Save to My Lists
Claimed
Claimed

Top Rated Bowtie Alternatives

Bowtie Reviews & Product Details

Bowtie Overview

What is Bowtie?

Bowtie defends the systems, applications, and workforce of leading enterprises. Instead of adding yet another tool that companies must build around, Bowtie integrates effortlessly into any network environment and unifies policy. This allows organizations to treat every user as if they’re working securely from a coffee shop — no matter where they actually work, with one global policy.

Bowtie Details
Discussions
Bowtie Community
Show LessShow More
Product Description

Bowtie offers secure private and public resource access via a "Decentralized SaaS" model - own your keys, data, and infrastructure. Operates like SaaS but provides a superior user experience, greater privacy, attack surface reduction, and cost efficiencies.


Seller Details
Seller
Bowtie
Year Founded
2022
HQ Location
Santa Clara, US
LinkedIn® Page
www.linkedin.com
13 employees on LinkedIn®

Justin F.
JF
Overview Provided by:
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

Bowtie Media

Bowtie Demo -
Answer a few questions to help the Bowtie community
Have you used Bowtie before?
Yes
G2 reviews are authentic and verified.

There are not enough reviews of Bowtie for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Okta Logo
Okta
4.5
(891)
Okta is The World’s Identity Company™. As the leading independent Identity partner, we free everyone to safely use any technology — anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.
2
BetterCloud Logo
BetterCloud
4.4
(457)
BetterCloud provides critical insights, automated management, and intelligent data security for cloud office platforms.
3
Cisco Duo Logo
Cisco Duo
4.5
(394)
Duo is a cloud-based access security platform built to protect access to any application, from any device. Duo’s passwordless authentication, single sign-on (SSO) and user-friendly multi-factor authentication make secure logins easy for users, reducing friction to their workflow.
4
Prisma SASE Logo
Prisma SASE
4.4
(327)
Palo Alto has built their SASE solution around the product Prisma Access which secures the edge, provides firewall as a service, zero trust networking, and cloud application access. Still, the seller provides complimentary software products specified to component functionalities harbored within the Prisma Platform.
5
FortiSASE Solution Logo
FortiSASE Solution
4.6
(317)
FortiSASE Solution combines the functionality of numerous Fortinet products that are available as a singluar product or as a modular solution. FortiSASE's core features include firewall as a service, intrusion prevention, secure web access, and zero-trust networking.
6
Symantec SASE Framework Logo
Symantec SASE Framework
4.3
(258)
Symantec's SASE Framework combines a variety of technologies to improve network performance and modernize security management. It can be used to securely access content, applications and data-center services. Core capabilities of the platform include secure internet and network access, data loss prevention, and cloud application access.
7
Zscaler Cloud Security Platform Logo
Zscaler Cloud Security Platform
4.4
(243)
The Zscaler Cloud Security Platform utilzes Zscaler Secure Access Service Edge (SASE) atop their flagship offerings to provide a single pane of glass visability and control across Zscaler Private Access and Zscaler Internet Access. The SASE solution also utilizes the Zscaler Zero Trust Exchange to enforce least-privileged access via context-based identity and policy enforcement.
8
Absolute Secure Access Logo
Absolute Secure Access
4.7
(213)
Absolute Secure Access delivers modern remote access for highly mobile workforces without sacrificing productivity. It provides reliable network connectivity for users to securely access critical resources in the public cloud, private data centers, or on-premises -- even in challenging environments. It is the only solution that proactively optimizes and improves the employee experience while offering deep visibility, control, and analytics to IT administrators.
9
FortiClient Logo
FortiClient
4.4
(204)
FortiClient Fabric Agent integrates endpoints into the Security Fabric and provides endpoint telemetry, including user identity, protection status, risk scores, unpatched vulnerabilities, security events, and more.
10
Forcepoint SASE Platform Logo
Forcepoint SASE Platform
4.2
(195)
Forcrepoint''s SASE security offering combines secure netwokring with their application security solutions. The platform is powered by cloud access and zero-trust functionality. Data-centric security features help enforce policies across physical locations. Additional features include risk-based threat intelligence, virtual firewalls, and network access through unified software-defined agent.
Show More