• HOME
  • CATEGORIES

    • CATEGORIES

    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

    • Loading categories...

      Browse All Categories

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
All Categories
/
Security Service Edge

Security Service Edge Reviews and Ratings

What is Security Service Edge?

Gartner defines security service edge (SSE) as an offering that secures access to the web, cloud services and private applications regardless of the location of the user, the device they are using or where that application is hosted. SSE protects users from malicious and inappropriate content on the web and provides enhanced security and visibility for the SaaS and private applications accessed by end users.

Security service edge provides a primarily cloud-delivered solution to control access from end users and devices to applications, as well as websites and the internet. It provides a range of security capabilities, including adaptive access based on identity and context, malware protection, data security and threat prevention, as well as the associated analytics and visibility. It enables more direct connectivity for hybrid users by reducing latency and providing the potential for improved user experience. Capabilities that are integrated across multiple traffic types and destinations allow a more seamless experience for both users and administrators while maintaining a consistent security stance.

Learn More About This Category
How Categories and Markets Are Defined
Highest Rated By Your Peers
For Willingness to Recommend
Logo of Versa SASE
Versa SASE
Logo of Versa Security Service Edge
Versa Security Service Edge
Logo of FortiSASE
FortiSASE
For 50M-1B USD Companies
Logo of Fortinet Universal ZTNA
Fortinet Universal ZTNA
Logo of FortiSASE
FortiSASE
Logo of Versa Security Service Edge
Versa Security Service Edge
For North America
Logo of Zscaler Zero Trust Exchange
Zscaler Zero Trust Exchange
Logo of iboss Zero Trust SSE
iboss Zero Trust SSE
Logo of Skyhigh Cloud Platform
Skyhigh Cloud Platform
Integration & Deployment
Logo of Fortinet Universal ZTNA
Fortinet Universal ZTNA
Logo of Versa SASE
Versa SASE
Logo of Versa Security Service Edge
Versa Security Service Edge

Product Listings

Filter by

Products 1 - 20 of 72
Sort by
Logo of Zscaler Zero Trust Exchange

Zscaler Zero Trust Exchange

By Zscaler

4.6
(1108 Ratings)
customers choice 2025

Zscaler is a globally recognized company that specializes in securing network and application transformations for mobile and cloud based platforms of major organizations. The primary services it offers are Zscaler Internet Access and Zscaler Private Access. These services are developed to create rapid, robust links between users and applications, independent of the device, location, or network. Fully delivered through cloud, Zscaler services aim to provide simplicity, enhanced cybersecurity, and better user experience which can be a challenge for traditional appliances or hybrid solutions. Functioning in over 185 countries, Zscaler operates a vast cloud security platform to protect numerous enterprises and governmental agencies from cyber threats and potential data loss.

Show More Details
Logo of Cisco Secure Client

Cisco Secure Client

By Cisco Systems

4.3
(794 Ratings)

Cisco is a company that specializes in networking technologies, particularly Internet Protocol (IP)-based solutions. It was established in 1984 by a group of computer scientists from Stanford University. As of today, Cisco has a global workforce, continuing to innovate in various fields, notably in routing and switching. Adding to its core business, the company also delves into emerging technologies including home networking, IP telephony, optical networking, security features, storage area networking, and wireless technology. Moreover, Cisco extends its expertise to offer a sweeping range of services such as technical support and advanced services. The company sells its products and services on an enterprise level, to commercial businesses, service providers, and end-users.

Show More Details
Logo of Netskope One SSE

Netskope One SSE

By Netskope

4.5
(580 Ratings)

Netskope, a global cybersecurity leader, supports organizations in applying Zero Trust principles to protect data. The Netskope platform provides optimized access and zero trust security for people, devices, and data anywhere they go. Netskope helps customers reduce risk, accelerate performance, and get visibility into cloud, web, and Privately Held application activity. Thousands of customers, including more than 25 of the Fortune 100, trust Netskope and its powerful NewEdge network to address evolving threats, new risks, technology shifts, organizational and network changes, and new regulatory requirements.

