Best Software for 2025 is now live!
|| products.size

Best Network Security Policy Management (NSPM) Software - Page 2

Lauren Worth
LW
Researched and written by Lauren Worth

Network security policy management (NSPM) software provides tools for maintaining compliance and enforcing network security and firewall management policies across an organization.

NSPM tools provide the functionality to create, document, and visualize operational workflows for network security management and orchestration. A few NSPM software offerings also include features for auditing networks, documenting policy changes, and automating security operations.

Companies use NSPM software to ensure consistent network policies and compliance while endpoints, data, and networks remain secure. These tools help identify and remove unnecessary or obsolete security policies and simplify security operations. In addition, they often integrate with other security solutions to streamline policy management across complex networks.

Some of these products may share features with network monitoring software and network management software. However, those groupings are more concerned with performance and functionality than security and compliance.

To qualify for inclusion in the Network Security Policy Management (NSPM) category, a product must:

Develop and facilitate network and firewall policy management
Track and document changes made to security policies
Provide tools to ensure that networks meet various compliance standards

Best Network Security Policy Management (NSPM) Software At A Glance

Best for Mid-Market:
Highest User Satisfaction:
Show LessShow More
Highest User Satisfaction:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
42 Listings in Network Security Policy Management (NSPM) Available
(775)4.3 out of 5
Optimized for quick response
11th Easiest To Use in Network Security Policy Management (NSPM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SolarWinds® Observability is a full-stack observability solution that addresses the needs of modern organizations of all sizes by providing deep visibility into their hybrid ecosystems while affording

    Users
    • Network Engineer
    • Network Administrator
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 46% Enterprise
    • 37% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SolarWinds Observability Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Monitoring Performance
    48
    Ease of Use
    45
    Monitoring
    45
    Monitoring Capabilities
    45
    Easy Monitoring
    27
    Cons
    Expensive
    26
    Configuration Difficulty
    13
    Complex Setup
    12
    Integration Issues
    12
    User Interface Issues
    10
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SolarWinds Observability features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1999
    HQ Location
    Austin, TX
    Twitter
    @solarwinds
    20,054 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,655 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SolarWinds® Observability is a full-stack observability solution that addresses the needs of modern organizations of all sizes by providing deep visibility into their hybrid ecosystems while affording

Users
  • Network Engineer
  • Network Administrator
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 46% Enterprise
  • 37% Mid-Market
SolarWinds Observability Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Monitoring Performance
48
Ease of Use
45
Monitoring
45
Monitoring Capabilities
45
Easy Monitoring
27
Cons
Expensive
26
Configuration Difficulty
13
Complex Setup
12
Integration Issues
12
User Interface Issues
10
SolarWinds Observability features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Company Website
Year Founded
1999
HQ Location
Austin, TX
Twitter
@solarwinds
20,054 Twitter followers
LinkedIn® Page
www.linkedin.com
2,655 employees on LinkedIn®
(15)4.5 out of 5
13th Easiest To Use in Network Security Policy Management (NSPM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 53% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Forescout Network Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    4
    Internet Security
    3
    IP Addressing
    3
    Monitoring
    3
    Customization
    2
    Cons
    Complex Implementation
    2
    Dependency Issues
    2
    Integration Issues
    2
    Performance Issues
    2
    Poor Customer Support
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Forescout Network Security features and usability ratings that predict user satisfaction
    8.7
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2000
    HQ Location
    San Jose, CA
    Twitter
    @ForeScout
    23,689 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,132 employees on LinkedIn®
Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 53% Enterprise
  • 33% Mid-Market
Forescout Network Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
4
Internet Security
3
IP Addressing
3
Monitoring
3
Customization
2
Cons
Complex Implementation
2
Dependency Issues
2
Integration Issues
2
Performance Issues
2
Poor Customer Support
2
Forescout Network Security features and usability ratings that predict user satisfaction
8.7
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2000
HQ Location
San Jose, CA
Twitter
@ForeScout
23,689 Twitter followers
LinkedIn® Page
www.linkedin.com
1,132 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Junos Space Security Director provides security policy management through an intuitive, centralized interface that offers enforcement across emerging and traditional risk vectors.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 64% Enterprise
    • 45% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Juniper Security Director features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1996
    HQ Location
    Sunnyvale, CA
    Twitter
    @JuniperNetworks
    106,288 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    12,217 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Junos Space Security Director provides security policy management through an intuitive, centralized interface that offers enforcement across emerging and traditional risk vectors.

