Show rating breakdown
Save to My Lists
Unclaimed
Unclaimed

Top Rated Cisco Zero Trust network Alternatives

Cisco Zero Trust network Reviews & Product Details

Cisco Zero Trust network Overview

What is Cisco Zero Trust network?

Make security pervasive throughout the network, not just at the perimeter. Attackers or malicious insiders will penetrate threat-centric defenses.

Cisco Zero Trust network Details
Show LessShow More
Product Description

Make security pervasive throughout the network, not just at the perimeter. Attackers or malicious insiders will penetrate threat-centric defenses.


Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
733,629 Twitter followers
LinkedIn® Page
www.linkedin.com
97,323 employees on LinkedIn®
Ownership
NASDAQ:CSCO
Phone
847-678-6600
Total Revenue (USD mm)
$49,301
Description

Cisco delivers intent-based networking across the branch, WAN, and cloud. We provide end-to-end security, automation, and analytics with award-winning services and support.

Recent Cisco Zero Trust network Reviews

Verified User
U
Verified UserEnterprise (> 1000 emp.)
4.5 out of 5
"Pillar tool to have secure access and avoid the passage of day-to-day threats."
Zero Trust network is the ideal solution to restrict access to whom we do not want so that our data and information remain highly classified and pr...
Shreyans P.
SP
Shreyans P.Enterprise (> 1000 emp.)
4.5 out of 5
"Cisco Zero Trust Network provides the most secure access and is great against network attacks"
What I love most about Cisco's Zero Trust Network is the ability to provide users with the ability to safely and securely correlate their networks ...
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

Cisco Zero Trust network Media

Answer a few questions to help the Cisco Zero Trust network community
Have you used Cisco Zero Trust network before?
Yes

1 Cisco Zero Trust network Reviews

4.5 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
1 Cisco Zero Trust network Reviews
4.5 out of 5
1 Cisco Zero Trust network Reviews
4.5 out of 5
G2 reviews are authentic and verified.
Shreyans P.
SP
Corporate Development + Venture Practice Lead
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
(Original )Information
What do you like best about Cisco Zero Trust network?

What I love most about Cisco's Zero Trust Network is the ability to provide users with the ability to safely and securely correlate their networks across the organization. The Cisco Zero Trust Approach also provides access control and eliminates trust in the overall network, which leads to seamless security provisions and protocols. This means comprehensive security for the company's numerous devices and users. It can restrict access from non-compliant devices. It relies on the comprehensive monitoring of every attempt to access a network rather than assuming that somebody can trust their devices entirely. All applications and layers of the technology stack should definitely be secured, and Cisco ZTN allows us to issue access on a per-connection basis. This level of specificity is amazing to have in an organization. Review collected by and hosted on G2.com.

What do you dislike about Cisco Zero Trust network?

Cisco Zero Trust Networking can continue to be improved by managing additional use cases, including further unified endpoint management with mobile access. Cisco can also improve its comprehensive network and application monitoring solution integrations to continuously assess and manage risk and trust and ensure that the right security posture is maintained. You can utilize granular user segmentation by using Cisco's Zero Trust Network, which limits universal access to networks, programs, devices and software programs to only the employees who need that specific access. This protocol helps to minimize rirks within the organization. Review collected by and hosted on G2.com.

Recommendations to others considering Cisco Zero Trust network:

The Cisco Zero Trust network is easy to set up and offers robust role-based access control management and the right access to the appropriate resources and connections. Review collected by and hosted on G2.com.

What problems is Cisco Zero Trust network solving and how is that benefiting you?

We use Cisco ZTN to fully protect a company's network, infrastructure, applications, and security in hybrid cloud environments. With the broad coverage of Cisco's ZTN, the organization has very expansive coverage across thousands of global users across our organization. Prior to utilizing Cisco Zero Trust network, we did experience the challenge of blocking attacks originating from inside our network. Cisco ZTN eliminates the unauthorized access to data and services and makes the access control enforcement systems very fine-tuned. Review collected by and hosted on G2.com.

There are not enough reviews of Cisco Zero Trust network for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Okta Logo
Okta
4.5
(891)
Okta is The World’s Identity Company™. As the leading independent Identity partner, we free everyone to safely use any technology — anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.
2
BetterCloud Logo
BetterCloud
4.4
(457)
BetterCloud provides critical insights, automated management, and intelligent data security for cloud office platforms.
3
Absolute Secure Access Logo
Absolute Secure Access
4.7
(213)
Absolute Secure Access delivers modern remote access for highly mobile workforces without sacrificing productivity. It provides reliable network connectivity for users to securely access critical resources in the public cloud, private data centers, or on-premises -- even in challenging environments. It is the only solution that proactively optimizes and improves the employee experience while offering deep visibility, control, and analytics to IT administrators.
4
FortiClient Logo
FortiClient
4.4
(204)
FortiClient Fabric Agent integrates endpoints into the Security Fabric and provides endpoint telemetry, including user identity, protection status, risk scores, unpatched vulnerabilities, security events, and more.
5
Trend Vision One Logo
Trend Vision One
4.7
(187)
Trend Micro Vision One (XDR) collects and correlates deep activity data across multiple vectors - email, endpoints, servers, cloud workloads, and networks - enabling a level of detection and investigation that is difficult or impossible to achieve with SIEM or individual point solutions.
6
GoodAccess Logo
GoodAccess
4.7
(148)
Secure your online business systems against hackers. Control access to your online business systems easily. Let your team work from home office and remote locations. Securely!
7
Check Point Harmony SASE Logo
Check Point Harmony SASE
4.7
(116)
Check Point Harmony SASE is a converged networking and network security platform which connects all users, in the office or remote, to all resources, located on-prem, cloud, SaaS or web. It delivers secure Zerto Trust Network Access (ZTNA) connectivity along web protection capabilities including Internet access control, malware protection, data loss prevention(DLP), and sandboxing, as well as a firewall as a service. The solution employs a hybrid architecture, combining on-device and cloud-based protections, which delivers market leading security and performance.
8
Check Point CloudGuard Network Security Logo
Check Point CloudGuard Network Security
4.5
(122)
Check Point CloudGuard Network Security for private and public cloud platforms is designed to protect assets in the cloud against the most sophisticated threats.
9
NordLayer Logo
NordLayer
4.3
(117)
A stress-free way to secure your network.
10
CyberArk Workforce Identity Logo
CyberArk Workforce Identity
4.4
(107)
Today’s new reality requires a new kind of access platform. Built on Zero Trust, CyberArk Identity is creating a new era -secure access everywhere- that uniquely combines leading capabilities to seamlessly integrate SSO, MFA, EMM and UBA. Using our proven technologies, we’re ushering in a new generation of access technology that not only protects companies, but also leads to happier customers, better products and more valuable organizations.
Show More