Best Software-Defined Perimeter (SDP) Software

Lauren Worth
LW
Researched and written by Lauren Worth

Software-defined perimeter (SDP) products are a specific type of network security solution which focus on network segmentation and user authentication. SDP itself is an architecture designed to allow access on a need-to-know basis, meaning every device and user must be verified before accessing either the network as a whole or specific systems and applications within a network. Unlike traditional network access controllers that utilize a lock and key approach, SDP segments networks by application use and analyzes user access permissions at a granular level across the network. SDP administrators can also customize and automate highly specific network security policies while enforcing them continuously.

Companies adopt SDP solutions because traditional network protection ecosystems are insufficient. If a hacker or unauthorized user obtains access to a traditional network, it’s uncertain what they can access. SDP, on the other hand, analyzes each access request at the application level, compares it to the user’s privileges, then grants or denies access. This verification process occurs continuously, increasing visibility into user behaviors and privileges.

SDP solutions differ from virtual private networks (VPN) because VPNs simply provide a barrier to network entry: an easy target for hackers. SDP, on the other hand, provides continuous authentication functionality and visibility into traffic and network activity. There is some overlap between zero-trust security solutions and SDP products as some SDP solutions utilize the zero-trust approach to continuous verification, simply hiding services, applications, networks, and devices until requests are verified. Still, SDP solutions help build specific network architectures that can be used to leverage the technology and increase the efficacy of zero-trust security solutions.

To qualify for inclusion in the Software-Defined Perimeter (SDP) category, a product must:

Provide adaptive, granular network segmentation functionality
Provide on-demand access to services, networks, and applications upon verification
Continuously monitor activity and verify network access requests

Best Software-Defined Perimeter (SDP) Software At A Glance

Best for Small Businesses:
Best for Mid-Market:
Best for Enterprise:
Highest User Satisfaction:
Best Free Software:
Show LessShow More
Best for Enterprise:
Highest User Satisfaction:
Best Free Software:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
52 Listings in Software-Defined Perimeter (SDP) Available
(98)4.6 out of 5
5th Easiest To Use in Software-Defined Perimeter (SDP) software
Save to My Lists
30% off
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CloudConnexa®, powered by OpenVPN, is the leader in delivering premium, enterprise-grade network security accessible to businesses of all sizes. Easy to set up and simple to deploy, CloudConnexa's clo

    Users
    • CTO
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 49% Mid-Market
    • 46% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • OpenVPN CloudConnexa is a solution that allows secure connection from anywhere with an intuitive platform and embedded security features.
    • Reviewers frequently mention the excellent customer support, the ease of integration with various network devices, and the constant addition of new features.
    • Users mentioned the lack of some connectivity features, the technical language on support pages, and the absence of a direct call option for support.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • OpenVPN CloudConnexa Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    48
    Setup Ease
    20
    Easy Setup
    19
    Reliability
    18
    Customer Support
    15
    Cons
    Poor Documentation
    11
    Connection Issues
    10
    Connectivity Issues
    8
    Insufficient Documentation
    8
    Complex Setup
    7
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OpenVPN CloudConnexa features and usability ratings that predict user satisfaction
    9.1
    Ease of Use
    Average: 9.2
    8.9
    Quality of Support
    Average: 8.9
    9.2
    Has the product been a good partner in doing business?
    Average: 8.8
    9.6
    Network Segmentation
    Average: 9.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OpenVPN
    Company Website
    Year Founded
    2002
    HQ Location
    Pleasanton, CA
    Twitter
    @OpenVPN
    20,989 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    164 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CloudConnexa®, powered by OpenVPN, is the leader in delivering premium, enterprise-grade network security accessible to businesses of all sizes. Easy to set up and simple to deploy, CloudConnexa's clo

Users
  • CTO
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 49% Mid-Market
  • 46% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • OpenVPN CloudConnexa is a solution that allows secure connection from anywhere with an intuitive platform and embedded security features.
  • Reviewers frequently mention the excellent customer support, the ease of integration with various network devices, and the constant addition of new features.
  • Users mentioned the lack of some connectivity features, the technical language on support pages, and the absence of a direct call option for support.
OpenVPN CloudConnexa Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
48
Setup Ease
20
Easy Setup
19
Reliability
18
Customer Support
15
Cons
Poor Documentation
11
Connection Issues
10
Connectivity Issues
8
Insufficient Documentation
8
Complex Setup
7
OpenVPN CloudConnexa features and usability ratings that predict user satisfaction
9.1
Ease of Use
Average: 9.2
8.9
Quality of Support
Average: 8.9
9.2
Has the product been a good partner in doing business?
Average: 8.8
9.6
Network Segmentation
Average: 9.3
Seller Details
Seller
OpenVPN
Company Website
Year Founded
2002
HQ Location
Pleasanton, CA
Twitter
@OpenVPN
20,989 Twitter followers
LinkedIn® Page
www.linkedin.com
164 employees on LinkedIn®
(26)4.8 out of 5
3rd Easiest To Use in Software-Defined Perimeter (SDP) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Appgate SDP is a leading Zero Trust Network Access solution that simplifies and strengthens access controls for all users, devices, and workloads. We deliver secure access for complex and hybrid enter

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 62% Enterprise
    • 27% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Appgate SDP Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    11
    Security
    7
    Performance Efficiency
    6
    Speed
    6
    User Interface
    5
    Cons
    Performance Issues
    7
    Connection Issues
    6
    Connectivity Issues
    6
    Poor Interface Design
    2
    Access Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Appgate SDP features and usability ratings that predict user satisfaction
    9.5
    Ease of Use
    Average: 9.2
    9.1
    Quality of Support
    Average: 8.9
    10.0
    Has the product been a good partner in doing business?
    Average: 8.8
    9.6
    Network Segmentation
    Average: 9.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Appgate
    Year Founded
    2020
    HQ Location
    Coral Gables, US
    Twitter
    @AppgateSecurity
    880 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    386 employees on LinkedIn®
    Ownership
    OTC: APGT
Product Description
How are these determined?Information
This description is provided by the seller.

