• HOME
  • CATEGORIES

    • CATEGORIES

    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

    • No categories available

      Browse All Categories

      Select a category to view markets

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.

All Categories
/
IT Security

'IT Security' Reviews and Ratings

What is 'IT Security' market?

IT Security refers to products and services that protect digital systems and data from cyber threats and unauthorized access. This category includes markets that focus on network security, identity management, data protection, and cloud security, enabling organizations to reduce risk, ensure compliance, and operate securely in a digital world.

How Categories and Markets Are Defined
Highest Rated By Your Peers
For Willingness to Recommend
Logo of Patch My PC Patch Management
Patch My PC Patch Management
Logo of Sangfor Athena Next-Generation Firewall
Sangfor Athena Next-Generation Firewall
Logo of Cloudflare Access
Cloudflare Access
For 50M-1B USD Companies
Logo of SRX Series
SRX Series
Logo of Patch My PC Patch Management
Patch My PC Patch Management
Logo of Symantec ProxySG
Symantec ProxySG
For North America
Logo of Patch My PC Patch Management
Patch My PC Patch Management
Logo of Imperva Web Application Firewall (WAF) Gateway
Imperva Web Application Firewall (WAF) Gateway
Logo of Sangfor Athena Next-Generation Firewall
Sangfor Athena Next-Generation Firewall
Integration & Deployment
Logo of Patch My PC Patch Management
Patch My PC Patch Management
Logo of Sangfor Athena Next-Generation Firewall
Sangfor Athena Next-Generation Firewall
Logo of Sucuri Website Firewall (WAF)
Sucuri Website Firewall (WAF)

Top Trending Products

Exaforce Agentic SOC PlatformImperva Web Application Firewall (WAF) GatewayTrend Micro Deep SecuritynShield General Purpose HSMCrowdStrike Falcon ShieldOne Identity Active RolesOne Identity Safeguard for Privileged SessionsDigiCert Software Trust ManagerJazz DLPRadware AppWall

Popular Product Comparisons

CrowdStrike Falcon Shield vs ObsidianBlancco Drive Eraser vs Trend Micro Deep SecurityHalcyon Anti-Ransomware Platform vs Trend Micro Deep SecurityForcepoint Web Security (Appliance) vs Trend Micro Deep SecurityThreat Detection Marketplace vs Trend Micro Deep SecurityMicrosoft Identity Manager (MIM) vs ObsidianNetwrix Change Tracker vs Quest Change Auditor for Active DirectoryAccelPro Zero Trust Secure Access vs Trend Micro Deep Security

Best ${reviewsHome-default-title} Reviews 2026 | Gartner Peer Insights

Product Listings

Filter by

Products 1 - 20 of 1282
Sort by
Logo of Trend Micro Deep Security

Trend Micro Deep Security

By Trend Micro

4.6
(613 Ratings)

Trend Micro Deep Security is a software designed to provide advanced security for physical, virtual, and cloud environments. The software offers features such as intrusion prevention, firewall, application control, web reputation, integrity monitoring, and anti-malware. It is developed to address business challenges related to safeguarding servers and virtual desktops from vulnerabilities, malicious attacks, and unauthorized changes. By integrating multiple protection modules, the software helps organizations manage risks, enforce compliance requirements, and maintain the security of workloads across diverse infrastructures.

Show More Details
Logo of Cisco Meraki MX appliances

Cisco Meraki MX appliances

By Cisco Systems

4.5
(495 Ratings)

Cisco Meraki MX appliances are security and SD-WAN software solutions designed to simplify the management of network infrastructure for organizations. These appliances provide features such as firewall protection, intrusion detection and prevention, VPN capabilities, content filtering, and automatic updates. The software enables centralized cloud-based management, allowing users to configure, monitor, and maintain network security across multiple sites from a single interface. It addresses business needs for secure connectivity, optimized network performance, and scalable administration by integrating advanced networking functionality with automated policy enforcement and real-time analytics. The software supports both wired and wireless environments and helps organizations manage bandwidth usage, secure remote access, and ensure business continuity.

