• HOME
  • CATEGORIES

    • CATEGORIES

    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

    • Loading categories...

      Browse All Categories

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
All Categories
/
Security Service Edge

Security Service Edge Reviews and Ratings

What is Security Service Edge?

Gartner defines security service edge (SSE) as an offering that secures access to the web, cloud services and private applications regardless of the location of the user, the device they are using or where that application is hosted. SSE protects users from malicious and inappropriate content on the web and provides enhanced security and visibility for the SaaS and private applications accessed by end users.

Security service edge provides a primarily cloud-delivered solution to control access from end users and devices to applications, as well as websites and the internet. It provides a range of security capabilities, including adaptive access based on identity and context, malware protection, data security and threat prevention, as well as the associated analytics and visibility. It enables more direct connectivity for hybrid users by reducing latency and providing the potential for improved user experience. Capabilities that are integrated across multiple traffic types and destinations allow a more seamless experience for both users and administrators while maintaining a consistent security stance.

Learn More About This Category
How Categories and Markets Are Defined
Highest Rated By Your Peers
For Willingness to Recommend
Logo of Versa SASE
Versa SASE
Logo of Versa Security Service Edge
Versa Security Service Edge
Logo of Fortinet Universal ZTNA
Fortinet Universal ZTNA
For 50M-1B USD Companies
Logo of Fortinet Universal ZTNA
Fortinet Universal ZTNA
Logo of Versa Security Service Edge
Versa Security Service Edge
Logo of FortiSASE
FortiSASE
For North America
Logo of Zscaler Zero Trust Exchange
Zscaler Zero Trust Exchange
Logo of iboss Zero Trust SSE
iboss Zero Trust SSE
Logo of Skyhigh Cloud Platform
Skyhigh Cloud Platform
Integration & Deployment
Logo of Fortinet Universal ZTNA
Fortinet Universal ZTNA
Logo of Versa SASE
Versa SASE
Logo of Versa Security Service Edge
Versa Security Service Edge

Product Listings

Filter by

Products 1 - 20 of 72
Sort by
Logo of Zscaler Zero Trust Exchange

Zscaler Zero Trust Exchange

By Zscaler

4.6
(1108 Ratings)
customers choice 2025

Zscaler Zero Trust Exchange is a cloud-based software designed to provide secure and seamless access to applications and data regardless of user location or device. The software operates on a zero-trust architecture, inspecting all internet and private application traffic to reduce the risk of unauthorized access and data breaches. It enables organizations to manage access policies, segment users, and monitor activity across distributed environments. Zscaler Zero Trust Exchange integrates various security features such as secure web gateway, cloud firewall, data loss prevention, and sandboxing, supporting organizations in protecting users, applications, and sensitive information while facilitating remote work and digital transformation initiatives.

Show More Details
Logo of Cisco Secure Client

Cisco Secure Client

By Cisco Systems

4.4
(799 Ratings)

Cisco Secure Client is a software designed to enable safe remote access and secure endpoint connectivity for organizations. By integrating functions such as VPN access, network visibility, and endpoint posture assessment, the software assists users in maintaining security for their devices and data across different networks. It provides unified policy enforcement and supports compliance requirements by evaluating device health and ensuring trusted connections. The software addresses challenges related to secure access management, reducing risks from unauthorized access and compromising devices while facilitating secure communication between users and organizational resources. Cisco Secure Client is commonly utilized in environments where secure and reliable connectivity for remote or hybrid workers is essential.

Show More Details
Logo of Netskope One SSE

Netskope One SSE

By Netskope

4.5
(583 Ratings)

Netskope One CASB is a software designed to provide cloud access security brokerage solutions for organizations seeking to protect sensitive data across cloud services. The software offers visibility and control over user activity and data interactions within cloud applications, enabling security teams to identify risks and enforce policies. By monitoring and analyzing cloud app usage, it supports compliance requirements and helps prevent data loss through features such as threat protection, access management, and real-time detection of anomalous behaviors. Netskope One CASB integrates with existing security infrastructure to address business concerns related to data security and regulatory compliance in cloud environments.

Show More Details
Logo of FortiClient

FortiClient

By Fortinet

4.7
(448 Ratings)
customers choice 2025

FortiClient is an endpoint security software that provides integrated protection features including antivirus, web filtering, firewall, and VPN capabilities. The software enables secure remote access to corporate networks, helps identify and prevent malware, and enforces security policies across devices. It addresses business needs related to safeguarding endpoints and maintaining compliance with organizational security standards. FortiClient is designed to work within network environments to reduce the risk of data breaches and system compromise by offering centralized management and automated threat response. The software assists organizations in enhancing workforce productivity while maintaining a secure computing environment.