Appgate SDP is a leading Zero Trust Network Access solution that simplifies and strengthens access controls for all users, devices, and workloads. We deliver secure access for complex and hybrid enter

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 62% Enterprise
  • 27% Mid-Market
Appgate SDP Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
11
Security
7
Performance Efficiency
6
Speed
6
User Interface
5
Cons
Performance Issues
7
Connection Issues
6
Connectivity Issues
6
Poor Interface Design
2
Access Issues
1
Appgate SDP features and usability ratings that predict user satisfaction
9.5
Ease of Use
Average: 9.2
9.1
Quality of Support
Average: 8.9
10.0
Has the product been a good partner in doing business?
Average: 8.8
9.6
Network Segmentation
Average: 9.3
Seller Details
Seller
Appgate
Year Founded
2020
HQ Location
Coral Gables, US
Twitter
@AppgateSecurity
880 Twitter followers
LinkedIn® Page
www.linkedin.com
386 employees on LinkedIn®
Ownership
OTC: APGT

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(13)4.4 out of 5
6th Easiest To Use in Software-Defined Perimeter (SDP) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A leading provider of next-generation network access solutions for the mobile enterprise.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 46% Enterprise
    • 46% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Aruba ESP Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Easy Integrations
    1
    Network Connectivity
    1
    Reliability
    1
    Cons
    Connection Issues
    1
    Poor Customer Support
    1
    Software Bugs
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Aruba ESP features and usability ratings that predict user satisfaction
    8.8
    Ease of Use
    Average: 9.2
    9.1
    Quality of Support
    Average: 8.9
    9.2
    Has the product been a good partner in doing business?
    Average: 8.8
    6.7
    Network Segmentation
    Average: 9.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Santa Clara, California
    LinkedIn® Page
    www.linkedin.com
    5,861 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A leading provider of next-generation network access solutions for the mobile enterprise.

Users
No information available
Industries
No information available
Market Segment
  • 46% Enterprise
  • 46% Mid-Market
Aruba ESP Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Easy Integrations
1
Network Connectivity
1
Reliability
1
Cons
Connection Issues
1
Poor Customer Support
1
Software Bugs
1
Aruba ESP features and usability ratings that predict user satisfaction
8.8
Ease of Use
Average: 9.2
9.1
Quality of Support
Average: 8.9
9.2
Has the product been a good partner in doing business?
Average: 8.8
6.7
Network Segmentation
Average: 9.3
Seller Details
HQ Location
Santa Clara, California
LinkedIn® Page
www.linkedin.com
5,861 employees on LinkedIn®
(148)4.7 out of 5
2nd Easiest To Use in Software-Defined Perimeter (SDP) software
Save to My Lists
Entry Level Price:$7.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    GoodAccess is a cybersecurity platform (SASE/SSE) that empowers medium-sized enterprises to easily implement Zero Trust Architecture (ZTA) in their infrastructure, regardless of its complexity or scal

    Users
    • CTO
    • CEO
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 78% Small-Business
    • 22% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • GoodAccess is a VPN solution that provides secure remote access and robust encryption for businesses.
    • Reviewers like the user-friendly interface, seamless integration into workflows, and the proactive customer support that quickly accommodates new feature requests.
    • Users reported occasional connectivity issues, a desire for more gateway locations in Canada and Bangladesh, and a need for more detailed documentation and advanced customization options.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • GoodAccess Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    51
    VPN Services
    32
    Customer Support
    26
    Reliability
    26
    User Interface
    24
    Cons
    Expensive
    20
    Connection Issues
    12
    Limited Location Options
    7
    Connectivity Issues
    5
    Lacking Features
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • GoodAccess features and usability ratings that predict user satisfaction
    9.5
    Ease of Use
    Average: 9.2
    9.3
    Quality of Support
    Average: 8.9
    9.4
    Has the product been a good partner in doing business?
    Average: 8.8
    9.2
    Network Segmentation
    Average: 9.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2009
    HQ Location
    Usti nad Labem, Czech Republic, Europe
    Twitter
    @GoodAccessVPN
    47 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    28 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

GoodAccess is a cybersecurity platform (SASE/SSE) that empowers medium-sized enterprises to easily implement Zero Trust Architecture (ZTA) in their infrastructure, regardless of its complexity or scal

