Introducing G2.ai, the future of software buying.Try now

Best Zero Trust Networking Software for Small Business

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Products classified in the overall Zero Trust Networking category are similar in many regards and help companies of all sizes solve their business problems. However, small business features, pricing, setup, and installation differ from businesses of other sizes, which is why we match buyers to the right Small Business Zero Trust Networking to fit their needs. Compare product ratings based on reviews from enterprise users or connect with one of G2's buying advisors to find the right solutions within the Small Business Zero Trust Networking category.

In addition to qualifying for inclusion in the Zero Trust Networking Software category, to qualify for inclusion in the Small Business Zero Trust Networking Software category, a product must have at least 10 reviews left by a reviewer from a small business.

Show More
Show Less

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Zero Trust Networking Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
1 filter applied
Clear All

12 Listings in Small Business Zero Trust Networking Available

(294)4.8 out of 5
4th Easiest To Use in Zero Trust Networking software
View top Consulting Services for ThreatLocker Platform
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ThreatLocker is a comprehensive cybersecurity solution designed to empower organizations by providing them with the ability to control which applications are permitted to run on their networks. This s

    Users
    • President
    • CEO
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 62% Small-Business
    • 32% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ThreatLocker Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    93
    Threat Detection
    89
    Ease of Use
    76
    Security
    72
    Protection
    71
    Cons
    Learning Curve
    43
    Difficult Learning Curve
    30
    Difficult Configuration
    16
    Difficult Navigation
    14
    Training Required
    13
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatLocker Platform features and usability ratings that predict user satisfaction
    9.8
    Quality of Support
    Average: 8.8
    8.3
    Ease of Use
    Average: 8.9
    8.6
    Ease of Admin
    Average: 8.8
    8.1
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2017
    HQ Location
    Orlando, Florida, United States
    Twitter
    @ThreatLocker
    2,651 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    650 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ThreatLocker is a comprehensive cybersecurity solution designed to empower organizations by providing them with the ability to control which applications are permitted to run on their networks. This s

Users
  • President
  • CEO
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 62% Small-Business
  • 32% Mid-Market
ThreatLocker Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
93
Threat Detection
89
Ease of Use
76
Security
72
Protection
71
Cons
Learning Curve
43
Difficult Learning Curve
30
Difficult Configuration
16
Difficult Navigation
14
Training Required
13
ThreatLocker Platform features and usability ratings that predict user satisfaction
9.8
Quality of Support
Average: 8.8
8.3
Ease of Use
Average: 8.9
8.6
Ease of Admin
Average: 8.8
8.1
Application Security
Average: 8.9
Seller Details
Company Website
Year Founded
2017
HQ Location
Orlando, Florida, United States
Twitter
@ThreatLocker
2,651 Twitter followers
LinkedIn® Page
www.linkedin.com
650 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    What is Palo Alto Networks IoT/OT Security? Palo Alto Networks IoT/OT Security is a comprehensive solution delivering ML-powered visibility, prevention, and zero-trust enforcement in a single platf

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 35% Mid-Market
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Palo Alto Networks IoT/OT Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Threat Protection
    33
    Security
    30
    Ease of Use
    21
    Features
    20
    Monitoring
    18
    Cons
    Expensive
    29
    Complex Setup
    18
    Difficult Learning Curve
    16
    Difficult Configuration
    10
    Required Expertise
    9
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Palo Alto Networks IoT/OT Security features and usability ratings that predict user satisfaction
    8.3
    Quality of Support
    Average: 8.8
    8.2
    Ease of Use
    Average: 8.9
    8.5
    Ease of Admin
    Average: 8.8
    9.0
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    127,364 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    18,396 employees on LinkedIn®
    Ownership
    NYSE: PANW
Product Description
How are these determined?Information
This description is provided by the seller.