Show More Details
Logo of Skyhigh Cloud-Native Application Protection Platform

Skyhigh Cloud-Native Application Protection Platform

By Skyhigh Security

4.6
(419 Ratings)

Skyhigh Cloud Native Application Protection Platform CNAPP is the industry’s first platform to extend Cloud Access Security Broker CASB, bringing application and data context to converge Cloud Security Posture Management CSPM with IaaS Data Loss Prevention DLP for IaaS public clouds. Skyhigh CNAPP provides consistent data protection, threat prevention, governance, and compliance throughout the cloud-native application development lifecycle. Skyhigh CNAPP is consolidated into a fully converged platform and managed from the same single console as the rest of the Skyhigh SSE services.

Show More Details
Logo of SonicWall NSa Series

SonicWall NSa Series

By SonicWall

4.7
(295 Ratings)

The SonicWall NSa series hybrid mesh firewalls deliver enterprise-class security purpose-built for mid-market & distributed enterprises, with simplicity & low TCO. It supports Zero-Touch Deployment & centralized management to streamline installation & administration. To protect against sophisticated threats, it combines advanced networking with multi-engine Capture Advanced Threat Protection, including patented Real Time Deep Memory Inspection for 0-day detection. High-performance deep packet inspection & TLS/SSL decryption maintain strong security without compromising performance. Built-in secure SD-WAN optimizes broadband & cloud connectivity without additional appliances, while advanced reporting and analytics provide actionable visibility. Broad integration with SonicWall & third-party solutions, plus an embedded cyber warranty through Cysurance, offers no-cost financial protection for qualifying deployments & helps reduce cyber insurance expenses & strengthen overall risk posture

Show More Details
Logo of Sucuri Website Firewall (WAF)

Sucuri Website Firewall (WAF)

By Sucuri

4.5
(271 Ratings)

Sucuri Website Firewall (WAF) is a software designed to protect websites from a range of security threats and vulnerabilities. The software provides features such as real-time website traffic monitoring, protection against distributed denial-of-service (DDoS) attacks, and prevention of unauthorized access through filtering of malicious requests. It helps mitigate exploits targeting website code and optimizes website performance by caching content and reducing load on origin servers. The software addresses the business problem of maintaining website availability and integrity by automatically blocking attempts to exploit common vulnerabilities and providing virtual patching. Through continuous monitoring and analysis, it helps ensure that websites remain secure from various online threats.

Show More Details
Logo of Ivanti Connect Secure

Ivanti Connect Secure

By Ivanti

4.3
(252 Ratings)

Ivanti Connect Secure (ICS) delivers secure, high‑performance remote access through a single unified client for both remote and on‑site connectivity, reducing operational overhead while maintaining a consistent security posture. It enforces dynamic, zero‑trust‑aligned access with real‑time identity and device‑state checks to mitigate unauthorized access risks. Integrated endpoint compliance, adaptive MFA, and per‑app VPN controls strengthen protection across diverse devices. Seamless integration with identity services, SIEM, NGFW and MDM/EMM tools preserves existing workflows while scaling secure access across distributed, cloud‑first environments.

Show More Details
Logo of SRX Series

SRX Series

By Hewlett Packard Enterprise (HPE)

4.7
(233 Ratings)

SRX Series is a software developed by Juniper Networks that integrates security and networking functions for enterprise and service provider environments. The software provides firewall, intrusion prevention, automated threat intelligence, and secure connectivity capabilities. It manages traffic inspection, controls access, and enforces network segmentation to address risks and support compliance requirements. SRX Series is designed to help organizations protect infrastructure by detecting threats, blocking unauthorized access, and enabling secure communication within distributed and multi-cloud networks. The software is used to reduce operational complexity by consolidating multiple security features into a single platform, facilitating centralized policy management, and improving visibility across a network.

Show More Details
Logo of Qualys TotalAppSec

Qualys TotalAppSec

By Qualys

4.5
(231 Ratings)

Qualys Web Application Scanning (WAS) secures web applications & APIs and reduces risks across the entire web attack surface through comprehensive discovery, continuous monitoring & automated remediation.

1. Comprehensive discovery across hybrid, cloud-native or on-prem environments and internal & external networks for unknown, orphaned and forgotten web apps & APIs.

2. Continuous monitoring, consolidated detection and risk-based prioritization of runtime vulnerabilities, misconfigurations, sensitive data & PII exposures, OWASP Top 10 risks, manual PEN test, web malware, in addition to compliance against regulatory standards like PCI DSS, GDPR, and HIPAA.

