|| products.size

Best Cloud Edge Security Software - Page 3

Lauren Worth
LW
Researched and written by Lauren Worth

Cloud edge security solutions provide companies with a cloud-delivered solution to securely access the internet, cloud-based applications, and business networks. The products are delivered using SD-WAN technology, which combines software-defined networking with a wide area network. This allows cloud edge security solutions to operate anywhere and combine security functions to protect all network activity.

Companies use these tools combine security functions of traditional tools such as secure web gateways (SWG), cloud access security brokers (CASB), and web application firewalls (WAF). This helps businesses and security teams create a single point of visibility for security policies, activities, and risks without forcing the user to interact with numerous tools or provide recurring authentication. The unified security solutions are designed to provide complete visibility across complex, hybrid environments. This simplifies work for administrators by using a single tool to classify, govern, and report on all user activity and network traffic without impacting end-user experiences. There is some direct relationship between cloud edge security tools and the other technologies mentioned above, but traditional CASB, WAF, and SWG products operate independently and do not provide the same level of visibility and accessibility across hybrid environments. The closest solution would be a software-defined perimeter (SDP), which provides unified network security but not unified access to cloud-based applications, networks, and web browsers.

To qualify for inclusion in the Cloud Edge Security category, a product must:

Provide a single access point for SaaS applications, web browsers, and networks
Centrally manage policies and risks across hybrid environments, networks, and applications
Provide a virtual web application firewall as a service
Unify incident management across hybrid environments

Best Cloud Edge Security Software At A Glance

Best for Small Businesses:
Best for Mid-Market:
Best for Enterprise:
Highest User Satisfaction:
Best Free Software:
Show LessShow More
Best for Enterprise:
Highest User Satisfaction:
Best Free Software:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
35 Listings in Cloud Edge Security Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Versa SASE is a cloud-native, multi-tenant, multi-service software for a software defined network.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 42% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Versa SASE Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Speed
    3
    Customer Support
    2
    Ease of Use
    2
    Features
    2
    Performance Efficiency
    2
    Cons
    Expensive
    1
    Poor Documentation
    1
    Update Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Versa SASE features and usability ratings that predict user satisfaction
    10.0
    Anomaly Detection
    Average: 8.3
    10.0
    Cloud Application Brokerage
    Average: 8.4
    9.4
    Policy Enforcement
    Average: 8.5
    8.7
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2012
    HQ Location
    Santa Clara
    Twitter
    @versanetworks
    28,415 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    759 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Versa SASE is a cloud-native, multi-tenant, multi-service software for a software defined network.

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 42% Mid-Market
Versa SASE Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Speed
3
Customer Support
2
Ease of Use
2
Features
2
Performance Efficiency
2
Cons
Expensive
1
Poor Documentation
1
Update Issues
1
Versa SASE features and usability ratings that predict user satisfaction
10.0
Anomaly Detection
Average: 8.3
10.0
Cloud Application Brokerage
Average: 8.4
9.4
Policy Enforcement
Average: 8.5
8.7
Ease of Use
Average: 8.8
Seller Details
Year Founded
2012
HQ Location
Santa Clara
Twitter
@versanetworks
28,415 Twitter followers
LinkedIn® Page
www.linkedin.com
759 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CleanINTERNET® is an intelligence-powered security solution using high performance computing technology, patented software algorithms and uniquely skilled security analysts to deliver a robust alterna

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 80% Mid-Market
    • 20% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Centripetal CleanINTERNET ® Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    3
    Alerts
    2
    Reliability
    2
    Security Protection
    2
    Automation
    1
    Cons
    Data Privacy
    1
    False Positives
    1
    Incomplete Information
    1
    Logging Issues
    1
    Poor Reporting
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Centripetal CleanINTERNET ® features and usability ratings that predict user satisfaction
    7.5
    Anomaly Detection
    Average: 8.3
    9.2
    Cloud Application Brokerage
    Average: 8.4
    10.0
    Policy Enforcement
    Average: 8.5
    9.3
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2009
    HQ Location
    Reston, VA
    Twitter
    @Centripetal_AI
    480 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    73 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CleanINTERNET® is an intelligence-powered security solution using high performance computing technology, patented software algorithms and uniquely skilled security analysts to deliver a robust alterna