Show More Details
Logo of Forcepoint ONE

Forcepoint ONE

By Forcepoint

4.5
(412 Ratings)

Forcepoint ONE is an all-in-one SSE platform that makes it easy to adopt Zero Trust, protect against threats, and prevent the theft or loss of sensitive data and intellectual property on the web (SWG), in the cloud (CASB), and in internal private applications (ZTNA). It allows organizations to manage one set of policies, in one console, with one endpoint agent. Unique features include 99.99% verified uptime since 2015, more than 300 points of presence worldwide, ability to support in-line proxy of highly latency sensitive apps like Slack, SWG with integrated smart RBI with CDR, and distributed SWG policy enforcement. The solution contains an agentless CASB and ZTNA option for private web applications. The options for Cloud and SaaS Security Posture Management (CSPM and SSPM) flag and optionally auto-remediate risky tenant security settings.

Show More Details
Logo of Microsoft Defender for Cloud Apps

Microsoft Defender for Cloud Apps

By Microsoft

4.4
(375 Ratings)

Microsoft Defender for Cloud Apps is a software designed to provide visibility and control over cloud applications within an organization’s IT environment. It helps monitor user activities, detect abnormal behavior, and safeguard sensitive information across cloud platforms. The software enables policy enforcement for data sharing and access, integrates with other security solutions, and offers threat detection and automated response capabilities. It supports compliance efforts by providing audit trails and alerting on potential policy violations. By delivering insights into app usage and risks, it aids organizations in managing cloud app security and protecting business-critical data against unauthorized access and external threats.

Show More Details
Logo of Fortinet Universal ZTNA

Fortinet Universal ZTNA

By Fortinet

4.9
(307 Ratings)
customers choice 2025

Fortinet Universal ZTNA is a software that provides Zero Trust Network Access to enable secure remote connectivity for users to applications, regardless of location or device. The software verifies user identity, device posture, and application context before granting access, reducing the risk of unauthorized intrusion. It integrates with network and application security infrastructure, supporting a range of deployment options including on-premises and cloud environments. Features include continuous risk assessment, policy enforcement, and adaptive authentication, which work together to control access and minimize attack surfaces. It is designed to address business requirements for secure workforce mobility, hybrid workplace support, and protection against threats targeting remote connections.

Show More Details
Logo of Prisma Access

Prisma Access

By Palo Alto Networks

4.6
(294 Ratings)
customers choice 2025

Prisma Access is a cloud-delivered security software developed by Palo Alto Networks that provides secure access to applications and resources for users regardless of location. The software integrates firewall-as-a-service, secure web gateway, cloud access security broker, and zero trust network access capabilities. Prisma Access helps organizations protect remote and hybrid workforces by offering consistent security policies, threat prevention, and encrypted traffic inspection. The software addresses challenges related to secure connectivity, visibility, and control over application usage while supporting secure connections for mobile users and branch offices. It is designed to simplify network security management and improve compliance across distributed environments.

Show More Details
Logo of Cloudflare One

Cloudflare One

By Cloudflare

4.5
(287 Ratings)

Cloudflare One is a software platform that integrates network security and connectivity features to support secure access to corporate resources and applications. It offers a range of functions including secure web gateway, zero trust network access, cloud access security broker, and firewall as a service. The software enables organizations to authenticate and authorize user traffic, protect devices and data, and manage access to internal and external applications without relying on traditional perimeter-based security models. Cloudflare One addresses the business challenge of enabling secure and scalable remote access while helping to reduce potential attack surfaces and simplifying network management across distributed environments.

Show More Details
Logo of Skyhigh Cloud Platform

Skyhigh Cloud Platform

By Skyhigh Security

4.7
(286 Ratings)

Skyhigh Private Access is the data centric Zero Trust Network Access ZTNA solution that provides integrated Data Loss Prevention DLP scanning and seamless Remote Browser Isolation RBI integration for robust data protection, using Zero Trust principles. Apply a unified policy across web, SaaS, and private apps all from a fully converged, consolidated platform, and managed from the same single console as the rest of the Skyhigh SSE services.

Show More Details
Logo of Check Point Harmony SASE

Check Point Harmony SASE

By Check Point Software Technologies

4.5
(208 Ratings)

Check Point Harmony SASE is a software solution designed to unify network security and secure access service edge functions for organizations. The software integrates secure web gateway, cloud access security broker, zero trust network access, and firewall as a service capabilities to protect data, applications, and users across various locations and devices. It enables secure remote connectivity and applies consistent security policies for users accessing resources both on-premises and in the cloud. Check Point Harmony SASE addresses business challenges related to dispersed workforces and increasing adoption of cloud applications by managing security and networking requirements from a single platform, helping organizations maintain visibility, control, and threat prevention across their digital environments.

