  # Best Secure Access Service Edge (SASE) Platforms

  *By [Lauren Worth](https://research.g2.com/insights/author/lauren-worth)*

   Secure access service edge (SASE) is a cybersecurity architecture built to tackle modern computing environments. Traditionally, companies utilize numerous point solutions to secure access to networks and connections and manage identities. With SASE platforms, companies can combine the functionality of secure application and network access through a software-defined, cloud-native solution.

SASE platforms can be delivered as a single software-as-a-service (SaaS) offering or a collection of integrated security solutions flexibly designed to meet the unique needs of modern enterprises.

These platforms emerged as the next generation of [secure web gateways](https://www.g2.com/categories/secure-web-gateways) and [cloud access security broker (CASB) software](https://www.g2.com/categories/cloud-access-security-broker-casb). New cloud-native solutions began to emerge to secure access across environments. Eventually, these edge security products were equipped with [zero-trust networking](https://www.g2.com/categories/zero-trust-networking), risk-based identity management, and a secure [software-defined perimeter (SDP)](https://www.g2.com/categories/software-defined-perimeter-sdp).

To qualify for inclusion in the Secure Access Service Edge (SASE) category, a product or product suite must:

- Provide a single access point for SaaS applications, web browsers, and networks
- Centrally manage policies and risks across hybrid environments, networks, and applications
- Provide a virtual firewall as a service
- Secure connections between end users and cloud service providers
- Protect data and connected devices from cloud-based threats and malware
- Use adaptive authentication to verify user permissions continuously
- Monitor traffic and user behavior for future inspection and analysis




  ## How Many Secure Access Service Edge (SASE) Platforms Products Does G2 Track?
**Total Products under this Category:** 23

  
## How Does G2 Rank Secure Access Service Edge (SASE) Platforms Products?

**Why You Can Trust G2's Software Rankings:**

- 30 Analysts and Data Experts
- 1,100+ Authentic Reviews
- 23+ Products
- Unbiased Rankings

G2's software rankings are built on verified user reviews, rigorous moderation, and a consistent research methodology maintained by a team of analysts and data experts. Each product is measured using the same transparent criteria, with no paid placement or vendor influence. While reviews reflect real user experiences, which can be subjective, they offer valuable insight into how software performs in the hands of professionals. Together, these inputs power the G2 Score, a standardized way to compare tools within every category.

  
## Which Secure Access Service Edge (SASE) Platforms Is Best for Your Use Case?

- **Highest Performer:** [Check Point SASE](https://www.g2.com/products/check-point-sase/reviews)
- **Easiest to Use:** [Todyl Security Platform](https://www.g2.com/products/todyl-security-platform/reviews)
- **Top Trending:** [Todyl Security Platform](https://www.g2.com/products/todyl-security-platform/reviews)
- **Best Free Software:** [Cloudflare One (SASE)](https://www.g2.com/products/cloudflare-one-sase/reviews)

  
---

**Sponsored**

### Foxpass by Splashtop

Foxpass Cloud RADIUS by Splashtop is a fully managed, cloud-hosted RADIUS authentication service designed to provide secure, passwordless access to Wi-Fi networks, VPNs, and various network infrastructures. This solution is particularly tailored for IT teams that prioritize security, control, and operational simplicity. By employing certificate-based and identity-based authentication protocols, Foxpass ensures that every device and user connection is validated, enhancing the overall security posture of an organization. The product is especially beneficial for organizations looking to eliminate the vulnerabilities associated with shared passwords. By utilizing X.509 certificate authentication (EAP-TLS) and identity-driven policies (EAP-TTLS), Foxpass facilitates the implementation of Zero Trust principles. This approach allows organizations to assign role-based access controls and maintain comprehensive audit visibility without the need for on-premises servers or complex Public Key Infrastructure (PKI). Such features make Foxpass an appealing choice for enterprises, educational institutions, and global teams seeking to streamline their authentication processes. Foxpass seamlessly integrates with various identity providers, including Microsoft Entra ID (Azure), Google, OKTA, and OneLogin. This integration is complemented by automated certificate management capabilities through leading Mobile Device Management (MDM) solutions such as Microsoft Intune, Jamf, Kandji, and Addigy. Additionally, the built-in Bring Your Own Device (BYOD) workflows enable secure enrollment of unmanaged or personal devices, ensuring that organizations can maintain security standards while accommodating diverse device types. Compliance with industry standards is another critical aspect of Foxpass. The service is designed to meet regulations such as GDPR, SOC 2, ISO 27001, HIPAA, FERPA, and CIPA, making it suitable for organizations with stringent compliance requirements. Furthermore, Foxpass offers regional hosting and data residency options, which are essential for organizations that must adhere to specific sovereignty or privacy mandates. This flexibility ensures that users can implement Foxpass in a manner that aligns with their operational and regulatory needs. Overall, Foxpass Cloud RADIUS by Splashtop stands out in the authentication service category by providing a robust, cloud-based solution that enhances security, simplifies management, and supports compliance across various industries. Its focus on passwordless access and seamless integration with existing identity systems positions it as a valuable tool for organizations aiming to enhance their network security infrastructure.