Show More Details
Logo of FortiClient

FortiClient

By Fortinet

4.7
(446 Ratings)
customers choice 2025

Founded more than 20 years ago in Sunnyvale, California, Fortinet continues to be a driving force in the evolution of cybersecurity and the convergence of networking and security. Securing people, devices, and data everywhere is our mission. To that end, our portfolio of over 50 enterprise-grade products is the largest integrated offering available, delivering proven cybersecurity everywhere you need it. More than 680,000 customers trust Fortinet solutions, which are among the most deployed, most patented, and most validated in the industry.

Show More Details
Logo of Forcepoint ONE

Forcepoint ONE

By Forcepoint

4.5
(412 Ratings)

Forcepoint’s mission is to foster safe and trusting environments through a comprehensive security solution that understands digital identities and their cyber behaviors to protect employees and critical data everywhere. Forcepoint achieves this mission by simplifying security for global businesses and governments. The company’s all-in-one, truly cloud-native platform makes it easy to adopt Zero Trust, Security Service Edge (SSE), and Secure Access Service Edge (SASE), by preventing the theft or loss of sensitive data and intellectual property no matter where people are working. Rather than offering a static one-size fits all approach, Forcepoint solutions inherently understand how people interact with data, providing secure access while enabling employees to create value. Forcepoint creates safe, trusted environments for customers and their employees to achieve their highest potential while reducing risk.

Show More Details
Logo of Microsoft Defender for Cloud Apps

Microsoft Defender for Cloud Apps

By Microsoft

4.3
(374 Ratings)

Microsoft enables digital transformation for the era of an intelligent cloud and an intelligent edge. Its mission is to empower every person and every organization on the planet to achieve more. Microsoft is dedicated to advancing human and organizational achievement.

Microsoft Security helps protect people and data against cyberthreats to give peace of mind.

Show More Details
Logo of Fortinet Universal ZTNA

Fortinet Universal ZTNA

By Fortinet

4.9
(307 Ratings)
customers choice 2025

Founded more than 20 years ago in Sunnyvale, California, Fortinet continues to be a driving force in the evolution of cybersecurity and the convergence of networking and security. Securing people, devices, and data everywhere is our mission. To that end, our portfolio of over 50 enterprise-grade products is the largest integrated offering available, delivering proven cybersecurity everywhere you need it. More than 680,000 customers trust Fortinet solutions, which are among the most deployed, most patented, and most validated in the industry.

Show More Details
Logo of Cloudflare One

Cloudflare One

By Cloudflare

4.5
(287 Ratings)

Cloudflare, is a provider of WAAP, SASE, SSE, SD-WAN, CDN, and Edge Developer services. Cloudflare empowers organizations to make their employees, applications and networks faster and more secure everywhere, while reducing complexity and cost. Cloudflare delivers all services from a single intelligent global network platform, providing customers with a unified platform of cloud-native products and developer tools, so any organization can gain the control they need to work, develop, and accelerate their business.

Show More Details
Logo of Prisma Access

Prisma Access

By Palo Alto Networks

4.6
(285 Ratings)
customers choice 2025

Palo Alto Networks is a global cybersecurity organization shaping the future of cloud-centric technology. The main business objective is to provide effective cybersecurity solutions, maintaining and valuing the digital way of life. It addresses the significant issue of maintaining digital security in an increasingly online-centric world. The company utilizes innovative approaches leveraging advancements in artificial intelligence, analytics, automation, and orchestration. Offering an integrated platform and bolstering a burgeoning ecosystem of collaborators, it assures protection across various platforms including clouds, networks, and mobile devices. The organization envisions a progressively safe and secure digital world each day.

Show More Details
Logo of Skyhigh Cloud Platform

Skyhigh Cloud Platform

By Skyhigh Security

4.7
(284 Ratings)

Skyhigh Security protects organizations with cloud-based Zero Trust security solutions that are both data-aware and simple to use. Our Security Service Edge portfolio goes beyond data access and focuses on data use, allowing organizations to collaborate from any device and from anywhere without sacrificing security, while providing the visibility and control required to monitor and mitigate security risks. The Skyhigh Security Service Edge portfolio includes Skyhigh Secure Web Gateway, Skyhigh Cloud Access Security Broker, Skyhigh Privately Held Access, and Skyhigh Cloud Native Application Protection Platform.

