Best Software for 2025 is now live!
|| products.size

Best Zero Trust Networking Software for for Small Business

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Products classified in the overall Zero Trust Networking category are similar in many regards and help companies of all sizes solve their business problems. However, small business features, pricing, setup, and installation differ from businesses of other sizes, which is why we match buyers to the right Small Business Zero Trust Networking to fit their needs. Compare product ratings based on reviews from enterprise users or connect with one of G2's buying advisors to find the right solutions within the Small Business Zero Trust Networking category.

In addition to qualifying for inclusion in the Zero Trust Networking Software category, to qualify for inclusion in the Small Business Zero Trust Networking Software category, a product must have at least 10 reviews left by a reviewer from a small business.

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

1 filter applied
Clear All

10 Listings in Small Business Zero Trust Networking Available

(91)4.3 out of 5
13th Easiest To Use in Zero Trust Networking software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    What is Palo Alto Networks IoT/OT Security? Palo Alto Networks IoT/OT Security is a comprehensive solution delivering ML-powered visibility, prevention, and zero-trust enforcement in a single platf

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 34% Mid-Market
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Palo Alto Networks IoT/OT Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    27
    Threat Protection
    27
    Ease of Use
    19
    Features
    16
    Monitoring
    15
    Cons
    Expensive
    23
    Complex Setup
    14
    Difficult Learning Curve
    12
    Required Expertise
    9
    Difficult Configuration
    8
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Palo Alto Networks IoT/OT Security features and usability ratings that predict user satisfaction
    8.3
    Quality of Support
    Average: 8.8
    8.0
    Ease of Use
    Average: 8.9
    8.4
    Ease of Admin
    Average: 8.9
    8.9
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    127,155 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    16,690 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

What is Palo Alto Networks IoT/OT Security? Palo Alto Networks IoT/OT Security is a comprehensive solution delivering ML-powered visibility, prevention, and zero-trust enforcement in a single platf

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 34% Mid-Market
  • 33% Small-Business
Palo Alto Networks IoT/OT Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
27
Threat Protection
27
Ease of Use
19
Features
16
Monitoring
15
Cons
Expensive
23
Complex Setup
14
Difficult Learning Curve
12
Required Expertise
9
Difficult Configuration
8
Palo Alto Networks IoT/OT Security features and usability ratings that predict user satisfaction
8.3
Quality of Support
Average: 8.8
8.0
Ease of Use
Average: 8.9
8.4
Ease of Admin
Average: 8.9
8.9
Application Security
Average: 8.9
Seller Details
Company Website
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
127,155 Twitter followers
LinkedIn® Page
www.linkedin.com
16,690 employees on LinkedIn®
(92)4.6 out of 5
View top Consulting Services for Cloudflare SSE & SASE Platform
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cloudflare Area 1 is a cloud-native email security platform that identifies and blocks attacks before they hit user inboxes, enabling more effective protection against spear phishing, Business Email C

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 37% Small-Business
    • 34% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cloudflare SSE & SASE Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    12
    Ease of Use
    11
    Performance Speed
    9
    Protection
    8
    Reliability
    7
    Cons
    Needs Improvement
    4
    Difficult Learning
    3
    Difficult Learning Curve
    3
    Expensive
    3
    Learning Difficulty
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cloudflare SSE & SASE Platform features and usability ratings that predict user satisfaction
    9.2
    Quality of Support
    Average: 8.8
    9.2
    Ease of Use
    Average: 8.9
    9.1
    Ease of Admin
    Average: 8.9
    8.9
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2009
    HQ Location
    San Francisco, California
    Twitter
    @Cloudflare
    213,181 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,964 employees on LinkedIn®
    Ownership
    NYSE: NET
Product Description
How are these determined?Information
This description is provided by the seller.

Cloudflare Area 1 is a cloud-native email security platform that identifies and blocks attacks before they hit user inboxes, enabling more effective protection against spear phishing, Business Email C

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 37% Small-Business
  • 34% Mid-Market
Cloudflare SSE & SASE Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
12
Ease of Use
11
Performance Speed
9
Protection
8
Reliability
7
Cons
Needs Improvement
4
Difficult Learning
3
Difficult Learning Curve
3
Expensive
3
Learning Difficulty
3
Cloudflare SSE & SASE Platform features and usability ratings that predict user satisfaction
9.2
Quality of Support
Average: 8.8
9.2
Ease of Use
Average: 8.9
9.1
Ease of Admin
Average: 8.9
8.9
Application Security
Average: 8.9
Seller Details
Year Founded
2009
HQ Location
San Francisco, California
Twitter
@Cloudflare
213,181 Twitter followers
LinkedIn® Page
www.linkedin.com
4,964 employees on LinkedIn®
Ownership
NYSE: NET

