Best Software for 2025 is now live!
Show rating breakdown
Save to My Lists
Claimed
Claimed

Top Rated Zero Networks Segment Alternatives

Zero Networks Segment Reviews & Product Details

Zero Networks Segment Overview

What is Zero Networks Segment?

Least privilege networking solution that prevents attacks from spreading and causing damage by automatically restricting network access to only what is normally needed, everything else goes through 2-step verification. With the addition of identity segmentation, Zero Networks is creating a new sphere of security capabilities. The combination of Zero’s network and identity segmentation capabilities redefines least privilege architecture, providing a level of protection that the market has never seen before. It allows security teams to control network device segmentation down to the port and protocol level and then layer complete control of user logon access by logon type – network, local, service, etc. As if that wasn’t enough, you can also add multi-factor authentication to any of those controls. You simply can’t do this using any other platform on the market today. Zero’s combined capabilities of network and identity segmentation are going to rewrite the playbook auditors and examiners use to assess security programs. Security teams need to take note and get ahead of the game.

Zero Networks Segment Details
Languages Supported
English
Show LessShow More
Product Description

Zero Networks Segment is an automated, agentless, MFA powered platform that is the very first to succeed at scale. It learns network connections, creates accurate security policies, and applies them to all host-based firewalls to permit only necessary traffic. Privileged ports are kept closed and are opened temporarily following admin authentication with MFA


Seller Details

BL
Overview Provided by:

Recent Zero Networks Segment Reviews

Verified User
A
Verified UserSmall-Business (50 or fewer emp.)
5.0 out of 5
"Scalable on demand tool"
Solution for cybersecurity, Asset management, Policy expert and IRM functionality stands out the best. Prediction of cyber attacks and provide ML ...
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

Zero Networks Segment Media

Zero Networks Segment Demo - Zero Networks Segment
Dashboard view of Zero Networks segment
Answer a few questions to help the Zero Networks Segment community
Have you used Zero Networks Segment before?
Yes

1 Zero Networks Segment Reviews

5.0 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
1 Zero Networks Segment Reviews
5.0 out of 5
1 Zero Networks Segment Reviews
5.0 out of 5
G2 reviews are authentic and verified.
Verified User in Information Technology and Services
AI
Small-Business(50 or fewer emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Zero Networks Segment?

Solution for cybersecurity,

Asset management, Policy expert and IRM functionality stands out the best. Prediction of cyber attacks and provide ML algos to tackle them. Review collected by and hosted on G2.com.

What do you dislike about Zero Networks Segment?

Pricing for implementation,

Limited functional capabilities like zoxor off and many more,

Cannot be used for small scale packages, minimal customization capabilities Review collected by and hosted on G2.com.

What problems is Zero Networks Segment solving and how is that benefiting you?

Admin can apply policies that restrict the access of each and every machine entity to only what they need to do also prevent unauthorized access and eliminating many vulnerabilities. Review collected by and hosted on G2.com.

There are not enough reviews of Zero Networks Segment for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Cisco Duo Logo
Cisco Duo
4.5
(393)
Duo is a cloud-based access security platform built to protect access to any application, from any device. Duo’s passwordless authentication, single sign-on (SSO) and user-friendly multi-factor authentication make secure logins easy for users, reducing friction to their workflow.
2
Okta Logo
Okta
4.5
(886)
Okta is The World’s Identity Company™. As the leading independent Identity partner, we free everyone to safely use any technology — anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.
3
BetterCloud Logo
BetterCloud
4.4
(454)
BetterCloud provides critical insights, automated management, and intelligent data security for cloud office platforms.
4
Absolute Secure Access Logo
Absolute Secure Access
4.7
(213)
Absolute Secure Access delivers modern remote access for highly mobile workforces without sacrificing productivity. It provides reliable network connectivity for users to securely access critical resources in the public cloud, private data centers, or on-premises -- even in challenging environments. It is the only solution that proactively optimizes and improves the employee experience while offering deep visibility, control, and analytics to IT administrators.
5
FortiClient Logo
FortiClient
4.4
(204)
FortiClient Fabric Agent integrates endpoints into the Security Fabric and provides endpoint telemetry, including user identity, protection status, risk scores, unpatched vulnerabilities, security events, and more.
6
AlgoSec Logo
AlgoSec
4.5
(189)
AlgoSec is a business-driven security management solution.
7
Trend Vision One Logo
Trend Vision One
4.7
(187)
Trend Micro Vision One (XDR) collects and correlates deep activity data across multiple vectors - email, endpoints, servers, cloud workloads, and networks - enabling a level of detection and investigation that is difficult or impossible to achieve with SIEM or individual point solutions.
8
GoodAccess Logo
GoodAccess
4.7
(147)
Secure your online business systems against hackers. Control access to your online business systems easily. Let your team work from home office and remote locations. Securely!
9
Check Point CloudGuard Network Security Logo
Check Point CloudGuard Network Security
4.5
(122)
Check Point CloudGuard Network Security for private and public cloud platforms is designed to protect assets in the cloud against the most sophisticated threats.
10
NordLayer Logo
NordLayer
4.3
(117)
A stress-free way to secure your network.
Show More