# Best Zero Trust Platforms

  *By [Preethica Furtado](https://research.g2.com/insights/author/preethica-furtado)*

   Zero trust is a strategic security concept and framework built on the principle that no implicit trust is granted to entities, assets, user accounts, or digital assets or connections based solely on simple factors. Depending on the policy configuration, these factors include physical or network location, such as local area networks vs. the internet, or asset ownership, like enterprise or personally owned.

Zero trust policies require that all entities, whether in or outside the organization&#39;s network, be authenticated, authorized, and continuously validated for security configuration and posture before gaining or maintaining access to applications and data. It further requires that those entities be placed in isolated and managed segments within an infrastructure and that their access to assets or network enclaves is based on sessions and dependent on policy controls.

Zero trust platforms include broad features like identity and access management (IAM), device security, network security, data security, application security, visibility and analytics, automation and orchestration capabilities, integration and interoperability, and compliance and policy management.

To qualify for inclusion in the Zero Trust Platforms category, a product must:

- Follow the principle of “never trust, always verify&quot; by enabling granular permissions based on user roles, content, and policies
- Enforce identity-based controls with strong authentication, such as single sign-on (SSO) and multi-factor authentication (MFA), before access is granted to workloads
- Continuously evaluate trust by monitoring behaviour in security posture in real time
- Offer zero-trust network access to ensure users can only reach authorized applications or resources





## Category Overview

**Total Products under this Category:** 26


## Trust & Credibility Stats

**Why You Can Trust G2's Software Rankings:**

- 30 Analysts and Data Experts
- 2,600+ Authentic Reviews
- 26+ Products
- Unbiased Rankings

G2's software rankings are built on verified user reviews, rigorous moderation, and a consistent research methodology maintained by a team of analysts and data experts. Each product is measured using the same transparent criteria, with no paid placement or vendor influence. While reviews reflect real user experiences, which can be subjective, they offer valuable insight into how software performs in the hands of professionals. Together, these inputs power the G2 Score, a standardized way to compare tools within every category.


## Best Zero Trust Platforms At A Glance

- **Highest Performer:** [ThreatLocker Platform](https://www.g2.com/products/threatlocker-platform/reviews)
- **Easiest to Use:** [ThreatLocker Platform](https://www.g2.com/products/threatlocker-platform/reviews)
- **Best Free Software:** [ThreatLocker Platform](https://www.g2.com/products/threatlocker-platform/reviews)


---

**Sponsored**

### GoodAccess

GoodAccess is a cybersecurity platform (SASE/SSE) that empowers medium-sized enterprises to easily implement Zero Trust Architecture (ZTA) in their infrastructure, regardless of its complexity or scale. By leveraging a Low-Code/No-Code approach, GoodAccess delivers a hardware-free, rapid deployment solution within hours or days, allowing companies to enhance their security without the need for in-house IT experts. Our platform ensures seamless integration with modern SaaS/cloud applications as well as legacy systems, protecting critical assets for remote and hybrid workforces. GoodAccess serves businesses with 50-5000 employees across diverse industries, particularly those adopting multi-cloud and SaaS environments. What does GoodAccess do? GoodAccess protects the customer’s infrastructure under one zero-trust umbrella, regardless of how complex, heterogeneous, or widespread it is. It is a good fit for companies supporting full-remote or hybrid modes of work using both company-issued and employees’ own devices. The low-code/no-code, cloud-based SASE platform allows medium-sized businesses to create and manage zero trust architecture easily. In today’s cybersecurity landscape, this is an essential part of any medium-sized organization’s security, and a highly effective enabler of regulatory compliance. The GoodAccess platform combines several latest technologies to tackle the most pressing cybersecurity challenges of today. ✅ Remote access and BYOD—Device security enforcement with device inventory and posture checks. ✅ Multi-factor authentication (MFA)---Unified MFA solution for all critical systems, including legacy applications. ✅ Identity-based access control (IAM/FwaaS)---Zero-Trust Architecture enabling control of all access by identity (SSO/SCIM). ✅ Network encryption and segmentation—Segmentation at maximum granularity radically reduces the attack surface. ✅ Full control and visibility—Security logs and reports from across the entire organization with SIEM integration. What makes GoodAccess unique? GoodAccess stands out by its usability-first design. It is an all-SaaS, zero-hardware platform that fits any infrastructure to deliver network-based Zero-Trust Architecture (SDP) without the need for an IT expert on staff. Our key uniquenesses include: ✅ Simplicity—Low-code/no-code/no-hardware platform for medium-sized organizations. ✅ Market-leading deployment time—GoodAccess takes hours to days to deploy. ✅ Infrastructure-agnostic—Deployable over any existing infrastructure. ✅ Easy management—No certified IT experts needed. ✅ Zero Trust on network layer—Allows for simple integration of legacy applications. ✅ Based in the EU—Ideal cybersecurity provider for NIS2 compliance. Interested in giving GoodAccess a shot? Book a Free Demo: https://calendar.goodaccess.com/meetings/eva-hisemova Start your Free Trial: https://app.goodaccess.com/free-trial/



[Visit website](https://www.g2.com/external_clickthroughs/record?secure%5Bad_program%5D=ppc&amp;secure%5Bad_slot%5D=category_product_list&amp;secure%5Bcategory_id%5D=1009559&amp;secure%5Bdisplayable_resource_id%5D=1009559&amp;secure%5Bdisplayable_resource_type%5D=Category&amp;secure%5Bmedium%5D=sponsored&amp;secure%5Bplacement_reason%5D=page_category&amp;secure%5Bplacement_resource_ids%5D%5B%5D=1009559&amp;secure%5Bprioritized%5D=false&amp;secure%5Bproduct_id%5D=130601&amp;secure%5Bresource_id%5D=1009559&amp;secure%5Bresource_type%5D=Category&amp;secure%5Bsource_type%5D=category_page&amp;secure%5Bsource_url%5D=https%3A%2F%2Fwww.g2.com%2Fcategories%2Fzero-trust-platforms%3Fpage%3D2&amp;secure%5Btoken%5D=a30dee5f9e96d16e0ef3a3f39bf6cd164f46664ff1626e1de2c74bf5c5f4a23f&amp;secure%5Burl%5D=https%3A%2F%2Fwww.goodaccess.com%2Flp%2Fenterprise-vpn&amp;secure%5Burl_type%5D=custom_url)

