Best Software for 2025 is now live!
By DH2i
Save to My Lists
Claimed
Claimed

Top Rated DxOdyssey Alternatives

DxOdyssey Reviews & Product Details

Shantanu S.
SS
Java Tech Lead
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about DxOdyssey?

DxOdyssey helps us create a high availablity application level micro tunnels, a mixture of platforms and locations. It also gives us much more security and more in a private manner. Review collected by and hosted on G2.com.

What do you dislike about DxOdyssey?

It provides a different approach that is different from other VPNs. That means the security and infra level one needs to learn beforehand. Also, securing the tunnels/pipes is a big headache. Review collected by and hosted on G2.com.

What problems is DxOdyssey solving and how is that benefiting you?

DxOdyssey software integrates easily into the existing network infrastructure, and thus we can overcome the complex challenge of configuring the VPNs by ourselves. Review collected by and hosted on G2.com.

DxOdyssey Overview

What is DxOdyssey?

DxOdyssey is a Software-Defined Perimeter (SDP) network security solution built on patented technology that is a critical component to achieving a Zero Trust architecture. DxOdyssey enables highly available application-specific micro-tunnels across any mix of locations and platforms. Users access their tunnels via a local port, making the device and the resource invisible to the network. With no open ports and application-level access rather than network-level access, the lateral attack surface is nearly eliminated to protect businesses and data from malicious intruders. This dynamic software solution is extremely lightweight and can be installed and configured on any Windows or Linux machine in just seconds. DxOdyssey extends SDP capabilities to edge computing with DxOdyssey for IoT, enabling secure, private bi-directional communication between edge devices, the cloud, and on-premises or remote sites – all without VPNs, SD-WANs, or open ports. DxOdyssey unlocks these key benefits: ✔️ Enable secure, private access between edge devices, the datacenter, and cloud ✔️ Eliminate any network attack surface without complexities of VPNs, SD-WANs, or open ports ✔️ Create a Zero Trust network architecture while achieving the highest ROI ✔️ Achieve complete data privacy with its intelligent matchmaking service ✔️ Built-in failover and easy 3rd party integrations ✔️ Up to a 40% increase in network throughput from traditional methods DH2i is a software provider with over 10 years of experience, helping customers around the world enhance their network security capabilities with DxOdyssey.

DxOdyssey Details
Show LessShow More
Product Description

DxOdyssey is lightweight software that enables you to create highly available application-level micro-tunnels across any mix of locations and platforms.


Seller Details
Seller
DH2i
Year Founded
2010
HQ Location
Fort Collins, CO
Twitter
@DH2i
1,329 Twitter followers
LinkedIn® Page
www.linkedin.com
10 employees on LinkedIn®

Dayna R.
DR
Overview Provided by:
Marketing Specialist at DH2i

Recent DxOdyssey Reviews

Shantanu S.
SS
Shantanu S.Mid-Market (51-1000 emp.)
4.5 out of 5
"review of a lightweight software, yes you read that right lightweight software not process"
DxOdyssey helps us create a high availablity application level micro tunnels, a mixture of platforms and locations. It also gives us much more secu...
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

DxOdyssey Media

DxOdyssey Demo - DxOdyssey Architecture
This diagram depicts how DxOdyssey works using advanced technology.
DxOdyssey Demo - Screenshot of DxOdyssey's Management Console
This is where you would manage your gateways, tunnels, clients, and more.
DxOdyssey Demo - Screenshot of DxOdyssey's Management Console with IoT Use Case
This is an example of how a user would manage their tunnels. In this case, the user is creating a tunnel to connect an IoT Edge Device to and IoT Hub.
Answer a few questions to help the DxOdyssey community
Have you used DxOdyssey before?
Yes
G2 reviews are authentic and verified.

There are not enough reviews of DxOdyssey for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Okta Logo
Okta
4.5
(886)
Okta is The World’s Identity Company™. As the leading independent Identity partner, we free everyone to safely use any technology — anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.
2
BetterCloud Logo
BetterCloud
4.4
(457)
BetterCloud provides critical insights, automated management, and intelligent data security for cloud office platforms.
3
Cisco Duo Logo
Cisco Duo
4.5
(394)
Duo is a cloud-based access security platform built to protect access to any application, from any device. Duo’s passwordless authentication, single sign-on (SSO) and user-friendly multi-factor authentication make secure logins easy for users, reducing friction to their workflow.
4
Absolute Secure Access Logo
Absolute Secure Access
4.7
(213)
Absolute Secure Access delivers modern remote access for highly mobile workforces without sacrificing productivity. It provides reliable network connectivity for users to securely access critical resources in the public cloud, private data centers, or on-premises -- even in challenging environments. It is the only solution that proactively optimizes and improves the employee experience while offering deep visibility, control, and analytics to IT administrators.
5
FortiClient Logo
FortiClient
4.4
(204)
FortiClient Fabric Agent integrates endpoints into the Security Fabric and provides endpoint telemetry, including user identity, protection status, risk scores, unpatched vulnerabilities, security events, and more.
6
Trend Vision One Logo
Trend Vision One
4.7
(187)
Trend Micro Vision One (XDR) collects and correlates deep activity data across multiple vectors - email, endpoints, servers, cloud workloads, and networks - enabling a level of detection and investigation that is difficult or impossible to achieve with SIEM or individual point solutions.
7
GoodAccess Logo
GoodAccess
4.7
(148)
Secure your online business systems against hackers. Control access to your online business systems easily. Let your team work from home office and remote locations. Securely!
8
ManageEngine OpManager Logo
ManageEngine OpManager
4.5
(124)
Try network performance monitoring & data center infrastructure management software from ManageEngine OpManager.
9
Check Point CloudGuard Network Security Logo
Check Point CloudGuard Network Security
4.5
(122)
Check Point CloudGuard Network Security for private and public cloud platforms is designed to protect assets in the cloud against the most sophisticated threats.
10
NordLayer Logo
NordLayer
4.3
(117)
A stress-free way to secure your network.
Show More