G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
Cato provides the world’s leading single-vendor SASE platform. Cato creates a seamless and elegant customer experience that effortlessly enables threat prevention, data protection, and timely incident
Palo Alto Networks Prisma® Access protects the hybrid workforce with the superior security of ZTNA while providing exceptional user experiences from a simple, unified security product. Purpose-built
Aryaka Networks is the leader in delivering Unified SASE as a Service, the only solution designed to provide performance, agility, simplicity, and security without compromise. Aryaka's platform integr
The internet is the new corporate network, leading organizations to transition to their network security to Secure Access Service Edge (SASE). However, current solutions break the user experience with
Check Point Harmony SASE is a cloud-based solution that combines network security and secure remote access into a single platform, providing secure connectivity for remote users and branch offices. Reviewers frequently mention the seamless integration with existing tools, clear visibility into user activity, and the platform's ability to provide robust security without compromising performance or user experience. Reviewers experienced complexity during the initial setup and policy configuration, a steep learning curve to understand all features, and occasional performance lags, especially in certain regions.
Todyl empowers businesses of any size with a complete, end-to-end security program. The Todyl Security Platform converges SASE, SIEM, Endpoint Security, GRC, MXDR, and more into a cloud-native, singl
Zscaler Private Access (ZPA) is a cloud-based zero trust solution that securely connects users to private applications hosted in public clouds, data centers, or on-premises environments without relyin
Zscaler Private Access is a security tool that provides secure access to internal applications without using a traditional VPN. Reviewers like the fast and reliable connection, the ease of use, and the enhanced security features that Zscaler Private Access offers. Users mentioned that the initial setup can be complex and time-consuming, and troubleshooting issues can take longer than expected.
Enterprise Application Access is a unique cloud architecture that closes all inbound firewall ports, while ensuring that only authorized users and devices have access to the internal applications they
FortiSASE is a cloud-delivered Secure Access Service Edge (SASE) solution designed to provide secure and seamless access to the internet, cloud services, and private applications for remote users. By
Forcepoint Data Security Cloud delivers unified visibility, control, and protection for data across endpoints, web, SaaS, and private applications, powered by Forcepoint’s AI Mesh and Data Security Ev
Zscaler’s Secure Access Service Edge (SASE) platform enables organizations to unify networking and security into a seamless, cloud-delivered, zero trust framework. Built on the world’s largest securit
NordLayer is a toggle-ready network security platform that helps businesses connect, protect, detect, and respond to cyber threats. Built on NordVPN standards, it ensures a secure and reliable connect
Cloudflare One is a single-vendor secure access service edge (SASE) platform that converges security and networking services into a unified, global connectivity cloud. It replaces legacy, fragmented h
iboss is a leading Zero Trust Secure Access Service Edge (SASE) cloud security platform that consolidates network and security technologies into a single cloud-based service. By integrating VPN, Secur
Timus helps MSPs deliver enterprise-level security and compliance, without enterprise-level complexity. The Timus SASE platform was developed by network security experts to make it easy to protect eve
Barracuda’s cloud-first SASE platform enables businesses to control access to data from any device, anytime, anywhere, and allows security inspection and policy enforcement in the cloud, at the branch