Top Rated Zero Networks Segment Alternatives
1 Zero Networks Segment Reviews
5.0 out of 5
The next elements are filters and will change the displayed results once they are selected.
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
G2 reviews are authentic and verified.
Here's how.
We strive to keep our reviews authentic.
G2 reviews are an important part of the buying process, and we understand the value they provide to both our customers and buyers. To ensure the value is retained, it's important to make certain that reviews are authentic and trustworthy, which is why G2 requires verified methods to write a review and validates the reviewer's identity before approving. G2 validates the reviewers identity with our moderation process that prevents inauthentic reviews, and we strive to collect reviews in a responsible and ethical manner.
AI
Verified User in Information Technology and Services
Small-Business(50 or fewer emp.)
What do you like best about Zero Networks Segment?
Solution for cybersecurity,
Asset management, Policy expert and IRM functionality stands out the best. Prediction of cyber attacks and provide ML algos to tackle them. Review collected by and hosted on G2.com.
What do you dislike about Zero Networks Segment?
Pricing for implementation,
Limited functional capabilities like zoxor off and many more,
Cannot be used for small scale packages, minimal customization capabilities Review collected by and hosted on G2.com.
There are not enough reviews of Zero Networks Segment for G2 to provide buying insight. Below are some alternatives with more reviews:
1
Cisco Duo
4.5
(393)
Duo is a cloud-based access security platform built to protect access to any application, from any device. Duo’s passwordless authentication, single sign-on (SSO) and user-friendly multi-factor authentication make secure logins easy for users, reducing friction to their workflow.
2
Okta
4.5
(886)
Okta is The World’s Identity Company™. As the leading independent Identity partner, we free everyone to safely use any technology — anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.
3
BetterCloud
4.4
(454)
BetterCloud provides critical insights, automated management, and intelligent data security for cloud office platforms.
4
Absolute Secure Access
4.7
(213)
Absolute Secure Access delivers modern remote access for highly mobile workforces without sacrificing productivity. It provides reliable network connectivity for users to securely access critical resources in the public cloud, private data centers, or on-premises -- even in challenging environments. It is the only solution that proactively optimizes and improves the employee experience while offering deep visibility, control, and analytics to IT administrators.
5

FortiClient
4.4
(204)
FortiClient Fabric Agent integrates endpoints into the Security Fabric and
provides endpoint telemetry, including user identity, protection status,
risk scores, unpatched vulnerabilities, security events, and more.
6

AlgoSec
4.5
(189)
AlgoSec is a business-driven security management solution.
7

Trend Vision One
4.7
(187)
Trend Micro Vision One (XDR) collects and correlates deep activity data across multiple vectors - email, endpoints, servers, cloud workloads, and networks - enabling a level of detection and investigation that is difficult or impossible to achieve with SIEM or individual point solutions.
8
GoodAccess
4.7
(147)
Secure your online business systems against hackers. Control access to your online business systems easily. Let your team work from home office and remote locations. Securely!
9
Check Point CloudGuard Network Security
4.5
(122)
Check Point CloudGuard Network Security for private and public cloud platforms is designed to protect assets in the cloud against the most sophisticated threats.
10
NordLayer
4.3
(117)
A stress-free way to secure your network.