Introducing G2.ai, the future of software buying.Try now

Best Software-Defined Perimeter (SDP) Software

Lauren Worth
LW
Researched and written by Lauren Worth

Software-defined perimeter (SDP) products are a specific type of network security solution which focus on network segmentation and user authentication. SDP itself is an architecture designed to allow access on a need-to-know basis, meaning every device and user must be verified before accessing either the network as a whole or specific systems and applications within a network. Unlike traditional network access controllers that utilize a lock and key approach, SDP segments networks by application use and analyzes user access permissions at a granular level across the network. SDP administrators can also customize and automate highly specific network security policies while enforcing them continuously.

Companies adopt SDP solutions because traditional network protection ecosystems are insufficient. If a hacker or unauthorized user obtains access to a traditional network, it’s uncertain what they can access. SDP, on the other hand, analyzes each access request at the application level, compares it to the user’s privileges, then grants or denies access. This verification process occurs continuously, increasing visibility into user behaviors and privileges.

SDP solutions differ from virtual private networks (VPN) because VPNs simply provide a barrier to network entry: an easy target for hackers. SDP, on the other hand, provides continuous authentication functionality and visibility into traffic and network activity. There is some overlap between zero-trust security solutions and SDP products as some SDP solutions utilize the zero-trust approach to continuous verification, simply hiding services, applications, networks, and devices until requests are verified. Still, SDP solutions help build specific network architectures that can be used to leverage the technology and increase the efficacy of zero-trust security solutions.

To qualify for inclusion in the Software-Defined Perimeter (SDP) category, a product must:

Provide adaptive, granular network segmentation functionality
Provide on-demand access to services, networks, and applications upon verification
Continuously monitor activity and verify network access requests
Show More
Show Less

Featured Software-Defined Perimeter (SDP) Software At A Glance

Free Plan Available:
GoodAccess
Sponsored
Highest Performer:
Easiest to Use:
Show LessShow More
Highest Performer:
Easiest to Use:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Software-Defined Perimeter (SDP) Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
49 Listings in Software-Defined Perimeter (SDP) Available
(51)4.5 out of 5
9th Easiest To Use in Software-Defined Perimeter (SDP) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all netwo

    Users
    • Network & Security Engineer
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 39% Mid-Market
    • 31% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point Infinity Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Centralized Management
    12
    Security
    11
    Easy Management
    10
    Features
    9
    Ease of Use
    8
    Cons
    Learning Curve
    10
    Complexity
    6
    Delays
    4
    Difficult Configuration
    4
    Expensive
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point Infinity Platform features and usability ratings that predict user satisfaction
    8.8
    Ease of Use
    Average: 9.2
    8.9
    Quality of Support
    Average: 9.0
    8.8
    Has the product been a good partner in doing business?
    Average: 8.7
    10.0
    Network Segmentation
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    70,953 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,323 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all netwo

Users
  • Network & Security Engineer
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 39% Mid-Market
  • 31% Small-Business
Check Point Infinity Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Centralized Management
12
Security
11
Easy Management
10
Features
9
Ease of Use
8
Cons
Learning Curve
10
Complexity
6
Delays
4
Difficult Configuration
4
Expensive
4
Check Point Infinity Platform features and usability ratings that predict user satisfaction
8.8
Ease of Use
Average: 9.2
8.9
Quality of Support
Average: 9.0
8.8
Has the product been a good partner in doing business?
Average: 8.7
10.0
Network Segmentation
Average: 9.2
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
70,953 Twitter followers
LinkedIn® Page
www.linkedin.com
8,323 employees on LinkedIn®
Ownership
NASDAQ:CHKP
(160)4.7 out of 5
1st Easiest To Use in Software-Defined Perimeter (SDP) software
Save to My Lists
Entry Level Price:Starting at $7.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    GoodAccess is a cybersecurity platform (SASE/SSE) that empowers medium-sized enterprises to easily implement Zero Trust Architecture (ZTA) in their infrastructure, regardless of its complexity or scal

    Users
    • CTO
    • CEO
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 77% Small-Business
    • 23% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • GoodAccess is a VPN solution that provides secure remote access and network security for businesses.
    • Reviewers like the simplicity of use, secure remote access, dependable network security, easy traffic monitoring, access control management, user onboarding, and the zero-trust security model that guarantees data safety.
    • Reviewers mentioned that new users may find the initial setup and configuration complicated, there is room for improvement in the documentation of some advanced settings, and the client sometimes disconnects requiring re-authentication.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • GoodAccess Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    77
    VPN Services
    47
    Reliability
    45
    Customer Support
    41
    Easy Setup
    32
    Cons
    Expensive
    23
    Connection Issues
    16
    Access Issues
    8
    Limited Location Options
    8
    Connectivity Issues
    7
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • GoodAccess features and usability ratings that predict user satisfaction
    9.5
    Ease of Use
    Average: 9.2
    9.3
    Quality of Support
    Average: 9.0
    9.4
    Has the product been a good partner in doing business?
    Average: 8.7
    9.2
    Network Segmentation
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2009
    HQ Location
    Usti nad Labem, Czech Republic, Europe
    LinkedIn® Page
    www.linkedin.com
    23 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