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(43)4.7 out of 5
7th Easiest To Use in Zero Trust Networking software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Todyl empowers businesses of any size with a complete, end-to-end security program. The Todyl Security Platform converges SASE, SIEM, Endpoint Security, GRC, MXDR, and more into a cloud-native, singl

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 88% Small-Business
    • 12% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Todyl Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    26
    Customer Support
    24
    Features
    19
    Security
    16
    Cybersecurity
    13
    Cons
    Technical Issues
    7
    Integration Issues
    6
    Limited Features
    6
    Lacking Features
    5
    Pricing Issues
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Todyl Security Platform features and usability ratings that predict user satisfaction
    9.6
    Quality of Support
    Average: 8.8
    8.5
    Ease of Use
    Average: 8.9
    8.8
    Ease of Admin
    Average: 8.9
    9.1
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Todyl
    Company Website
    Year Founded
    2015
    HQ Location
    Denver, CO
    LinkedIn® Page
    www.linkedin.com
    128 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Todyl empowers businesses of any size with a complete, end-to-end security program. The Todyl Security Platform converges SASE, SIEM, Endpoint Security, GRC, MXDR, and more into a cloud-native, singl

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 88% Small-Business
  • 12% Mid-Market
Todyl Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
26
Customer Support
24
Features
19
Security
16
Cybersecurity
13
Cons
Technical Issues
7
Integration Issues
6
Limited Features
6
Lacking Features
5
Pricing Issues
5
Todyl Security Platform features and usability ratings that predict user satisfaction
9.6
Quality of Support
Average: 8.8
8.5
Ease of Use
Average: 8.9
8.8
Ease of Admin
Average: 8.9
9.1
Application Security
Average: 8.9
Seller Details
Seller
Todyl
Company Website
Year Founded
2015
HQ Location
Denver, CO
LinkedIn® Page
www.linkedin.com
128 employees on LinkedIn®
(148)4.7 out of 5
11th Easiest To Use in Zero Trust Networking software
Save to My Lists
Entry Level Price:$7.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    GoodAccess is a cybersecurity platform (SASE/SSE) that empowers medium-sized enterprises to easily implement Zero Trust Architecture (ZTA) in their infrastructure, regardless of its complexity or scal

    Users
    • CTO
    • CEO
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 78% Small-Business
    • 22% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • GoodAccess is a VPN service that provides secure remote access, easy setup, and robust security features for teams.
    • Reviewers like the user-friendly interface, seamless integration into workflows, reliable performance, and the excellent customer support provided by GoodAccess.
    • Reviewers experienced occasional connectivity issues, high pricing, and limited IP locations in the USA, which can interrupt workflows and cause inconvenience.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • GoodAccess Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    51
    VPN Services
    32
    Customer Support
    26
    Reliability
    26
    User Interface
    24
    Cons
    Expensive
    20
    Connection Issues
    12
    Limited Location Options
    7
    Connectivity Issues
    5
    Lacking Features
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • GoodAccess features and usability ratings that predict user satisfaction
    9.3
    Quality of Support
    Average: 8.8
    9.5
    Ease of Use
    Average: 8.9
    9.4
    Ease of Admin
    Average: 8.9
    8.8
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2009
    HQ Location
    Usti nad Labem, Czech Republic, Europe
    Twitter
    @GoodAccessVPN
    47 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    28 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

GoodAccess is a cybersecurity platform (SASE/SSE) that empowers medium-sized enterprises to easily implement Zero Trust Architecture (ZTA) in their infrastructure, regardless of its complexity or scal

Users
  • CTO
  • CEO
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 78% Small-Business
  • 22% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • GoodAccess is a VPN service that provides secure remote access, easy setup, and robust security features for teams.
  • Reviewers like the user-friendly interface, seamless integration into workflows, reliable performance, and the excellent customer support provided by GoodAccess.
  • Reviewers experienced occasional connectivity issues, high pricing, and limited IP locations in the USA, which can interrupt workflows and cause inconvenience.
GoodAccess Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
51
VPN Services
32
Customer Support
26
Reliability
26
User Interface
24
Cons
Expensive
20
Connection Issues
12
Limited Location Options
7
Connectivity Issues
5
Lacking Features
5
GoodAccess features and usability ratings that predict user satisfaction
9.3
Quality of Support
Average: 8.8
9.5
Ease of Use
Average: 8.9
9.4
Ease of Admin
Average: 8.9
8.8
Application Security
Average: 8.9
Seller Details
Year Founded
2009
HQ Location
Usti nad Labem, Czech Republic, Europe
Twitter
@GoodAccessVPN
47 Twitter followers
LinkedIn® Page
www.linkedin.com
28 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Zscaler Private Access™ (ZPA) gives users the fastest, most secure access to private apps and OT devices while enabling zero trust connectivity for workloads. As the world’s most deployed zero trust

