Top Rated ExtremeControl Alternatives
(71)
4.4 out of 5
Visit Website
Sponsored
1 ExtremeControl Reviews
4.5 out of 5
The next elements are filters and will change the displayed results once they are selected.
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
G2 reviews are authentic and verified.
Here's how.
We strive to keep our reviews authentic.
G2 reviews are an important part of the buying process, and we understand the value they provide to both our customers and buyers. To ensure the value is retained, it's important to make certain that reviews are authentic and trustworthy, which is why G2 requires verified methods to write a review and validates the reviewer's identity before approving. G2 validates the reviewers identity with our moderation process that prevents inauthentic reviews, and we strive to collect reviews in a responsible and ethical manner.
UI
Verified User in Information Technology and Services
Mid-Market(51-1000 emp.)
What do you like best about ExtremeControl?
Granularity and visibility of devices is in depth & it also helps enable onboarding of IoT devices Review collected by and hosted on G2.com.
What do you dislike about ExtremeControl?
It's a good good solution & I have not came across any setbacks yet. Review collected by and hosted on G2.com.
There are not enough reviews of ExtremeControl for G2 to provide buying insight. Below are some alternatives with more reviews:
1
Coro Cybersecurity
4.7
(205)
Monitors your cloud applications for data leaks, cyber-threats and regulatory violations that put your business at risk.
2
NordLayer
4.3
(117)
A stress-free way to secure your network.
3
Genea Security
4.3
(85)
Genea Security's cloud-based access control system is designed for the convenience and security of both tenants and building management teams.
4
Citrix Gateway
4.0
(71)
Citrix Gateway is a customer-managed solution that can be deployed on premises or on any public cloud, such as AWS, Azure, or Google Cloud Platform.
5
Portnox
4.4
(71)
Portnox is a solution for on-premise network access control, visibility and enforcement in real-time on all devices.
6
SecureW2 JoinNow
4.7
(68)
The full JoinNow Suite contains everything you need to transition to secure passwordless authentication. It includes an intuitive managed PKI for certificate creation and management, as well as best-in-class certificate delivery solutions such as a dissolvable self-service configuration client for unmanaged devices and automatic enrollment gateways for managed devices. The platform also offers a Cloud RADIUS server, designed from the ground up for passwordless security and works seamlessly with Cloud Identity Providers.
7

McAfee NAC
4.3
(67)
McAfee's network security offerings help you block malware and advanced targeted attacks on your network. Unlike traditional network security solutions, McAfee extends protection beyond IPS signature matching with layered signature-less technologies that defend against never-before-seen threats.
8
Twingate
4.7
(67)
Twingate secures remote access to private apps, data and environments, allowing businesses to replace corporate VPNs with a more secure, usable, performant and modern zero trust-based solution.
9

Google Cloud Identity-Aware Proxy
4.4
(56)
Cloud Identity-Aware Proxy (Cloud IAP) controls access to user cloud applications running on Google Cloud Platform.
10

Cisco Identity Services Engine (ISE)
4.5
(48)
Gain awareness of everything hitting your network. Provide access consistently and efficiently. Relieve the stress of complex access management.