GoodAccess is a cybersecurity platform (SASE/SSE) that empowers medium-sized enterprises to easily implement Zero Trust Architecture (ZTA) in their infrastructure, regardless of its complexity or scal

Users
  • CTO
  • CEO
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 77% Small-Business
  • 23% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • GoodAccess is a VPN solution that provides secure remote access and network security for businesses.
  • Reviewers like the simplicity of use, secure remote access, dependable network security, easy traffic monitoring, access control management, user onboarding, and the zero-trust security model that guarantees data safety.
  • Reviewers mentioned that new users may find the initial setup and configuration complicated, there is room for improvement in the documentation of some advanced settings, and the client sometimes disconnects requiring re-authentication.
GoodAccess Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
77
VPN Services
47
Reliability
45
Customer Support
41
Easy Setup
32
Cons
Expensive
23
Connection Issues
16
Access Issues
8
Limited Location Options
8
Connectivity Issues
7
GoodAccess features and usability ratings that predict user satisfaction
9.5
Ease of Use
Average: 9.2
9.3
Quality of Support
Average: 9.0
9.4
Has the product been a good partner in doing business?
Average: 8.7
9.2
Network Segmentation
Average: 9.2
Seller Details
Company Website
Year Founded
2009
HQ Location
Usti nad Labem, Czech Republic, Europe
LinkedIn® Page
www.linkedin.com
23 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(33)4.8 out of 5
3rd Easiest To Use in Software-Defined Perimeter (SDP) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Appgate SDP is a leading Zero Trust Network Access solution that simplifies and strengthens access controls for all users, devices, and workloads. We deliver secure access for complex and hybrid enter

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 52% Enterprise
    • 30% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Appgate SDP Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    10
    Customer Support
    7
    Ease of Use
    7
    Network Security
    6
    Reliability
    6
    Cons
    Performance Issues
    6
    Complex Setup
    4
    Connection Issues
    2
    Connectivity Issues
    2
    Difficult Configuration
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Appgate SDP features and usability ratings that predict user satisfaction
    9.5
    Ease of Use
    Average: 9.2
    9.3
    Quality of Support
    Average: 9.0
    9.9
    Has the product been a good partner in doing business?
    Average: 8.7
    9.6
    Network Segmentation
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Appgate
    Year Founded
    2020
    HQ Location
    Coral Gables, US
    Twitter
    @AppgateSecurity
    1,115 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    406 employees on LinkedIn®
    Ownership
    OTC: APGT
Product Description
How are these determined?Information
This description is provided by the seller.

Appgate SDP is a leading Zero Trust Network Access solution that simplifies and strengthens access controls for all users, devices, and workloads. We deliver secure access for complex and hybrid enter

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 52% Enterprise
  • 30% Mid-Market
Appgate SDP Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
10
Customer Support
7
Ease of Use
7
Network Security
6
Reliability
6
Cons
Performance Issues
6
Complex Setup
4
Connection Issues
2
Connectivity Issues
2
Difficult Configuration
2
Appgate SDP features and usability ratings that predict user satisfaction
9.5
Ease of Use
Average: 9.2
9.3
Quality of Support
Average: 9.0
9.9
Has the product been a good partner in doing business?
Average: 8.7
9.6
Network Segmentation
Average: 9.2
Seller Details
Seller
Appgate
Year Founded
2020
HQ Location
Coral Gables, US
Twitter
@AppgateSecurity
1,115 Twitter followers
LinkedIn® Page
www.linkedin.com
406 employees on LinkedIn®
Ownership
OTC: APGT
(73)4.3 out of 5
13th Easiest To Use in Software-Defined Perimeter (SDP) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Palo Alto Networks Prisma® Access protects the hybrid workforce with the superior security of ZTNA while providing exceptional user experiences from a simple, unified security product. Purpose-built

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 45% Enterprise
    • 27% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Prisma Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    34
    Protection
    23
    Secure Access
    22
    Internet Security
    21
    Threat Protection
    21
    Cons
    Complex Setup
    20
    Complex Implementation
    19
    Complex Configuration
    17
    Expensive
    15
    Difficult Learning Curve
    11
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Prisma Access features and usability ratings that predict user satisfaction
    8.2
    Ease of Use
    Average: 9.2
    8.2
    Quality of Support
    Average: 9.0
    8.5
    Has the product been a good partner in doing business?
    Average: 8.7
    8.5
    Network Segmentation
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    127,306 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    18,396 employees on LinkedIn®
    Ownership
    NYSE: PANW
Product Description
How are these determined?Information
This description is provided by the seller.