---

## Top-Rated Products (Ranked by G2 Score)
### 1. [Zscaler Internet Access](https://www.g2.com/products/zscaler-internet-access/reviews)
  Zscaler Internet Access™ (ZIA) is the world’s leading cloud-native secure access solution that protects users, devices, and data by securing all internet traffic, regardless of location. Leveraging cloud native, AI-powered cyberthreat protection and zero trust access to the internet and SaaS apps, ZIA ensures fast, direct, and secure connections to the internet and SaaS applications, eliminating the need for traditional on-premises security hardware. With ZIA, you can optimize internet security and user experience while aligning with Zero Trust principles through Zscaler Internet Access. ZIA&#39;s advanced features like Secure Web Gateways, DNS Security, Cloud Access Security Broker (CASB), Data Loss Prevention (DLP), Secure Enterprise Browsing, and Cloud Sandboxing provide comprehensive protection against advanced threats such as malware, ransomware, and phishing while safeguarding sensitive corporate data. It combines robust threat prevention with granular policy enforcement to ensure secure, seamless access for users across remote, branch, or hybrid environments. With ZIA, organizations can embrace cloud transformation while leveraging simplified management, reduced complexity, and consistent security across global teams. Key Features and Benefits: • Prevent cyberthreats and data loss with AI: Protect your organization against advanced threats with a suite of AI-powered cyberthreat and data protection services, enriched by real-time updates sourced from 500 trillion daily threat signals from the world’s largest security cloud. • Get an unmatched user experience: Get the world’s fastest internet and SaaS experience—up to 40% faster than legacy security architectures—to boost productivity and increase business agility. • Reduce costs and complexity: Realize 139% ROI with Zscaler by replacing 90% of your costly, complex, and slow appliances with a fully cloud-native zero trust platform. • Secure your hybrid workforce: Empower employees, customers, and third parties to securely access web apps and cloud services from anywhere, on any device—with a great digital experience. • Unify SecOps and NetOps Efforts: Drive faster, more collaborative security outcomes with shared tooling like real-time traffic insights, API-first integrations, and granular RBAC. • Achieve Total Data and Content Sovereignty: Enforce compliance for secure and localized access without performance tradeoffs using Egress NAT, geolocalized content, and in-country data logging. • Secure AI in Your Environment: Enable the secure use of Microsoft Copilot and other AI applications. • Protect Developer Environments at Scale: Automate SSL/TLS inspection for 30+ developer tools while sandboxing code and unknown or large files with instant AI-verdicts—all without slowing innovation. Zscaler Internet Access is trusted by organizations worldwide to ensure secure, reliable, and fast internet connectivity that supports both modern workflows and digital transformation initiatives.&quot;


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 184


**Seller Details:**

- **Seller:** [Zscaler](https://www.g2.com/sellers/zscaler)
- **Company Website:** https://www.zscaler.com/
- **Year Founded:** 2008
- **HQ Location:** San Jose, California
- **Twitter:** @zscaler (17,513 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/234625/ (9,540 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 48% Enterprise, 28% Mid-Market


#### Pros & Cons

**Pros:**

- Security (48 reviews)
- Internet Security (47 reviews)
- Protection (41 reviews)
- Cloud Services (26 reviews)
- Email Security (26 reviews)

**Cons:**

- Slow Performance (27 reviews)
- Complex Implementation (24 reviews)
- Complex Configuration (22 reviews)
- Connection Issues (22 reviews)
- Internet Connectivity (18 reviews)

### 2. [ThreatLocker Platform](https://www.g2.com/products/threatlocker-platform/reviews)
  ThreatLocker is a global leading Zero Trust Platform designed to empower organizations by providing them with the ability to control which applications are permitted to run on their networks. This suite of security tools is tailored for a wide range of users, including businesses, government agencies, and academic institutions, all of whom face the increasing threat of cybercrime. By enabling users to manage application execution, ThreatLocker aims to create a secure environment where organizations can operate without the looming fear of malware and other cyber threats. The ThreatLocker suite stands out in the cybersecurity landscape due to its focus on application whitelisting, a proactive approach that allows organizations to define and enforce policies on what software can be executed. This feature is particularly beneficial for organizations that require stringent security measures, as it minimizes the risk of unauthorized applications compromising sensitive data. The solution is designed for IT administrators who seek to enhance their network security posture while maintaining operational efficiency. One of the key features of ThreatLocker is its ability to provide real-time visibility and control over application behavior. This allows organizations to monitor application usage and detect any suspicious activities that may indicate a potential threat. Additionally, ThreatLocker offers customizable policies that can be tailored to meet the specific needs of different departments or user groups within an organization, ensuring that security measures align with operational requirements. Another significant benefit of ThreatLocker is its user-friendly interface, which simplifies the management of security policies. This accessibility enables IT teams to implement and adjust security measures without extensive training or expertise in cybersecurity. Furthermore, ThreatLocker is backed by a team of experienced cybersecurity professionals who continuously update and enhance the platform to address emerging threats and vulnerabilities. In essence, ThreatLocker provides organizations with the tools they need to take control of their cybersecurity strategy. By focusing on application control and offering robust monitoring capabilities, ThreatLocker helps organizations mitigate risks associated with cyber threats while fostering a secure environment for their operations. This innovative approach to cybersecurity empowers users to navigate their digital landscape confidently, free from the influence of cybercriminals.


