Best Software for 2025 is now live!
Show rating breakdown
Save to My Lists
Claimed
Claimed

Top Rated Menlo Security Alternatives

Menlo Security Reviews & Product Details

RA
Security Engineer
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: G2 invite
Incentivized Review
(Original )Information
What do you like best about Menlo Security?

Menlo HEAT features is really helpful in identifying the email threats Review collected by and hosted on G2.com.

What do you dislike about Menlo Security?

User intervention is needed, and experience will change Review collected by and hosted on G2.com.

What problems is Menlo Security solving and how is that benefiting you?

Menlo blocked the user from clicking on malicious links and download email attachment Review collected by and hosted on G2.com.

Menlo Security Overview

What is Menlo Security?

Menlo Security protects organizations from cyber threats that attack enterprise browsers. Menlo Security’s patented Cloud-Browser Security Platform scales to provide comprehensive protection across enterprises of any size, without requiring endpoint software or impacting the end user-experience. The Menlo Secure Enterprise Browser solution includes dramatic new capabilities for: - Managing local browser security policies within Google Chrome and Microsoft Edge - Protecting users with the Menlo Secure Cloud Browser - Securing access to applications and protecting associated data down to the last mile Menlo Security provides browser security to over 8 million users across nearly 1,000 global enterprises and leading government organizations, including the U.S. Department of Defense. Enterprises large and small benefit from risk reductions that facilitate more efficient work. The Menlo Secure Enterprise Browser solution enables the workspace of tomorrow, delivering browser security to desktops and mobile work, and protecting users, applications, and data.

Menlo Security Details
Languages Supported
English, Japanese, Korean
Show LessShow More
Product Description

The Menlo Security Web Isolation Service protects enterprises from cyber attacks by isolating and executing all web content in the Menlo Security Isolation Platform, away from the endpoint, eliminating malware before it can reach user devices.


Seller Details
Year Founded
2012
HQ Location
Mountain View, CA
Twitter
@menlosecurity
17,329 Twitter followers
LinkedIn® Page
www.linkedin.com
114 employees on LinkedIn®

NV
Overview Provided by:

Recent Menlo Security Reviews

LR
Linda R.Small-Business (50 or fewer emp.)
4.0 out of 5
"Robust and Secure Platform"
Isolation technology to help prevent malicious attecks from executing.
RA
RAMACHANDRA KALIDAS A.Enterprise (> 1000 emp.)
4.5 out of 5
"Menlo Web/Email Security"
Menlo HEAT features is really helpful in identifying the email threats
John P.
JP
John P.Enterprise (> 1000 emp.)
5.0 out of 5
"Best Cloud Based Proxy with Web Isolation Tool"
The functionality of the product fits the business requirement. It is also flexible with other requirements such as fixed egress IP, as well as wor...
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

Menlo Security Media

Menlo Security Demo - Menlo Secure Cloud Browser
The Menlo Secure Cloud Browser executes each web request in the cloud, preventing browser-based attacks from ever reaching the endpoint and eliminating the browser attack surface.
Menlo Security Demo - Three Pillars of Menlo Security
Manage the browser attack surface. Deploy browser-security policies and forensics instantly. Protect users. Secure access and data to the last mile with trusted and proven defenses.
Answer a few questions to help the Menlo Security community
Have you used Menlo Security before?
Yes

3 out of 4 Total Reviews for Menlo Security

4.4 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.

Menlo Security Pros and Cons

How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cons
G2 reviews are authentic and verified.
LR
System Administrator
Small-Business(50 or fewer emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Menlo Security?

Isolation technology to help prevent malicious attecks from executing. Review collected by and hosted on G2.com.

What do you dislike about Menlo Security?

The level of Zero trust appoarch makes way for more deployment/maintenace efforts. Review collected by and hosted on G2.com.

What problems is Menlo Security solving and how is that benefiting you?