Palo Alto Networks Prisma® Access protects the hybrid workforce with the superior security of ZTNA while providing exceptional user experiences from a simple, unified security product. Purpose-built

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 45% Enterprise
  • 27% Mid-Market
Prisma Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
34
Protection
23
Secure Access
22
Internet Security
21
Threat Protection
21
Cons
Complex Setup
20
Complex Implementation
19
Complex Configuration
17
Expensive
15
Difficult Learning Curve
11
Prisma Access features and usability ratings that predict user satisfaction
8.2
Ease of Use
Average: 9.2
8.2
Quality of Support
Average: 9.0
8.5
Has the product been a good partner in doing business?
Average: 8.7
8.5
Network Segmentation
Average: 9.2
Seller Details
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
127,306 Twitter followers
LinkedIn® Page
www.linkedin.com
18,396 employees on LinkedIn®
Ownership
NYSE: PANW
(60)4.4 out of 5
View top Consulting Services for Citrix Workspace
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Citrix Workspace Essentials provides a comprehensive, zero-trust approach to deliver secure and contextual access to corporate internal web apps, SaaS, and virtual applications. With Citrix Workspace

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 68% Enterprise
    • 27% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Citrix Workspace Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    4
    Internet Security
    3
    Ease of Use
    2
    Intuitive
    2
    Protection
    2
    Cons
    Complex Configuration
    2
    Complex Setup
    2
    Slow Loading
    2
    Slow Performance
    2
    Access Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Citrix Workspace features and usability ratings that predict user satisfaction
    8.7
    Ease of Use
    Average: 9.2
    8.6
    Quality of Support
    Average: 9.0
    9.0
    Has the product been a good partner in doing business?
    Average: 8.7
    9.7
    Network Segmentation
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Citrix
    Year Founded
    1989
    HQ Location
    Fort Lauderdale, FL
    Twitter
    @citrix
    199,519 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,296 employees on LinkedIn®
    Ownership
    NASDAQ:CTXS
Product Description
How are these determined?Information
This description is provided by the seller.

Citrix Workspace Essentials provides a comprehensive, zero-trust approach to deliver secure and contextual access to corporate internal web apps, SaaS, and virtual applications. With Citrix Workspace

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 68% Enterprise
  • 27% Mid-Market
Citrix Workspace Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
4
Internet Security
3
Ease of Use
2
Intuitive
2
Protection
2
Cons
Complex Configuration
2
Complex Setup
2
Slow Loading
2
Slow Performance
2
Access Issues
1
Citrix Workspace features and usability ratings that predict user satisfaction
8.7
Ease of Use
Average: 9.2
8.6
Quality of Support
Average: 9.0
9.0
Has the product been a good partner in doing business?
Average: 8.7
9.7
Network Segmentation
Average: 9.2
Seller Details
Seller
Citrix
Year Founded
1989
HQ Location
Fort Lauderdale, FL
Twitter
@citrix
199,519 Twitter followers
LinkedIn® Page
www.linkedin.com
4,296 employees on LinkedIn®
Ownership
NASDAQ:CTXS
(195)4.5 out of 5
11th Easiest To Use in Software-Defined Perimeter (SDP) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The internet is the new corporate network, leading organizations to transition to their network security to Secure Access Service Edge (SASE). However, current solutions break the user experience with

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 49% Mid-Market
    • 36% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Check Point Harmony SASE is a cloud-based solution that combines network security and secure remote access into a single platform, simplifying management and reducing the need for multiple tools.
    • Users frequently mention the seamless user experience, the integration of firewall, zero-trust access, and web security features for enhanced visibility and control, and the platform's ability to simplify connectivity for remote users while maintaining robust protection against malware and phishing.
    • Users reported that the initial learning curve can be steep, the interface sometimes requires extra clicks to access simple options, and performance can sometimes vary by region, requiring advanced knowledge for troubleshooting.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point Harmony SASE Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    29
    Secure Access
    28
    Protection
    22
    Ease of Use
    18
    Internet Security
    16
    Cons
    Complex Configuration
    21
    Complex Implementation
    20
    Complex Setup
    18
    Learning Curve
    13
    Difficult Learning Curve
    12
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point Harmony SASE features and usability ratings that predict user satisfaction
    9.1
    Ease of Use
    Average: 9.2
    9.0
    Quality of Support
    Average: 9.0
    8.8
    Has the product been a good partner in doing business?
    Average: 8.7
    8.8
    Network Segmentation
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    70,953 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,323 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

The internet is the new corporate network, leading organizations to transition to their network security to Secure Access Service Edge (SASE). However, current solutions break the user experience with

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 49% Mid-Market
  • 36% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Check Point Harmony SASE is a cloud-based solution that combines network security and secure remote access into a single platform, simplifying management and reducing the need for multiple tools.
  • Users frequently mention the seamless user experience, the integration of firewall, zero-trust access, and web security features for enhanced visibility and control, and the platform's ability to simplify connectivity for remote users while maintaining robust protection against malware and phishing.
  • Users reported that the initial learning curve can be steep, the interface sometimes requires extra clicks to access simple options, and performance can sometimes vary by region, requiring advanced knowledge for troubleshooting.
Check Point Harmony SASE Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
29
Secure Access
28
Protection
22
Ease of Use
18
Internet Security
16
Cons
Complex Configuration
21
Complex Implementation
20
Complex Setup
18
Learning Curve
13
Difficult Learning Curve
12
Check Point Harmony SASE features and usability ratings that predict user satisfaction
9.1
Ease of Use
Average: 9.2
9.0
Quality of Support
Average: 9.0
8.8
Has the product been a good partner in doing business?
Average: 8.7
8.8
Network Segmentation
Average: 9.2
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
70,953 Twitter followers
LinkedIn® Page
www.linkedin.com
8,323 employees on LinkedIn®
Ownership
NASDAQ:CHKP
(117)4.6 out of 5
8th Easiest To Use in Software-Defined Perimeter (SDP) software
Save to My Lists
30% Off
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CloudConnexa®, powered by OpenVPN, is the leader in delivering premium, enterprise-grade network security accessible to businesses of all sizes. Easy to set up and simple to deploy, CloudConnexa's clo