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 471


**Seller Details:**

- **Seller:** [Threatlocker Inc](https://www.g2.com/sellers/threatlocker-inc)
- **Company Website:** https://www.threatlocker.com
- **Year Founded:** 2017
- **HQ Location:** Orlando, Florida, United States
- **Twitter:** @ThreatLocker (2,735 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/65512111/ (686 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** President, CEO
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 54% Small-Business, 33% Mid-Market


#### Pros & Cons

**Pros:**

- Customer Support (92 reviews)
- Threat Detection (87 reviews)
- Ease of Use (75 reviews)
- Security (71 reviews)
- Protection (69 reviews)

**Cons:**

- Learning Curve (44 reviews)
- Difficult Learning Curve (30 reviews)
- Difficult Configuration (16 reviews)
- Difficult Navigation (14 reviews)
- Training Required (13 reviews)

### 3. [FortiClient](https://www.g2.com/products/forticlient/reviews)
  Integrated endpoint protection that provides automated next-generation threat protection, as well as visibility and control of your software and hardware inventory across the entire security fabric. Identify and remediate vulnerable or compromised hosts across your attack surface.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 267


**Seller Details:**

- **Seller:** [Fortinet](https://www.g2.com/sellers/fortinet)
- **Year Founded:** 2000
- **HQ Location:** Sunnyvale, CA
- **Twitter:** @Fortinet (151,464 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/6460/ (16,112 employees on LinkedIn®)
- **Ownership:** NASDAQ: FTNT

**Reviewer Demographics:**
  - **Who Uses This:** Software Engineer
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 58% Mid-Market, 26% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (40 reviews)
- Security (38 reviews)
- VPN Efficiency (31 reviews)
- Connectivity (25 reviews)
- Reliability (24 reviews)

**Cons:**

- Unstable Connection (21 reviews)
- Slow Performance (20 reviews)
- Connection Issues (19 reviews)
- Remote Access Issues (16 reviews)
- Update Issues (13 reviews)

### 4. [Cisco Duo](https://www.g2.com/products/cisco-duo/reviews)
  Duo stops identity-based threats and boosts workforce productivity. Our Continuous Identity Security solution provides the best access management experience across users, devices, and applications while incorporating identity visibility and context from multiple identity sources.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 492


**Seller Details:**

- **Seller:** [Cisco](https://www.g2.com/sellers/cisco)
- **Company Website:** https://www.cisco.com
- **Year Founded:** 1984
- **HQ Location:** San Jose, CA
- **Twitter:** @Cisco (721,388 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/cisco/ (95,742 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Software Engineer, Network Administrator
  - **Top Industries:** Information Technology and Services, Higher Education
  - **Company Size:** 41% Enterprise, 37% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (71 reviews)
- Security (67 reviews)
- Authentication (46 reviews)
- Easy Access (46 reviews)
- Authentication Ease (40 reviews)

**Cons:**

- Authentication Issues (24 reviews)
- Login Issues (16 reviews)
- Complexity (15 reviews)
- Notification Issues (15 reviews)
- Delay Issues (14 reviews)

### 5. [Prisma Access](https://www.g2.com/products/prisma-access/reviews)
  Palo Alto Networks Prisma® Access protects the hybrid workforce with the superior security of ZTNA while providing exceptional user experiences from a simple, unified security product. Purpose-built in the cloud to secure at cloud scale, only Prisma Access protects all application traffic with best-in-class capabilities while securing both access and data to dramatically reduce the risk of a data breach. With a common policy framework and single-pane-of-glass management, Prisma Access secures today’s hybrid workforce without compromising performance, backed by industry-leading SLAs to ensure exceptional user experiences.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 72


**Seller Details:**

- **Seller:** [Palo Alto Networks](https://www.g2.com/sellers/palo-alto-networks)
- **Year Founded:** 2005
- **HQ Location:** Santa Clara, CA
- **Twitter:** @PaloAltoNtwks (128,686 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/30086/ (21,355 employees on LinkedIn®)
- **Ownership:** NYSE: PANW

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 45% Enterprise, 27% Mid-Market


#### Pros & Cons

**Pros:**

- Security (34 reviews)
- Protection (23 reviews)
- Secure Access (22 reviews)
- Internet Security (21 reviews)
- Threat Protection (21 reviews)

**Cons:**

- Complex Setup (20 reviews)
- Complex Implementation (19 reviews)
- Complex Configuration (17 reviews)
- Expensive (15 reviews)
- Difficult Learning Curve (11 reviews)

### 6. [Illumio](https://www.g2.com/products/illumio/reviews)
   Illumio Zero Trust Segmentation is the first platform for breach containment. Visualize all communication between workloads and devices, set granular segmentation policies to control communications, and isolate high-value assets to stop breaches and ransomware from spreading.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 31


**Seller Details:**

- **Seller:** [Illumio](https://www.g2.com/sellers/illumio)
- **Company Website:** https://www.illumio.com/
- **Year Founded:** 2013
- **HQ Location:** Sunnyvale, California
- **Twitter:** @illumio (3,415 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/illumio/ (854 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Computer &amp; Network Security
  - **Company Size:** 44% Enterprise, 38% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (9 reviews)
- Security (5 reviews)
- Centralized Management (3 reviews)
- Implementation Ease (3 reviews)
- Installation Ease (3 reviews)

**Cons:**

- Difficult Learning Curve (2 reviews)
- Integration Issues (2 reviews)
- Compatibility Issues (1 reviews)
- Difficult Learning (1 reviews)
- Expensive (1 reviews)