What is Palo Alto Networks IoT/OT Security? Palo Alto Networks IoT/OT Security is a comprehensive solution delivering ML-powered visibility, prevention, and zero-trust enforcement in a single platf

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 35% Mid-Market
  • 33% Small-Business
Palo Alto Networks IoT/OT Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Threat Protection
33
Security
30
Ease of Use
21
Features
20
Monitoring
18
Cons
Expensive
29
Complex Setup
18
Difficult Learning Curve
16
Difficult Configuration
10
Required Expertise
9
Palo Alto Networks IoT/OT Security features and usability ratings that predict user satisfaction
8.3
Quality of Support
Average: 8.8
8.2
Ease of Use
Average: 8.9
8.5
Ease of Admin
Average: 8.8
9.0
Application Security
Average: 8.9
Seller Details
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
127,364 Twitter followers
LinkedIn® Page
www.linkedin.com
18,396 employees on LinkedIn®
Ownership
NYSE: PANW

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(161)4.7 out of 5
1st Easiest To Use in Zero Trust Networking software
Save to My Lists
Entry Level Price:Starting at $7.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    GoodAccess is a cybersecurity platform (SASE/SSE) that empowers medium-sized enterprises to easily implement Zero Trust Architecture (ZTA) in their infrastructure, regardless of its complexity or scal

    Users
    • CTO
    • CEO
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 76% Small-Business
    • 24% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • GoodAccess is a VPN solution that provides secure remote access and network security for businesses.
    • Reviewers like the simplicity of use, secure remote access, dependable network security, easy traffic monitoring, access control management, user onboarding, and the zero-trust security model that guarantees data safety.
    • Reviewers mentioned that new users may find the initial setup and configuration complicated, there is room for improvement in the documentation of some advanced settings, and the client sometimes disconnects requiring re-authentication.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • GoodAccess Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    77
    VPN Services
    47
    Reliability
    45
    Customer Support
    41
    Easy Setup
    32
    Cons
    Expensive
    23
    Connection Issues
    16
    Access Issues
    8
    Limited Location Options
    8
    Connectivity Issues
    7
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • GoodAccess features and usability ratings that predict user satisfaction
    9.3
    Quality of Support
    Average: 8.8
    9.5
    Ease of Use
    Average: 8.9
    9.4
    Ease of Admin
    Average: 8.8
    8.8
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2009
    HQ Location
    Usti nad Labem, Czech Republic, Europe
    LinkedIn® Page
    www.linkedin.com
    25 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

GoodAccess is a cybersecurity platform (SASE/SSE) that empowers medium-sized enterprises to easily implement Zero Trust Architecture (ZTA) in their infrastructure, regardless of its complexity or scal

Users
  • CTO
  • CEO
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 76% Small-Business
  • 24% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • GoodAccess is a VPN solution that provides secure remote access and network security for businesses.
  • Reviewers like the simplicity of use, secure remote access, dependable network security, easy traffic monitoring, access control management, user onboarding, and the zero-trust security model that guarantees data safety.
  • Reviewers mentioned that new users may find the initial setup and configuration complicated, there is room for improvement in the documentation of some advanced settings, and the client sometimes disconnects requiring re-authentication.
GoodAccess Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
77
VPN Services
47
Reliability
45
Customer Support
41
Easy Setup
32
Cons
Expensive
23
Connection Issues
16
Access Issues
8
Limited Location Options
8
Connectivity Issues
7
GoodAccess features and usability ratings that predict user satisfaction
9.3
Quality of Support
Average: 8.8
9.5
Ease of Use
Average: 8.9
9.4
Ease of Admin
Average: 8.8
8.8
Application Security
Average: 8.9
Seller Details
Company Website
Year Founded
2009
HQ Location
Usti nad Labem, Czech Republic, Europe
LinkedIn® Page
www.linkedin.com
25 employees on LinkedIn®
(119)4.5 out of 5
2nd Easiest To Use in Zero Trust Networking software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Zscaler Private Access (ZPA) is a cloud-based zero trust solution that securely connects users to private applications hosted in public clouds, data centers, or on-premises environments without relyin