Users
No information available
Industries
No information available
Market Segment
  • 64% Enterprise
  • 45% Small-Business
Juniper Security Director features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1996
HQ Location
Sunnyvale, CA
Twitter
@JuniperNetworks
106,288 Twitter followers
LinkedIn® Page
www.linkedin.com
12,217 employees on LinkedIn®
Entry Level Price:$25.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ditno is an Australian owned company delivering a unique Network Security Management Platform with centralised visibility across hybrid networks, risk analysis, real-time compliance, and application d

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 62% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ditno Network Firewall Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Control
    4
    Network Security
    3
    Protection
    3
    Customization
    2
    Ease of Management
    2
    Cons
    Limited Features
    2
    Slow Performance
    2
    VPN Issues
    2
    Complexity
    1
    Connection Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ditno Network Firewall features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    10.0
    Console
    Average: 9.0
    10.0
    Policy Optimization
    Average: 8.9
    10.0
    Network Mapping
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ditno
    Year Founded
    2012
    HQ Location
    Sydney, New South Wales
    Twitter
    @DitnoAu
    176 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    9 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ditno is an Australian owned company delivering a unique Network Security Management Platform with centralised visibility across hybrid networks, risk analysis, real-time compliance, and application d

Users
No information available
Industries
No information available
Market Segment
  • 62% Enterprise
  • 38% Mid-Market
ditno Network Firewall Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Control
4
Network Security
3
Protection
3
Customization
2
Ease of Management
2
Cons
Limited Features
2
Slow Performance
2
VPN Issues
2
Complexity
1
Connection Issues
1
ditno Network Firewall features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
10.0
Console
Average: 9.0
10.0
Policy Optimization
Average: 8.9
10.0
Network Mapping
Average: 8.7
Seller Details
Seller
ditno
Year Founded
2012
HQ Location
Sydney, New South Wales
Twitter
@DitnoAu
176 Twitter followers
LinkedIn® Page
www.linkedin.com
9 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    F5 BIG-IP Advanced Firewall Manager (AFM) is a high-performance, full-proxy network security solution designed to protect networks and data centers against incoming threats that enter the network. Bui

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 53% Enterprise
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • F5 BIG-IP Advanced Firewall Manager (AFM) features and usability ratings that predict user satisfaction
    8.1
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Console
    Average: 9.0
    10.0
    Policy Optimization
    Average: 8.9
    10.0
    Network Mapping
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    F5
    HQ Location
    Seattle, Washington
    Twitter
    @F5Networks
    1,450 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    6,292 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

F5 BIG-IP Advanced Firewall Manager (AFM) is a high-performance, full-proxy network security solution designed to protect networks and data centers against incoming threats that enter the network. Bui

Users
No information available
Industries
No information available
Market Segment
  • 53% Enterprise
  • 33% Mid-Market
F5 BIG-IP Advanced Firewall Manager (AFM) features and usability ratings that predict user satisfaction
8.1
Has the product been a good partner in doing business?
Average: 9.0
8.3
Console
Average: 9.0
10.0
Policy Optimization
Average: 8.9
10.0
Network Mapping
Average: 8.7
Seller Details
Seller
F5
HQ Location
Seattle, Washington
Twitter
@F5Networks
1,450 Twitter followers
LinkedIn® Page
www.linkedin.com
6,292 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all netwo

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 35% Enterprise
    • 20% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point Infinity Platform features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.0
    8.9
    Console
    Average: 9.0
    9.0
    Policy Optimization
    Average: 8.9
    9.4
    Network Mapping
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,144 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,920 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all netwo