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 45% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Zscaler Private Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    18
    Secure Access
    15
    Ease of Use
    8
    Easy Access
    7
    Reliability
    6
    Cons
    Connection Issues
    4
    Complex Administration
    3
    Difficult Configuration
    3
    Slow Internet
    3
    Unreliable Connectivity
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Zscaler Private Access features and usability ratings that predict user satisfaction
    8.9
    Quality of Support
    Average: 8.8
    8.9
    Ease of Use
    Average: 8.9
    8.9
    Ease of Admin
    Average: 8.9
    9.2
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Zscaler
    Company Website
    Year Founded
    2008
    HQ Location
    San Jose, California
    Twitter
    @zscaler
    16,372 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,427 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Zscaler Private Access™ (ZPA) gives users the fastest, most secure access to private apps and OT devices while enabling zero trust connectivity for workloads. As the world’s most deployed zero trust

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 45% Enterprise
  • 25% Mid-Market
Zscaler Private Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
18
Secure Access
15
Ease of Use
8
Easy Access
7
Reliability
6
Cons
Connection Issues
4
Complex Administration
3
Difficult Configuration
3
Slow Internet
3
Unreliable Connectivity
3
Zscaler Private Access features and usability ratings that predict user satisfaction
8.9
Quality of Support
Average: 8.8
8.9
Ease of Use
Average: 8.9
8.9
Ease of Admin
Average: 8.9
9.2
Application Security
Average: 8.9
Seller Details
Seller
Zscaler
Company Website
Year Founded
2008
HQ Location
San Jose, California
Twitter
@zscaler
16,372 Twitter followers
LinkedIn® Page
www.linkedin.com
8,427 employees on LinkedIn®
(67)4.7 out of 5
Optimized for quick response
9th Easiest To Use in Zero Trust Networking software
Save to My Lists
Entry Level Price:Starting at $5.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Twingate is a secure remote access solution for an organization’s private applications, data, and environments, whether they are on-premise or in the cloud. Built to make the lives of DevOps teams, IT

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 49% Mid-Market
    • 45% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Twingate is a software that publishes specific resources to specific users, proxying services by name directly to the site of the resource without having to consider IP routing or address conflicts.
    • Users frequently mention the ease of setup, low cost, secure access, multiple login options, and the ability to monitor and control user access as key benefits of Twingate.
    • Reviewers mentioned issues such as the lack of an official package in the Arch repository for Arch Linux users, the tedious onboarding process due to the lack of bulk creation of resources and bulk editing, and the frequent requirement for authentication as drawbacks.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Twingate Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    9
    Easy Setup
    7
    Setup Ease
    7
    Security
    6
    Access Management
    5
    Cons
    Performance Issues
    9
    Limited Customization
    5
    Lacking Features
    4
    Lack of Features
    4
    Logging Issues
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Twingate features and usability ratings that predict user satisfaction
    9.3
    Quality of Support
    Average: 8.8
    9.8
    Ease of Use
    Average: 8.9
    9.3
    Ease of Admin
    Average: 8.9
    8.9
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    HQ Location
    Redwood City, California
    Twitter
    @TwingateHQ
    2,262 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    76 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Twingate is a secure remote access solution for an organization’s private applications, data, and environments, whether they are on-premise or in the cloud. Built to make the lives of DevOps teams, IT

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 49% Mid-Market
  • 45% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Twingate is a software that publishes specific resources to specific users, proxying services by name directly to the site of the resource without having to consider IP routing or address conflicts.
  • Users frequently mention the ease of setup, low cost, secure access, multiple login options, and the ability to monitor and control user access as key benefits of Twingate.
  • Reviewers mentioned issues such as the lack of an official package in the Arch repository for Arch Linux users, the tedious onboarding process due to the lack of bulk creation of resources and bulk editing, and the frequent requirement for authentication as drawbacks.
Twingate Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
9
Easy Setup
7
Setup Ease
7
Security
6
Access Management
5
Cons
Performance Issues
9
Limited Customization
5
Lacking Features
4
Lack of Features
4
Logging Issues
4
Twingate features and usability ratings that predict user satisfaction
9.3
Quality of Support
Average: 8.8
9.8
Ease of Use
Average: 8.9
9.3
Ease of Admin
Average: 8.9
8.9
Application Security
Average: 8.9
Seller Details
Company Website
HQ Location
Redwood City, California
Twitter
@TwingateHQ
2,262 Twitter followers
LinkedIn® Page
www.linkedin.com
76 employees on LinkedIn®
By Okta
(886)4.5 out of 5
3rd Easiest To Use in Zero Trust Networking software
View top Consulting Services for Okta
Save to My Lists
Entry Level Price:$2 / user, per month
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Okta is The World’s Identity Company™. As the leading independent Identity partner, we free everyone to safely use any technology — anywhere, on any device or app. The most trusted brands trust Okta t

