Top Rated Google Cloud Identity-Aware Proxy Alternatives
56 Google Cloud Identity-Aware Proxy Reviews
Overall Review Sentiment for Google Cloud Identity-Aware Proxy
Log in to view review sentiment.
I can protect applications and virtual machines, can also be used with files, software, code in the cloud and on-premise.
I can manage everything the way I want Review collected by and hosted on G2.com.
I don't really find many disadvantages, only that they are very similar to their competitions, and also the prices of the cloud for wanting to recover data are high cost Review collected by and hosted on G2.com.

it is easier to get started and we don't have to be worried about managing authentication it is very secure and best for remote access Review collected by and hosted on G2.com.
I am not sure about this but it only works with gcp Review collected by and hosted on G2.com.
Very easy login process and very secure method of obtaining login access. Review collected by and hosted on G2.com.
This may not be easy to use for people who are not familiar with login authentication. Not that is isn't user friendly but may need step by step explanation. Review collected by and hosted on G2.com.
The best thing about this is you can easily control the access for both the cloud and on-premise environments , Working on untrusted networks without a need of VPN. Review collected by and hosted on G2.com.
So Far have not come across any such scenarios where we have faced any major setbacks which can be highlighted Review collected by and hosted on G2.com.
In our organization previously we were using VPN, but now this advance cloud technology of Google is much more easy and scalable to use.
Overall user experience and documentation are pretty good. Review collected by and hosted on G2.com.
As of now i didn't found any pros except that it is bit expensive. Review collected by and hosted on G2.com.

Verifying user identity to determine if a user should be granted access. Being able to use untrusted networks without the use of a VPN. Review collected by and hosted on G2.com.
That it requires HTTPS or self-signed certificates Review collected by and hosted on G2.com.

- The ease of being able to onboard to the app
- The way configuration are handled Review collected by and hosted on G2.com.
- The documentation could have been more customer intuitive with use cases for onboarding Review collected by and hosted on G2.com.

It's very easy to use and good documentation. Sample code base is available in all major languages. Review collected by and hosted on G2.com.
Herirachy is sometimes difficult to understand. Review collected by and hosted on G2.com.

It has done a great job with controlling access to the cloud. Review collected by and hosted on G2.com.
It wasn't easy to understand at first so it took some time to figure out and implement. Review collected by and hosted on G2.com.
The visibility and control it provides to restrict the cloud-hosted application access are excellent. This is much required to mitigate DDOS attacks as well. Review collected by and hosted on G2.com.
As of now, nothing as we reply on Google research wing to periodically review and update the services. Review collected by and hosted on G2.com.