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 49% Enterprise
    • 29% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Zscaler Private Access is a security tool that provides secure and seamless access to internal applications without the need for traditional VPNs.
    • Reviewers like the ease of use, the seamless user experience, and the enhanced security that Zscaler Private Access offers, with many appreciating its ability to run in the background and its integration with identity providers like Okta and Azure.
    • Reviewers experienced issues with the initial setup and policy configuration, occasional latency and connection drops, and some found the troubleshooting process to be complex and the cost to be high for smaller organizations.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Zscaler Private Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    53
    Secure Access
    40
    Ease of Use
    38
    VPN Efficiency
    26
    Reliability
    19
    Cons
    Connection Issues
    20
    Slow Loading
    17
    Error Handling
    16
    Expensive
    16
    Slow Internet
    14
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Zscaler Private Access features and usability ratings that predict user satisfaction
    8.9
    Quality of Support
    Average: 8.8
    8.9
    Ease of Use
    Average: 8.9
    9.0
    Ease of Admin
    Average: 8.8
    9.2
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Zscaler
    Company Website
    Year Founded
    2008
    HQ Location
    San Jose, California
    Twitter
    @zscaler
    17,150 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    9,528 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Zscaler Private Access (ZPA) is a cloud-based zero trust solution that securely connects users to private applications hosted in public clouds, data centers, or on-premises environments without relyin

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 49% Enterprise
  • 29% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Zscaler Private Access is a security tool that provides secure and seamless access to internal applications without the need for traditional VPNs.
  • Reviewers like the ease of use, the seamless user experience, and the enhanced security that Zscaler Private Access offers, with many appreciating its ability to run in the background and its integration with identity providers like Okta and Azure.
  • Reviewers experienced issues with the initial setup and policy configuration, occasional latency and connection drops, and some found the troubleshooting process to be complex and the cost to be high for smaller organizations.
Zscaler Private Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
53
Secure Access
40
Ease of Use
38
VPN Efficiency
26
Reliability
19
Cons
Connection Issues
20
Slow Loading
17
Error Handling
16
Expensive
16
Slow Internet
14
Zscaler Private Access features and usability ratings that predict user satisfaction
8.9
Quality of Support
Average: 8.8
8.9
Ease of Use
Average: 8.9
9.0
Ease of Admin
Average: 8.8
9.2
Application Security
Average: 8.9
Seller Details
Seller
Zscaler
Company Website
Year Founded
2008
HQ Location
San Jose, California
Twitter
@zscaler
17,150 Twitter followers
LinkedIn® Page
www.linkedin.com
9,528 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Todyl empowers businesses of any size with a complete, end-to-end security program. The Todyl Security Platform converges SASE, SIEM, Endpoint Security, GRC, MXDR, and more into a cloud-native, singl

    Users
    • Owner
    • President
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 72% Small-Business
    • 8% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Todyl Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    28
    Customer Support
    24
    Features
    20
    Security
    17
    Cybersecurity
    15
    Cons
    Technical Issues
    7
    Integration Issues
    6
    Limited Features
    6
    Difficult Initiation
    5
    Difficult Learning
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Todyl Security Platform features and usability ratings that predict user satisfaction
    9.4
    Quality of Support
    Average: 8.8
    8.5
    Ease of Use
    Average: 8.9
    8.6
    Ease of Admin
    Average: 8.8
    8.8
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Todyl
    Company Website
    Year Founded
    2015
    HQ Location
    Denver, CO
    LinkedIn® Page
    www.linkedin.com
    125 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Todyl empowers businesses of any size with a complete, end-to-end security program. The Todyl Security Platform converges SASE, SIEM, Endpoint Security, GRC, MXDR, and more into a cloud-native, singl