[Visit website](https://www.g2.com/external_clickthroughs/record?secure%5Bad_program%5D=ppc&amp;secure%5Bad_slot%5D=category_product_list&amp;secure%5Bcategory_id%5D=1003473&amp;secure%5Bdisplayable_resource_id%5D=1497&amp;secure%5Bdisplayable_resource_type%5D=Category&amp;secure%5Bmedium%5D=sponsored&amp;secure%5Bplacement_reason%5D=neighbor_category&amp;secure%5Bplacement_resource_ids%5D%5B%5D=1848&amp;secure%5Bprioritized%5D=false&amp;secure%5Bproduct_id%5D=16236&amp;secure%5Bresource_id%5D=1003473&amp;secure%5Bresource_type%5D=Category&amp;secure%5Bsource_type%5D=category_page&amp;secure%5Bsource_url%5D=https%3A%2F%2Fwww.g2.com%2Fcategories%2Fsecure-access-service-edge-sase-platforms&amp;secure%5Btoken%5D=541880c2829aecb94b05e16bb232d6ace7bb0511c40f59251663af8454fcecce&amp;secure%5Burl%5D=https%3A%2F%2Fwww.splashtop.com%2Ffoxpass%3Futm_source%3Dg2.com%26utm_medium%3Dcpc%26utm_campaign%3D251218_WW_WW_G2_NAC_Foxpass&amp;secure%5Burl_type%5D=custom_url)

---

  ## What Are the Top-Rated Secure Access Service Edge (SASE) Platforms Products in 2026?
### 1. [Cato SASE Cloud](https://www.g2.com/products/cato-networks-cato-sase-cloud/reviews)
  Cato provides the world’s leading single-vendor SASE platform. Cato creates a seamless and elegant customer experience that effortlessly enables threat prevention, data protection, and timely incident detection and response. Using Cato, businesses easily replace costly and rigid legacy infrastructure with an open and modular SASE architecture based on SD-WAN, a purpose-built global cloud network, and an embedded cloud-native security stack


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 80

**Who Is the Company Behind Cato SASE Cloud?**

- **Seller:** [Cato Networks](https://www.g2.com/sellers/cato-networks)
- **Company Website:** https://www.catonetworks.com
- **Year Founded:** 2015
- **HQ Location:** Tel-Aviv, Israel
- **Twitter:** @CatoNetworks (12,672 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/3533853/ (1,661 employees on LinkedIn®)

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services, Financial Services
  - **Company Size:** 55% Mid-Market, 23% Small-Business


#### What Are Cato SASE Cloud's Pros and Cons?

**Pros:**

- Ease of Use (5 reviews)
- Customer Support (4 reviews)
- Reliability (4 reviews)
- Threat Protection (4 reviews)
- Deployment Ease (3 reviews)

**Cons:**

- Limited Features (3 reviews)
- Connection Issues (2 reviews)
- Expensive (2 reviews)
- Compatibility Issues (1 reviews)
- Expensive Licensing (1 reviews)

### 2. [Check Point SASE](https://www.g2.com/products/check-point-sase/reviews)
  The internet is the new corporate network, leading organizations to transition to their network security to Secure Access Service Edge (SASE). However, current solutions break the user experience with slow connections and complex management. Check Point SASE is a game-changing solution that delivers 10x faster internet security, SaaS Security, and full mesh Zero Trust Access and optimized SD-WAN performance—all with an emphasis on streamlined management. Combining innovative on-device and cloud-delivered network protections, Check Point SASE offers a local browsing experience with tighter security and privacy, and an identity-centric zero trust access policy that accommodates everyone: employees, BYOD and third parties. Its SD-WAN solution unifies industry-leading threat prevention with optimized connectivity, automated steering for over 10,000 applications and seamless link failover for uninterrupted web conferencing. Using Check Point SASE, business can build a secure corporate network over a private global backbone in less than an hour. The service is managed from a unified console and is backed by an award-winning global support team that has you covered 24/7.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 211

**Who Is the Company Behind Check Point SASE?**

- **Seller:** [Check Point Software Technologies](https://www.g2.com/sellers/check-point-software-technologies)
- **Company Website:** https://www.checkpoint.com/
- **Year Founded:** 1993
- **HQ Location:** Redwood City, CA
- **Twitter:** @CheckPointSW (70,991 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/check-point-software-technologies/ (8,356 employees on LinkedIn®)

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 47% Mid-Market, 35% Small-Business


#### What Are Check Point SASE's Pros and Cons?

**Pros:**

- Security (46 reviews)
- Ease of Use (39 reviews)
- Secure Access (34 reviews)
- Protection (26 reviews)
- Reliability (25 reviews)

**Cons:**

- Complex Implementation (28 reviews)
- Complex Configuration (24 reviews)
- Complex Setup (22 reviews)
- Expensive (17 reviews)
- Learning Curve (17 reviews)

### 3. [Todyl Security Platform](https://www.g2.com/products/todyl-security-platform/reviews)
  Todyl empowers businesses of any size with a complete, end-to-end security program. The Todyl Security Platform converges SASE, SIEM, Endpoint Security, GRC, MXDR, and more into a cloud-native, single-agent platform purpose-built for MSPs, MSSPs, and Mid-Market IT professionals. Each module is designed to be deployed in a targeted, agile approach to meet any use case. When all modules are combined, our platform becomes a comprehensive security solution that is cloud-first, globally accessible, and features a highly intuitive interface. With Todyl, your security stack becomes one comprehensive, consolidated, and customizable platform, making security more intuitive and streamlined to combat modern threats. Our platform helps to eliminate the complexity, cost, and operational overhead traditional approaches to cybersecurity require, empowering teams with the capabilities they need to protect, detect, and respond to cyberattacks.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 96

**Who Is the Company Behind Todyl Security Platform?**

- **Seller:** [Todyl](https://www.g2.com/sellers/todyl)
- **Company Website:** https://www.todyl.com/
- **Year Founded:** 2015
- **HQ Location:** Denver, CO
- **LinkedIn® Page:** https://www.linkedin.com/company/todylprotection (125 employees on LinkedIn®)

**Who Uses This Product?**
  - **Who Uses This:** Owner, President
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 73% Small-Business, 8% Mid-Market


#### What Are Todyl Security Platform's Pros and Cons?

**Pros:**

- Ease of Use (64 reviews)
- Customer Support (51 reviews)
- Features (41 reviews)
- Security (39 reviews)
- Deployment Ease (35 reviews)