    Users
    • Software Engineer
    • Account Executive
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 53% Mid-Market
    • 41% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Okta Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    106
    Security
    62
    Easy Access
    51
    Authentication
    49
    Single Sign-On
    42
    Cons
    Authentication Issues
    39
    Frequent Authentication
    23
    Login Issues
    22
    Password Issues
    13
    Complex Setup
    9
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Okta features and usability ratings that predict user satisfaction
    8.8
    Quality of Support
    Average: 8.8
    9.2
    Ease of Use
    Average: 8.9
    9.0
    Ease of Admin
    Average: 8.9
    9.2
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Okta
    Company Website
    Year Founded
    2009
    HQ Location
    San Francisco, California
    Twitter
    @okta
    42,267 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,122 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Okta is The World’s Identity Company™. As the leading independent Identity partner, we free everyone to safely use any technology — anywhere, on any device or app. The most trusted brands trust Okta t

Users
  • Software Engineer
  • Account Executive
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 53% Mid-Market
  • 41% Enterprise
Okta Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
106
Security
62
Easy Access
51
Authentication
49
Single Sign-On
42
Cons
Authentication Issues
39
Frequent Authentication
23
Login Issues
22
Password Issues
13
Complex Setup
9
Okta features and usability ratings that predict user satisfaction
8.8
Quality of Support
Average: 8.8
9.2
Ease of Use
Average: 8.9
9.0
Ease of Admin
Average: 8.9
9.2
Application Security
Average: 8.9
Seller Details
Seller
Okta
Company Website
Year Founded
2009
HQ Location
San Francisco, California
Twitter
@okta
42,267 Twitter followers
LinkedIn® Page
www.linkedin.com
8,122 employees on LinkedIn®
(394)4.5 out of 5
Optimized for quick response
5th Easiest To Use in Zero Trust Networking software
View top Consulting Services for Cisco Duo
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cisco Duo is a cloud-based access management platform that secures access to all applications, for any user and device, from anywhere. It’s designed to be easy to use and deploy while providing identi

    Users
    • Consultant
    • Software Engineer
    Industries
    • Information Technology and Services
    • Higher Education
    Market Segment
    • 44% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cisco Duo Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    90
    Authentication Ease
    60
    Security
    60
    Authentication
    53
    Easy Access
    45
    Cons
    Authentication Issues
    32
    Access Limitations
    24
    Login Issues
    21
    Notification Issues
    15
    Poor Notifications
    12
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco Duo features and usability ratings that predict user satisfaction
    8.8
    Quality of Support
    Average: 8.8
    9.3
    Ease of Use
    Average: 8.9
    9.2
    Ease of Admin
    Average: 8.9
    9.0
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Company Website
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    733,769 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    97,323 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cisco Duo is a cloud-based access management platform that secures access to all applications, for any user and device, from anywhere. It’s designed to be easy to use and deploy while providing identi

Users
  • Consultant
  • Software Engineer
Industries
  • Information Technology and Services
  • Higher Education
Market Segment
  • 44% Enterprise
  • 38% Mid-Market
Cisco Duo Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
90
Authentication Ease
60
Security
60
Authentication
53
Easy Access
45
Cons
Authentication Issues
32
Access Limitations
24
Login Issues
21
Notification Issues
15
Poor Notifications
12
Cisco Duo features and usability ratings that predict user satisfaction
8.8
Quality of Support
Average: 8.8
9.3
Ease of Use
Average: 8.9
9.2
Ease of Admin
Average: 8.9
9.0
Application Security
Average: 8.9
Seller Details
Seller
Cisco
Company Website
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
733,769 Twitter followers
LinkedIn® Page
www.linkedin.com
97,323 employees on LinkedIn®
(213)4.7 out of 5
Optimized for quick response
4th Easiest To Use in Zero Trust Networking software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Absolute Secure Access (formerly NetMotion by Absolute) is one of the company’s core product lines, which was added through the acquisition of NetMotion in July 2021. The product portfolio provides re