    Users
    • CTO
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 47% Mid-Market
    • 46% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • OpenVPN CloudConnexa is a product that provides secure connectivity and network management for remote teams and devices.
    • Users frequently mention the ease of use, robust security features, and the ability to manage and monitor activity from a centralized cloud platform as key benefits of OpenVPN CloudConnexa.
    • Reviewers mentioned that the product can be complex to set up for non-technical users, has occasional latency issues when connecting from distant locations, and is considered expensive for smaller teams.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • OpenVPN CloudConnexa Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    18
    Customer Support
    13
    Access
    11
    Reliability
    11
    Features
    10
    Cons
    Connection Issues
    7
    Expensive
    7
    Connectivity Issues
    5
    Login Issues
    5
    Required Expertise
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OpenVPN CloudConnexa features and usability ratings that predict user satisfaction
    9.0
    Ease of Use
    Average: 9.2
    8.9
    Quality of Support
    Average: 9.0
    9.2
    Has the product been a good partner in doing business?
    Average: 8.7
    9.7
    Network Segmentation
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OpenVPN
    Company Website
    Year Founded
    2002
    HQ Location
    Pleasanton, CA
    Twitter
    @OpenVPN
    20,221 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    162 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CloudConnexa®, powered by OpenVPN, is the leader in delivering premium, enterprise-grade network security accessible to businesses of all sizes. Easy to set up and simple to deploy, CloudConnexa's clo

Users
  • CTO
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 47% Mid-Market
  • 46% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • OpenVPN CloudConnexa is a product that provides secure connectivity and network management for remote teams and devices.
  • Users frequently mention the ease of use, robust security features, and the ability to manage and monitor activity from a centralized cloud platform as key benefits of OpenVPN CloudConnexa.
  • Reviewers mentioned that the product can be complex to set up for non-technical users, has occasional latency issues when connecting from distant locations, and is considered expensive for smaller teams.
OpenVPN CloudConnexa Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
18
Customer Support
13
Access
11
Reliability
11
Features
10
Cons
Connection Issues
7
Expensive
7
Connectivity Issues
5
Login Issues
5
Required Expertise
5
OpenVPN CloudConnexa features and usability ratings that predict user satisfaction
9.0
Ease of Use
Average: 9.2
8.9
Quality of Support
Average: 9.0
9.2
Has the product been a good partner in doing business?
Average: 8.7
9.7
Network Segmentation
Average: 9.2
Seller Details
Seller
OpenVPN
Company Website
Year Founded
2002
HQ Location
Pleasanton, CA
Twitter
@OpenVPN
20,221 Twitter followers
LinkedIn® Page
www.linkedin.com
162 employees on LinkedIn®
(164)4.4 out of 5
12th Easiest To Use in Software-Defined Perimeter (SDP) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Zscaler Internet Access™ (ZIA) is the world’s leading cloud-native secure access solution that protects users, devices, and data by securing all internet traffic, regardless of location. Leveragin

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 51% Enterprise
    • 26% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Zscaler Internet Access is a cloud-based security tool that aims to secure and control internet traffic, eliminating security risks from web and cloud traffic.
    • Reviewers like the consistent performance, cloud-native security, and the robust security features of Zscaler Internet Access, which provide a seamless internet access experience and enhance their day-to-day internet activities.
    • Reviewers experienced slow performance and delays in internet access when starting their computers or waking them from sleep mode, and found the initial setup process not straightforward, which disrupts their workflow.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Zscaler Internet Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    35
    Internet Security
    33
    Protection
    29
    Ease of Use
    20
    Email Security
    19
    Cons
    Slow Performance
    20
    Connection Issues
    19
    Internet Connectivity
    16
    Complex Implementation
    15
    Complex Configuration
    14
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Zscaler Internet Access features and usability ratings that predict user satisfaction
    8.7
    Ease of Use
    Average: 9.2
    8.7
    Quality of Support
    Average: 9.0
    8.9
    Has the product been a good partner in doing business?
    Average: 8.7
    8.1
    Network Segmentation
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Zscaler
    Company Website
    Year Founded
    2008
    HQ Location
    San Jose, California
    Twitter
    @zscaler
    17,122 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    9,410 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Zscaler Internet Access™ (ZIA) is the world’s leading cloud-native secure access solution that protects users, devices, and data by securing all internet traffic, regardless of location. Leveragin