### 7. [TrendAI Vision One](https://www.g2.com/products/trendai-vision-one/reviews)
  TrendAI Vision One is a cloud-native security operations platform, serving cloud, hybrid, and on-premises environments. It combines ASM and XDR in a single console to effectively manage cyber risk across your organization. The platform provides powerful risk insights, earlier threat detection, and automated risk and threat response options. Utilize the platform’s predictive machine learning and advanced security analytics for a broader perspective and advanced context. TrendAI Vision One integrates with its own expansive protection platform portfolio and industry-leading global threat intelligence, in addition to a broad ecosystem of purpose-built and API-driven third-party integrations.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 227


**Seller Details:**

- **Seller:** [Trend Micro](https://www.g2.com/sellers/trend-micro)
- **Company Website:** https://www.trendmicro.com/
- **Year Founded:** 1988
- **HQ Location:** Tokyo
- **LinkedIn® Page:** https://www.linkedin.com/company/4312/ (8,090 employees on LinkedIn®)
- **Ownership:** OTCMKTS:TMICY

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 51% Enterprise, 34% Mid-Market


#### Pros & Cons

**Pros:**

- Visibility (38 reviews)
- Security (33 reviews)
- Ease of Use (32 reviews)
- Features (31 reviews)
- Threat Detection (27 reviews)

**Cons:**

- Complex Interface (12 reviews)
- Integration Issues (12 reviews)
- Learning Curve (11 reviews)
- Expensive (10 reviews)
- Limited Features (10 reviews)

### 8. [Akamai Enterprise Application Access](https://www.g2.com/products/akamai-akamai-enterprise-application-access/reviews)
  Enterprise Application Access is a unique cloud architecture that closes all inbound firewall ports, while ensuring that only authorized users and devices have access to the internal applications they need, and not the entire network. No one can access applications directly because they are hidden from the Internet and public exposure. Enterprise Application Access integrates data path protection, single sign-on, identity access, application security, and management visibility and control into a single service.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 27


**Seller Details:**

- **Seller:** [Akamai Technologies](https://www.g2.com/sellers/akamai-technologies)
- **Year Founded:** 1998
- **HQ Location:** Cambridge, MA
- **Twitter:** @Akamai (115,399 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/3925/ (10,444 employees on LinkedIn®)
- **Ownership:** NASDAQ:AKAM

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 37% Enterprise, 33% Small-Business


#### Pros & Cons

**Pros:**

- Customer Support (1 reviews)
- Ease of Use (1 reviews)
- Easy Access (1 reviews)
- Features (1 reviews)
- Security (1 reviews)


### 9. [GoodAccess](https://www.g2.com/products/goodaccess/reviews)
  GoodAccess is a cybersecurity platform (SASE/SSE) that empowers medium-sized enterprises to easily implement Zero Trust Architecture (ZTA) in their infrastructure, regardless of its complexity or scale. By leveraging a Low-Code/No-Code approach, GoodAccess delivers a hardware-free, rapid deployment solution within hours or days, allowing companies to enhance their security without the need for in-house IT experts. Our platform ensures seamless integration with modern SaaS/cloud applications as well as legacy systems, protecting critical assets for remote and hybrid workforces. GoodAccess serves businesses with 50-5000 employees across diverse industries, particularly those adopting multi-cloud and SaaS environments. What does GoodAccess do? GoodAccess protects the customer’s infrastructure under one zero-trust umbrella, regardless of how complex, heterogeneous, or widespread it is. It is a good fit for companies supporting full-remote or hybrid modes of work using both company-issued and employees’ own devices. The low-code/no-code, cloud-based SASE platform allows medium-sized businesses to create and manage zero trust architecture easily. In today’s cybersecurity landscape, this is an essential part of any medium-sized organization’s security, and a highly effective enabler of regulatory compliance. The GoodAccess platform combines several latest technologies to tackle the most pressing cybersecurity challenges of today. ✅ Remote access and BYOD—Device security enforcement with device inventory and posture checks. ✅ Multi-factor authentication (MFA)---Unified MFA solution for all critical systems, including legacy applications. ✅ Identity-based access control (IAM/FwaaS)---Zero-Trust Architecture enabling control of all access by identity (SSO/SCIM). ✅ Network encryption and segmentation—Segmentation at maximum granularity radically reduces the attack surface. ✅ Full control and visibility—Security logs and reports from across the entire organization with SIEM integration. What makes GoodAccess unique? GoodAccess stands out by its usability-first design. It is an all-SaaS, zero-hardware platform that fits any infrastructure to deliver network-based Zero-Trust Architecture (SDP) without the need for an IT expert on staff. Our key uniquenesses include: ✅ Simplicity—Low-code/no-code/no-hardware platform for medium-sized organizations. ✅ Market-leading deployment time—GoodAccess takes hours to days to deploy. ✅ Infrastructure-agnostic—Deployable over any existing infrastructure. ✅ Easy management—No certified IT experts needed. ✅ Zero Trust on network layer—Allows for simple integration of legacy applications. ✅ Based in the EU—Ideal cybersecurity provider for NIS2 compliance. Interested in giving GoodAccess a shot? Book a Free Demo: https://calendar.goodaccess.com/meetings/eva-hisemova Start your Free Trial: https://app.goodaccess.com/free-trial/


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 164


**Seller Details:**

- **Seller:** [Goodaccess](https://www.g2.com/sellers/goodaccess)
- **Company Website:** https://www.goodaccess.com/
- **Year Founded:** 2009
- **HQ Location:** Usti nad Labem, Czech Republic, Europe
- **LinkedIn® Page:** https://www.linkedin.com/company/30700911/ (23 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** CTO, CEO
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 76% Small-Business, 24% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (79 reviews)
- VPN Services (47 reviews)
- Reliability (46 reviews)
- Customer Support (41 reviews)
- Easy Setup (34 reviews)

**Cons:**

- Expensive (23 reviews)
- Connection Issues (16 reviews)
- Access Issues (8 reviews)
- Limited Location Options (8 reviews)
- Connectivity Issues (7 reviews)

### 10. [Appgate SDP](https://www.g2.com/products/appgate-sdp/reviews)
  Appgate SDP is a leading Zero Trust Network Access solution that simplifies and strengthens access controls for all users, devices, and workloads. We deliver secure access for complex and hybrid enterprises by thwarting complex threats, reducing costs, and boosting operational efficiency. The full suite of Appgate solutions and services protects more than 650 organizations across the government, fortune 50, and global enterprises.