Users
  • Owner
  • President
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 72% Small-Business
  • 8% Mid-Market
Todyl Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
28
Customer Support
24
Features
20
Security
17
Cybersecurity
15
Cons
Technical Issues
7
Integration Issues
6
Limited Features
6
Difficult Initiation
5
Difficult Learning
5
Todyl Security Platform features and usability ratings that predict user satisfaction
9.4
Quality of Support
Average: 8.8
8.5
Ease of Use
Average: 8.9
8.6
Ease of Admin
Average: 8.8
8.8
Application Security
Average: 8.9
Seller Details
Seller
Todyl
Company Website
Year Founded
2015
HQ Location
Denver, CO
LinkedIn® Page
www.linkedin.com
125 employees on LinkedIn®
(1,051)4.5 out of 5
7th Easiest To Use in Zero Trust Networking software
View top Consulting Services for Okta
Save to My Lists
Entry Level Price:$6.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Okta is The World’s Identity Company™. As the leading independent Identity partner, we free everyone to safely use any technology — anywhere, on any device or app. The most trusted brands trust Okta t

    Users
    • Software Engineer
    • Account Executive
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 53% Mid-Market
    • 40% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Okta Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    175
    Security
    129
    Single Sign-On
    99
    Easy Access
    97
    Authentication
    94
    Cons
    Authentication Issues
    65
    Login Issues
    44
    Frequent Authentication
    30
    Complex Setup
    27
    Expensive
    27
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Okta features and usability ratings that predict user satisfaction
    8.9
    Quality of Support
    Average: 8.8
    9.3
    Ease of Use
    Average: 8.9
    9.0
    Ease of Admin
    Average: 8.8
    9.2
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Okta
    Company Website
    Year Founded
    2009
    HQ Location
    San Francisco, California
    Twitter
    @okta
    42,525 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    6,910 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Okta is The World’s Identity Company™. As the leading independent Identity partner, we free everyone to safely use any technology — anywhere, on any device or app. The most trusted brands trust Okta t

Users
  • Software Engineer
  • Account Executive
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 53% Mid-Market
  • 40% Enterprise
Okta Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
175
Security
129
Single Sign-On
99
Easy Access
97
Authentication
94
Cons
Authentication Issues
65
Login Issues
44
Frequent Authentication
30
Complex Setup
27
Expensive
27
Okta features and usability ratings that predict user satisfaction
8.9
Quality of Support
Average: 8.8
9.3
Ease of Use
Average: 8.9
9.0
Ease of Admin
Average: 8.8
9.2
Application Security
Average: 8.9
Seller Details
Seller
Okta
Company Website
Year Founded
2009
HQ Location
San Francisco, California
Twitter
@okta
42,525 Twitter followers
LinkedIn® Page
www.linkedin.com
6,910 employees on LinkedIn®
(103)4.6 out of 5
View top Consulting Services for Cloudflare SSE & SASE Platform
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cloudflare Area 1 is a cloud-native email security platform that identifies and blocks attacks before they hit user inboxes, enabling more effective protection against spear phishing, Business Email C

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 37% Small-Business
    • 34% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cloudflare SSE & SASE Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    8
    Protection
    7
    Reliability
    7
    Security
    7
    User Interface
    6
    Cons
    Steep Learning Curve
    5
    Complexity
    4
    Difficult Learning
    4
    Difficult Learning Curve
    4
    Difficult Setup
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cloudflare SSE & SASE Platform features and usability ratings that predict user satisfaction
    9.2
    Quality of Support
    Average: 8.8
    9.1
    Ease of Use
    Average: 8.9
    9.1
    Ease of Admin
    Average: 8.8
    9.0
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2009
    HQ Location
    San Francisco, California
    Twitter
    @Cloudflare
    259,161 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    6,320 employees on LinkedIn®
    Ownership
    NYSE: NET
Product Description
How are these determined?Information
This description is provided by the seller.

