ConcealBrowse

By Conceal

Re-claim Profile

Unlock access to ConcealBrowse profile for Free

Your G2 page is often the first place buyers evaluate you. Take control of how your brand shows up

WHAT YOU UNLOCK

Control your profile

Update logo, screenshots, pricing info

Engage with customers

Respond to reviews, build trust with prospects

See buyer activity

Track who’s viewing, understand engagement

Collect reviews

Create landing page and collect reviews

Sellers who actively manage their G2 profile build more trust and convert more buyers

5.0 out of 5 stars
4 star
0%
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with ConcealBrowse?

It's been two months since this profile received a new review
Leave a Review
Compare this with other toolsSave it to your board and evaluate your options side by side.
Save to board

ConcealBrowse Reviews & Product Details

ConcealBrowse Media

ConcealBrowse Demo - ConcealBrowse Secure Browser Extension
ConcealBrowse elevates web security to new heights, harnessing the power of advanced AI to seamlessly detect, thwart, and shield users from the constantly evolving spectrum of web-based threats.
Product Avatar Image

Have you used ConcealBrowse before?

Answer a few questions to help the ConcealBrowse community

ConcealBrowse Reviews (1)

Reviews

ConcealBrowse Reviews (1)

5.0
1 reviews
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Andre F.
AF
Industrial Cyber Security Specialist
Mid-Market (51-1000 emp.)
"Protecting the space between the EDR and the Web filter Gateway."
What do you like best about ConcealBrowse?

Conceal comes in at a very attractive cost per user per year bracket. IT totally compliments existing EDR and Web content filter technologies and sandboxes/isolates threats that are not seen by signature-based filters or End Point Detection scans. It is super easy to deploy, it is a browser-based plugin that can be installed by MSI or pushed by group policy. The dashboard is easy to use and it does not overcomplicate operations. Conceal is also very well positioned to work in areas of the network where normal Cybersecurity policies do not apply, like MES workstations or Historians in the OT network. Threat intel from Conceal can be shared to your flavour of SIEM and Conceal also allows threat intel import from major sources. Review collected by and hosted on G2.com.

What do you dislike about ConcealBrowse?

There are no apparent downsides, I would like to see deeper asset visibility for endpoints that are protected. Review collected by and hosted on G2.com.

There are not enough reviews of ConcealBrowse for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Mimecast Advanced Email Security Logo
Mimecast Advanced Email Security
4.4
(317)
Mimecast Email Security with Targeted Threat Protection solution that offers comprehensive, multi-layered email security and content controls.
2
Symantec Web Security Service Logo
Symantec Web Security Service
4.4
(120)
Symantec Web Security is a cloud based software that helps protect organization from compromised websites and malicious downloads and allows user to control, monitor and enforce Acceptable Use Policies for organizations users, whether on-premises or away from the office.
3
Authentic8 Silo for Research Logo
Authentic8 Silo for Research
4.6
(109)
The Silo Web Isolation Platform — a secure, cloud-native execution environment for all web-based activity — underpins two core products: Silo for Safe Access and Silo for Research. Silo for Safe Access is an isolated workspace that allows IT to manage use of the web regardless of the access details or the role of the user. The end user receives a familiar browsing environment via benign video display. Silo for Research leverages the same browsing experience, IT control and security but adds a powerhouse of capabilities and automated features purpose-built for online investigators. The solution gives them the control to manage how their digital fingerprint appears to visited websites during the course of investigations — whether they be for law enforcement, trust and safety, cybersecurity intelligence or other purposes. This way, investigators can blend in with the crowd and not give away their identity of intent to investigative targets, which could cause them to disinform, go into hiding or retaliate against the investigator or their organization.
4
Cloudflare One (SASE) Logo
Cloudflare One (SASE)
4.6
(103)
Cloudflare Area 1 Security identifies and prevents advanced socially engineered attacks before they impact your enterprise.
5
BitBrowser Logo
BitBrowser
4.8
(103)
BitBrowser is an undetectable browser that lets you easily create a unique and stable fingerprint for multiple accounts on any platform.
6
Citrix Secure Private Access Logo
Citrix Secure Private Access
4.5
(54)
Citrix Secure Browser is service protects the corporate network from browser-based attacks by isolating web browsing. It delivers consistent, secure remote access to internet hosted web applications with zero end-point configuration.
7
Menlo Security Logo
Menlo Security
4.6
(51)
The Menlo Security Web Isolation Service protects enterprises from cyber attacks by isolating and executing all web content in the Menlo Security Isolation Platform, away from the endpoint, eliminating malware before it can reach user devices.
8
Kasm Workspaces Logo
Kasm Workspaces
4.7
(47)
Workspaces is a modern, secure and cost-effective solution for remote browser isolation (RBI), containerized application streaming (CAS), virtualized desktop infrastructure (VDI) and desktop as a service (DaaS) that provides a remote desktop and remote work solution for your distributed workforce. The Workspaces platform provides enterprise-class orchestration, data loss prevention, and web streaming technology to enable the delivery of containerized workloads to your browser.
9
Prisma Browser Logo
Prisma Browser
4.3
(46)
Talon provides the first enterprise browser that was designed to secure and enable hybrid work, while reducing complexity and cost. Talon's secure and isolated workspace enables today’s employees, who use the browser more than any other business application, to work from anywhere and from any device, accessing enterprise resources securely from both corporate and non-corporate devices. Talon provides enhanced security in various work scenarios such as: Remote workers, 3rd party contractors, SaaS and on-prem web-based applications, work from non-corporate devices and more. Talon was founded by Ofer Ben-Noon and Ohad Bobrov, who are proven entrepreneurs and former officers of Unit 8200, Israel’s elite intelligence technology unit.
10
iboss Logo
iboss
4.0
(16)
Replace VPN, SWG, SD-WAN, Firewall, CASB, and Browser Isolation with a Consolidated SaaS Network & Security Service.
Show More
People Icons

Start a Discussion about ConcealBrowse

Have a software question? Get answers from real users and experts.

Start a Discussion
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
ConcealBrowse