**Cons:**

- Improvements Needed (21 reviews)
- Integration Issues (14 reviews)
- Inadequate Reporting (12 reviews)
- Limited Features (12 reviews)
- Poor Reporting (12 reviews)

### 4. [Zscaler Private Access](https://www.g2.com/products/zscaler-private-access/reviews)
  Zscaler Private Access (ZPA) is a cloud-based zero trust solution that securely connects users to private applications hosted in public clouds, data centers, or on-premises environments without relying on traditional VPNs or exposing them to the internet. Built on the principles of zero trust, ZPA ensures that users are authenticated and authorized before granting access, providing application-specific access rather than exposing the network. With AI-powered segmentation and identity-based policies, ZPA minimizes the attack surface, makes applications invisible to the internet, and prevents lateral movement. By simplifying access, reducing IT complexity, and improving user experience, ZPA supports modern hybrid work while delivering unmatched scalability and performance. Key Features and Benefits: • Minimize the Attack Surface: Private applications are hidden behind the Zero Trust Exchange, making them invisible and unreachable. Users connect to apps, not the network. • Eliminate Lateral Movement: Least-privileged access allows one-to-one user-to-application connections, avoiding network-wide exposure. • Deliver Exceptional User Experience &amp; Boost Hybrid Workforce Productivity: Fast, direct access to apps via 160+ global points of presence ensures low latency and no backhauling, boosting productivity. • Accelerate Zero Trust Journey with AI-powered User-to-app Segmentation: AI/ML generates custom app segmentation recommendations, simplifying user-to-app segmentation. • Prevent Compromised Users, Insider Threats &amp; Advanced Attackers: Comprehensive protection for private apps with OWASP Top 10 prevention, inline inspection, advanced threat protection, and data loss prevention. • Extend Zero Trust to All Applications: Enable secure remote access for legacy network connected applications such as VOIP and server-to-client applications, and extranet applications hosted in business partner or vendor networks. • Ensure Business Continuity and High Availability: ZPA Private Service Edge caches policies for zero trust access during internet outages, allowing for secure connectivity and business continuity. • Reduce Cost &amp; Operational Complexity: Replaces legacy VPNs, simplifying management and cutting hardware and operational costs. Accelerate M&amp;A time-to-value without having to integrate networks.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 132

**Who Is the Company Behind Zscaler Private Access?**

- **Seller:** [Zscaler](https://www.g2.com/sellers/zscaler)
- **Company Website:** https://www.zscaler.com/
- **Year Founded:** 2008
- **HQ Location:** San Jose, California
- **Twitter:** @zscaler (17,540 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/234625/ (8,743 employees on LinkedIn®)

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 44% Enterprise, 29% Mid-Market


#### What Are Zscaler Private Access's Pros and Cons?

**Pros:**

- Security (64 reviews)
- Ease of Use (53 reviews)
- Secure Access (49 reviews)
- VPN Efficiency (30 reviews)
- Reliability (25 reviews)

**Cons:**

- Connection Issues (24 reviews)
- Error Handling (21 reviews)
- Slow Loading (20 reviews)
- Expensive (18 reviews)
- Slow Internet (16 reviews)

### 5. [Aryaka Networks](https://www.g2.com/products/aryaka-networks/reviews)
  Founded in 2009 and headquartered in Santa Clara, California, Aryaka Networks is the first company to deliver Unified SASE as a Service, a fully integrated platform combining networking, security, and observability, purpose-built as a managed service. With a global team operating across five continents and an infrastructure spanning 40+ Points of Presence (PoPs) across six continents, Aryaka serves hundreds of global enterprises, including several Fortune 100 companies across industries including manufacturing, financial services, aviation, and technology. Aryaka Unified SASE as a Service integrates SD-WAN, Zero Trust Network Access (ZTNA), Next-Generation Firewall (NGFW), Secure Web Gateway (SWG), Cloud Access Security Broker (CASB), Next-Gen Data Loss Prevention (DLP), Intrusion Prevention System (IPS), and WAN Optimization into a single cloud-delivered platform. The OnePASS architecture enforces networking and security policy in a single pass, eliminating the latency and complexity of assembling point solutions from multiple vendors. Aryaka&#39;s private global backbone delivers 99.999% uptime with sub-30ms latency, reaching 95% of the global business population. The platform includes three purpose-built AI-native product lines: Aryaka AI\&gt;Perform, which optimizes network transport for AI and Generative AI workloads; Aryaka AI\&gt;Observe, which delivers AI-powered threat detection, prevention, and analytics; and Aryaka AI\&gt;Secure, which extends Zero Trust security controls across AI-driven environments. Management is unified through MyAryaka, a single-pane-of-glass portal spanning network performance, security posture, and observability. Flexible delivery options support fully managed, co-managed, and self-managed deployments. The platform aligns with ISO 27001, PCI DSS, HIPAA, and GDPR compliance frameworks. Enterprise IT and security teams are under sustained pressure to simplify fragmented infrastructure, control operational costs, and deliver consistent performance across distributed workforces, multi-cloud environments, and AI-driven workloads. Aryaka addresses each of these challenges within a single managed platform. By converging networking and security on a private global backbone, Aryaka eliminates the performance limitations of internet-dependent architectures, the management overhead of multi-vendor environments, and the security gaps created by disconnected tools. Independent analysis of Aryaka&#39;s platform found 113% ROI with payback in under six months. Customers report measurable improvements across application performance, network reliability, total cost of ownership, and security posture. For organizations modernizing from MPLS, adopting multi-cloud, enabling hybrid work, or building the network foundation for AI adoption, Aryaka delivers unified, high-performance secure connectivity at global scale, without the tradeoffs that come from stitching together point solutions.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 76