Cloudflare Area 1 is a cloud-native email security platform that identifies and blocks attacks before they hit user inboxes, enabling more effective protection against spear phishing, Business Email C

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 37% Small-Business
  • 34% Mid-Market
Cloudflare SSE & SASE Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
8
Protection
7
Reliability
7
Security
7
User Interface
6
Cons
Steep Learning Curve
5
Complexity
4
Difficult Learning
4
Difficult Learning Curve
4
Difficult Setup
4
Cloudflare SSE & SASE Platform features and usability ratings that predict user satisfaction
9.2
Quality of Support
Average: 8.8
9.1
Ease of Use
Average: 8.9
9.1
Ease of Admin
Average: 8.8
9.0
Application Security
Average: 8.9
Seller Details
Year Founded
2009
HQ Location
San Francisco, California
Twitter
@Cloudflare
259,161 Twitter followers
LinkedIn® Page
www.linkedin.com
6,320 employees on LinkedIn®
Ownership
NYSE: NET
(440)4.5 out of 5
Optimized for quick response
12th Easiest To Use in Zero Trust Networking software
View top Consulting Services for Cisco Duo
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Duo stops identity-based threats and boosts workforce productivity. Our Continuous Identity Security solution provides the best access management experience across users, devices, and applications whi

    Users
    • Software Engineer
    • Consultant
    Industries
    • Information Technology and Services
    • Higher Education
    Market Segment
    • 44% Enterprise
    • 37% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cisco Duo Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    25
    Ease of Use
    22
    Authentication
    16
    Authentication Ease
    14
    Reliability
    12
    Cons
    Authentication Issues
    8
    Access Limitations
    7
    Expensive
    7
    Internet Dependency
    7
    Complexity
    6
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco Duo features and usability ratings that predict user satisfaction
    8.9
    Quality of Support
    Average: 8.8
    9.3
    Ease of Use
    Average: 8.9
    9.2
    Ease of Admin
    Average: 8.8
    9.2
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Company Website
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    721,782 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,386 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Duo stops identity-based threats and boosts workforce productivity. Our Continuous Identity Security solution provides the best access management experience across users, devices, and applications whi

Users
  • Software Engineer
  • Consultant
Industries
  • Information Technology and Services
  • Higher Education
Market Segment
  • 44% Enterprise
  • 37% Mid-Market
Cisco Duo Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
25
Ease of Use
22
Authentication
16
Authentication Ease
14
Reliability
12
Cons
Authentication Issues
8
Access Limitations
7
Expensive
7
Internet Dependency
7
Complexity
6
Cisco Duo features and usability ratings that predict user satisfaction
8.9
Quality of Support
Average: 8.8
9.3
Ease of Use
Average: 8.9
9.2
Ease of Admin
Average: 8.8
9.2
Application Security
Average: 8.9
Seller Details
Seller
Cisco
Company Website
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
721,782 Twitter followers
LinkedIn® Page
www.linkedin.com
95,386 employees on LinkedIn®
(74)4.7 out of 5
Optimized for quick response
11th Easiest To Use in Zero Trust Networking software
Save to My Lists
Entry Level Price:Starting at $5.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Twingate is a secure remote access solution for an organization’s private applications, data, and environments, whether they are on-premise or in the cloud. Built to make the lives of DevOps teams, IT

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 51% Mid-Market
    • 43% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Twingate Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    9
    Security
    9
    Secure Access
    7
    Access Management
    6
    Easy Setup
    6
    Cons
    Performance Issues
    10
    Limited Customization
    5
    Complex Implementation
    4
    Complex Configuration
    3
    Lacking Features
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Twingate features and usability ratings that predict user satisfaction
    9.1
    Quality of Support
    Average: 8.8
    9.7
    Ease of Use
    Average: 8.9
    9.1
    Ease of Admin
    Average: 8.8
    8.7
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    HQ Location
    Redwood City, California
    Twitter
    @TwingateHQ
    2,385 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    75 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Twingate is a secure remote access solution for an organization’s private applications, data, and environments, whether they are on-premise or in the cloud. Built to make the lives of DevOps teams, IT

