company Website
    Year Founded
    2015
    HQ Location
    Denver, CO
    LinkedIn® Page
    www.linkedin.com
    128 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Todyl empowers businesses of any size with a complete, end-to-end security program. The Todyl Security Platform converges SASE, SIEM, Endpoint Security, GRC, MXDR, and more into a cloud-native, singl

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 88% Small-Business
  • 12% Mid-Market
Todyl Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
26
Customer Support
24
Features
19
Security
16
Cybersecurity
13
Cons
Technical Issues
7
Integration Issues
6
Limited Features
6
Lacking Features
5
Pricing Issues
5
Todyl Security Platform features and usability ratings that predict user satisfaction
8.9
Anomaly Detection
Average: 8.3
8.1
Cloud Application Brokerage
Average: 8.4
8.7
Policy Enforcement
Average: 8.5
8.5
Ease of Use
Average: 8.8
Seller Details
Seller
Todyl
Company Website
Year Founded
2015
HQ Location
Denver, CO
LinkedIn® Page
www.linkedin.com
128 employees on LinkedIn®
(274)4.4 out of 5
Optimized for quick response
3rd Easiest To Use in Cloud Edge Security software
View top Consulting Services for Cisco Umbrella
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cisco Umbrella simplifies cybersecurity and compliance by providing a converged set of capabilities in a single, cloud-native solution. Its combination of DNS-layer security, secure web gateway, CASB,

    Users
    • Network Engineer
    • Software Developer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 48% Mid-Market
    • 29% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco Umbrella features and usability ratings that predict user satisfaction
    9.0
    Anomaly Detection
    Average: 8.3
    8.8
    Cloud Application Brokerage
    Average: 8.4
    9.1
    Policy Enforcement
    Average: 8.5
    8.5
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Company Website
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    733,769 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    97,323 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cisco Umbrella simplifies cybersecurity and compliance by providing a converged set of capabilities in a single, cloud-native solution. Its combination of DNS-layer security, secure web gateway, CASB,

Users
  • Network Engineer
  • Software Developer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 48% Mid-Market
  • 29% Enterprise
Cisco Umbrella features and usability ratings that predict user satisfaction
9.0
Anomaly Detection
Average: 8.3
8.8
Cloud Application Brokerage
Average: 8.4
9.1
Policy Enforcement
Average: 8.5
8.5
Ease of Use
Average: 8.8
Seller Details
Seller
Cisco
Company Website
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
733,769 Twitter followers
LinkedIn® Page
www.linkedin.com
97,323 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(99)4.2 out of 5
2nd Easiest To Use in Cloud Edge Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    At Forcepoint, we understand the transformation our customers currently face. A cloud-based security reality is a journey. And we’re thoroughly committed to helping our customers make it. Forcepoint

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 51% Enterprise
    • 37% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Forcepoint ONE Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    4
    Ease of Use
    4
    Security
    4
    Detailed Analysis
    3
    Features
    3
    Cons
    Expensive
    3
    Complexity
    2
    Poor Customer Support
    2
    Connectivity Issues
    1
    Data Management
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Forcepoint ONE features and usability ratings that predict user satisfaction
    9.0
    Anomaly Detection
    Average: 8.3
    8.6
    Cloud Application Brokerage
    Average: 8.4
    9.4
    Policy Enforcement
    Average: 8.5
    8.6
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1994
    HQ Location
    Austin, TX
    Twitter
    @Forcepointsec
    67,687 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,899 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

At Forcepoint, we understand the transformation our customers currently face. A cloud-based security reality is a journey. And we’re thoroughly committed to helping our customers make it. Forcepoint

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 51% Enterprise
  • 37% Mid-Market
Forcepoint ONE Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
4
Ease of Use
4
Security
4
Detailed Analysis
3
Features
3
Cons
Expensive
3
Complexity
2
Poor Customer Support
2
Connectivity Issues
1
Data Management
1
Forcepoint ONE features and usability ratings that predict user satisfaction
9.0
Anomaly Detection
Average: 8.3
8.6
Cloud Application Brokerage
Average: 8.4
9.4
Policy Enforcement
Average: 8.5
8.6
Ease of Use
Average: 8.8
Seller Details
Year Founded
1994
HQ Location
Austin, TX
Twitter
@Forcepointsec
67,687 Twitter followers
LinkedIn® Page
www.linkedin.com
1,899 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Check Point Harmony Connect redefines SASE by making it easy to access corporate applications, SaaS and the internet for any user or branch, from any device, without compromising on security. Built to

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 44% Small-Business
    • 28% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point CloudGuard Harmony Connect (CloudGuard Connect) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    6
    Customer Support
    4
    Ease of Use
    4
    Easy Integrations
    3
    Features
    2
    Cons
    Expensive
    4
    Lacking Features
    2
    Required Expertise
    2
    Access Issues
    1
    Complex Setup
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point CloudGuard Harmony Connect (CloudGuard Connect) features and usability ratings that predict user satisfaction
    7.8
    Anomaly Detection
    Average: 8.3
    7.8
    Cloud Application Brokerage
    Average: 8.4
    8.2
    Policy Enforcement
    Average: 8.5
    8.8
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,158 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,920 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

Check Point Harmony Connect redefines SASE by making it easy to access corporate applications, SaaS and the internet for any user or branch, from any device, without compromising on security. Built to