Users
No information available
Industries
No information available
Market Segment
  • 35% Enterprise
  • 20% Small-Business
Check Point Infinity Platform features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.0
8.9
Console
Average: 9.0
9.0
Policy Optimization
Average: 8.9
9.4
Network Mapping
Average: 8.7
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,144 Twitter followers
LinkedIn® Page
www.linkedin.com
7,920 employees on LinkedIn®
Ownership
NASDAQ:CHKP
(14)4.4 out of 5
12th Easiest To Use in Network Security Policy Management (NSPM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BlueCat Infrastructure Assurance (BCIA) is a proactive monitoring and automation solution. Think of it as a virtual DDI expert, on duty 24/7. Infrastructure Assurance provides deep visibility into Blu

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 57% Enterprise
    • 29% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BlueCat Infrastructure Assurance (BCIA) features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    BlueCat
    Year Founded
    2001
    HQ Location
    Toronto, Ontario
    Twitter
    @BlueCatNetworks
    2,300 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    583 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

BlueCat Infrastructure Assurance (BCIA) is a proactive monitoring and automation solution. Think of it as a virtual DDI expert, on duty 24/7. Infrastructure Assurance provides deep visibility into Blu

Users
No information available
Industries
No information available
Market Segment
  • 57% Enterprise
  • 29% Mid-Market
BlueCat Infrastructure Assurance (BCIA) features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.0
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
BlueCat
Year Founded
2001
HQ Location
Toronto, Ontario
Twitter
@BlueCatNetworks
2,300 Twitter followers
LinkedIn® Page
www.linkedin.com
583 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Stealthwatch is the only solution that detects threats across your private network, public clouds, and even in encrypted traffic.

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 52% Enterprise
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cisco Secure Network Analytics Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Network Security
    5
    Security
    4
    Detection Efficiency
    3
    Monitoring
    3
    Threat Detection
    3
    Cons
    Dashboard Issues
    2
    Difficult Learning
    2
    Learning Curve
    2
    Performance Issues
    2
    Slow Performance
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco Secure Network Analytics features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Console
    Average: 9.0
    8.9
    Policy Optimization
    Average: 8.9
    8.3
    Network Mapping
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    733,873 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    97,323 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Stealthwatch is the only solution that detects threats across your private network, public clouds, and even in encrypted traffic.

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 52% Enterprise
  • 33% Small-Business
Cisco Secure Network Analytics Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Network Security
5
Security
4
Detection Efficiency
3
Monitoring
3
Threat Detection
3
Cons
Dashboard Issues
2
Difficult Learning
2
Learning Curve
2
Performance Issues
2
Slow Performance
2
Cisco Secure Network Analytics features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.0
8.3
Console
Average: 9.0
8.9
Policy Optimization
Average: 8.9
8.3
Network Mapping
Average: 8.7
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
733,873 Twitter followers
LinkedIn® Page
www.linkedin.com
97,323 employees on LinkedIn®
Ownership
NASDAQ:CSCO
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    F5® BIG-IQ® Centralized Management provides an application-centric and unified point of visibility and control for F5 BIG-IP products and features. BIG-IQ Centralized Management significantly eases th

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 55% Small-Business
    • 27% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • F5 BIG-IQ Centralized Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Centralized Management
    3
    Security
    3
    User Interface
    3
    Monitoring
    2
    Cloud Management
    1
    Cons
    Insufficient Documentation
    1
    Limited Reporting
    1
    Limited Visibility
    1
    Poor Customer Support
    1
    Training Required
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • F5 BIG-IQ Centralized Management features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Console
    Average: 9.0
    7.9
    Policy Optimization
    Average: 8.9
    7.9
    Network Mapping
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    F5
    HQ Location
    Seattle, Washington
    Twitter
    @F5Networks
    1,450 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    6,292 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

F5® BIG-IQ® Centralized Management provides an application-centric and unified point of visibility and control for F5 BIG-IP products and features. BIG-IQ Centralized Management significantly eases th

Users
No information available
Industries
No information available
Market Segment
  • 55% Small-Business
  • 27% Enterprise
F5 BIG-IQ Centralized Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Centralized Management
3
Security
3
User Interface
3
Monitoring
2
Cloud Management
1
Cons
Insufficient Documentation
1
Limited Reporting
1
Limited Visibility
1
Poor Customer Support
1
Training Required
1
F5 BIG-IQ Centralized Management features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.0
8.3
Console
Average: 9.0
7.9
Policy Optimization
Average: 8.9
7.9
Network Mapping
Average: 8.7
Seller Details
Seller
F5
HQ Location
Seattle, Washington
Twitter
@F5Networks
1,450 Twitter followers
LinkedIn® Page
www.linkedin.com
6,292 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Trend Micro TippingPoint integrates with the Deep Discovery Advanced Threat Protection Solution to detect and block targeted attacks and malware through preemptive threat prevention, threat insight an