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 51% Mid-Market
  • 43% Small-Business
Twingate Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
9
Security
9
Secure Access
7
Access Management
6
Easy Setup
6
Cons
Performance Issues
10
Limited Customization
5
Complex Implementation
4
Complex Configuration
3
Lacking Features
3
Twingate features and usability ratings that predict user satisfaction
9.1
Quality of Support
Average: 8.8
9.7
Ease of Use
Average: 8.9
9.1
Ease of Admin
Average: 8.8
8.7
Application Security
Average: 8.9
Seller Details
Company Website
HQ Location
Redwood City, California
Twitter
@TwingateHQ
2,385 Twitter followers
LinkedIn® Page
www.linkedin.com
75 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The internet is the new corporate network, leading organizations to transition to their network security to Secure Access Service Edge (SASE). However, current solutions break the user experience with

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 49% Mid-Market
    • 36% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Check Point Harmony SASE is a unified, cloud-native security solution that provides seamless access for users working from anywhere, integrating network security and secure remote access into a single solution.
    • Users like the platform's Zero Trust approach, strong threat prevention, and centralized management, which ensures consistent protection across all devices and networks and simplifies policy enforcement and monitoring.
    • Reviewers mentioned that the initial setup and policy configuration can be complex, especially for new users, and the user interface, while powerful, sometimes requires extra clicks to access simple options, slowing down routine adjustments.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point Harmony SASE Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    29
    Secure Access
    28
    Protection
    22
    Ease of Use
    18
    Internet Security
    16
    Cons
    Complex Configuration
    21
    Complex Implementation
    20
    Complex Setup
    18
    Learning Curve
    13
    Difficult Learning Curve
    12
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point Harmony SASE features and usability ratings that predict user satisfaction
    9.0
    Quality of Support
    Average: 8.8
    9.1
    Ease of Use
    Average: 8.9
    9.0
    Ease of Admin
    Average: 8.8
    8.1
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    70,964 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,323 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

The internet is the new corporate network, leading organizations to transition to their network security to Secure Access Service Edge (SASE). However, current solutions break the user experience with

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 49% Mid-Market
  • 36% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Check Point Harmony SASE is a unified, cloud-native security solution that provides seamless access for users working from anywhere, integrating network security and secure remote access into a single solution.
  • Users like the platform's Zero Trust approach, strong threat prevention, and centralized management, which ensures consistent protection across all devices and networks and simplifies policy enforcement and monitoring.
  • Reviewers mentioned that the initial setup and policy configuration can be complex, especially for new users, and the user interface, while powerful, sometimes requires extra clicks to access simple options, slowing down routine adjustments.
Check Point Harmony SASE Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
29
Secure Access
28
Protection
22
Ease of Use
18
Internet Security
16
Cons
Complex Configuration
21
Complex Implementation
20
Complex Setup
18
Learning Curve
13
Difficult Learning Curve
12
Check Point Harmony SASE features and usability ratings that predict user satisfaction
9.0
Quality of Support
Average: 8.8
9.1
Ease of Use
Average: 8.9
9.0
Ease of Admin
Average: 8.8
8.1
Application Security
Average: 8.9
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
70,964 Twitter followers
LinkedIn® Page
www.linkedin.com
8,323 employees on LinkedIn®
Ownership
NASDAQ:CHKP
(225)4.7 out of 5
Optimized for quick response
10th Easiest To Use in Zero Trust Networking software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Absolute Secure Access (formerly NetMotion by Absolute) is one of the company’s core product lines, which was added through the acquisition of NetMotion in July 2021. The product portfolio provides re