Users
  • CTO
  • CEO
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 78% Small-Business
  • 22% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • GoodAccess is a VPN solution that provides secure remote access and robust encryption for businesses.
  • Reviewers like the user-friendly interface, seamless integration into workflows, and the proactive customer support that quickly accommodates new feature requests.
  • Users reported occasional connectivity issues, a desire for more gateway locations in Canada and Bangladesh, and a need for more detailed documentation and advanced customization options.
GoodAccess Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
51
VPN Services
32
Customer Support
26
Reliability
26
User Interface
24
Cons
Expensive
20
Connection Issues
12
Limited Location Options
7
Connectivity Issues
5
Lacking Features
5
GoodAccess features and usability ratings that predict user satisfaction
9.5
Ease of Use
Average: 9.2
9.3
Quality of Support
Average: 8.9
9.4
Has the product been a good partner in doing business?
Average: 8.8
9.2
Network Segmentation
Average: 9.3
Seller Details
Year Founded
2009
HQ Location
Usti nad Labem, Czech Republic, Europe
Twitter
@GoodAccessVPN
47 Twitter followers
LinkedIn® Page
www.linkedin.com
28 employees on LinkedIn®
(116)4.4 out of 5
7th Easiest To Use in Software-Defined Perimeter (SDP) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Zscaler Internet Access™ (ZIA) is the world’s leading secure web gateway (SWG), delivering cloud native, AI-powered cyberthreat protection and zero trust access to the internet and SaaS apps. Enter

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 54% Enterprise
    • 22% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Zscaler Internet Access is a cloud-based security service that proxies internet traffic and runs it through URL content filter lists, providing secure access to company internal tools and data.
    • Users like the ease of use, the ability to monitor and filter traffic in real time, the seamless integration with other security tools, and the responsive customer support that often replies within four hours.
    • Users mentioned issues such as latency during high traffic times, a complex configuration process, occasional connection issues impacting user experience, and a high pricing that may not be affordable for smaller businesses.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Zscaler Internet Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    29
    Internet Security
    23
    Ease of Use
    18
    Protection
    17
    Security Protection
    11
    Cons
    Connection Issues
    13
    Internet Connectivity
    10
    Slow Performance
    9
    Connectivity Issues
    7
    Complex Configuration
    6
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Zscaler Internet Access features and usability ratings that predict user satisfaction
    8.9
    Ease of Use
    Average: 9.2
    8.8
    Quality of Support
    Average: 8.9
    9.0
    Has the product been a good partner in doing business?
    Average: 8.8
    7.8
    Network Segmentation
    Average: 9.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Zscaler
    Company Website
    Year Founded
    2008
    HQ Location
    San Jose, California
    Twitter
    @zscaler
    16,396 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,427 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Zscaler Internet Access™ (ZIA) is the world’s leading secure web gateway (SWG), delivering cloud native, AI-powered cyberthreat protection and zero trust access to the internet and SaaS apps. Enter

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 54% Enterprise
  • 22% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Zscaler Internet Access is a cloud-based security service that proxies internet traffic and runs it through URL content filter lists, providing secure access to company internal tools and data.
  • Users like the ease of use, the ability to monitor and filter traffic in real time, the seamless integration with other security tools, and the responsive customer support that often replies within four hours.
  • Users mentioned issues such as latency during high traffic times, a complex configuration process, occasional connection issues impacting user experience, and a high pricing that may not be affordable for smaller businesses.
Zscaler Internet Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
29
Internet Security
23
Ease of Use
18
Protection
17
Security Protection
11
Cons
Connection Issues
13
Internet Connectivity
10
Slow Performance
9
Connectivity Issues
7
Complex Configuration
6
Zscaler Internet Access features and usability ratings that predict user satisfaction
8.9
Ease of Use
Average: 9.2
8.8
Quality of Support
Average: 8.9
9.0
Has the product been a good partner in doing business?
Average: 8.8
7.8
Network Segmentation
Average: 9.3
Seller Details
Seller
Zscaler
Company Website
Year Founded
2008
HQ Location
San Jose, California
Twitter
@zscaler
16,396 Twitter followers
LinkedIn® Page
www.linkedin.com
8,427 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Symantec Secure Access Cloud is a SaaS solution that enables more secure and granular access management to any corporate resource hosted on-premises or in the cloud. It uses Zero Trust Access principl

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 71% Mid-Market
    • 24% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Symantec Secure Access Cloud features and usability ratings that predict user satisfaction
    9.4
    Ease of Use
    Average: 9.2
    9.5
    Quality of Support
    Average: 8.9
    8.3
    Has the product been a good partner in doing business?
    Average: 8.8
    9.8
    Network Segmentation
    Average: 9.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    59,378 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    61,034 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

Symantec Secure Access Cloud is a SaaS solution that enables more secure and granular access management to any corporate resource hosted on-premises or in the cloud. It uses Zero Trust Access principl

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 71% Mid-Market
  • 24% Enterprise
Symantec Secure Access Cloud features and usability ratings that predict user satisfaction
9.4
Ease of Use
Average: 9.2
9.5
Quality of Support
Average: 8.9
8.3
Has the product been a good partner in doing business?
Average: 8.8
9.8
Network Segmentation
Average: 9.3
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
59,378 Twitter followers
LinkedIn® Page
www.linkedin.com
61,034 employees on LinkedIn®
Ownership
NASDAQ: CA
(55)4.4 out of 5
View top Consulting Services for Citrix Workspace
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Citrix Workspace Essentials provides a comprehensive, zero-trust approach to deliver secure and contextual access to corporate internal web apps, SaaS, and virtual applications. With Citrix Workspace