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 51% Enterprise
  • 26% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Zscaler Internet Access is a cloud-based security tool that aims to secure and control internet traffic, eliminating security risks from web and cloud traffic.
  • Reviewers like the consistent performance, cloud-native security, and the robust security features of Zscaler Internet Access, which provide a seamless internet access experience and enhance their day-to-day internet activities.
  • Reviewers experienced slow performance and delays in internet access when starting their computers or waking them from sleep mode, and found the initial setup process not straightforward, which disrupts their workflow.
Zscaler Internet Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
35
Internet Security
33
Protection
29
Ease of Use
20
Email Security
19
Cons
Slow Performance
20
Connection Issues
19
Internet Connectivity
16
Complex Implementation
15
Complex Configuration
14
Zscaler Internet Access features and usability ratings that predict user satisfaction
8.7
Ease of Use
Average: 9.2
8.7
Quality of Support
Average: 9.0
8.9
Has the product been a good partner in doing business?
Average: 8.7
8.1
Network Segmentation
Average: 9.2
Seller Details
Seller
Zscaler
Company Website
Year Founded
2008
HQ Location
San Jose, California
Twitter
@zscaler
17,122 Twitter followers
LinkedIn® Page
www.linkedin.com
9,410 employees on LinkedIn®
(13)4.4 out of 5
7th Easiest To Use in Software-Defined Perimeter (SDP) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A leading provider of next-generation network access solutions for the mobile enterprise.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 46% Mid-Market
    • 46% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Aruba ESP features and usability ratings that predict user satisfaction
    8.8
    Ease of Use
    Average: 9.2
    9.1
    Quality of Support
    Average: 9.0
    9.2
    Has the product been a good partner in doing business?
    Average: 8.7
    6.7
    Network Segmentation
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Santa Clara, California
    LinkedIn® Page
    www.linkedin.com
    5,219 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A leading provider of next-generation network access solutions for the mobile enterprise.

Users
No information available
Industries
No information available
Market Segment
  • 46% Mid-Market
  • 46% Enterprise
Aruba ESP features and usability ratings that predict user satisfaction
8.8
Ease of Use
Average: 9.2
9.1
Quality of Support
Average: 9.0
9.2
Has the product been a good partner in doing business?
Average: 8.7
6.7
Network Segmentation
Average: 9.2
Seller Details
HQ Location
Santa Clara, California
LinkedIn® Page
www.linkedin.com
5,219 employees on LinkedIn®
(225)4.7 out of 5
Optimized for quick response
5th Easiest To Use in Software-Defined Perimeter (SDP) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Absolute Secure Access (formerly NetMotion by Absolute) is one of the company’s core product lines, which was added through the acquisition of NetMotion in July 2021. The product portfolio provides re

    Users
    • IT Director
    • System Administrator
    Industries
    • Law Enforcement
    • Government Administration
    Market Segment
    • 62% Mid-Market
    • 25% Enterprise
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Absolute is a VPN service that offers persistent connectivity, allowing users to switch between different networks without losing their connection.
    • Reviewers frequently mention the product's intelligent VPN connectivity, its ability to optimize network traffic for improved performance, and its comprehensive Insight tool for understanding client workflow.
    • Users reported that the initial setup and policy configuration can be complex, the user interface of the management console can feel outdated, and the licensing model can become complex depending on the specific features and scale of deployment.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Absolute Secure Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    18
    Customer Support
    11
    Secure Access
    11
    VPN Efficiency
    10
    Reliability
    9
    Cons
    Access Issues
    5
    Expensive
    5
    Complex Configuration
    4
    Complex Implementation
    4
    Expensive Licensing
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Absolute Secure Access features and usability ratings that predict user satisfaction
    9.1
    Ease of Use
    Average: 9.2
    9.3
    Quality of Support
    Average: 9.0
    9.2
    Has the product been a good partner in doing business?
    Average: 8.7
    9.2
    Network Segmentation
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1993
    HQ Location
    British Columbia, Canada
    Twitter
    @absolutecorp
    3,929 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,194 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Absolute Secure Access (formerly NetMotion by Absolute) is one of the company’s core product lines, which was added through the acquisition of NetMotion in July 2021. The product portfolio provides re

Users
  • IT Director
  • System Administrator
Industries
  • Law Enforcement
  • Government Administration
Market Segment
  • 62% Mid-Market
  • 25% Enterprise
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Absolute is a VPN service that offers persistent connectivity, allowing users to switch between different networks without losing their connection.
  • Reviewers frequently mention the product's intelligent VPN connectivity, its ability to optimize network traffic for improved performance, and its comprehensive Insight tool for understanding client workflow.
  • Users reported that the initial setup and policy configuration can be complex, the user interface of the management console can feel outdated, and the licensing model can become complex depending on the specific features and scale of deployment.
Absolute Secure Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
18
Customer Support
11
Secure Access
11
VPN Efficiency
10
Reliability
9
Cons
Access Issues
5
Expensive
5
Complex Configuration
4
Complex Implementation
4
Expensive Licensing
3
Absolute Secure Access features and usability ratings that predict user satisfaction
9.1
Ease of Use
Average: 9.2
9.3
Quality of Support
Average: 9.0
9.2
Has the product been a good partner in doing business?
Average: 8.7
9.2
Network Segmentation
Average: 9.2
Seller Details
Company Website
Year Founded
1993
HQ Location
British Columbia, Canada
Twitter
@absolutecorp
3,929 Twitter followers
LinkedIn® Page
www.linkedin.com
1,194 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Citrix Secure Workspace Access provides a comprehensive, zero-trust approach to deliver secure and contextual access to the corporate internal web apps, SaaS, and virtual applications. It enables the

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 58% Enterprise
    • 26% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Citrix Secure Private Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Intuitive
    1
    Simple
    1
    Cons
    Connection Issues
    1
    Delay Issues
    1
    Slow Internet
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Citrix Secure Private Access features and usability ratings that predict user satisfaction
    9.0
    Ease of Use
    Average: 9.2
    8.6
    Quality of Support
    Average: 9.0
    8.9
    Has the product been a good partner in doing business?
    Average: 8.7
    10.0
    Network Segmentation
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Citrix
    Year Founded
    1989
    HQ Location
    Fort Lauderdale, FL
    Twitter
    @citrix
    199,519 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,296 employees on LinkedIn®
    Ownership
    NASDAQ:CTXS
Product Description
How are these determined?Information
This description is provided by the seller.