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 36


**Seller Details:**

- **Seller:** [Appgate](https://www.g2.com/sellers/appgate)
- **Year Founded:** 2020
- **HQ Location:** Coral Gables, US
- **Twitter:** @AppgateSecurity (1,171 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/appgate-security (377 employees on LinkedIn®)
- **Ownership:** OTC: APGT

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 56% Enterprise, 31% Mid-Market


#### Pros & Cons

**Pros:**

- Security (10 reviews)
- Customer Support (7 reviews)
- Ease of Use (6 reviews)
- Network Security (6 reviews)
- Reliability (6 reviews)

**Cons:**

- Performance Issues (6 reviews)
- Complex Setup (4 reviews)
- Connection Issues (2 reviews)
- Connectivity Issues (2 reviews)
- Difficult Configuration (2 reviews)

### 11. [VMware NSX](https://www.g2.com/products/vmware-nsx/reviews)
  VMware NSX® is a powerful network virtualization solution for VMware Cloud Foundation™ (VCF) that enables network connectivity, operations, and scale. NSX Network Virtualization brings the simplicity of the cloud operating model to networking, allowing you to streamline, accelerate, and scale both traditional and modern applications in private/hybrid clouds.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 72


**Seller Details:**

- **Seller:** [Broadcom](https://www.g2.com/sellers/broadcom-ab3091cd-4724-46a8-ac89-219d6bc8e166)
- **Year Founded:** 1991
- **HQ Location:** San Jose, CA
- **Twitter:** @broadcom (63,117 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/broadcom/ (55,707 employees on LinkedIn®)
- **Ownership:** NASDAQ: CA

**Reviewer Demographics:**
  - **Top Industries:** Computer &amp; Network Security, Information Technology and Services
  - **Company Size:** 36% Enterprise, 33% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (8 reviews)
- Features (4 reviews)
- Security (4 reviews)
- Easy Integrations (3 reviews)
- Integrations (3 reviews)

**Cons:**

- Complexity (3 reviews)
- Expensive (3 reviews)
- Pricing Issues (3 reviews)
- Learning Difficulty (2 reviews)
- Small Business Limitations (2 reviews)

### 12. [Zaperon Identity-centric SSE Platform](https://www.g2.com/products/zaperon-identity-centric-sse-platform/reviews)
  Today, enterprises are going through rapid transformation with their workforce becoming hybrid, applications moving to cloud and personal devices being allowed. Organizations expose themselves to cyberattacks while employees use VPN to connect to their corporate network from a remote location. Securing access to enterprise applications is “top-of-mind” for IT/Security admins. Moreover, stealing of employee credentials is a big concern for organizations. Zaperon directly addresses this need by providing a comprehensive security layer for application access and enabling zero trust in organizations. Key Features: 1) Passwordless Access to Applications 2) Seamless Single Sign-on to on-premise and cloud applications 3) Secure Remote Access without the need for VPN 4) Zero Trust Granular Access Control 5) Multi-factor Authentication 6) AI-based Continuous Risk Analysis 7) Monitoring Dashboards 8) Cross-platform Compatibility 9) Directory/LDAP Integration Zaperon Differentiators: 1) Streamline Security, Remove Silos – Zaperon Zero Trust streamlines your security operations by offering ‘all-inclusive’ features of identity &amp; access management, passwordless application access, MFA, device binding, VPN, cloud security, single sign-on and password manager solutions. 2) True Passwordless – Unlike password management/vault solutions, Zaperon doesn’t store passwords. It truly makes application access passwordless with secure proprietary technology. 3) Device Binding – Zaperon establishes trust with user devices to ensure only authorized and secure devices connect to enterprise applications. 4) Secure MFA – Zaperon Verify app doesn’t send codes on SMS or emails that can be phished. It also doesn’t do push notification that may lead to MFA fatigue. 5) Continuous Protection – Zaperon performs continuous user behaviour analysis and anomaly detection on device security health parameters to alert admins in real-time. 6) Comprehensive Monitoring – Zaperon provides real-time application-level visibility to IT/security admins through pre-configured dashboards.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 9


**Seller Details:**

- **Seller:** [Zaperon](https://www.g2.com/sellers/zaperon)
- **Year Founded:** 2021
- **HQ Location:** Delhi, IN
- **LinkedIn® Page:** https://www.linkedin.com/company/securewithzaperon/ (6 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 56% Mid-Market, 44% Small-Business


#### Pros & Cons

**Pros:**

- Security (8 reviews)
- Secure Access (6 reviews)
- Data Security (5 reviews)
- Protection (5 reviews)
- Access Centralization (4 reviews)

**Cons:**

- Complex Configuration (2 reviews)
- Configuration Issues (2 reviews)
- Difficult Learning (2 reviews)
- Difficult Learning Curve (2 reviews)
- Difficult Learning Process (2 reviews)

### 13. [Barracuda CloudGen Access](https://www.g2.com/products/barracuda-cloudgen-access/reviews)
  Barracuda CloudGen Access makes it easy to simplify compliance and secure third-party access to your systems, providing Zero Trust Access to all your apps and data from any device and location. Barracuda CloudGen Access provides employees and partners with access to corporate apps and cloud workloads without creating additional attack surfaces.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 18