Menlo Security offered us a unique isolation-powered platform that focuses on threat prevention. Great secure Zero Trust approach which kept malicious attacks at bay while allowing seamless online work for users. Additional benefit is the non-intrusive security to help maintaining business continuity throughout. Review collected by and hosted on G2.com.

John P.
JP
VP, Chief Information Security Officer and Data Protection Officer
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: Organic
What do you like best about Menlo Security?

The functionality of the product fits the business requirement. It is also flexible with other requirements such as fixed egress IP, as well as work from office or work from home scenarios, while providing additional security like web isolation. Review collected by and hosted on G2.com.

What do you dislike about Menlo Security?

We initially had a challenge with the sites like google or youtube having foreign language, as the cloud proxy instance used is from the cloud. However, Menlo is responsive enough to add a local egress IP to correct that. Review collected by and hosted on G2.com.

What problems is Menlo Security solving and how is that benefiting you?

During the pandemic our company was forced to do work from home and we had to disable the proxy setting as we were using on premise proxy. Menlo was able to allow us to have web security as the solution is cloud based, and getting browser isolation is a big plus. Review collected by and hosted on G2.com.

Verified User in Banking
UB
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Menlo Security?

It is easy to use to setup on protect and quick deployment Review collected by and hosted on G2.com.

What do you dislike about Menlo Security?

Local support in China and Asia is not strong Review collected by and hosted on G2.com.

What problems is Menlo Security solving and how is that benefiting you?

Quick deployment and easy to use Review collected by and hosted on G2.com.

There are not enough reviews of Menlo Security for G2 to provide buying insight. Below are some alternatives with more reviews:

1
BetterCloud Logo
BetterCloud
4.4
(457)
BetterCloud provides critical insights, automated management, and intelligent data security for cloud office platforms.
2
Okta Logo
Okta
4.5
(886)
Okta is The World’s Identity Company™. As the leading independent Identity partner, we free everyone to safely use any technology — anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.
3
Cisco Duo Logo
Cisco Duo
4.5
(394)
Duo is a cloud-based access security platform built to protect access to any application, from any device. Duo’s passwordless authentication, single sign-on (SSO) and user-friendly multi-factor authentication make secure logins easy for users, reducing friction to their workflow.
4
Avanan Cloud Email Security Logo
Avanan Cloud Email Security
4.7
(352)
AVANAN protects your data in the cloud with the same industry-leading security you trust in your datacenter. The cloud-based platform is completely out-of-band, requires no proxy, and can be deployed in just 10 minutes.
5
Mimecast Advanced Email Security Logo
Mimecast Advanced Email Security
4.4
(296)
Mimecast Email Security with Targeted Threat Protection solution that offers comprehensive, multi-layered email security and content controls.
6
Cisco Umbrella Logo
Cisco Umbrella
4.4
(274)
Cisco Umbrella is a cloud security platform that provides the first line of defense against threats on the internet.
7
DNSFilter Logo
DNSFilter
4.6
(239)
DNS threat protection that is accurate, reliable, and easy. Stop end users from visiting malicious and inappropriate sites. Filters internet traffic in minutes. DNSFilter is backed by the largest global DNS network in the industry.
8
Absolute Secure Access Logo
Absolute Secure Access
4.7
(213)
Absolute Secure Access delivers modern remote access for highly mobile workforces without sacrificing productivity. It provides reliable network connectivity for users to securely access critical resources in the public cloud, private data centers, or on-premises -- even in challenging environments. It is the only solution that proactively optimizes and improves the employee experience while offering deep visibility, control, and analytics to IT administrators.
9
FortiClient Logo
FortiClient
4.4
(204)
FortiClient Fabric Agent integrates endpoints into the Security Fabric and provides endpoint telemetry, including user identity, protection status, risk scores, unpatched vulnerabilities, security events, and more.
10
Coro Cybersecurity Logo
Coro Cybersecurity
4.7
(205)
Monitors your cloud applications for data leaks, cyber-threats and regulatory violations that put your business at risk.
Show More