Citrix Secure Workspace Access provides a comprehensive, zero-trust approach to deliver secure and contextual access to the corporate internal web apps, SaaS, and virtual applications. It enables the

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 58% Enterprise
  • 26% Mid-Market
Citrix Secure Private Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Intuitive
1
Simple
1
Cons
Connection Issues
1
Delay Issues
1
Slow Internet
1
Citrix Secure Private Access features and usability ratings that predict user satisfaction
9.0
Ease of Use
Average: 9.2
8.6
Quality of Support
Average: 9.0
8.9
Has the product been a good partner in doing business?
Average: 8.7
10.0
Network Segmentation
Average: 9.2
Seller Details
Seller
Citrix
Year Founded
1989
HQ Location
Fort Lauderdale, FL
Twitter
@citrix
199,519 Twitter followers
LinkedIn® Page
www.linkedin.com
4,296 employees on LinkedIn®
Ownership
NASDAQ:CTXS
(74)4.7 out of 5
Optimized for quick response
6th Easiest To Use in Software-Defined Perimeter (SDP) software
Save to My Lists
Entry Level Price:Starting at $5.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Twingate is a secure remote access solution for an organization’s private applications, data, and environments, whether they are on-premise or in the cloud. Built to make the lives of DevOps teams, IT

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 51% Mid-Market
    • 43% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Twingate Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    9
    Security
    9
    Secure Access
    7
    Access Management
    6
    Easy Setup
    6
    Cons
    Performance Issues
    10
    Limited Customization
    5
    Complex Implementation
    4
    Complex Configuration
    3
    Lacking Features
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Twingate features and usability ratings that predict user satisfaction
    9.7
    Ease of Use
    Average: 9.2
    9.1
    Quality of Support
    Average: 9.0
    9.3
    Has the product been a good partner in doing business?
    Average: 8.7
    9.0
    Network Segmentation
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    HQ Location
    Redwood City, California
    Twitter
    @TwingateHQ
    2,336 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    75 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Twingate is a secure remote access solution for an organization’s private applications, data, and environments, whether they are on-premise or in the cloud. Built to make the lives of DevOps teams, IT

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 51% Mid-Market
  • 43% Small-Business
Twingate Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
9
Security
9
Secure Access
7
Access Management
6
Easy Setup
6
Cons
Performance Issues
10
Limited Customization
5
Complex Implementation
4
Complex Configuration
3
Lacking Features
3
Twingate features and usability ratings that predict user satisfaction
9.7
Ease of Use
Average: 9.2
9.1
Quality of Support
Average: 9.0
9.3
Has the product been a good partner in doing business?
Average: 8.7
9.0
Network Segmentation
Average: 9.2
Seller Details
Company Website
HQ Location
Redwood City, California
Twitter
@TwingateHQ
2,336 Twitter followers
LinkedIn® Page
www.linkedin.com
75 employees on LinkedIn®
(56)4.6 out of 5
10th Easiest To Use in Software-Defined Perimeter (SDP) software
View top Consulting Services for FortiGate SD-WAN
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    FortiGate SD-WAN replaces separate WAN routers, WAN optimization, and security devices with a single solution that is application-aware, offers automatic WAN path control and multi-broadband support.

    Users
    • Network Engineer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 55% Mid-Market
    • 32% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • FortiGate SD-WAN Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    1
    Management Ease
    1
    Reliability
    1
    Scalability
    1
    Security
    1
    Cons
    Complex Implementation
    1
    Expensive
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FortiGate SD-WAN features and usability ratings that predict user satisfaction
    9.0
    Ease of Use
    Average: 9.2
    8.9
    Quality of Support
    Average: 9.0
    8.9
    Has the product been a good partner in doing business?
    Average: 8.7
    9.1
    Network Segmentation
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortinet
    Year Founded
    2000
    HQ Location
    Sunnyvale, CA
    Twitter
    @Fortinet
    151,435 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    15,738 employees on LinkedIn®
    Ownership
    NASDAQ: FTNT
Product Description
How are these determined?Information
This description is provided by the seller.

FortiGate SD-WAN replaces separate WAN routers, WAN optimization, and security devices with a single solution that is application-aware, offers automatic WAN path control and multi-broadband support.