**Who Is the Company Behind Aryaka Networks?**

- **Seller:** [Aryaka Networks](https://www.g2.com/sellers/aryaka-networks)
- **Company Website:** https://www.aryaka.com
- **Year Founded:** 2009
- **HQ Location:** Santa Clara
- **Twitter:** @AryakaNetworks (12,092 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/304863/ (568 employees on LinkedIn®)

**Who Uses This Product?**
  - **Top Industries:** Manufacturing, Airlines/Aviation
  - **Company Size:** 58% Mid-Market, 42% Enterprise


### 6. [Prisma Access](https://www.g2.com/products/prisma-access/reviews)
  Palo Alto Networks Prisma® Access protects the hybrid workforce with the superior security of ZTNA while providing exceptional user experiences from a simple, unified security product. Purpose-built in the cloud to secure at cloud scale, only Prisma Access protects all application traffic with best-in-class capabilities while securing both access and data to dramatically reduce the risk of a data breach. With a common policy framework and single-pane-of-glass management, Prisma Access secures today’s hybrid workforce without compromising performance, backed by industry-leading SLAs to ensure exceptional user experiences.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 71

**Who Is the Company Behind Prisma Access?**

- **Seller:** [Palo Alto Networks](https://www.g2.com/sellers/palo-alto-networks)
- **Year Founded:** 2005
- **HQ Location:** Santa Clara, CA
- **Twitter:** @PaloAltoNtwks (128,825 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/30086/ (21,355 employees on LinkedIn®)
- **Ownership:** NYSE: PANW

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 46% Enterprise, 28% Mid-Market


#### What Are Prisma Access's Pros and Cons?

**Pros:**

- Security (33 reviews)
- Protection (23 reviews)
- Secure Access (21 reviews)
- Threat Protection (21 reviews)
- Internet Security (20 reviews)

**Cons:**

- Complex Setup (20 reviews)
- Complex Implementation (19 reviews)
- Complex Configuration (17 reviews)
- Expensive (14 reviews)
- Difficult Configuration (10 reviews)

### 7. [Akamai Enterprise Application Access](https://www.g2.com/products/akamai-akamai-enterprise-application-access/reviews)
  Enterprise Application Access is a unique cloud architecture that closes all inbound firewall ports, while ensuring that only authorized users and devices have access to the internal applications they need, and not the entire network. No one can access applications directly because they are hidden from the Internet and public exposure. Enterprise Application Access integrates data path protection, single sign-on, identity access, application security, and management visibility and control into a single service.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 27

**Who Is the Company Behind Akamai Enterprise Application Access?**

- **Seller:** [Akamai Technologies](https://www.g2.com/sellers/akamai-technologies)
- **Year Founded:** 1998
- **HQ Location:** Cambridge, MA
- **Twitter:** @Akamai (115,423 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/3925/ (10,444 employees on LinkedIn®)
- **Ownership:** NASDAQ:AKAM

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 37% Enterprise, 33% Small-Business


#### What Are Akamai Enterprise Application Access's Pros and Cons?

**Pros:**

- Customer Support (1 reviews)
- Ease of Use (1 reviews)
- Easy Access (1 reviews)
- Features (1 reviews)
- Security (1 reviews)


### 8. [FortiSASE](https://www.g2.com/products/fortisase/reviews)
  FortiSASE is a cloud-delivered Secure Access Service Edge (SASE) solution designed to provide secure and seamless access to the internet, cloud services, and private applications for remote users. By integrating networking and security functionalities into a unified platform, FortiSASE ensures consistent protection and optimal performance across all user locations. Key Features and Functionality: - Unified Security Services: FortiSASE combines Secure Web Gateway (SWG), Universal Zero Trust Network Access (ZTNA), Cloud Access Security Broker (CASB), Firewall-as-a-Service (FWaaS), and Data Loss Prevention (DLP) into a single solution. - Flexible Connectivity Options: The solution offers adaptable deployment methods, including native SD-WAN integration, support for microbranches, agent-based and agentless access, and flexible point-of-presence (PoP) selection, catering to diverse organizational needs. - AI-Powered Threat Intelligence: Leveraging FortiGuard Labs, FortiSASE utilizes artificial intelligence to provide real-time threat intelligence, ensuring continuous updates with the latest attack information for proactive security measures. - Global Coverage and Scalability: With over 170 PoPs worldwide, FortiSASE delivers low-latency, high-performance connectivity, ensuring reliable and scalable access for users across various regions. Primary Value and User Solutions: FortiSASE addresses the challenges of securing a hybrid workforce by providing consistent, enterprise-grade security regardless of user location. It simplifies operations through unified management and policy enforcement, reducing complexity and operational overhead. By converging networking and security into a single platform, FortiSASE enhances user experience, ensures data protection, and supports compliance with regional data residency and sovereignty laws.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 16

**Who Is the Company Behind FortiSASE?**

- **Seller:** [Fortinet](https://www.g2.com/sellers/fortinet)
- **Year Founded:** 2000
- **HQ Location:** Sunnyvale, CA
- **Twitter:** @Fortinet (151,491 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/6460/ (16,112 employees on LinkedIn®)
- **Ownership:** NASDAQ: FTNT

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 56% Mid-Market, 28% Enterprise


#### What Are FortiSASE's Pros and Cons?

**Pros:**

- Security (5 reviews)
- Threat Protection (5 reviews)
- Ease of Use (3 reviews)
- Secure Access (3 reviews)
- App Integration (2 reviews)

**Cons:**

- Difficult Learning Curve (2 reviews)
- Difficult Setup (2 reviews)
- Expensive (2 reviews)
- Complex Implementation (1 reviews)
- Complex Setup (1 reviews)

### 9. [Forcepoint Data Security Cloud](https://www.g2.com/products/forcepoint-data-security-cloud/reviews)
  Forcepoint Data Security Cloud delivers unified visibility, control, and protection for data across endpoints, web, SaaS, and private applications, powered by Forcepoint’s AI Mesh and Data Security Everywhere architecture. The platform integrates Data Loss Prevention (DLP), Cloud Access Security Broker (CASB), Secure Web Gateway (SWG), and Zero Trust Network Access (ZTNA) capabilities to help organizations prevent breaches, streamline compliance, and safely embrace AI and the cloud. Key capabilities include: • Unified data security across endpoints, web, cloud, and private apps • Distributed enforcement via endpoint, inline proxy, and API connectors • AI-driven data classification and adaptive risk protection • Industry-leading threat and data protection from one console • Seamless user experience with Zero Trust access and continuous monitoring Forcepoint Data Security Cloud simplifies and strengthens your security, delivering the freedom to work securely anywhere.