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 44% Small-Business
  • 28% Mid-Market
Check Point CloudGuard Harmony Connect (CloudGuard Connect) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
6
Customer Support
4
Ease of Use
4
Easy Integrations
3
Features
2
Cons
Expensive
4
Lacking Features
2
Required Expertise
2
Access Issues
1
Complex Setup
1
Check Point CloudGuard Harmony Connect (CloudGuard Connect) features and usability ratings that predict user satisfaction
7.8
Anomaly Detection
Average: 8.3
7.8
Cloud Application Brokerage
Average: 8.4
8.2
Policy Enforcement
Average: 8.5
8.8
Ease of Use
Average: 8.8
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,158 Twitter followers
LinkedIn® Page
www.linkedin.com
7,920 employees on LinkedIn®
Ownership
NASDAQ:CHKP
(67)4.7 out of 5
Optimized for quick response
1st Easiest To Use in Cloud Edge Security software
Save to My Lists
Entry Level Price:Starting at $5.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Twingate is a secure remote access solution for an organization’s private applications, data, and environments, whether they are on-premise or in the cloud. Built to make the lives of DevOps teams, IT

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 49% Mid-Market
    • 45% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Twingate is a software that publishes specific resources to specific users, proxying services by name directly to the site of the resource without having to consider IP routing or address conflicts.
    • Users frequently mention the ease of setup, low cost, secure access, multiple login options, and the ability to monitor and control user access as key benefits of Twingate.
    • Reviewers mentioned issues such as the lack of an official package in the Arch repository for Arch Linux users, the tedious onboarding process due to the lack of bulk creation of resources and bulk editing, and the frequent requirement for authentication as drawbacks.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Twingate Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    9
    Easy Setup
    7
    Setup Ease
    7
    Security
    6
    Access Management
    5
    Cons
    Performance Issues
    9
    Limited Customization
    5
    Lacking Features
    4
    Lack of Features
    4
    Logging Issues
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Twingate features and usability ratings that predict user satisfaction
    7.1
    Anomaly Detection
    Average: 8.3
    10.0
    Cloud Application Brokerage
    Average: 8.4
    9.1
    Policy Enforcement
    Average: 8.5
    9.8
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    HQ Location
    Redwood City, California
    Twitter
    @TwingateHQ
    2,258 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    76 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Twingate is a secure remote access solution for an organization’s private applications, data, and environments, whether they are on-premise or in the cloud. Built to make the lives of DevOps teams, IT

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 49% Mid-Market
  • 45% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Twingate is a software that publishes specific resources to specific users, proxying services by name directly to the site of the resource without having to consider IP routing or address conflicts.
  • Users frequently mention the ease of setup, low cost, secure access, multiple login options, and the ability to monitor and control user access as key benefits of Twingate.
  • Reviewers mentioned issues such as the lack of an official package in the Arch repository for Arch Linux users, the tedious onboarding process due to the lack of bulk creation of resources and bulk editing, and the frequent requirement for authentication as drawbacks.
Twingate Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
9
Easy Setup
7
Setup Ease
7
Security
6
Access Management
5
Cons
Performance Issues
9
Limited Customization
5
Lacking Features
4
Lack of Features
4
Logging Issues
4
Twingate features and usability ratings that predict user satisfaction
7.1
Anomaly Detection
Average: 8.3
10.0
Cloud Application Brokerage
Average: 8.4
9.1
Policy Enforcement
Average: 8.5
9.8
Ease of Use
Average: 8.8
Seller Details
Company Website
HQ Location
Redwood City, California
Twitter
@TwingateHQ
2,258 Twitter followers
LinkedIn® Page
www.linkedin.com
76 employees on LinkedIn®
Entry Level Price:$8.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Check Point Harmony SASE is a converged networking and network security platform which connects all users, in the office or remote, to all resources, located on-prem, cloud, SaaS or web. It delivers s

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 52% Mid-Market
    • 35% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point Harmony SASE Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    16
    Reliability
    9
    User Interface
    8
    Ease of Connectivity
    6
    Intuitive
    5
    Cons
    Poor Support Services
    6
    Connection Issues
    5
    Poor Customer Support
    5
    Connectivity Issues
    4
    Expensive
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point Harmony SASE features and usability ratings that predict user satisfaction
    6.9
    Anomaly Detection
    Average: 8.3
    9.6
    Cloud Application Brokerage
    Average: 8.4
    8.3
    Policy Enforcement
    Average: 8.5
    9.4
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,158 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,920 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

Check Point Harmony SASE is a converged networking and network security platform which connects all users, in the office or remote, to all resources, located on-prem, cloud, SaaS or web. It delivers s

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 52% Mid-Market
  • 35% Small-Business
Check Point Harmony SASE Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
16
Reliability
9
User Interface
8
Ease of Connectivity
6
Intuitive
5
Cons
Poor Support Services
6
Connection Issues
5
Poor Customer Support
5
Connectivity Issues
4
Expensive
4
Check Point Harmony SASE features and usability ratings that predict user satisfaction
6.9
Anomaly Detection
Average: 8.3
9.6
Cloud Application Brokerage
Average: 8.4
8.3
Policy Enforcement
Average: 8.5
9.4
Ease of Use
Average: 8.8
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,158 Twitter followers
LinkedIn® Page
www.linkedin.com
7,920 employees on LinkedIn®
Ownership
NASDAQ:CHKP