Top Rated SCADAfence Alternatives
(51)
4.2 out of 5
Visit Website
Sponsored
1 SCADAfence Reviews
5.0 out of 5
The next elements are filters and will change the displayed results once they are selected.
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
G2 reviews are authentic and verified.
Here's how.
We strive to keep our reviews authentic.
G2 reviews are an important part of the buying process, and we understand the value they provide to both our customers and buyers. To ensure the value is retained, it's important to make certain that reviews are authentic and trustworthy, which is why G2 requires verified methods to write a review and validates the reviewer's identity before approving. G2 validates the reviewers identity with our moderation process that prevents inauthentic reviews, and we strive to collect reviews in a responsible and ethical manner.
AA
Angela A.
Tax Manager
Construction
Mid-Market(51-1000 emp.)
What do you like best about SCADAfence?
SCADAfence assists me to divide the ICS network from the internet and other networks that are not trusted. This segmentation tends to minimise the attack surface area and minimise the attack surface area and minimise the li9kelihood of an adversary gaining access to critical OT systems. Review collected by and hosted on G2.com.
What do you dislike about SCADAfence?
I noticed that there are specific issues with detecting various kind of anomalous behaviour in the sub-divided ICS network. This has led to a few omissions to certain security incidents that would have been noticed only otherwise. Review collected by and hosted on G2.com.
There are not enough reviews of SCADAfence for G2 to provide buying insight. Below are some alternatives with more reviews:
1
Palo Alto Networks IoT/OT Security
4.3
(91)
Protect every connected asset with OT security that keeps operations up 24/7, not CISOs
2
Microsoft Defender for IoT
4.2
(69)
3
AWS IoT Device Defender
4.4
(57)
AWS IoT Device Defender is a fully managed service that helps you secure your fleet of IoT devices. AWS IoT Device Defender continuously audits the security policies associated with your devices to make sure that they aren't deviating from security practices.
4
MSP360 Connect
4.2
(51)
MSP360 Connect is a fast and secure remote access solution enabling remote support, helpdesk assistance, remote work, distance education, and more. It allows users to access and control Windows devices from any operating system at any time regardless of the computer’s global location.
5

Azure IoT Hub
4.3
(44)
Azure IoT Hub is a scalable, multi-tenant cloud platform (IoT PaaS) that includes an IoT device registry, data storage, and security. It also provides a service interface to support IoT application development.
6

BeyondTrust Privileged Remote Access
4.5
(33)
Privileged Remote Access is a unified access solution. You can provide seamless, secure access to nearly any system, from anywhere via innovative egress techniques and a single administrative console.
7

Google Cloud IoT Core
4.1
(31)
Google Cloud IoT Core is a fully managed service that allows users to easily and securely connect, manage, and ingest data from millions of globally dispersed devices.
8

AppSealing
4.8
(27)
AppSealing is a trusted player in the world of mobile application security. In today’s application-focused world, security can’t slow down your speed of development. We utilize runtime application self-protection features to build scalable security solutions for your mobile apps business in quick time without 'ANY CODING'. Our powerful security suite ensures real-time in-depth application security like source code protection, anti-reverse engineering, cheat tool & emulator detection/blocking, and enforces app integrity. It protects 800+ mobile apps and 800 million+ devices, successfully blocking 70 million+ threats across the globe. Our esteemed clientele spans across Gaming, Fintech, Movie apps, E-comm, Healthcare, and O2o.
9
Appgate SDP
4.8
(26)
Appgate SDP secures the network with a Software-Defined Perimeter's network security model that dynamically creates one-to-one network connections between the user and the resources they access.
10

Azure Sphere
4.4
(23)
Azure Sphere is a new solution for creating highly-secured, Internet-connected microcontroller (MCU) devices. It provides a foundation of security and connectivity that allows you to create the intelligent products and experiences that customers love—and get them to market quickly—at a price point that enables the Internet of Things (IoT) at scale.
SCADAfence Categories on G2