Show More Details
Logo of Check Point Harmony SASE

Check Point Harmony SASE

By Check Point Software Technologies

4.5
(208 Ratings)

Check Point Software Technologies Ltd. is a company that offers cyber security solutions to governmental and business entities around the world. The company's solutions are designed to safeguard against a variety of cyber threats including malware and ransomware. With Check Point's multilevel security architecture, dubbed 'Infinity Total Protection with Gen V advanced threat prevention', cloud, network, and mobile devices of businesses are protected. Additionally, Check Point provides a comprehensive and easy-to-manage control security management system.

Show More Details
Logo of Symantec CloudSOC Cloud Access Security Broker

Symantec CloudSOC Cloud Access Security Broker

By Broadcom

4.3
(203 Ratings)

Broadcom Inc. is a global entity focusing on the design, development, and supply of semiconductor and infrastructure software solutions. Through these operations, the firm addresses the primary issue of providing efficient top-notch technology-based solutions.

Show More Details
Logo of GlobalProtect

GlobalProtect

By Palo Alto Networks

4.4
(154 Ratings)
customers choice 2025

Palo Alto Networks is a global cybersecurity organization shaping the future of cloud-centric technology. The main business objective is to provide effective cybersecurity solutions, maintaining and valuing the digital way of life. It addresses the significant issue of maintaining digital security in an increasingly online-centric world. The company utilizes innovative approaches leveraging advancements in artificial intelligence, analytics, automation, and orchestration. Offering an integrated platform and bolstering a burgeoning ecosystem of collaborators, it assures protection across various platforms including clouds, networks, and mobile devices. The organization envisions a progressively safe and secure digital world each day.

Show More Details
Logo of iboss Zero Trust SSE

iboss Zero Trust SSE

By iboss

4.8
(131 Ratings)

iboss is a Zero Trust Secure Access Service Edge (SASE) cloud security platform that consolidates network and security technologies into a single cloud-based service. By integrating VPN, Secure Web Gateway (SWG), SD-WAN, branch firewalls, Browser Isolation, and Cloud Access Security Broker (CASB) capabilities, iboss replaces legacy solutions to enhance security, reduce complexity, and lower costs. Utilizing Zero Trust Network Access (ZTNA), iboss grants users access only to the applications they need based on their identity, minimizing risks of breaches and data loss. As a unified network and security service with a single-pane-of-glass management console, iboss empowers organizations to enhance security, improve user experience, and support a distributed workforce in today's evolving digital landscape.

Show More Details
Logo of Cato SASE Cloud

Cato SASE Cloud

By Cato Networks

4.6
(130 Ratings)

Cato Networks provides a single-vendor SASE (Secure Access Service Edge) platform that enables threat prevention, data protection, and incident detection and response. The Cato SASE Cloud Platform allows businesses to replace legacy infrastructure with a modular SASE architecture based on SD-WAN, a purpose-built global cloud network, and an embedded security stack.

Cato’s cloud-native and global service architecture helps businesses secure and optimize their global hybrid workforces, applications, and data both on-premises and in the cloud, supporting their digital transformation efforts.

Show More Details
Logo of McAfee Web Protection (Legacy)

McAfee Web Protection (Legacy)

By Skyhigh Security

4.5
(122 Ratings)

Skyhigh Security protects organizations with cloud-based Zero Trust security solutions that are both data-aware and simple to use. Our Security Service Edge portfolio goes beyond data access and focuses on data use, allowing organizations to collaborate from any device and from anywhere without sacrificing security, while providing the visibility and control required to monitor and mitigate security risks. The Skyhigh Security Service Edge portfolio includes Skyhigh Secure Web Gateway, Skyhigh Cloud Access Security Broker, Skyhigh Privately Held Access, and Skyhigh Cloud Native Application Protection Platform.

Show More Details
Logo of Symantec Security Service Edge (SSE)

Symantec Security Service Edge (SSE)

By Broadcom

4.4
(120 Ratings)

Broadcom Inc. is a global entity focusing on the design, development, and supply of semiconductor and infrastructure software solutions. Through these operations, the firm addresses the primary issue of providing efficient top-notch technology-based solutions.