    Users
    No information available
    Industries
    • Financial Services
    • Information Technology and Services
    Market Segment
    • 67% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Citrix Workspace Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    10
    Access
    6
    Ease of Access
    6
    Easy Access
    6
    Security
    6
    Cons
    Slow Loading
    5
    Slow Performance
    5
    Delay Issues
    4
    Slow Internet
    4
    Performance Issues
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Citrix Workspace features and usability ratings that predict user satisfaction
    8.7
    Ease of Use
    Average: 9.2
    8.7
    Quality of Support
    Average: 8.9
    9.0
    Has the product been a good partner in doing business?
    Average: 8.8
    9.7
    Network Segmentation
    Average: 9.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Citrix
    Year Founded
    1989
    HQ Location
    Fort Lauderdale, FL
    Twitter
    @citrix
    206,016 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,830 employees on LinkedIn®
    Ownership
    NASDAQ:CTXS
Product Description
How are these determined?Information
This description is provided by the seller.

Citrix Workspace Essentials provides a comprehensive, zero-trust approach to deliver secure and contextual access to corporate internal web apps, SaaS, and virtual applications. With Citrix Workspace

Users
No information available
Industries
  • Financial Services
  • Information Technology and Services
Market Segment
  • 67% Enterprise
  • 25% Mid-Market
Citrix Workspace Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
10
Access
6
Ease of Access
6
Easy Access
6
Security
6
Cons
Slow Loading
5
Slow Performance
5
Delay Issues
4
Slow Internet
4
Performance Issues
3
Citrix Workspace features and usability ratings that predict user satisfaction
8.7
Ease of Use
Average: 9.2
8.7
Quality of Support
Average: 8.9
9.0
Has the product been a good partner in doing business?
Average: 8.8
9.7
Network Segmentation
Average: 9.3
Seller Details
Seller
Citrix
Year Founded
1989
HQ Location
Fort Lauderdale, FL
Twitter
@citrix
206,016 Twitter followers
LinkedIn® Page
www.linkedin.com
4,830 employees on LinkedIn®
Ownership
NASDAQ:CTXS
(67)4.7 out of 5
Optimized for quick response
8th Easiest To Use in Software-Defined Perimeter (SDP) software
Save to My Lists
Entry Level Price:Starting at $5.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Twingate is a secure remote access solution for an organization’s private applications, data, and environments, whether they are on-premise or in the cloud. Built to make the lives of DevOps teams, IT

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 49% Mid-Market
    • 45% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Twingate is a remote access solution that provides secure and high-performance access to resources, with features such as easy setup, low cost, secure access control, and multiple login options.
    • Reviewers frequently mention the transformative impact of Twingate on their teams, its ease of use, high level of security, impressive performance, and the granular control it provides over resource access.
    • Reviewers experienced minor issues with client installations, occasional network instability, lack of an official package in the Arch repository, and the need for custom scripts for Arch Linux users.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Twingate Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    9
    Easy Setup
    7
    Setup Ease
    7
    Security
    6
    Access Management
    5
    Cons
    Performance Issues
    9
    Limited Customization
    5
    Lacking Features
    4
    Lack of Features
    4
    Logging Issues
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Twingate features and usability ratings that predict user satisfaction
    9.8
    Ease of Use
    Average: 9.2
    9.3
    Quality of Support
    Average: 8.9
    9.4
    Has the product been a good partner in doing business?
    Average: 8.8
    9.4
    Network Segmentation
    Average: 9.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    HQ Location
    Redwood City, California
    Twitter
    @TwingateHQ
    2,259 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    76 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Twingate is a secure remote access solution for an organization’s private applications, data, and environments, whether they are on-premise or in the cloud. Built to make the lives of DevOps teams, IT

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 49% Mid-Market
  • 45% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Twingate is a remote access solution that provides secure and high-performance access to resources, with features such as easy setup, low cost, secure access control, and multiple login options.
  • Reviewers frequently mention the transformative impact of Twingate on their teams, its ease of use, high level of security, impressive performance, and the granular control it provides over resource access.
  • Reviewers experienced minor issues with client installations, occasional network instability, lack of an official package in the Arch repository, and the need for custom scripts for Arch Linux users.
Twingate Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
9
Easy Setup
7
Setup Ease
7
Security
6
Access Management
5
Cons
Performance Issues
9
Limited Customization
5
Lacking Features
4
Lack of Features
4
Logging Issues
4
Twingate features and usability ratings that predict user satisfaction
9.8
Ease of Use
Average: 9.2
9.3
Quality of Support
Average: 8.9
9.4
Has the product been a good partner in doing business?
Average: 8.8
9.4
Network Segmentation
Average: 9.3
Seller Details
Company Website
HQ Location
Redwood City, California
Twitter
@TwingateHQ
2,259 Twitter followers
LinkedIn® Page
www.linkedin.com
76 employees on LinkedIn®
(52)4.6 out of 5
9th Easiest To Use in Software-Defined Perimeter (SDP) software
View top Consulting Services for FortiGate SD-WAN
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    FortiGate SD-WAN replaces separate WAN routers, WAN optimization, and security devices with a single solution that is application-aware, offers automatic WAN path control and multi-broadband support.