**Seller Details:**

- **Seller:** [Barracuda](https://www.g2.com/sellers/barracuda)
- **Year Founded:** 2002
- **HQ Location:** Campbell, CA
- **Twitter:** @Barracuda (15,235 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/barracuda-networks/ (2,229 employees on LinkedIn®)
- **Ownership:** Private

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 53% Mid-Market, 37% Small-Business


#### Pros & Cons

**Pros:**

- Affordable Pricing (2 reviews)
- Deployment Ease (2 reviews)
- Ease of Use (2 reviews)
- Security (2 reviews)
- App Integration (1 reviews)

**Cons:**

- Expensive (2 reviews)
- Complex Configuration (1 reviews)
- Complex Implementation (1 reviews)
- Difficult Learning (1 reviews)
- Difficult Navigation (1 reviews)

### 14. [Cloudflare One (SASE)](https://www.g2.com/products/cloudflare-one-sase/reviews)
  Cloudflare One is a single-vendor secure access service edge (SASE) platform that converges security and networking services into a unified, global connectivity cloud. It replaces legacy, fragmented hardware and first-generation SASE solutions with a composable, programmable architecture. Cloudflare One connects and protects an organization&#39;s workforce, AI agents, and infrastructure. Learn more at https://www.cloudflare.com/sase/ Designed for agility, it enables teams to: - Accelerate safe AI adoption with granular visibility, control, and AI agent governance. - Modernize remote access by replacing clunky VPNs with zero trust access. - Block email phishing attacks with flexible, SASE-native email security. - Protect web traffic for remote users and branch offices with lightweight DNS filtering. - Deploy “coffee shop networking” with a light branch, heavy cloud approach.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 101


**Seller Details:**

- **Seller:** [Cloudflare, Inc.](https://www.g2.com/sellers/cloudflare-inc)
- **Year Founded:** 2009
- **HQ Location:** San Francisco, California
- **Twitter:** @Cloudflare (276,983 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/407222/ (6,898 employees on LinkedIn®)
- **Ownership:** NYSE: NET

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 37% Small-Business, 34% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (8 reviews)
- Protection (7 reviews)
- Reliability (7 reviews)
- Security (7 reviews)
- User Interface (6 reviews)

**Cons:**

- Steep Learning Curve (5 reviews)
- Complexity (4 reviews)
- Difficult Learning (4 reviews)
- Difficult Learning Curve (4 reviews)
- Difficult Setup (4 reviews)

### 15. [Saviynt](https://www.g2.com/products/saviynt-saviynt/reviews)
  Saviynt helps organizations transform their organization with identity security. Our AI-first platform enables enterprises to secure every identity — human, non-human, and AI — within any application and in any environment. With Saviynt, organizations strengthen their identity security posture, streamline operations, and ensure that every user has the right access at the right time. The Saviynt Identity Platform unifies identity governance (IGA), application access, cloud security, and privileged account management into a single, end-to-end platform. And, with our AI-powered recommendation engine, application onboarding, and more, users are empowered to make faster, smarter, data-driven decisions. In turn, organizations enjoy lower risk, complete visibility and governance, reduced total cost of ownership, and much more throughout their entire identity security program.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 77


**Seller Details:**

- **Seller:** [Saviynt](https://www.g2.com/sellers/saviynt)
- **Company Website:** https://www.saviynt.com
- **Year Founded:** 2010
- **HQ Location:** El Segundo, US
- **Twitter:** @saviynt (1,233 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/saviynt (1,579 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Oil &amp; Energy
  - **Company Size:** 80% Enterprise, 5% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (29 reviews)
- Features (23 reviews)
- Easy Setup (13 reviews)
- Customer Support (11 reviews)
- Integrations (11 reviews)

**Cons:**

- Difficult Learning (9 reviews)
- Lack of Features (9 reviews)
- Limited Features (9 reviews)
- Poor Interface Design (9 reviews)
- Complexity (8 reviews)

### 16. [Absolute Secure Access](https://www.g2.com/products/absolute-secure-access/reviews)
  Absolute Secure Access (formerly NetMotion by Absolute) is one of the company’s core product lines, which was added through the acquisition of NetMotion in July 2021. The product portfolio provides resilient network connectivity for users to securely access critical resources in the public cloud, private data centers, and on-premises. These products allow users to transition from traditional VPN to a resilient Zero Trust approach, without impairing productivity or admin controls. Absolute Secure Access encompasses three products: • Absolute VPN provides security and confidentiality for data in motion by means of encryption and access controls. It also offers benefits to the end user, such as making tunnel and network sessions resilient and optimizing streaming video and audio. • Absolute ZTNA provides a software-defined perimeter via Zero Trust Network Access, creating a context-based, logical access boundary around an application or set of applications – wherever they&#39;re hosted. It shields applications from the Internet, making them invisible to unauthorized users. Access policies are enforced at the endpoint, avoiding latency and any data transgression. • Absolute Insights™ for Network offers diagnostic and experience monitoring capabilities across endpoints and network, allowing organizations to proactively monitor, investigate, and remediate end user performance issues quickly and at scale, even on networks that are not company-owned or managed


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 224


**Seller Details:**

- **Seller:** [Absolute Security](https://www.g2.com/sellers/absolute-security)
- **Company Website:** https://www.absolute.com
- **Year Founded:** 1993
- **HQ Location:** British Columbia, Canada
- **Twitter:** @absolutecorp (3,908 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/14388/ (1,248 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** IT Director, System Administrator
  - **Top Industries:** Law Enforcement, Government Administration
  - **Company Size:** 62% Mid-Market, 25% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (10 reviews)
- Connectivity Stability (7 reviews)
- Secure Access (7 reviews)
- VPN Efficiency (7 reviews)
- Security (6 reviews)

**Cons:**

- Access Issues (3 reviews)
- Complex Configuration (3 reviews)
- Complex Implementation (3 reviews)
- Expensive (3 reviews)
- Integration Issues (3 reviews)