Show More Details
Logo of Versa Security Service Edge

Versa Security Service Edge

By Versa Networks

4.8
(119 Ratings)
customers choice 2025

Versa Networks offers SD-WAN, SSE and SASE products delivered via the AI/ML powered Versa Unified SASE platform. Managed from a single pane of glass, Versa products bring together advanced networking and security capabilities, a Zero Trust security foundation, genuine multi-tenancy, and in-depth analytics all delivered as cloud, on-premises, or hybrid deployments. This flexibility is tailored to meet the diverse Zero Trust needs of organizations across all sizes and industries. Versa has thousands of clients worldwide, across hundreds of thousands of sites and millions of users.

Show More Details
Logo of Trend Micro Web Security (Legacy)

Trend Micro Web Security (Legacy)

By Trend Micro

4.7
(109 Ratings)

Trend Micro is a global company specializing in cybersecurity. With comprehensive experience and global threat research, the principal business issue the company addresses is digital safety. Its cybersecurity platform is designed to protect numerous organizations and individuals across diverse clouds, networks, devices, and endpoints. The primary area of operation is in cloud and enterprise cybersecurity distinctive for providing advanced threat defense techniques suitable for various platforms. Additionally, the company offers central visibility for swift and improved detection and response. The threat research team of the company supplies essential intelligence and insights, thereby augmenting the effectiveness of the cybersecurity platform and assisting worldwide organizations in combating cyber threats. With a team of 7,000 employees spread across 65 countries, the primary aim of the company is to assist organizations in securing their connected world.

Show More Details
Logo of Menlo Secure Cloud Browser

Menlo Secure Cloud Browser

By Menlo Security

4.7
(91 Ratings)

Menlo Security, based in Mountain View, California, is focused on addressing threats for organizations through its unique isolation-powered cloud security platform. The firm's solution facilitates the implementation of a secure Zero Trust approach, which is aimed at preventing malicious attacks. The technology is designed to make security non-intrusive, enabling users to work online seamlessly. It also seeks to reduce operational efforts needed by security teams. The ultimate goal is to foster a secure online working environment, which allows the users to perform their duties without apprehension, thereby maintaining business continuity.

Show More Details

Features of Security Service Edge

Updated May 2025

Mandatory Features:

  • Identity-aware forward proxy with decryption and protection capabilities

  • Management and data planes that are primarily cloud-delivered

  • In-line protection of data in SaaS and private apps.

  • Out of band protection of data in SaaS apps via API integration

  • Adaptive and granular access control supporting both devices with an SSE agent (or similar traffic steering method) and devices with no local SSE software or configurations.

  • Integration with external identity providers

Peer Lessons Learned for Security Service Edge

Published October 2024

These lessons focuses on the responses to the questions: “If you could start over, what would your organization do differently?” and “What one piece of advice would you give other prospective customers?”

Peer Lessons Learned for Security Service EdgeLessons learned by your peers shared on Gartner Peer Insights for Security Service EdgePeer Lessons Learned for Security Service EdgeLesson 1LESSON1Define Security and Business Requirements;Ensure Alignment With Key Stakeholders andTeamsLesson 2LESSON2Evaluate SSE Vendors; Conduct POCs andClarify License RequirementsLesson 3LESSON3Plan SSE Configuration and Integration toAddress Key Issues and Ensure Risk ControlLesson 4LESSON4Build a Cross-Functional Team and LeveragePartner Support to Address TechnicalChallengesLesson 5LESSON5Train Users to Accelerate Adoption andMaximize SSE Benefitsn = 652Source: Reviews (652) submitted to Gartner Peer InsightsID: 7306330Gartner ®
Read Full Insights

Gartner Research

Magic Quadrant for Security Service EdgeCritical Capabilities for Security Service Edge
Gartner Peer Insights 'Voice of the Customer': Security Service Edge

Top Trending Products

Prisma AccessMicrosoft Defender for Cloud AppsSkyhigh Cloud PlatformSaaS SecurityCisco Secure AccessFortiClientGlobalProtectCisco Secure ClientZscaler Zero Trust ExchangeSkyhigh Security Service Edge

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.