Best Software for 2025 is now live!
Show rating breakdown
Save to My Lists
Claimed
Claimed

Top Rated Fortanix Alternatives

3 Fortanix Reviews

4.5 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
3 Fortanix Reviews
4.5 out of 5
3 Fortanix Reviews
4.5 out of 5

Fortanix Pros and Cons

How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cons
G2 reviews are authentic and verified.
RR
Head of PR
Small-Business(50 or fewer emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Fortanix?

I found it interesting that Fortanix has a data-centric approach. This flexibility helps to rationalise the management of security operations and some of the principal lifecycle aspects in multi-Cloud and hybrid environments. Review collected by and hosted on G2.com.

What do you dislike about Fortanix?

I require more information on how those keys are being utilized in other applications and in various settings. They do not offer much in terms of granular visibility into the service, which is vital for troubleshooting and identifying possible security threats. Review collected by and hosted on G2.com.

HR
Tax Associate
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Fortanix?

By decoupling encryption keys from equipment, it awards me adaptability in sending safety efforts across various cloud conditions. This has been instrumental in guaranteeing steady information assurance while moving responsibilities to the cloud. Review collected by and hosted on G2.com.

What do you dislike about Fortanix?

The restricted help for specific inheritance gadgets has demonstrated to be a test. A portion of our more established machines are not viable with the Fortanix programming, making security holes in our general foundation. Review collected by and hosted on G2.com.

MM
Systems Administrator
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Fortanix?

Fortanix has separated encryption keys from hardware, it has provided me with something that the traditional key management solutions do not have – flexibility and portability. This has been very useful in facilitating Cloud Migration strategy for our organization. Review collected by and hosted on G2.com.

What do you dislike about Fortanix?

Managing many encryption devices, configuring them and monitoring can be strenuous, and especially in large organizational networks. Review collected by and hosted on G2.com.

There are not enough reviews of Fortanix for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Egnyte Logo
Egnyte
4.4
(1,012)
Egnyte delivers the only modern content platform that is purpose-built for businesses. Egnyte gives IT centralized control and protection over their files, and users fast access to their content, no matter how or where work happens.
2
Sprinto Logo
Sprinto
4.8
(1,246)
Sprinto productizes and automates all compliance requirements that would otherwise require manual effort, documentation, and paperwork, end to end. It integrates with your business systems like GSuite, AWS, Github, Google Cloud, etc., and ensures that these systems are in the state required by SOC2/ISO27001. Sprinto also comes builtin with features like policies, security training, org charts, device monitoring, etc., to help you meet SOC 2/ISO27001 requirements without having to purchase new software for these. All in all, Sprinto takes care of all the compliance roadblocks and speaks the audit language on your behalf, while you focus on increasing revenue.
3
Acronis Cyber Protect Cloud Logo
Acronis Cyber Protect Cloud
4.7
(1,040)
Acronis Cyber Protect Cloud unites backup and next-generation, AI-based anti-malware, antivirus, and endpoint protection management in one solution. Integration and automation provide unmatched ease for service providers — reducing complexity while increasing productivity and decreasing operating costs. Acronis Cyber Protect Cloud is the single service provider solution that combines backup, anti-malware (including anti-virus, anti-ransomware, and anti-cryptojacking) and security and management capabilities such as vulnerability assessments, patch management, URL filtering and more. Now, service providers can eliminate complexity and make security a centerpiece of their offerings while increasing SLAs, decreasing churn, and generating more recurring revenue. Get upgraded security with integrated AI-based defenses that protect clients from modern threats, make smarter use of resources so your team can focus on clients, and earn new recurring revenue and higher margins that strengthen your business. Enriched with next-gen, full-stack anti-malware protection and comprehensive yet simple management tools, built on top of our industry-leading backup and data recovery solution, Acronis Cyber Protect Cloud simplifies onboarding, daily operations, and reporting, and combats advanced attacks with new use cases enabled by integration. Acronis Cyber Protect Cloud makes it easy to deliver the modern cyber protection your clients seek.
4
Druva Data Security Cloud Logo
Druva Data Security Cloud
4.7
(621)
Druva Data Security Cloud provides Enterprise Endpoint Backup and Protection
5
Cisco Duo Logo
Cisco Duo
4.5
(394)
Duo is a cloud-based access security platform built to protect access to any application, from any device. Duo’s passwordless authentication, single sign-on (SSO) and user-friendly multi-factor authentication make secure logins easy for users, reducing friction to their workflow.
6
Redstor Backup and Archiving Logo
Redstor Backup and Archiving
4.6
(376)
Designed for service provision as well as Enterprise environments, Redstor’s disruptive, smart, cloud-native suite of services deliver the new standard in data management and protection. Redstor protects data residing in the broadest range of environments, spanning infrastructure and an ever-widening array of SaaS platforms, through a single multi-tenanted app. Redstor’s data management for infrastructure service protects data on modern and legacy infrastructure, including physical or virtualized servers, desktops and laptops. AI infused throughout Redstor’s app highlights data risks, protects against malware, including preventing the recovery of ransomware, and continuously improves based on community shared insights.
7
Virtru Email Encryption Logo
Virtru Email Encryption
4.4
(327)
Virtru puts you in charge of how your digital information is shared. Combining control, convenience, and simplicity, Virtru makes it easy to keep your private communications private.
8
Coro Cybersecurity Logo
Coro Cybersecurity
4.7
(205)
Monitors your cloud applications for data leaks, cyber-threats and regulatory violations that put your business at risk.
9
Hybrid Cloud Security Logo
Hybrid Cloud Security
4.5
(175)
Hybrid Cloud Security solution, powered by XGen security, delivers a blend of cross-generational threat defense techniques that have been optimized to protect physical, virtual, and cloud workloads.
10
Check Point CloudGuard CNAPP Logo
Check Point CloudGuard CNAPP
4.5
(155)
Check Point CloudGuard CNAPP provides you with more context to drive actionable security and smarter prevention, from code-to-cloud, across the application lifecycle. CloudGuard’s prevention-first approach protects applications and workloads throughout the software development lifecycle, and includes an effective risk management engine, with automated remediation prioritization, to allow users to focus on the security risks that matter.
Show More