    Users
    • Network Engineer
    Industries
    • Information Technology and Services
    • Insurance
    Market Segment
    • 54% Mid-Market
    • 35% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • FortiGate SD-WAN Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Configuration Ease
    2
    Customer Support
    2
    Ease of Use
    2
    Implementation Ease
    2
    Cloud Technology
    1
    Cons
    Slow Performance
    2
    Complex Implementation
    1
    Expensive
    1
    Update Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FortiGate SD-WAN features and usability ratings that predict user satisfaction
    9.0
    Ease of Use
    Average: 9.2
    8.9
    Quality of Support
    Average: 8.9
    8.9
    Has the product been a good partner in doing business?
    Average: 8.8
    9.0
    Network Segmentation
    Average: 9.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortinet
    Year Founded
    2000
    HQ Location
    Sunnyvale, CA
    Twitter
    @Fortinet
    152,032 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    14,397 employees on LinkedIn®
    Ownership
    NASDAQ: FTNT
Product Description
How are these determined?Information
This description is provided by the seller.

FortiGate SD-WAN replaces separate WAN routers, WAN optimization, and security devices with a single solution that is application-aware, offers automatic WAN path control and multi-broadband support.

Users
  • Network Engineer
Industries
  • Information Technology and Services
  • Insurance
Market Segment
  • 54% Mid-Market
  • 35% Enterprise
FortiGate SD-WAN Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Configuration Ease
2
Customer Support
2
Ease of Use
2
Implementation Ease
2
Cloud Technology
1
Cons
Slow Performance
2
Complex Implementation
1
Expensive
1
Update Issues
1
FortiGate SD-WAN features and usability ratings that predict user satisfaction
9.0
Ease of Use
Average: 9.2
8.9
Quality of Support
Average: 8.9
8.9
Has the product been a good partner in doing business?
Average: 8.8
9.0
Network Segmentation
Average: 9.3
Seller Details
Seller
Fortinet
Year Founded
2000
HQ Location
Sunnyvale, CA
Twitter
@Fortinet
152,032 Twitter followers
LinkedIn® Page
www.linkedin.com
14,397 employees on LinkedIn®
Ownership
NASDAQ: FTNT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cisco DNA Center is the network management system, foundational controller, and analytics platform at the heart of Cisco’s intent-based network. Cisco DNA Center addresses the demands of digitization,

    Users
    No information available
    Industries
    • Computer & Network Security
    • Hospital & Health Care
    Market Segment
    • 37% Enterprise
    • 18% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cisco DNA Center Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    8
    Automation
    6
    Innovation
    4
    Reliability
    4
    Centralized Management
    3
    Cons
    Complexity
    4
    Expensive
    4
    Compatibility Issues
    2
    Complex Implementation
    2
    Learning Curve
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco DNA Center features and usability ratings that predict user satisfaction
    8.5
    Ease of Use
    Average: 9.2
    8.9
    Quality of Support
    Average: 8.9
    8.8
    Has the product been a good partner in doing business?
    Average: 8.8
    9.4
    Network Segmentation
    Average: 9.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    733,629 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    97,323 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Cisco DNA Center is the network management system, foundational controller, and analytics platform at the heart of Cisco’s intent-based network. Cisco DNA Center addresses the demands of digitization,

Users
No information available
Industries
  • Computer & Network Security
  • Hospital & Health Care
Market Segment
  • 37% Enterprise
  • 18% Mid-Market
Cisco DNA Center Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
8
Automation
6
Innovation
4
Reliability
4
Centralized Management
3
Cons
Complexity
4
Expensive
4
Compatibility Issues
2
Complex Implementation
2
Learning Curve
2
Cisco DNA Center features and usability ratings that predict user satisfaction
8.5
Ease of Use
Average: 9.2
8.9
Quality of Support
Average: 8.9
8.8
Has the product been a good partner in doing business?
Average: 8.8
9.4
Network Segmentation
Average: 9.3
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
733,629 Twitter followers
LinkedIn® Page
www.linkedin.com
97,323 employees on LinkedIn®
Ownership
NASDAQ:CSCO
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    UTunnel offers scalable Cloud VPN and Zero-Trust Network Access (ZTNA) solutions that enable secure connectivity and seamless remote access to your business network resources. With automated deploymen

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 71% Small-Business
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • UTunnel VPN and ZTNA Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    14
    Setup Ease
    13
    Easy Setup
    12
    VPN Services
    11
    Secure Access
    10
    Cons
    Poor Interface
    3
    Poor Interface Design
    3
    Complex Setup
    2
    Expensive
    2
    Poor Customer Support
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • UTunnel VPN and ZTNA features and usability ratings that predict user satisfaction
    9.6
    Ease of Use
    Average: 9.2
    9.4
    Quality of Support
    Average: 8.9
    9.8
    Has the product been a good partner in doing business?
    Average: 8.8
    10.0
    Network Segmentation
    Average: 9.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2019
    HQ Location
    West Chester, Pennsylvania
    LinkedIn® Page
    www.linkedin.com
    5 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

UTunnel offers scalable Cloud VPN and Zero-Trust Network Access (ZTNA) solutions that enable secure connectivity and seamless remote access to your business network resources. With automated deploymen