  **Average Rating:** 4.2/5.0
  **Total Reviews:** 100

**Who Is the Company Behind Forcepoint Data Security Cloud?**

- **Seller:** [Forcepoint](https://www.g2.com/sellers/forcepoint)
- **Year Founded:** 1994
- **HQ Location:** Austin, TX
- **Twitter:** @Forcepointsec (65,452 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/forcepoint/ (1,658 employees on LinkedIn®)

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 50% Enterprise, 38% Mid-Market


#### What Are Forcepoint Data Security Cloud's Pros and Cons?

**Pros:**

- Features (7 reviews)
- Ease of Use (6 reviews)
- Security (6 reviews)
- Customer Support (5 reviews)
- Monitoring (5 reviews)

**Cons:**

- Complex Configuration (4 reviews)
- Expensive (4 reviews)
- Complexity (3 reviews)
- Complex Setup (3 reviews)
- Difficult Setup (3 reviews)

### 10. [Zscaler Secure Access Service Edge (SASE)](https://www.g2.com/products/zscaler-secure-access-service-edge-sase/reviews)
  Zscaler’s Secure Access Service Edge (SASE) platform enables organizations to unify networking and security into a seamless, cloud-delivered, zero trust framework. Built on the world’s largest security cloud, Zscaler Zero Trust SASE provides organizations with the fastest, most secure, and most reliable approach to connecting users, devices, and locations to applications and information—anytime, anywhere. Redefining Networking and Security on a Zero Trust Foundation: Traditional networking solutions, like SD-WAN, struggle to meet today’s complex challenges, often increasing attack surfaces, enabling lateral threat movement, and adding unnecessary complexity to IT environments. Zscaler SASE addresses these challenges by integrating advanced networking capabilities with industry-leading security services. At its core, the framework enforces zero trust principles to adaptively secure connectivity for users, IoT/OT systems, workloads, and business partners—without the overhead of legacy hardware-based models. Key Capabilities of Zscaler SASE: • Zero Trust SD-WAN: Delivers secure and high-performance connectivity by auto-selecting optimal traffic routes to cloud applications, the internet, or data centers, eliminating unnecessary backhauling. • Secure Web Gateway (SWG): Protects users by inspecting and securing all web traffic, blocking malware, phishing, malicious downloads, and other incoming threats. • Cloud Access Security Broker (CASB): Extends control over SaaS and cloud apps, ensuring the safe and compliant use of cloud services. • Firewall as a Service (FWaaS): A scalable, cloud-delivered next-gen firewall that replaces legacy perimeter solutions to effectively block threats across all network layers. • Zero Trust Network Access (ZTNA): Provides secure, least-privileged application access without granting excessive trust or network visibility to users. • Digital Experience Management (DEM): Delivers AI-powered insights into application and network performance, enabling IT teams to optimize user experience proactively. The Advantages of Zero Trust SASE: • Unified Infrastructure for Simpler IT Management: Consolidate networking and security into a single-vendor SASE solution, reducing complexity and improving operational efficiency. • Enhanced Cyberthreat Protection: Apply inline protections such as data loss prevention (DLP), threat detection, and ransomware mitigation across all points of access. • Seamless User Experience: Enforce high-speed security policies closer to the user, eliminating latency and ensuring uninterrupted cloud access. • Reduction in Operational Costs: Eliminate the need for multiple point products and reduce reliance on expensive hardware solutions through a fully cloud-delivered framework. Use Cases Supported by Zscaler Zero Trust SASE: • Enable Secure Hybrid Workforces: Extend secure, zero trust connectivity to employees whether they are remote, on-site, or traveling. • Optimize Connectivity: Simplify network configurations by routing traffic directly to the most efficient path while ensuring uncompromised security. • Improve Threat Posture: Secure all traffic, ensure encrypted data inspection, and adapt defenses in real time to address evolving cyber threats. • Reduce Risk Across IoT/OT and Partner Ecosystems: Safeguard workforce, IoT/OT systems, and business partners across distributed environments with a unified, secure connectivity framework. Why Choose Zscaler SASE? Zscaler redefines SASE with the most comprehensive zero trust implementation in the industry. Built on the Zscaler Zero Trust Exchange™, the platform scales to meet the demands of the largest global enterprises by connecting over 160 points of presence worldwide. As an acknowledged leader in SASE innovation, Zscaler ensures that your organization can securely connect users, locations, and devices to mission-critical applications while improving agility, performance, and security. Embrace the future of secure networking with Zscaler Zero Trust SASE and transform your business operations into a seamless and secure digital-first environment.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 16

**Who Is the Company Behind Zscaler Secure Access Service Edge (SASE)?**

- **Seller:** [Zscaler](https://www.g2.com/sellers/zscaler)
- **Year Founded:** 2008
- **HQ Location:** San Jose, California
- **Twitter:** @zscaler (17,540 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/234625/ (8,743 employees on LinkedIn®)
- **Ownership:** NASDAQ:ZS