    Users
    • IT Director
    • System Administrator
    Industries
    • Law Enforcement
    • Government Administration
    Market Segment
    • 62% Mid-Market
    • 26% Enterprise
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Absolute Secure Access is a VPN service that provides protection when connecting to public wifi, offering features such as unlimited bandwidth, easy setup, and real-time location of devices.
    • Reviewers appreciate the user-friendly interface, seamless connectivity, robust security, and efficient customer support, highlighting the product's reliability and ease of use.
    • Reviewers mentioned issues with software compatibility, difficulty in finding documentation, limitations on device deployment, and the need for constant updates and rule building.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Absolute Secure Access Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    28
    Reliability
    18
    Customer Support
    13
    Secure Access
    13
    Easy Installation
    10
    Cons
    Connection Issues
    8
    Access Issues
    7
    Expensive
    6
    Limited Customization
    5
    Expensive Licensing
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Absolute Secure Access features and usability ratings that predict user satisfaction
    9.3
    Quality of Support
    Average: 8.8
    9.1
    Ease of Use
    Average: 8.9
    8.7
    Ease of Admin
    Average: 8.9
    9.0
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1993
    HQ Location
    British Columbia, Canada
    Twitter
    @absolutecorp
    3,991 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,078 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Absolute Secure Access (formerly NetMotion by Absolute) is one of the company’s core product lines, which was added through the acquisition of NetMotion in July 2021. The product portfolio provides re

Users
  • IT Director
  • System Administrator
Industries
  • Law Enforcement
  • Government Administration
Market Segment
  • 62% Mid-Market
  • 26% Enterprise
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Absolute Secure Access is a VPN service that provides protection when connecting to public wifi, offering features such as unlimited bandwidth, easy setup, and real-time location of devices.
  • Reviewers appreciate the user-friendly interface, seamless connectivity, robust security, and efficient customer support, highlighting the product's reliability and ease of use.
  • Reviewers mentioned issues with software compatibility, difficulty in finding documentation, limitations on device deployment, and the need for constant updates and rule building.
Absolute Secure Access Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
28
Reliability
18
Customer Support
13
Secure Access
13
Easy Installation
10
Cons
Connection Issues
8
Access Issues
7
Expensive
6
Limited Customization
5
Expensive Licensing
4
Absolute Secure Access features and usability ratings that predict user satisfaction
9.3
Quality of Support
Average: 8.8
9.1
Ease of Use
Average: 8.9
8.7
Ease of Admin
Average: 8.9
9.0
Application Security
Average: 8.9
Seller Details
Company Website
Year Founded
1993
HQ Location
British Columbia, Canada
Twitter
@absolutecorp
3,991 Twitter followers
LinkedIn® Page
www.linkedin.com
1,078 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Check Point Harmony SASE is a converged networking and network security platform which connects all users, in the office or remote, to all resources, located on-prem, cloud, SaaS or web. It delivers s

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 52% Mid-Market
    • 35% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point Harmony SASE Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    16
    Reliability
    9
    User Interface
    8
    Ease of Connectivity
    6
    Intuitive
    5
    Cons
    Poor Support Services
    6
    Connection Issues
    5
    Poor Customer Support
    5
    Connectivity Issues
    4
    Expensive
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point Harmony SASE features and usability ratings that predict user satisfaction
    9.1
    Quality of Support
    Average: 8.8
    9.4
    Ease of Use
    Average: 8.9
    9.3
    Ease of Admin
    Average: 8.9
    6.9
    Application Security
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,158 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,920 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

Check Point Harmony SASE is a converged networking and network security platform which connects all users, in the office or remote, to all resources, located on-prem, cloud, SaaS or web. It delivers s

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 52% Mid-Market
  • 35% Small-Business
Check Point Harmony SASE Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
16
Reliability
9
User Interface
8
Ease of Connectivity
6
Intuitive
5
Cons
Poor Support Services
6
Connection Issues
5
Poor Customer Support
5
Connectivity Issues
4
Expensive
4
Check Point Harmony SASE features and usability ratings that predict user satisfaction
9.1
Quality of Support
Average: 8.8
9.4
Ease of Use
Average: 8.9
9.3
Ease of Admin
Average: 8.9
6.9
Application Security
Average: 8.9
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,158 Twitter followers
LinkedIn® Page
www.linkedin.com
7,920 employees on LinkedIn®
Ownership
NASDAQ:CHKP