Users
No information available
Industries
No information available
Market Segment
  • 80% Mid-Market
  • 20% Small-Business
Centripetal CleanINTERNET ® Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
3
Alerts
2
Reliability
2
Security Protection
2
Automation
1
Cons
Data Privacy
1
False Positives
1
Incomplete Information
1
Logging Issues
1
Poor Reporting
1
Centripetal CleanINTERNET ® features and usability ratings that predict user satisfaction
7.5
Anomaly Detection
Average: 8.3
9.2
Cloud Application Brokerage
Average: 8.4
10.0
Policy Enforcement
Average: 8.5
9.3
Ease of Use
Average: 8.8
Seller Details
Year Founded
2009
HQ Location
Reston, VA
Twitter
@Centripetal_AI
480 Twitter followers
LinkedIn® Page
www.linkedin.com
73 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(4)3.0 out of 5
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Securely connecting any user from any device​. Trusted access to any system on any network and platform.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cyolo Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Access
    1
    Secure Access
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cyolo features and usability ratings that predict user satisfaction
    4.2
    Anomaly Detection
    Average: 8.3
    5.0
    Cloud Application Brokerage
    Average: 8.4
    4.2
    Policy Enforcement
    Average: 8.5
    7.2
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cyolo
    Year Founded
    2020
    HQ Location
    Mountain View, US
    LinkedIn® Page
    www.linkedin.com
    85 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Securely connecting any user from any device​. Trusted access to any system on any network and platform.

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 25% Mid-Market
Cyolo Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Access
1
Secure Access
1
Cons
This product has not yet received any negative sentiments.
Cyolo features and usability ratings that predict user satisfaction
4.2
Anomaly Detection
Average: 8.3
5.0
Cloud Application Brokerage
Average: 8.4
4.2
Policy Enforcement
Average: 8.5
7.2
Ease of Use
Average: 8.8
Seller Details
Seller
Cyolo
Year Founded
2020
HQ Location
Mountain View, US
LinkedIn® Page
www.linkedin.com
85 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Zentry Security enables small- to medium-sized enterprises (SMEs) to simply and cost-effectively realize the benefits of zero trust security by securing remote access to any application, anywhere—in t

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 38% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Zentry Zero Trust Network Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Features
    2
    User Interface
    2
    Configuration Ease
    1
    Customer Support
    1
    Cons
    Access Issues
    1
    Connection Issues
    1
    Connectivity Issues
    1
    Limited Security Access
    1
    Remote Connection Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Zentry Zero Trust Network Access features and usability ratings that predict user satisfaction
    6.7
    Anomaly Detection
    Average: 8.3
    5.0
    Cloud Application Brokerage
    Average: 8.4
    5.0
    Policy Enforcement
    Average: 8.5
    9.2
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2020
    HQ Location
    Milpitas, US
    Twitter
    @ZentrySecurity
    34 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    9 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Zentry Security enables small- to medium-sized enterprises (SMEs) to simply and cost-effectively realize the benefits of zero trust security by securing remote access to any application, anywhere—in t

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 38% Small-Business
Zentry Zero Trust Network Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Features
2
User Interface
2
Configuration Ease
1
Customer Support
1
Cons
Access Issues
1
Connection Issues
1
Connectivity Issues
1
Limited Security Access
1
Remote Connection Issues
1
Zentry Zero Trust Network Access features and usability ratings that predict user satisfaction
6.7
Anomaly Detection
Average: 8.3
5.0
Cloud Application Brokerage
Average: 8.4
5.0
Policy Enforcement
Average: 8.5
9.2
Ease of Use
Average: 8.8
Seller Details
Year Founded
2020
HQ Location
Milpitas, US
Twitter
@ZentrySecurity
34 Twitter followers
LinkedIn® Page
www.linkedin.com
9 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Essent OrderTrax features and usability ratings that predict user satisfaction
    10.0
    Anomaly Detection
    Average: 8.3
    10.0
    Cloud Application Brokerage
    Average: 8.4
    10.0
    Policy Enforcement
    Average: 8.5
    10.0
    Ease of Use
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Essent
    Twitter
    @EssentCorp
    384 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    27 employees on LinkedIn®
Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Essent OrderTrax features and usability ratings that predict user satisfaction
10.0
Anomaly Detection
Average: 8.3
10.0
Cloud Application Brokerage
Average: 8.4
10.0
Policy Enforcement
Average: 8.5
10.0
Ease of Use
Average: 8.8
Seller Details
Seller
Essent
Twitter
@EssentCorp
384 Twitter followers
LinkedIn® Page
www.linkedin.com
27 employees on LinkedIn®