**Who Uses This Product?**
  - **Company Size:** 69% Enterprise, 19% Small-Business


### 11. [NordLayer](https://www.g2.com/products/nordlayer/reviews)
  NordLayer is a toggle-ready network security platform that helps businesses connect, protect, detect, and respond to cyber threats. Built on NordVPN standards, it ensures a secure and reliable connection to the internet and private company resources. NordLayer is designed for modern businesses of all sizes, offering cutting-edge business VPN, Zero Trust Network Access (ZTNA), advanced threat protection, and threat intelligence. It helps companies meet regulatory compliance requirements and enhance cyber resilience while remaining hardware-free, scalable, and adaptable to any work model. With user-centered security and intuitive deployment, NordLayer integrates easily into any existing infrastructure, ensuring best-in-the-market protection for remote, hybrid, and on-premises teams. -- Looking for a partnership? The NordLayer Partner Program helps MSPs, resellers, and agents grow their businesses with high profit margins, dedicated training, 24/7 technical support, and no upfront investment. Learn more: nordlayer.com/partner-program


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 126

**Who Is the Company Behind NordLayer?**

- **Seller:** [Nord Security](https://www.g2.com/sellers/nord-security)
- **Company Website:** https://nordsecurity.com/
- **Year Founded:** 2012
- **HQ Location:** Global
- **Twitter:** @NordPass (9,506 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/nordsecurity/ (1,883 employees on LinkedIn®)

**Who Uses This Product?**
  - **Who Uses This:** CTO
  - **Top Industries:** Computer Software, Information Technology and Services
  - **Company Size:** 56% Small-Business, 35% Mid-Market


#### What Are NordLayer's Pros and Cons?

**Pros:**

- Ease of Use (6 reviews)
- Setup Ease (4 reviews)
- Easy Access (3 reviews)
- Easy Management (3 reviews)
- Easy Setup (3 reviews)

**Cons:**

- Performance Issues (5 reviews)
- Limited Features (4 reviews)
- Connection Issues (3 reviews)
- Complex Configuration (2 reviews)
- Complex Setup (2 reviews)

### 12. [Bowtie](https://www.g2.com/products/bowtie-bowtie/reviews)
  Bowtie defends the systems, applications, and workforce of leading enterprises. Instead of adding yet another tool that companies must build around, Bowtie integrates effortlessly into any network environment and unifies policy. This allows organizations to treat every user as if they’re working securely from a coffee shop — no matter where they actually work, with one global policy.


  **Average Rating:** 5.0/5.0
  **Total Reviews:** 1

**Who Is the Company Behind Bowtie?**

- **Seller:** [Bowtie](https://www.g2.com/sellers/bowtie-6f574b64-733b-4849-b13c-c4276af90e9b)
- **Year Founded:** 2022
- **HQ Location:** Santa Clara, US
- **LinkedIn® Page:** https://www.linkedin.com/company/bowtie-works (13 employees on LinkedIn®)

**Who Uses This Product?**
  - **Company Size:** 100% Mid-Market


### 13. [Cloudflare One (SASE)](https://www.g2.com/products/cloudflare-one-sase/reviews)
  Cloudflare One is a single-vendor secure access service edge (SASE) platform that converges security and networking services into a unified, global connectivity cloud. It replaces legacy, fragmented hardware and first-generation SASE solutions with a composable, programmable architecture. Cloudflare One connects and protects an organization&#39;s workforce, AI agents, and infrastructure. Learn more at https://www.cloudflare.com/sase/ Designed for agility, it enables teams to: - Accelerate safe AI adoption with granular visibility, control, and AI agent governance. - Modernize remote access by replacing clunky VPNs with zero trust access. - Block email phishing attacks with flexible, SASE-native email security. - Protect web traffic for remote users and branch offices with lightweight DNS filtering. - Deploy “coffee shop networking” with a light branch, heavy cloud approach.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 101

**Who Is the Company Behind Cloudflare One (SASE)?**

- **Seller:** [Cloudflare, Inc.](https://www.g2.com/sellers/cloudflare-inc)
- **Year Founded:** 2009
- **HQ Location:** San Francisco, California
- **Twitter:** @Cloudflare (279,846 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/407222/ (6,898 employees on LinkedIn®)
- **Ownership:** NYSE: NET

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 38% Small-Business, 34% Mid-Market


#### What Are Cloudflare One (SASE)'s Pros and Cons?

**Pros:**

- Ease of Use (8 reviews)
- Protection (7 reviews)
- Reliability (7 reviews)
- Security (7 reviews)
- User Interface (6 reviews)

**Cons:**

- Steep Learning Curve (5 reviews)
- Complexity (4 reviews)
- Difficult Learning (4 reviews)
- Difficult Learning Curve (4 reviews)
- Difficult Setup (4 reviews)

### 14. [iboss](https://www.g2.com/products/iboss/reviews)
  iboss is a leading Zero Trust Secure Access Service Edge (SASE) cloud security platform that consolidates network and security technologies into a single cloud-based service. By integrating VPN, Secure Web Gateway (SWG), SD-WAN, branch firewalls, Browser Isolation, and Cloud Access Security Broker (CASB) capabilities, iboss replaces legacy solutions to enhance security, reduce complexity, and lower costs. Utilizing Zero Trust Network Access (ZTNA), iboss grants users access only to the applications they need based on their identity, minimizing risks of breaches and data loss. As a unified network and security service with a single-pane-of-glass management console, iboss empowers organizations to enhance security, improve user experience, and support a distributed workforce in today&#39;s evolving digital landscape. Leveraging a purpose-built cloud architecture backed by 230+ issued and pending patents and more than 100 points of presence globally, iboss processes over 150 billion transactions daily, blocking 4 billion threats per day. More than 4,000 global enterprises trust the iboss platform to support their modern workforces, including a large number of Fortune 50 companies. iboss was named a Leader in the IDC MarketScape for Worldwide ZTNA, one of the Top 25 Cybersecurity Companies by The Software Report, one of the 25 highest-rated Private Cloud Computing Companies to work for by Battery Ventures, CRN’s top 20 Coolest Cloud Security Companies, and is one of Inc.’s 2024 Best Workplaces. To learn more, visit http://www.iboss.com