### 17. [Forcepoint Data Security Cloud](https://www.g2.com/products/forcepoint-data-security-cloud/reviews)
  Forcepoint Data Security Cloud delivers unified visibility, control, and protection for data across endpoints, web, SaaS, and private applications, powered by Forcepoint’s AI Mesh and Data Security Everywhere architecture. The platform integrates Data Loss Prevention (DLP), Cloud Access Security Broker (CASB), Secure Web Gateway (SWG), and Zero Trust Network Access (ZTNA) capabilities to help organizations prevent breaches, streamline compliance, and safely embrace AI and the cloud. Key capabilities include: • Unified data security across endpoints, web, cloud, and private apps • Distributed enforcement via endpoint, inline proxy, and API connectors • AI-driven data classification and adaptive risk protection • Industry-leading threat and data protection from one console • Seamless user experience with Zero Trust access and continuous monitoring Forcepoint Data Security Cloud simplifies and strengthens your security, delivering the freedom to work securely anywhere.


  **Average Rating:** 4.2/5.0
  **Total Reviews:** 100


**Seller Details:**

- **Seller:** [Forcepoint](https://www.g2.com/sellers/forcepoint)
- **Year Founded:** 1994
- **HQ Location:** Austin, TX
- **Twitter:** @Forcepointsec (65,480 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/forcepoint/ (1,658 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 50% Enterprise, 38% Mid-Market


#### Pros & Cons

**Pros:**

- Features (7 reviews)
- Ease of Use (6 reviews)
- Security (6 reviews)
- Customer Support (5 reviews)
- Monitoring (5 reviews)

**Cons:**

- Complex Configuration (4 reviews)
- Expensive (4 reviews)
- Complexity (3 reviews)
- Complex Setup (3 reviews)
- Difficult Setup (3 reviews)

### 18. [QueryPie](https://www.g2.com/products/querypie/reviews)
  QueryPie is a leading all-in-one access governance platform founded in Silicon Valley, helping teams manage and secure access to databases, servers, Kubernetes, and internal web apps — now with powerful AI agent support. Used by top organizations like Kakao, Shinhan, Toss, MUSINSA, HYBE, and Yanolja, QueryPie is fully compliant with global security standards (ISMS, PCI-DSS, GDPR) and trusted by over 130 enterprises. With the launch of the QueryPie Community Edition — a free, self-hosted version available to anyone for one year — startups and SMEs can now access enterprise-grade infrastructure security to stay compliant and productive without the overhead. 🚀 Now Available: QueryPie Community Edition Deploy unified access control for your infrastructure — completely free up to 5 active users. From SQL masking and SSH auditing to Kubernetes RBAC and web app activity logging, everything is included in our self-hosted Community Edition, with no sales call required. ✅ SQL query-level masking &amp; approval ✅ Command-level SSH session control with live replay ✅ Kubernetes API-level access policies ✅ User behavior recording on web apps ✅ Centralized audit logs &amp; enforcement 📘 Setup guide: https://www.querypie.com/resources/learn/documentation/querypie-install-guide 🤖 New: QueryPie AI Hub is Now Public Build and run LLM-powered agents with MCP (Model Context Protocol) — connect external SaaS tools and your own internal systems, all from a single interface. - Smart Tool Discovery powered by RAG - Edge Tunnel for secure internal tool connection (no firewall changes needed) - Custom MCP Server support (SSE-based) - Optional governance layer to control and audit agent behavior 🎯 Try it today: https://app.querypie.com/login 📺 See how it collaboratively works: Watch the demo at https://youtu.be/GdWEW45rJPA Need a unified layer to manage access and securely scale your AI workflows? QueryPie brings it all together — with enterprise-grade control and developer-ready tools.


  **Average Rating:** 4.0/5.0
  **Total Reviews:** 1


**Seller Details:**

- **Seller:** [QueryPie](https://www.g2.com/sellers/querypie)
- **Year Founded:** 2016
- **HQ Location:** Seoul, KR
- **Twitter:** @querypie (88 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/querypie-01/ (64 employees on LinkedIn®)



#### Pros & Cons

**Pros:**

- Access Control (1 reviews)
- Auditing (1 reviews)
- Automation (1 reviews)
- Centralized Management (1 reviews)
- Cloud Integration (1 reviews)

**Cons:**

- Complexity (1 reviews)
- Complexity Management (1 reviews)
- Complex Usage (1 reviews)
- Difficult Interface (1 reviews)
- Inefficient Workflow (1 reviews)

### 19. [BeyondCorp](https://www.g2.com/products/beyondcorp/reviews)
  BeyondCorp is a Zero Trust security framework modeled by Google that shifts access controls from the perimeter to individual devices and users. The end result allows employees to work securely from any location without the need for a traditional VPN.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 2


**Seller Details:**

- **Seller:** [Google](https://www.g2.com/sellers/google)
- **Year Founded:** 1998
- **HQ Location:** Mountain View, CA
- **Twitter:** @google (31,885,216 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/1441/ (336,169 employees on LinkedIn®)
- **Ownership:** NASDAQ:GOOG

**Reviewer Demographics:**
  - **Company Size:** 100% Small-Business


### 20. [Cisco Hypershield](https://www.g2.com/products/cisco-hypershield/reviews)
  Bringing the power of hyperscaler technology to the enterprise, Cisco Hypershield is a groundbreaking security architecture designed to defend modern, AI-scale data centers.