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 71% Small-Business
  • 25% Mid-Market
UTunnel VPN and ZTNA Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
14
Setup Ease
13
Easy Setup
12
VPN Services
11
Secure Access
10
Cons
Poor Interface
3
Poor Interface Design
3
Complex Setup
2
Expensive
2
Poor Customer Support
2
UTunnel VPN and ZTNA features and usability ratings that predict user satisfaction
9.6
Ease of Use
Average: 9.2
9.4
Quality of Support
Average: 8.9
9.8
Has the product been a good partner in doing business?
Average: 8.8
10.0
Network Segmentation
Average: 9.3
Seller Details
Year Founded
2019
HQ Location
West Chester, Pennsylvania
LinkedIn® Page
www.linkedin.com
5 employees on LinkedIn®
(87)4.3 out of 5
1st Easiest To Use in Software-Defined Perimeter (SDP) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ivanti Connect Secure provides a seamless, cost-effective SSL VPN solution for remote and mobile users from any web-enabled device to corporate resources— anytime, anywhere.

    Users
    No information available
    Industries
    • Information Technology and Services
    • Banking
    Market Segment
    • 70% Enterprise
    • 23% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Ivanti Connect Secure Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Network Security
    1
    Remote Work
    1
    Security
    1
    VPN Efficiency
    1
    Cons
    Connection Issues
    1
    System Restart
    1
    System Restart Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Ivanti Connect Secure features and usability ratings that predict user satisfaction
    9.3
    Ease of Use
    Average: 9.2
    8.7
    Quality of Support
    Average: 8.9
    9.0
    Has the product been a good partner in doing business?
    Average: 8.8
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Ivanti
    Year Founded
    1985
    HQ Location
    South Jordan, UT
    Twitter
    @GoIvanti
    6,772 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,974 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Ivanti Connect Secure provides a seamless, cost-effective SSL VPN solution for remote and mobile users from any web-enabled device to corporate resources— anytime, anywhere.

Users
No information available
Industries
  • Information Technology and Services
  • Banking
Market Segment
  • 70% Enterprise
  • 23% Mid-Market
Ivanti Connect Secure Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Network Security
1
Remote Work
1
Security
1
VPN Efficiency
1
Cons
Connection Issues
1
System Restart
1
System Restart Issues
1
Ivanti Connect Secure features and usability ratings that predict user satisfaction
9.3
Ease of Use
Average: 9.2
8.7
Quality of Support
Average: 8.9
9.0
Has the product been a good partner in doing business?
Average: 8.8
0.0
No information available
Seller Details
Seller
Ivanti
Year Founded
1985
HQ Location
South Jordan, UT
Twitter
@GoIvanti
6,772 Twitter followers
LinkedIn® Page
www.linkedin.com
2,974 employees on LinkedIn®
(213)4.7 out of 5
Optimized for quick response
10th Easiest To Use in Software-Defined Perimeter (SDP) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Absolute Secure Access (formerly NetMotion by Absolute) is one of the company’s core product lines, which was added through the acquisition of NetMotion in July 2021. The product portfolio provides re

    Users
    • IT Director
    • System Administrator
    Industries
    • Law Enforcement
    • Government Administration
    Market Segment
    • 62% Mid-Market
    • 26% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Absolute Secure Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    28
    Reliability
    18
    Customer Support
    13
    Secure Access
    13
    Easy Installation
    10
    Cons
    Connection Issues
    8
    Access Issues
    7
    Expensive
    6
    Limited Customization
    5
    Expensive Licensing
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Absolute Secure Access features and usability ratings that predict user satisfaction
    9.1
    Ease of Use
    Average: 9.2
    9.3
    Quality of Support
    Average: 8.9
    9.3
    Has the product been a good partner in doing business?
    Average: 8.8
    9.0
    Network Segmentation
    Average: 9.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1993
    HQ Location
    British Columbia, Canada
    Twitter
    @absolutecorp
    3,991 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,078 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Absolute Secure Access (formerly NetMotion by Absolute) is one of the company’s core product lines, which was added through the acquisition of NetMotion in July 2021. The product portfolio provides re

Users
  • IT Director
  • System Administrator
Industries
  • Law Enforcement
  • Government Administration
Market Segment
  • 62% Mid-Market
  • 26% Enterprise
Absolute Secure Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
28
Reliability
18
Customer Support
13
Secure Access
13
Easy Installation
10
Cons
Connection Issues
8
Access Issues
7
Expensive
6
Limited Customization
5
Expensive Licensing
4
Absolute Secure Access features and usability ratings that predict user satisfaction
9.1
Ease of Use
Average: 9.2
9.3
Quality of Support
Average: 8.9
9.3
Has the product been a good partner in doing business?
Average: 8.8
9.0
Network Segmentation
Average: 9.3
Seller Details
Company Website
Year Founded
1993
HQ Location
British Columbia, Canada
Twitter
@absolutecorp
3,991 Twitter followers
LinkedIn® Page
www.linkedin.com
1,078 employees on LinkedIn®
(45)4.8 out of 5
4th Easiest To Use in Software-Defined Perimeter (SDP) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    InstaSafe is redefining the challenge of secure access to modern networks by leveraging Zero Trust principles with its security solutions, that ensure seamless access to cloud applications, SAP applic