  **Average Rating:** 4.0/5.0
  **Total Reviews:** 15

**Who Is the Company Behind iboss?**

- **Seller:** [iboss](https://www.g2.com/sellers/iboss)
- **Year Founded:** 2003
- **HQ Location:** Boston, MA
- **Twitter:** @iboss (45 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/3520250/ (357 employees on LinkedIn®)

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 50% Mid-Market, 31% Small-Business


### 15. [Timus SASE](https://www.g2.com/products/timus-sase/reviews)
  Timus helps MSPs deliver enterprise-level security and compliance,&amp;nbsp;without enterprise-level complexity. The Timus SASE platform was developed by network security experts to make it easy to protect every client, whether they’re working from home, the office, or anywhere in between. Always-on, zero-click, zero-trust security comes standard!   Elevate your security under a single, cloud-based platform by consolidating and modernizing your VPNs, firewalls, MFA tools, secure web gateways/DNS filters, and more - deployable in less than 30 minutes and easy to scale.&amp;nbsp;Our mission is to help security-first MSPs protect their clients, accelerate revenues, and future-proof their stack. See the Timus difference today!


  **Average Rating:** 5.0/5.0
  **Total Reviews:** 1

**Who Is the Company Behind Timus SASE?**

- **Seller:** [Timus Networks](https://www.g2.com/sellers/timus-networks)
- **Year Founded:** 2021
- **HQ Location:** Tampa, US
- **LinkedIn® Page:** https://www.linkedin.com/company/timusnetworks/ (48 employees on LinkedIn®)

**Who Uses This Product?**
  - **Company Size:** 100% Small-Business


#### What Are Timus SASE's Pros and Cons?

**Pros:**

- App Integration (1 reviews)
- Easy Access (1 reviews)
- VPN Efficiency (1 reviews)

**Cons:**

- Poor Interface Design (1 reviews)

### 16. [Barracuda SecureEdge](https://www.g2.com/products/barracuda-secureedge/reviews)
  Barracuda’s cloud-first SASE platform enables businesses to control access to data from any device, anytime, anywhere, and allows security inspection and policy enforcement in the cloud, at the branch, or on the device. Barracuda SecureEdge delivers enterprise-grade security including Zero Trust Network Access (ZTNA), Firewall-as-a-Service, web security, and fully integrated office connectivity with Secure SD-WAN.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 15

**Who Is the Company Behind Barracuda SecureEdge?**

- **Seller:** [Barracuda](https://www.g2.com/sellers/barracuda)
- **Year Founded:** 2002
- **HQ Location:** Campbell, CA
- **Twitter:** @Barracuda (15,232 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/barracuda-networks/ (2,229 employees on LinkedIn®)
- **Ownership:** Private

**Who Uses This Product?**
  - **Company Size:** 73% Mid-Market, 13% Small-Business


### 17. [Bastionne SDi](https://www.g2.com/products/bastionne-sdi/reviews)
  SASE product bundle that offers unbreachable endpoint protection, whilst providing Quantum secure encryption for data in transit. Negligible overhead and infinitely scalable. Very affordable and saves up to 90% of regular cybersecurity costs on the product bundle.



**Who Is the Company Behind Bastionne SDi?**

- **Seller:** [Bastionne](https://www.g2.com/sellers/bastionne)
- **HQ Location:** Dover, US
- **Twitter:** @BastionneInc (197 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/bastionne (3 employees on LinkedIn®)



### 18. [Command|Link](https://www.g2.com/products/command-link/reviews)
  ONE platform to manage your SD-WAN, UCaaS, CaaS, firewalls, MPLS, network, switches, IP phones, installs, trouble tickets, bills, and network performance across the entire globe Complete control of your technology stack without interference or dependency on vendors Increase agent efficiency and speed up issue resolution using CommandLink&#39;s proprietary ITSM Streamline IT support with automated software-enabled support workflows Shape service experiences for employees anywhere with full transparency at the most granular level Make real-time moves, adds, changes without picking up the phone Analyze and control bandwidth traffic by application, port, IP, and or protocol. Enable real-time, dynamic, and pre-scheduled bandwidth modifications as often as you like. Direct communication with your tier 3 engineering POD, enabling you to scale your IT infrastructure without headcount and especially without headaches Deliver high-quality services proactively and at scale with real-time analytics and reports If you need access to third party apps like ServiceNow, the CommandLink API enables streaming push and pull functions with any API enabled app.


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 21

**Who Is the Company Behind Command|Link?**

- **Seller:** [CommandLink](https://www.g2.com/sellers/commandlink)
- **Year Founded:** 2012
- **HQ Location:** Bothell, Washington, United States
- **LinkedIn® Page:** https://www.linkedin.com/company/commandlink (277 employees on LinkedIn®)

**Who Uses This Product?**
  - **Company Size:** 59% Mid-Market, 32% Enterprise


#### What Are Command|Link's Pros and Cons?

**Pros:**

- Customer Support (13 reviews)
- Response Time (9 reviews)
- Reliability (6 reviews)
- Robust Support (5 reviews)
- Ease of Use (4 reviews)

**Cons:**

- Limited Features (4 reviews)
- Communication Issues (3 reviews)
- Insufficient Information (3 reviews)
- Lack of Features (2 reviews)
- Poor Support Services (2 reviews)

