Best Software for 2025 is now live!
Show rating breakdown
Save to My Lists
Unclaimed
Unclaimed

Top Rated Safe-T ZoneZero Perimeter Access Orchestration Alternatives

Safe-T ZoneZero Perimeter Access Orchestration Reviews & Product Details

Safe-T ZoneZero Perimeter Access Orchestration Overview

What is Safe-T ZoneZero Perimeter Access Orchestration?

Safe-T’s new ZoneZero platform supports existing VPN solutions, removes the need to re-design the network and access flow, and allows organizations to support all access scenarios for all user types, locations, and applications.

Safe-T ZoneZero Perimeter Access Orchestration Details
Show LessShow More
Product Description

Safe-T’s new ZoneZero platform supports existing VPN solutions, removes the need to re-design the network and access flow, and allows organizations to support all access scenarios for all user types, locations, and applications.


Seller Details
Seller
Safe-T
Ownership
NASDAQ: SFET

Recent Safe-T ZoneZero Perimeter Access Orchestration Reviews

Kaan A.
KA
Kaan A.
5.0 out of 5
"Safe-T provides true Zero Trust solutions to Enterprise customers."
Safe-T is a true Zero Trust solution with patented reverse access technology that does not require any clients to be installed on the end-user comp...
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

Safe-T ZoneZero Perimeter Access Orchestration Media

Answer a few questions to help the Safe-T ZoneZero Perimeter Access Orchestration community
Have you used Safe-T ZoneZero Perimeter Access Orchestration before?
Yes

1 Safe-T ZoneZero Perimeter Access Orchestration Reviews

0.0 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
G2 reviews are authentic and verified.
Kaan A.
KA
Founding Partner
More Options
Validated Reviewer
Review source: Organic
Business partner of the seller or seller's competitor, not included in G2 scores.
What do you like best about Safe-T ZoneZero Perimeter Access Orchestration?

Safe-T is a true Zero Trust solution with patented reverse access technology that does not require any clients to be installed on the end-user compute devices. Review collected by and hosted on G2.com.

What do you dislike about Safe-T ZoneZero Perimeter Access Orchestration?

They should market their product more aggressively, since I believe they have the best true Zero Trust solution in the market at this time. Review collected by and hosted on G2.com.

What problems is Safe-T ZoneZero Perimeter Access Orchestration solving and how is that benefiting you?

Safe-T provides full Zero Trust security and file access control over our Fortinet VPN connections. Review collected by and hosted on G2.com.

There are not enough reviews of Safe-T ZoneZero Perimeter Access Orchestration for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Okta Logo
Okta
4.5
(886)
Okta is The World’s Identity Company™. As the leading independent Identity partner, we free everyone to safely use any technology — anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.
2
BetterCloud Logo
BetterCloud
4.4
(457)
BetterCloud provides critical insights, automated management, and intelligent data security for cloud office platforms.
3
Cisco Duo Logo
Cisco Duo
4.5
(394)
Duo is a cloud-based access security platform built to protect access to any application, from any device. Duo’s passwordless authentication, single sign-on (SSO) and user-friendly multi-factor authentication make secure logins easy for users, reducing friction to their workflow.
4
Absolute Secure Access Logo
Absolute Secure Access
4.7
(213)
Absolute Secure Access delivers modern remote access for highly mobile workforces without sacrificing productivity. It provides reliable network connectivity for users to securely access critical resources in the public cloud, private data centers, or on-premises -- even in challenging environments. It is the only solution that proactively optimizes and improves the employee experience while offering deep visibility, control, and analytics to IT administrators.
5
FortiClient Logo
FortiClient
4.4
(204)
FortiClient Fabric Agent integrates endpoints into the Security Fabric and provides endpoint telemetry, including user identity, protection status, risk scores, unpatched vulnerabilities, security events, and more.
6
Trend Vision One Logo
Trend Vision One
4.7
(187)
Trend Micro Vision One (XDR) collects and correlates deep activity data across multiple vectors - email, endpoints, servers, cloud workloads, and networks - enabling a level of detection and investigation that is difficult or impossible to achieve with SIEM or individual point solutions.
7
GoodAccess Logo
GoodAccess
4.7
(148)
Secure your online business systems against hackers. Control access to your online business systems easily. Let your team work from home office and remote locations. Securely!
8
Check Point CloudGuard Network Security Logo
Check Point CloudGuard Network Security
4.5
(122)
Check Point CloudGuard Network Security for private and public cloud platforms is designed to protect assets in the cloud against the most sophisticated threats.
9
NordLayer Logo
NordLayer
4.3
(117)
A stress-free way to secure your network.
10
Check Point Harmony SASE Logo
Check Point Harmony SASE
4.7
(116)
Check Point Harmony SASE is a converged networking and network security platform which connects all users, in the office or remote, to all resources, located on-prem, cloud, SaaS or web. It delivers secure Zerto Trust Network Access (ZTNA) connectivity along web protection capabilities including Internet access control, malware protection, data loss prevention(DLP), and sandboxing, as well as a firewall as a service. The solution employs a hybrid architecture, combining on-device and cloud-based protections, which delivers market leading security and performance.
Show More