Users
  • Network Engineer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 55% Mid-Market
  • 32% Enterprise
FortiGate SD-WAN Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
1
Management Ease
1
Reliability
1
Scalability
1
Security
1
Cons
Complex Implementation
1
Expensive
1
FortiGate SD-WAN features and usability ratings that predict user satisfaction
9.0
Ease of Use
Average: 9.2
8.9
Quality of Support
Average: 9.0
8.9
Has the product been a good partner in doing business?
Average: 8.7
9.1
Network Segmentation
Average: 9.2
Seller Details
Seller
Fortinet
Year Founded
2000
HQ Location
Sunnyvale, CA
Twitter
@Fortinet
151,435 Twitter followers
LinkedIn® Page
www.linkedin.com
15,738 employees on LinkedIn®
Ownership
NASDAQ: FTNT
(52)4.3 out of 5
View top Consulting Services for Cisco DNA Center
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cisco DNA Center is the network management system, foundational controller, and analytics platform at the heart of Cisco’s intent-based network. Cisco DNA Center addresses the demands of digitization,

    Users
    No information available
    Industries
    • Computer & Network Security
    • Hospital & Health Care
    Market Segment
    • 37% Enterprise
    • 19% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cisco DNA Center Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Productivity Improvement
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco DNA Center features and usability ratings that predict user satisfaction
    8.5
    Ease of Use
    Average: 9.2
    9.0
    Quality of Support
    Average: 9.0
    8.8
    Has the product been a good partner in doing business?
    Average: 8.7
    9.4
    Network Segmentation
    Average: 9.2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    721,809 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,148 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Cisco DNA Center is the network management system, foundational controller, and analytics platform at the heart of Cisco’s intent-based network. Cisco DNA Center addresses the demands of digitization,

Users
No information available
Industries
  • Computer & Network Security
  • Hospital & Health Care
Market Segment
  • 37% Enterprise
  • 19% Mid-Market
Cisco DNA Center Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Productivity Improvement
1
Cons
This product has not yet received any negative sentiments.
Cisco DNA Center features and usability ratings that predict user satisfaction
8.5
Ease of Use
Average: 9.2
9.0
Quality of Support
Average: 9.0
8.8
Has the product been a good partner in doing business?
Average: 8.7
9.4
Network Segmentation
Average: 9.2
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
721,809 Twitter followers
LinkedIn® Page
www.linkedin.com
95,148 employees on LinkedIn®
Ownership
NASDAQ:CSCO
(87)4.3 out of 5
2nd Easiest To Use in Software-Defined Perimeter (SDP) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ivanti Connect Secure provides a seamless, cost-effective SSL VPN solution for remote and mobile users from any web-enabled device to corporate resources— anytime, anywhere.

    Users
    No information available
    Industries
    • Information Technology and Services
    • Banking
    Market Segment
    • 70% Enterprise
    • 23% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Ivanti Connect Secure features and usability ratings that predict user satisfaction
    9.3
    Ease of Use
    Average: 9.2
    8.7
    Quality of Support
    Average: 9.0
    9.0
    Has the product been a good partner in doing business?
    Average: 8.7
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Ivanti
    Year Founded
    1985
    HQ Location
    South Jordan, UT
    Twitter
    @GoIvanti
    6,766 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,984 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Ivanti Connect Secure provides a seamless, cost-effective SSL VPN solution for remote and mobile users from any web-enabled device to corporate resources— anytime, anywhere.

Users
No information available
Industries
  • Information Technology and Services
  • Banking
Market Segment
  • 70% Enterprise
  • 23% Mid-Market
Ivanti Connect Secure features and usability ratings that predict user satisfaction
9.3
Ease of Use
Average: 9.2
8.7
Quality of Support
Average: 9.0
9.0
Has the product been a good partner in doing business?
Average: 8.7
0.0
No information available
Seller Details
Seller
Ivanti
Year Founded
1985
HQ Location
South Jordan, UT
Twitter
@GoIvanti
6,766 Twitter followers
LinkedIn® Page
www.linkedin.com
2,984 employees on LinkedIn®

Learn More About Software-Defined Perimeter (SDP) Software

What is Software-Defined Perimeter (SDP) Software?

A software-defined perimeter (SDP) software helps create a blanket of security around a company's assets by applying a security boundary at the network layer.

SDP helps secure network perimeter, services, routers, applications, and systems in hybrid cloud, multi-cloud, and public cloud environments by applying virtual controls on software instead of hardware.

SDP works on the least privilege principle. When a user tries to enter a company’s network, the user and device are authenticated, irrespective of their location. Once authenticated, they are not allowed access to the entire network but only to those routers, services, or SaaS applications they need and are approved to access. SDP provides granular application-level segmentation instead of more complex network segmentation.

The cloud security alliance first introduced SDP. Cloud security alliance is a not-for-profit organization that promotes best practices for security in the cloud. 

SDP architecture consists of a receiving host, an initiating host, and a controller. Initiating host communicates with the controller to provide information on devices looking to connect with the network. Using an identification system, the SDP controller validates device and user identity based on pre-configured rules. Once it approves the device and user, it passes the approval to the SDP gateway. Once approved, it opens the virtual door for authorized users. The accepting host connects the devices to approved applications.

What does SDP stand for?

SDP stands for software-defined perimeter, a security solution that creates a perimeter around a company's IT assets.

What are the Common Features of Software-Defined Perimeter (SDP) Software?

The following are some core features of the software-defined perimeter solutions:

Application-level access: SDP allows access only to applications approved for a user and device, unlike virtual private network (VPN) software that provides remote access to the whole network once approved. So even if an intruder enters the system, their access is minimal, thus reducing the attack surface exposure and data breaches.

Granular access control: Once validated, the software provides a separate secure connection to each user. 