**Seller Details:**

- **Seller:** [Cisco](https://www.g2.com/sellers/cisco)
- **Year Founded:** 1984
- **HQ Location:** San Jose, CA
- **Twitter:** @Cisco (721,388 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/cisco/ (95,742 employees on LinkedIn®)
- **Ownership:** NASDAQ:CSCO



### 21. [Connectasec ztna for pyme](https://www.g2.com/products/connectasec-ztna-for-pyme/reviews)


**Seller Details:**

- **Seller:** [Connectasec](https://www.g2.com/sellers/connectasec)
- **Year Founded:** 2025
- **HQ Location:** N/A
- **LinkedIn® Page:** https://www.linkedin.com/company/connectasec-ztna/ (1 employees on LinkedIn®)



### 22. [Microsoft Entra Private Access](https://www.g2.com/products/microsoft-entra-private-access/reviews)
  Microsoft Entra Private Access is an identity-centric Zero Trust Network Access (ZTNA solution designed to provide secure and seamless connectivity to private applications and resources, regardless of their location—on-premises or across any cloud. By eliminating the need for traditional VPNs, it enhances security by enforcing least-privilege access and preventing lateral movement within networks. This approach ensures that users can efficiently and securely access the applications they need from any device and any network, aligning with modern security principles. Key Features and Functionality: - Zero Trust Access: Enforces adaptive Conditional Access policies, including multifactor authentication (MFA, location-based security, and least-privilege access, without requiring changes to existing applications or resources. - Seamless User Experience: Provides fast and easy access to private apps through Microsoft&#39;s global private network, enhancing productivity for users working remotely or in hybrid environments. - Broad Protocol Support: Supports secure connectivity across various operating systems and accommodates any port and protocol, including RDP, SSH, SMB, FTP, and other TCP/UDP-based protocols. - Integration with Existing Security Services: Integrates with Microsoft Entra ID Governance and Privileged Identity Management (PIM to secure just-in-time access to sensitive resources for privileged users. - Simplified Deployment: Offers Quick Access policies to facilitate the transition from legacy VPNs, allowing for easy onboarding and network segmentation without extensive configuration. Primary Value and User Solutions: Microsoft Entra Private Access addresses the challenges associated with traditional VPNs by providing a modern, secure, and efficient method for accessing private applications. It reduces operational complexity and costs, enhances security by enforcing strict access controls, and improves user productivity through seamless and fast connectivity. By adopting this solution, organizations can effectively implement Zero Trust principles, ensuring that access to private resources is both secure and user-friendly.




**Seller Details:**

- **Seller:** [Microsoft](https://www.g2.com/sellers/microsoft)
- **Year Founded:** 1975
- **HQ Location:** Redmond, Washington
- **Twitter:** @microsoft (13,105,844 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/microsoft/ (227,697 employees on LinkedIn®)
- **Ownership:** MSFT



### 23. [Netzilo](https://www.g2.com/products/netzilo/reviews)
  Netzilo is an AI Detection and Response (AIDR) platform that secures AI agents, MCP-driven workflows, and autonomous systems. It provides real-time behavior analysis, policy enforcement, and Zero Trust governance to detect, contain, and respond to AI-native threats before they spread across the enterprise.




**Seller Details:**

- **Seller:** [Netzilo](https://www.g2.com/sellers/netzilo)
- **Year Founded:** 2024
- **HQ Location:** San Francisco, US
- **LinkedIn® Page:** https://www.linkedin.com/company/netzilo/ (12 employees on LinkedIn®)



### 24. [SentinelOne Singularity Identity Detection &amp; Response](https://www.g2.com/products/sentinelone-singularity-identity-detection-response/reviews)
  Singularity Identity is an identity threat detection and response (ITDR) solution that protects on-premises and cloud-hosted Active Directory domain controllers and domain-joined endpoints in real time. A component of the Singularity Platform, Singularity Identity detects active attacks against all device types and OSes, and safeguards against unauthorized privilege escalation and lateral movement.


  **Average Rating:** 5.0/5.0
  **Total Reviews:** 2


**Seller Details:**

- **Seller:** [SentinelOne](https://www.g2.com/sellers/sentinelone)
- **Year Founded:** 2013
- **HQ Location:** Mountain View, CA
- **Twitter:** @SentinelOne (57,607 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/2886771/ (3,183 employees on LinkedIn®)
- **Ownership:** NASDAQ: S

**Reviewer Demographics:**
  - **Company Size:** 50% Mid-Market, 50% Small-Business


### 25. [Zscaler OT/IoT Segmentation](https://www.g2.com/products/zscaler-ot-iot-segmentation/reviews)
  Zscaler Zero Trust Device Segmentation is an agentless solution designed to isolate your devices (such as IoT, OT, and endpoint systems) without agents, upgrades, or downtime. By enforcing Zero Trust principles, it minimizes the risks of lateral movement inside branches, factories, and campuses by isolating every endpoint into a secure &quot;network of one.&quot; Additionally, it enables enterprises to deploy a unified and consistent segmentation approach, instead of the sprawl of agent-based microsegmentation, NAC and Firewall ACLs. Key Benefits: • No endpoint agents: Fully segment legacy servers, headless machines, and IoT/IoMT devices that can&#39;t accept agents. • A unified solution: Seamlessly deploy integrated OT/IoT Segmentation, Zero Trust SD-WAN, and Privileged Remote Access (PRA). • Maximum uptime: Deploy quickly and with no hardware upgrades or VLAN readdressing. Extend the life of legacy equipment.




**Seller Details:**

- **Seller:** [Zscaler](https://www.g2.com/sellers/zscaler)
- **Year Founded:** 2008
- **HQ Location:** San Jose, California
- **Twitter:** @zscaler (17,513 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/234625/ (9,540 employees on LinkedIn®)
- **Ownership:** NASDAQ:ZS





## Parent Category

[Zero Trust Software](https://www.g2.com/categories/zero-trust)



## Related Categories

- [Zero Trust Networking Software](https://www.g2.com/categories/zero-trust-networking)
- [Software-Defined Perimeter (SDP) Software](https://www.g2.com/categories/software-defined-perimeter-sdp)