    Users
    No information available
    Industries
    • Information Technology and Services
    • Banking
    Market Segment
    • 53% Mid-Market
    • 31% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Instasafe ZTAA Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    4
    Security
    4
    Solutions
    3
    Zero Trust Security
    3
    Cloud Services
    2
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Instasafe ZTAA features and usability ratings that predict user satisfaction
    9.2
    Ease of Use
    Average: 9.2
    9.3
    Quality of Support
    Average: 8.9
    9.5
    Has the product been a good partner in doing business?
    Average: 8.8
    9.3
    Network Segmentation
    Average: 9.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2012
    HQ Location
    San Francisco, Walnut, CA
    Twitter
    @InstaSafe
    717 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    69 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

InstaSafe is redefining the challenge of secure access to modern networks by leveraging Zero Trust principles with its security solutions, that ensure seamless access to cloud applications, SAP applic

Users
No information available
Industries
  • Information Technology and Services
  • Banking
Market Segment
  • 53% Mid-Market
  • 31% Enterprise
Instasafe ZTAA Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
4
Security
4
Solutions
3
Zero Trust Security
3
Cloud Services
2
Cons
This product has not yet received any negative sentiments.
Instasafe ZTAA features and usability ratings that predict user satisfaction
9.2
Ease of Use
Average: 9.2
9.3
Quality of Support
Average: 8.9
9.5
Has the product been a good partner in doing business?
Average: 8.8
9.3
Network Segmentation
Average: 9.3
Seller Details
Year Founded
2012
HQ Location
San Francisco, Walnut, CA
Twitter
@InstaSafe
717 Twitter followers
LinkedIn® Page
www.linkedin.com
69 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Citrix Secure Workspace Access provides a comprehensive, zero-trust approach to deliver secure and contextual access to the corporate internal web apps, SaaS, and virtual applications. It enables the

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 48% Enterprise
    • 24% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Citrix Secure Workspace Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    9
    Security
    7
    Secure Access
    6
    Convenience
    3
    Easy Access
    3
    Cons
    Connection Issues
    5
    Delay Issues
    5
    Connectivity Issues
    4
    Internet Dependency
    4
    Slow Internet
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Citrix Secure Workspace Access features and usability ratings that predict user satisfaction
    9.0
    Ease of Use
    Average: 9.2
    8.6
    Quality of Support
    Average: 8.9
    8.9
    Has the product been a good partner in doing business?
    Average: 8.8
    10.0
    Network Segmentation
    Average: 9.3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Citrix
    Year Founded
    1989
    HQ Location
    Fort Lauderdale, FL
    Twitter
    @citrix
    206,016 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,830 employees on LinkedIn®
    Ownership
    NASDAQ:CTXS
Product Description
How are these determined?Information
This description is provided by the seller.

Citrix Secure Workspace Access provides a comprehensive, zero-trust approach to deliver secure and contextual access to the corporate internal web apps, SaaS, and virtual applications. It enables the

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 48% Enterprise
  • 24% Mid-Market
Citrix Secure Workspace Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
9
Security
7
Secure Access
6
Convenience
3
Easy Access
3
Cons
Connection Issues
5
Delay Issues
5
Connectivity Issues
4
Internet Dependency
4
Slow Internet
4
Citrix Secure Workspace Access features and usability ratings that predict user satisfaction
9.0
Ease of Use
Average: 9.2
8.6
Quality of Support
Average: 8.9
8.9
Has the product been a good partner in doing business?
Average: 8.8
10.0
Network Segmentation
Average: 9.3
Seller Details
Seller
Citrix
Year Founded
1989
HQ Location
Fort Lauderdale, FL
Twitter
@citrix
206,016 Twitter followers
LinkedIn® Page
www.linkedin.com
4,830 employees on LinkedIn®
Ownership
NASDAQ:CTXS

Learn More About Software-Defined Perimeter (SDP) Software

What is Software-Defined Perimeter (SDP) Software?

A software-defined perimeter (SDP) software helps create a blanket of security around a company's assets by applying a security boundary at the network layer.

SDP helps secure network perimeter, services, routers, applications, and systems in hybrid cloud, multi-cloud, and public cloud environments by applying virtual controls on software instead of hardware.

SDP works on the least privilege principle. When a user tries to enter a company’s network, the user and device are authenticated, irrespective of their location. Once authenticated, they are not allowed access to the entire network but only to those routers, services, or SaaS applications they need and are approved to access. SDP provides granular application-level segmentation instead of more complex network segmentation.

The cloud security alliance first introduced SDP. Cloud security alliance is a not-for-profit organization that promotes best practices for security in the cloud. 

SDP architecture consists of a receiving host, an initiating host, and a controller. Initiating host communicates with the controller to provide information on devices looking to connect with the network. Using an identification system, the SDP controller validates device and user identity based on pre-configured rules. Once it approves the device and user, it passes the approval to the SDP gateway. Once approved, it opens the virtual door for authorized users. The accepting host connects the devices to approved applications.

What does SDP stand for?

SDP stands for software-defined perimeter, a security solution that creates a perimeter around a company's IT assets.

What are the Common Features of Software-Defined Perimeter (SDP) Software?

The following are some core features of the software-defined perimeter solutions:

Application-level access: SDP allows access only to applications approved for a user and device, unlike virtual private network (VPN) software that provides remote access to the whole network once approved. So even if an intruder enters the system, their access is minimal, thus reducing the attack surface exposure and data breaches.