3. Automated remediation workflows with integration into CI/CD pipelines and ITSM to support Shift Left & Shift Right testing, reduce time to remediate, and promote collaboration between DevSecOps, AppSec, IT Ops teams.

Show More Details
Logo of Forcepoint Web Security (Appliance)

Forcepoint Web Security (Appliance)

By Forcepoint

4.3
(222 Ratings)

Forcepoint Web Security (Appliance) is a software designed to provide protection for organizations against web-based threats by analyzing and filtering internet traffic. The software features real-time threat prevention, URL filtering, malware detection, and data loss prevention. It enables administrators to monitor and manage employee internet usage, enforce security policies, and block access to malicious or inappropriate websites. By inspecting incoming and outgoing web communications, the software aims to reduce risks associated with phishing, ransomware, and other online attacks. Forcepoint Web Security (Appliance) also supports integration with directory services and offers reporting tools to help ensure compliance with regulatory requirements and internal protocols. This software addresses the business challenge of safeguarding sensitive data and maintaining secure internet usage in corporate environments.

Show More Details
Logo of Patch My PC Patch Management

Patch My PC Patch Management

By Patch My PC

4.9
(217 Ratings)

Patch My PC Patch Management is a software that enables organizations to streamline the process of deploying, managing, and updating third-party applications across endpoints. The software integrates with Microsoft Configuration Manager and Intune, allowing IT teams to automate patching processes for supported applications. It includes features such as automatic update packaging, custom deployment configuration, and reporting capabilities to help address the challenges of keeping software up to date, reducing security risks associated with unpatched applications, and decreasing manual workloads for IT staff. Patch My PC Patch Management supports a wide range of enterprise applications, aiming to improve software compliance and endpoint security in business environments.

Show More Details
Logo of InsightAppSec

InsightAppSec

By Rapid7

4.3
(215 Ratings)

InsightAppSec is a software developed to identify and manage security risks within web applications. It automates the detection of vulnerabilities by performing dynamic application security testing, scanning for common issues such as cross-site scripting, SQL injection, and other exploitable flaws. The software provides actionable reporting and integrates with development workflows to help organizations remediate risks efficiently. InsightAppSec features centralized management to oversee multiple applications and environments, facilitating the prioritization and tracking of vulnerabilities. The software addresses the business problem of reducing application security risks and enhancing visibility into the security posture of web applications throughout the software development lifecycle.

Show More Details
Logo of Cloudflare Access

Cloudflare Access

By Cloudflare

4.5
(209 Ratings)

Cloudflare Access is a software solution that provides secure access management for internal applications and resources by verifying user identity and device posture before granting entry. This software integrates with identity providers, supports multi-factor authentication, and enables administrators to set granular access policies based on user and group attributes. It functions as a gateway to protect applications without relying on traditional VPNs, reducing potential attack surfaces. Cloudflare Access is designed to support secure remote work by ensuring that only authorized users can reach sensitive systems, thereby addressing challenges related to network security, remote access control, and compliance requirements for organizations.

Show More Details
Logo of Microsoft BitLocker

Microsoft BitLocker

By Microsoft

4.6
(194 Ratings)

Microsoft BitLocker is a disk encryption software designed to protect data by providing encryption for entire volumes. The software integrates with operating systems to help prevent unauthorized access to data stored on the system, even if the device is lost or stolen. BitLocker uses advanced encryption algorithms and can leverage hardware-based security features such as Trusted Platform Module. It supports management and recovery options for enterprise environments and helps address compliance requirements for data protection. The software is suitable for organizations seeking to safeguard sensitive information against potential threats related to physical device theft or unauthorized data exposure.

Show More Details
Logo of Carbon Black App Control

Carbon Black App Control

By Broadcom

4.5
(190 Ratings)

Carbon Black App Control is a software designed to provide application whitelisting and endpoint protection by allowing organizations to control which applications are permitted to run on their systems. The software enables centralized management and monitoring of executable files and scripts, helping reduce the attack surface by enforcing strict policies on software execution. Carbon Black App Control addresses the business problem of unauthorized software installations and potential malicious activity by ensuring that only approved applications run on endpoints, thereby supporting compliance requirements and contributing to overall security posture. The software features real-time visibility into application usage and change control, helping organizations efficiently prevent unwanted changes and maintain system integrity.