Infrastructure agnostic: Software-defined perimeter is agnostic of infrastructure since it is software defined and not hardware defined. So they can be deployed anywhere—on-premises, private, or public cloud environments.

Location agnostic: Devices and remote users do not have to be in the physical perimeter to get a secure connection through SDP. This feature is extremely useful in the remote work scenario.

What are the Benefits of Software-Defined Perimeter (SDP) Software?

SDP provides a security blanket around the system infrastructure, shrouding it from unregulated external access.

Internet security: Software-defined perimeter provides a security cover around the software perimeter. This helps eliminate security risks when external users or devices connect to the network.

Multi-cloud security: Today, companies usually have multiple cloud environments from different vendors. SDP helps secure entry to all of them through one solution.

Zero trust network security access (ZTNA) across devices: SDP provides zero trust network security access (ZTNA) for each device and user, irrespective of location. 

Restrict broad network access: Unlike VPN, SDP restricts access to broader networks. This way, even if a segment is compromised, other parts of the network are safe. 

Support a wide variety of devices: SDP supports a wide range of devices such as laptops, desktops, mobiles, and even Internet of Things (IoT) devices. This wide range provides good security coverage to the network.

Who Uses Software-Defined Perimeter (SDP) Software?

Network administrators: SDP helps network admins ensure malicious devices and unauthorized users do not enter the system.

IT teams: SDP software helps IT administrators give a specific remote user access to third parties irrespective of their devices and locations.

What are the Alternatives to Software-Defined Perimeter (SDP) Software?

Alternative security solutions to SDP solutions include:

Virtual private network (VPN): Virtual private networks or VPNs provide company employees with secure access to the network. They create a barrier to the network to prevent hackers, malware, and unauthorized users from entering the network perimeter. But SDP is more powerful as it provides privileged access to very specific SaaS applications, unlike VPN.

Zero trust networking software: This software follows the zero trust security approach where a user, internal or external, is considered a threat until they are thoroughly verified. Zero trust network access (ZTNA) software provides privileged access control to the network connections. 

Software Related to Software-Defined Perimeter (SDP) Software

Related solutions that can be used together with SDP include:

Multi-factor authentication (MFA): This software helps authenticate users in two or more ways to ensure that only authorized users and devices are logging on to the system. IT teams use push notifications, tokens, and one-time passwords ( OTPs) to authenticate users.

Firewall software: This software helps create a barrier between the network and the internet to prevent hackers and unauthorized users from entering the corporate network. It validates access based on pre-configured security policies to decide which remote users should be let into the network.

Challenges With Software-Defined Perimeter (SDP) Software

Software solutions can come with their own set of challenges. 

Device compatibility: Although vendors generally ensure maximum compatibility, the software might not be able to connect some of the devices to the network. 

Network and app reconfiguration: When SDP is deployed, all network connections and application settings must be reconfigured, causing disruptions during deployment.

SDP Controller uptime: One of the biggest challenges of SDP is that if the controller is down, users and devices cannot be connected to the network.

How to Buy Software-Defined Perimeter (SDP) Software?

Requirements Gathering (RFI/RFP) For Software-Defined Perimeter (SDP) Software

One important thing to consider while buying an SDP solution is the software’s ability to integrate with all devices. Buyers should be careful about the availability of the SDP controller and time for implementation, as implementation requires reconfiguration. 

It is advantageous if the vendor offers a free trial so that the buyer can evaluate the product before making a long-term investment.

Compare Software-Defined Perimeter Software (SDP) Products

Create a long list

Buyers need to identify features that they need from their software-defined perimeter tools and start with a large pool of SDP vendors. Buyers must then evaluate the pros and cons of each product.

Create a short list

Short lists help cross-reference the results of initial SDP vendor evaluations with other buyer reviews on third-party review sites such as g2.com, which will help the buyer narrow in on a three to five-product list. From there, buyers can compare pricing and features to determine the best fit.

Conduct demos

Companies should demo all of the SDP products on their short list. During demos, buyers should ask specific questions about the functionalities they care about most; for example, one might ask for a demo of how the tool would behave when it detects a policy change.

Selection of Software-Defined Perimeter (SDP) Software

Choose a selection team

Regardless of a company’s size, involving the most relevant personnel is crucial during the software selection process. The team should include relevant company stakeholders who can use the security solution, scrutinize it, and check whether it will meet the organization’s requirements. The individuals responsible for the day-to-day use of SDP software must be a part of the selection team. IT admins, security teams, and decision makers could be the primary personas included in the group.

Negotiation

To get the best price, buyers looking to trim costs should try to negotiate the specific functions that matter to them. More often than not, the price and specifications mentioned on the vendor’s pricing page can be negotiated. Negotiation on SDP software implementation, support, and other professional services are also crucial. Buyers should ensure they receive adequate support to get the product up and running. The cost of SDP software typically depends on the number of users per month. Some even offer free trial periods to start with. 

Final decision

Before deciding to purchase the software, testing it for a short period is advisable. The day-to-day users of the software are the best individuals to perform this test. They can use and analyze the software product's capabilities and offer valuable feedback.

In most cases, software service providers offer a short-term product trial. If the selection team is satisfied with what the software offers, buyers can proceed with the purchase or contracting process.