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 38% Small-Business
    • 31% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trend Micro TippingPoint features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.0
    8.8
    Console
    Average: 9.0
    9.0
    Policy Optimization
    Average: 8.9
    8.7
    Network Mapping
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Tokyo
    Twitter
    @trendmicro
    113,698 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,572 employees on LinkedIn®
    Ownership
    OTCMKTS:TMICY
Product Description
How are these determined?Information
This description is provided by the seller.

Trend Micro TippingPoint integrates with the Deep Discovery Advanced Threat Protection Solution to detect and block targeted attacks and malware through preemptive threat prevention, threat insight an

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 38% Small-Business
  • 31% Enterprise
Trend Micro TippingPoint features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.0
8.8
Console
Average: 9.0
9.0
Policy Optimization
Average: 8.9
8.7
Network Mapping
Average: 8.7
Seller Details
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
113,698 Twitter followers
LinkedIn® Page
www.linkedin.com
7,572 employees on LinkedIn®
Ownership
OTCMKTS:TMICY
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Security Management and Multi-Domain Security Management (Provider-1) delivers more security and control by segmenting your security management into multiple virtual domains. Businesses of all sizes c

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 90% Enterprise
    • 10% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Multi-Domain Security Management features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.0
    9.6
    Console
    Average: 9.0
    9.4
    Policy Optimization
    Average: 8.9
    7.8
    Network Mapping
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,144 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,920 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

Security Management and Multi-Domain Security Management (Provider-1) delivers more security and control by segmenting your security management into multiple virtual domains. Businesses of all sizes c

Users
No information available
Industries
No information available
Market Segment
  • 90% Enterprise
  • 10% Small-Business
Multi-Domain Security Management features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.0
9.6
Console
Average: 9.0
9.4
Policy Optimization
Average: 8.9
7.8
Network Mapping
Average: 8.7
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,144 Twitter followers
LinkedIn® Page
www.linkedin.com
7,920 employees on LinkedIn®
Ownership
NASDAQ:CHKP
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

     Illumio Zero Trust Segmentation is the first platform for breach containment. Visualize all communication between workloads and devices, set granular segmentation policies to control communications,

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 50% Mid-Market
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Illumio Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    3
    Data Security
    2
    Malware Protection
    2
    Threat Protection
    2
    Implementation Ease
    1
    Cons
    Expensive
    2
    Integration Issues
    1
    Time-Consumption
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Illumio features and usability ratings that predict user satisfaction
    7.8
    Has the product been a good partner in doing business?
    Average: 9.0
    9.4
    Console
    Average: 9.0
    9.4
    Policy Optimization
    Average: 8.9
    10.0
    Network Mapping
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Illumio
    Year Founded
    2013
    HQ Location
    Sunnyvale, California
    Twitter
    @illumio
    3,413 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    729 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

 Illumio Zero Trust Segmentation is the first platform for breach containment. Visualize all communication between workloads and devices, set granular segmentation policies to control communications,

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 50% Mid-Market
  • 33% Enterprise
Illumio Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
3
Data Security
2
Malware Protection
2
Threat Protection
2
Implementation Ease
1
Cons
Expensive
2
Integration Issues
1
Time-Consumption
1
Illumio features and usability ratings that predict user satisfaction
7.8
Has the product been a good partner in doing business?
Average: 9.0
9.4
Console
Average: 9.0
9.4
Policy Optimization
Average: 8.9
10.0
Network Mapping
Average: 8.7
Seller Details
Seller
Illumio
Year Founded
2013
HQ Location
Sunnyvale, California
Twitter
@illumio
3,413 Twitter followers
LinkedIn® Page
www.linkedin.com
729 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    FireMon Security Manager is a comprehensive network security policy management platform that helps organizations quickly adapt to change, manage risk, and achieve continuous compliance. By standardi