Show More Details
Logo of Absolute Secure Access

Absolute Secure Access

By Absolute Security

4.6
(173 Ratings)

Absolute Secure Access is a software designed to provide secure connectivity and protection for endpoint devices in remote and hybrid work environments. The software focuses on maintaining secure, resilient connections between users and corporate resources, regardless of location or network condition. It incorporates features such as encrypted network tunnels, real-time diagnostics, policy enforcement, and threat management to help organizations manage devices, ensure data privacy, and support compliance requirements. Absolute Secure Access addresses challenges related to secure remote access, network visibility, and the safeguarding of sensitive organizational information across distributed workforces.

Show More Details
Logo of Imperva Web Application Firewall (WAF) Gateway

Imperva Web Application Firewall (WAF) Gateway

By Thales Group (Imperva)

4.6
(167 Ratings)

Imperva Web Application Firewall Gateway is a software that provides security for web applications by monitoring and filtering HTTP traffic between applications and clients. The software is designed to protect applications from attacks such as SQL injection, cross-site scripting, and other vulnerabilities by analyzing incoming requests and blocking malicious activity. It features automated threat detection, customizable security policies, and integration with identity management systems. The software helps organizations address risks related to unauthorized data access and application downtime, supporting compliance requirements and enabling continuous monitoring and reporting of security events.

Show More Details
Logo of Acunetix

Acunetix

By Invicti

4.4
(165 Ratings)

Acunetix is a software designed for automated web application security testing. It identifies vulnerabilities such as SQL injection, cross-site scripting, and other common security issues in websites and web applications. The software enables organizations to assess risk by scanning for security flaws across a range of platforms and technologies, providing detailed reports and guidance for remediation. It integrates with development and issue tracking environments to facilitate continuous security assessments throughout the software development lifecycle. Acunetix assists businesses in meeting compliance standards by enabling regular and thorough vulnerability assessments, helping reduce the risk of exploitation in online assets.

Show More Details
Logo of Forcepoint Next-Gen Firewall

Forcepoint Next-Gen Firewall

By Forcepoint

4.4
(157 Ratings)

Forcepoint Next-Gen Firewall is a software that provides network security through features such as advanced threat protection, intrusion prevention, and secure SD-WAN connectivity. It offers centralized management capabilities to streamline policy control and monitoring across distributed environments. The software is designed to help organizations manage network access, detect suspicious activity, and respond to potential threats in real time. Forcepoint Next-Gen Firewall supports integration with cloud and on-premises infrastructure, enabling policy enforcement and data protection across different network segments. It addresses business needs related to safeguarding network resources, reducing complexity in security operations, and ensuring regulatory compliance within enterprise networks.

Show More Details
Logo of Symantec Advanced Threat Protection

Symantec Advanced Threat Protection

By Broadcom

4.6
(156 Ratings)

Symantec Advanced Threat Protection is a software designed to identify, analyze, and remediate complex cybersecurity threats across various environments, including endpoints, networks, and email systems. The software integrates multiple threat detection technologies to provide visibility into suspicious activities and targeted attacks, enabling organizations to coordinate response actions and prevent potential breaches. By leveraging centralized management and correlation of threat intelligence, the software assists businesses in addressing vulnerabilities, reducing response times, and enhancing overall security posture against advanced malware and zero-day threats.

Show More Details
Logo of Symantec ProxySG

Symantec ProxySG

By Broadcom

4.6
(142 Ratings)

Symantec ProxySG is a software solution that delivers secure web gateway functionality for organizations seeking to control and protect their internet traffic. The software focuses on advanced threat protection, policy enforcement, and data security by providing granular visibility into web traffic and enabling policy-based filtering and inspection. It supports encrypted traffic inspection and integrates with directory services for user authentication. Symantec ProxySG assists businesses in mitigating risks from web-based threats and ensuring compliance with internal and regulatory requirements by allowing administrators to define access controls and monitor usage. The software addresses challenges related to secure web access and data leakage prevention in enterprise environments.

Show More Details