Granular access control: Once validated, the software provides a separate secure connection to each user. 

Infrastructure agnostic: Software-defined perimeter is agnostic of infrastructure since it is software defined and not hardware defined. So they can be deployed anywhere—on-premises, private, or public cloud environments.

Location agnostic: Devices and remote users do not have to be in the physical perimeter to get a secure connection through SDP. This feature is extremely useful in the remote work scenario.

What are the Benefits of Software-Defined Perimeter (SDP) Software?

SDP provides a security blanket around the system infrastructure, shrouding it from unregulated external access.

Internet security: Software-defined perimeter provides a security cover around the software perimeter. This helps eliminate security risks when external users or devices connect to the network.

Multi-cloud security: Today, companies usually have multiple cloud environments from different vendors. SDP helps secure entry to all of them through one solution.

Zero trust network security access (ZTNA) across devices: SDP provides zero trust network security access (ZTNA) for each device and user, irrespective of location. 

Restrict broad network access: Unlike VPN, SDP restricts access to broader networks. This way, even if a segment is compromised, other parts of the network are safe. 

Support a wide variety of devices: SDP supports a wide range of devices such as laptops, desktops, mobiles, and even Internet of Things (IoT) devices. This wide range provides good security coverage to the network.

Who Uses Software-Defined Perimeter (SDP) Software?

Network administrators: SDP helps network admins ensure malicious devices and unauthorized users do not enter the system.

IT teams: SDP software helps IT administrators give a specific remote user access to third parties irrespective of their devices and locations.

What are the Alternatives to Software-Defined Perimeter (SDP) Software?

Alternative security solutions to SDP solutions include:

Virtual private network (VPN): Virtual private networks or VPNs provide company employees with secure access to the network. They create a barrier to the network to prevent hackers, malware, and unauthorized users from entering the network perimeter. But SDP is more powerful as it provides privileged access to very specific SaaS applications, unlike VPN.

Zero trust networking software: This software follows the zero trust security approach where a user, internal or external, is considered a threat until they are thoroughly verified. Zero trust network access (ZTNA) software provides privileged access control to the network connections. 

Software Related to Software-Defined Perimeter (SDP) Software

Related solutions that can be used together with SDP include:

Multi-factor authentication (MFA): This software helps authenticate users in two or more ways to ensure that only authorized users and devices are logging on to the system. IT teams use push notifications, tokens, and one-time passwords ( OTPs) to authenticate users.

Firewall software: This software helps create a barrier between the network and the internet to prevent hackers and unauthorized users from entering the corporate network. It validates access based on pre-configured security policies to decide which remote users should be let into the network.

Challenges With Software-Defined Perimeter (SDP) Software

Software solutions can come with their own set of challenges. 

Device compatibility: Although vendors generally ensure maximum compatibility, the software might not be able to connect some of the devices to the network. 

Network and app reconfiguration: When SDP is deployed, all network connections and application settings must be reconfigured, causing disruptions during deployment.

SDP Controller uptime: One of the biggest challenges of SDP is that if the controller is down, users and devices cannot be connected to the network.

How to Buy Software-Defined Perimeter (SDP) Software?

Requirements Gathering (RFI/RFP) For Software-Defined Perimeter (SDP) Software

One important thing to consider while buying an SDP solution is the software’s ability to integrate with all devices. Buyers should be careful about the availability of the SDP controller and time for implementation, as implementation requires reconfiguration. 

It is advantageous if the vendor offers a free trial so that the buyer can evaluate the product before making a long-term investment.

Compare Software-Defined Perimeter Software (SDP) Products

Create a long list

Buyers need to identify features that they need from their software-defined perimeter tools and start with a large pool of SDP vendors. Buyers must then evaluate the pros and cons of each product.

Create a short list

Short lists help cross-reference the results of initial SDP vendor evaluations with other buyer reviews on third-party review sites such as g2.com, which will help the buyer narrow in on a three to five-product list. From there, buyers can compare pricing and features to determine the best fit.

Conduct demos

Companies should demo all of the SDP products on their short list. During demos, buyers should ask specific questions about the functionalities they care about most; for example, one might ask for a demo of how the tool would behave when it detects a policy change.

Selection of Software-Defined Perimeter (SDP) Software

Choose a selection team

Regardless of a company’s size, involving the most relevant personnel is crucial during the software selection process. The team should include relevant company stakeholders who can use the security solution, scrutinize it, and check whether it will meet the organization’s requirements. The individuals responsible for the day-to-day use of SDP software must be a part of the selection team. IT admins, security teams, and decision makers could be the primary personas included in the group.

Negotiation

To get the best price, buyers looking to trim costs should try to negotiate the specific functions that matter to them. More often than not, the price and specifications mentioned on the vendor’s pricing page can be negotiated. Negotiation on SDP software implementation, support, and other professional services are also crucial. Buyers should ensure they receive adequate support to get the product up and running. The cost of SDP software typically depends on the number of users per month. Some even offer free trial periods to start with. 

Final decision

Before deciding to purchase the software, testing it for a short period is advisable. The day-to-day users of the software are the best individuals to perform this test. They can use and analyze the software product's capabilities and offer valuable feedback.

In most cases, software service providers offer a short-term product trial. If the selection team is satisfied with what the software offers, buyers can proceed with the purchase or contracting process.