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 63% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • FireMon Security Manager Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Reporting
    1
    Security
    1
    Solutions
    1
    Cons
    Performance Issues
    2
    Improvements Needed
    1
    Lacking Features
    1
    Missing Features
    1
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FireMon Security Manager features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.0
    10.0
    Console
    Average: 9.0
    10.0
    Policy Optimization
    Average: 8.9
    8.3
    Network Mapping
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    FireMon
    Year Founded
    2004
    HQ Location
    Overland Park, KS
    Twitter
    @FireMon
    2,441 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    233 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

FireMon Security Manager is a comprehensive network security policy management platform that helps organizations quickly adapt to change, manage risk, and achieve continuous compliance. By standardi

Users
No information available
Industries
No information available
Market Segment
  • 63% Enterprise
  • 38% Mid-Market
FireMon Security Manager Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Reporting
1
Security
1
Solutions
1
Cons
Performance Issues
2
Improvements Needed
1
Lacking Features
1
Missing Features
1
Slow Performance
1
FireMon Security Manager features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.0
10.0
Console
Average: 9.0
10.0
Policy Optimization
Average: 8.9
8.3
Network Mapping
Average: 8.7
Seller Details
Seller
FireMon
Year Founded
2004
HQ Location
Overland Park, KS
Twitter
@FireMon
2,441 Twitter followers
LinkedIn® Page
www.linkedin.com
233 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Network Configuration Manager is a comprehensive solution designed to empower netwaork organizations with efficient network configuration and change management capabilities. It supports a wide range o

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 47% Mid-Market
    • 37% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ManageEngine Network Configuration Manager Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Backup
    8
    Configuration Management
    8
    Configuration Ease
    6
    Security Compliance
    6
    Automation
    5
    Cons
    Limited Features
    5
    Expensive
    4
    Compatibility Issues
    3
    Complex Setup
    3
    Lack of Features
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ManageEngine Network Configuration Manager features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.0
    8.8
    Console
    Average: 9.0
    8.3
    Policy Optimization
    Average: 8.9
    8.3
    Network Mapping
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Del Valle, Texas
    Twitter
    @manageengine
    7,655 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    418 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Network Configuration Manager is a comprehensive solution designed to empower netwaork organizations with efficient network configuration and change management capabilities. It supports a wide range o

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 47% Mid-Market
  • 37% Enterprise
ManageEngine Network Configuration Manager Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Backup
8
Configuration Management
8
Configuration Ease
6
Security Compliance
6
Automation
5
Cons
Limited Features
5
Expensive
4
Compatibility Issues
3
Complex Setup
3
Lack of Features
3
ManageEngine Network Configuration Manager features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.0
8.8
Console
Average: 9.0
8.3
Policy Optimization
Average: 8.9
8.3
Network Mapping
Average: 8.7
Seller Details
Year Founded
2002
HQ Location
Del Valle, Texas
Twitter
@manageengine
7,655 Twitter followers
LinkedIn® Page
www.linkedin.com
418 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Firewalls and security groups are important in securing your cloud environment and the information stored in it, as well as preventing malicious activity from reaching your servers or users.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM Cloud Network Security features and usability ratings that predict user satisfaction
    0.0
    No information available
    9.2
    Console
    Average: 9.0
    8.3
    Policy Optimization
    Average: 8.9
    8.3
    Network Mapping
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IBM
    Year Founded
    1911
    HQ Location
    Armonk, NY
    Twitter
    @IBM
    711,154 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    317,108 employees on LinkedIn®
    Ownership
    SWX:IBM
Product Description
How are these determined?Information
This description is provided by the seller.

Firewalls and security groups are important in securing your cloud environment and the information stored in it, as well as preventing malicious activity from reaching your servers or users.

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Mid-Market
IBM Cloud Network Security features and usability ratings that predict user satisfaction
0.0
No information available
9.2
Console
Average: 9.0
8.3
Policy Optimization
Average: 8.9
8.3
Network Mapping
Average: 8.7
Seller Details
Seller
IBM
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
711,154 Twitter followers
LinkedIn® Page
www.linkedin.com
317,108 employees on LinkedIn®
Ownership
SWX:IBM