### 19. [Ericsson Enterprise Wireless Solutions](https://www.g2.com/products/ericsson-enterprise-wireless-solutions/reviews)
  Ericsson Enterprise Wireless Solutions enables enterprises to take advantage of cellular connectivity through its Cradlepoint LTE and 5G Wireless WAN routers. Through the NetCloud platform, these routers are configured, managed, and monitored, with SD‑WAN and zero trust networking capabilities applied to support secure and reliable connectivity across distributed and mobile environments, including sites, vehicles, and IoT deployments.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 40

**Who Is the Company Behind Ericsson Enterprise Wireless Solutions?**

- **Seller:** [Ericsson Enterprise Wireless Solutions](https://www.g2.com/sellers/ericsson-enterprise-wireless-solutions)
- **Year Founded:** 2006
- **HQ Location:** Boise, ID
- **Twitter:** @EricssonEnt (4,797 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/showcase/ericsson-enterprise-wireless/ (1 employees on LinkedIn®)

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 46% Mid-Market, 27% Enterprise


### 20. [Sangfor SASE](https://www.g2.com/products/sangfor-sase/reviews)
  Sangfor Access is a SASE (Secure Access Service Edge) solution that provides your branch office or remote users secure internet access and access control.


  **Average Rating:** 4.0/5.0
  **Total Reviews:** 1

**Who Is the Company Behind Sangfor SASE?**

- **Seller:** [Sangfor Technologies](https://www.g2.com/sellers/sangfor-technologies)
- **Year Founded:** 2000
- **HQ Location:** Shenzhen, China
- **Twitter:** @SANGFOR (13,253 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/sangfor-technologies/ (2,285 employees on LinkedIn®)

**Who Uses This Product?**
  - **Company Size:** 100% Small-Business


### 21. [Symantec Secure Access Cloud](https://www.g2.com/products/symantec-secure-access-cloud/reviews)
  Symantec Secure Access Cloud is a SaaS solution that enables more secure and granular access management to any corporate resource hosted on-premises or in the cloud. It uses Zero Trust Access principles in delivering point-to-point connectivity without agents or appliances, eliminating network level threats.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 17

**Who Is the Company Behind Symantec Secure Access Cloud?**

- **Seller:** [Broadcom](https://www.g2.com/sellers/broadcom-ab3091cd-4724-46a8-ac89-219d6bc8e166)
- **Year Founded:** 1991
- **HQ Location:** San Jose, CA
- **Twitter:** @broadcom (63,400 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/broadcom/ (55,707 employees on LinkedIn®)
- **Ownership:** NASDAQ: CA

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 67% Mid-Market, 28% Enterprise


### 22. [VeloCloud SASE](https://www.g2.com/products/velocloud-sase/reviews)
  VMware VeloCloud SASE, secured by Symantec, is a comprehensive cloud-delivered Secure Access Service Edge platform that integrates VMware&#39;s leading SD-WAN technology with Symantec&#39;s advanced Security Service Edge capabilities. This unified solution offers enterprises reliable, efficient, and secure access to applications and data from any device and location, ensuring consistent protection across edge locations, applications, users, and devices. Key Features and Functionality: - Enhanced User Experience: VeloCloud SD-WAN automatically recognizes over 4,300 applications, optimizing network performance based on local conditions to ensure seamless user experiences without IT intervention. - Comprehensive Threat Detection and Response: Integration with Symantec&#39;s security enforcement points provides proactive network security, including advanced threat intelligence, deep file inspection, sandboxing, and web isolation technologies to protect against sophisticated threats. - Automation for Branch and Edge Connectivity: The solution enables direct forwarding of internet-bound traffic from branch or edge locations to the nearest Symantec Enterprise Cloud location, simplifying the addition of new sites and policy modifications. - Streamlined Management and AI-Enabled Operations: A cloud-delivered architecture reduces IT burdens related to scalability and lifecycle management. Centralized configuration through VMware Edge Cloud Orchestrator and AI-powered analytics provide valuable insights into user experience and security operations. Primary Value and Problem Solved: VeloCloud SASE addresses the challenges of managing and securing distributed enterprise environments by combining networking and security into a single, cloud-delivered service. It enhances security, improves user experience, simplifies management, and streamlines operations, enabling organizations to protect sensitive data, ensure uninterrupted operations, and mitigate potential risks across their distributed infrastructure.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 11

**Who Is the Company Behind VeloCloud SASE?**

- **Seller:** [Arista Networks](https://www.g2.com/sellers/arista-networks-39d4d864-54b5-4f9b-bebc-dc5cf72757ca)
- **Year Founded:** 2004
- **HQ Location:** Santa Clara, US
- **Twitter:** @arista_channels (2,447 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/80069/ (5,422 employees on LinkedIn®)
- **Ownership:** NYSE:ANET

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 38% Mid-Market, 38% Small-Business


### 23. [WatchGuard FireCloud](https://www.g2.com/products/watchguard-firecloud/reviews)
  FireCloud delivers zero trust-driven protection with identity-based access, session-level enforcement, and cloud-delivered security to block web threats, eliminate VPN risk, and reduce exposure across every connection.



**Who Is the Company Behind WatchGuard FireCloud?**

- **Seller:** [WatchGuard](https://www.g2.com/sellers/watchguard)
- **Company Website:** https://www.watchguard.com
- **Year Founded:** 1996
- **HQ Location:** Seatle, WA
- **Twitter:** @watchguard (19,460 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/166878/ (1,207 employees on LinkedIn®)




    ## What Is Secure Access Service Edge (SASE) Platforms?
  [Cloud Security Software](https://www.g2.com/categories/cloud-security)
  ## What Software Categories Are Similar to Secure Access Service Edge (SASE) Platforms?
    - [Zero Trust Networking Software](https://www.g2.com/categories/zero-trust-networking)
    - [Cloud Edge Security Software](https://www.g2.com/categories/cloud-edge-security)
    - [Secure Service Edge (SSE) Solutions](https://www.g2.com/categories/secure-service-edge-sse-solutions)

  
    