    Users
    • IT Director
    • System Administrator
    Industries
    • Law Enforcement
    • Government Administration
    Market Segment
    • 62% Mid-Market
    • 25% Enterprise
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Absolute is a VPN service that offers persistent connectivity, allowing users to switch between different networks without losing their connection.
    • Reviewers frequently mention the product's intelligent VPN connectivity, its ability to optimize network traffic for improved performance, and its comprehensive Insight tool for understanding client workflow.
    • Users reported that the initial setup and policy configuration can be complex, the user interface of the management console can feel outdated, and the licensing model can become complex depending on the specific features and scale of deployment.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Absolute Secure Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    18
    Customer Support
    11
    Secure Access
    11
    VPN Efficiency
    10
    Reliability
    9
    Cons
    Access Issues
    5
    Expensive
    5
    Complex Configuration
    4
    Complex Implementation
    4
    Expensive Licensing
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Absolute Secure Access features and usability ratings that predict user satisfaction
    9.3
    Quality of Support
    Average: 8.8
    9.1
    Ease of Use
    Average: 8.9
    8.7
    Ease of Admin
    Average: 8.8
    9.0
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1993
    HQ Location
    British Columbia, Canada
    Twitter
    @absolutecorp
    3,929 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,233 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Absolute Secure Access (formerly NetMotion by Absolute) is one of the company’s core product lines, which was added through the acquisition of NetMotion in July 2021. The product portfolio provides re

Users
  • IT Director
  • System Administrator
Industries
  • Law Enforcement
  • Government Administration
Market Segment
  • 62% Mid-Market
  • 25% Enterprise
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Absolute is a VPN service that offers persistent connectivity, allowing users to switch between different networks without losing their connection.
  • Reviewers frequently mention the product's intelligent VPN connectivity, its ability to optimize network traffic for improved performance, and its comprehensive Insight tool for understanding client workflow.
  • Users reported that the initial setup and policy configuration can be complex, the user interface of the management console can feel outdated, and the licensing model can become complex depending on the specific features and scale of deployment.
Absolute Secure Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
18
Customer Support
11
Secure Access
11
VPN Efficiency
10
Reliability
9
Cons
Access Issues
5
Expensive
5
Complex Configuration
4
Complex Implementation
4
Expensive Licensing
3
Absolute Secure Access features and usability ratings that predict user satisfaction
9.3
Quality of Support
Average: 8.8
9.1
Ease of Use
Average: 8.9
8.7
Ease of Admin
Average: 8.8
9.0
Application Security
Average: 8.9
Seller Details
Company Website
Year Founded
1993
HQ Location
British Columbia, Canada
Twitter
@absolutecorp
3,929 Twitter followers
LinkedIn® Page
www.linkedin.com
1,233 employees on LinkedIn®
(94)4.4 out of 5
Optimized for quick response
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Portnox offers cloud-native zero trust access control and cybersecurity essentials that enable agile, resource-constrained IT teams to proactively address today’s most pressing security challenges: th

    Users
    • Network Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 41% Enterprise
    • 36% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Portnox Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    16
    Customer Support
    11
    Implementation Ease
    11
    Integrations
    9
    Setup Ease
    9
    Cons
    Performance Issues
    9
    Connection Issues
    5
    Software Bugs
    5
    Difficult Learning
    4
    Expensive
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Portnox features and usability ratings that predict user satisfaction
    8.8
    Quality of Support
    Average: 8.8
    8.8
    Ease of Use
    Average: 8.9
    8.5
    Ease of Admin
    Average: 8.8
    7.5
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Portnox
    Company Website
    Year Founded
    2007
    HQ Location
    Austin, Texas
    Twitter
    @portnox
    826 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    100 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Portnox offers cloud-native zero trust access control and cybersecurity essentials that enable agile, resource-constrained IT teams to proactively address today’s most pressing security challenges: th

Users
  • Network Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 41% Enterprise
  • 36% Mid-Market
Portnox Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
16
Customer Support
11
Implementation Ease
11
Integrations
9
Setup Ease
9
Cons
Performance Issues
9
Connection Issues
5
Software Bugs
5
Difficult Learning
4
Expensive
4
Portnox features and usability ratings that predict user satisfaction
8.8
Quality of Support
Average: 8.8
8.8
Ease of Use
Average: 8.9
8.5
Ease of Admin
Average: 8.8
7.5
Application Security
Average: 8.9
Seller Details
Seller
Portnox
Company Website
Year Founded
2007
HQ Location
Austin, Texas
Twitter
@portnox
826 Twitter followers
LinkedIn® Page
www.linkedin.com
100 employees on LinkedIn®