Show More Details
Logo of Symantec CloudSOC Cloud Access Security Broker

Symantec CloudSOC Cloud Access Security Broker

By Broadcom

4.3
(203 Ratings)

Symantec CloudSOC Cloud Access Security Broker is a software designed to enable organizations to securely adopt and manage cloud applications. The software provides visibility into cloud app usage, monitors user activities, and helps protect sensitive data through advanced threat detection and analytics. It offers policy enforcement, risk assessment tools, and compliance support. Organizations can manage access to cloud applications and control data sharing to address challenges related to security, compliance, and governance. The software also assists in detecting anomalous behavior and preventing data loss, supporting secure collaboration and regulatory requirements in cloud environments.

Show More Details
Logo of GlobalProtect

GlobalProtect

By Palo Alto Networks

4.4
(156 Ratings)
customers choice 2025

GlobalProtect is a software that enables organizations to secure their network perimeter by extending protection to remote users, mobile devices, and branch locations. It integrates with existing firewall infrastructure to provide consistent security policies across on-premises and remote environments. The software features advanced capabilities such as threat prevention, secure access, and encrypted communications, supporting zero trust network access principles. GlobalProtect addresses business challenges related to maintaining secure connectivity for distributed workforces, managing device compliance, and ensuring visibility and control over network traffic regardless of the user’s location. It is designed to help organizations reduce the risk of unauthorized access and data breaches by enforcing security standards for all endpoints.

Show More Details
Logo of iboss Zero Trust SSE

iboss Zero Trust SSE

By iboss

4.8
(131 Ratings)

iboss Zero Trust Network Access (ZTNA) is an integral part of the iboss SASE platform, providing secure, granular access to applications and resources in your offices and data centers. Replace legacy VPNs with a modern solution that reduces risk, enhances visibility, and simplifies management, ensuring users access only what they need while protecting your organization from modern threats.

Show More Details
Logo of Cato SASE Cloud

Cato SASE Cloud

By Cato Networks

4.6
(130 Ratings)

Cato SASE Cloud is a software platform that integrates networking and security capabilities using a cloud-native architecture. The software combines secure access service edge functions such as SD-WAN, firewall as a service, secure web gateway, cloud access security broker, and zero trust network access. It enables organizations to connect physical locations, cloud resources, and remote users to a unified, secure global network. By providing centralized management and visibility, the software helps address challenges related to complex network infrastructure, security policy enforcement, and remote connectivity. It is designed to support digital transformation initiatives and simplify both connectivity and security management across distributed environments.

Show More Details
Logo of McAfee Web Protection (Legacy)

McAfee Web Protection (Legacy)

By Skyhigh Security

4.5
(122 Ratings)

McAfee Web Protection (Legacy) is a software designed to enable organizations to secure web access for users across various environments. The software provides capabilities such as web filtering, malware defense, and policy enforcement to help prevent unauthorized access and protect against online threats. It analyzes web traffic in real-time, allowing administrators to block or allow content according to organizational requirements. The software integrates into existing network infrastructure to monitor and control internet usage, addressing business concerns around data loss, productivity, and compliance with regulatory standards. It supports deployment across on-premise and cloud architectures, giving flexibility in protecting endpoints and remote users from potentially harmful web content.

Show More Details
Logo of Symantec Security Service Edge (SSE)

Symantec Security Service Edge (SSE)

By Broadcom

4.4
(120 Ratings)

Symantec Security Service Edge is a software designed to deliver cloud-based security for enterprises, focusing on protecting users, devices, applications, and data regardless of location. The software integrates secure web gateway, cloud-access security broker, and zero trust network access capabilities to safeguard access to internet-based resources and sensitive corporate information. It enables unified policy enforcement and threat protection for remote and onsite users, aiming to address challenges associated with distributed workforces and cloud adoption. The software supports consistent security across cloud and on-premises environments, helping organizations reduce risks related to web-based threats, unauthorized access, and data loss.

Show More Details
Logo of Versa Security Service Edge

Versa Security Service Edge

By Versa Networks

4.8
(119 Ratings)
customers choice 2025

Versa Security Service Edge software delivers integrated security and networking capabilities through cloud and on-premises deployment options. The software offers features such as secure web gateway, firewall, intrusion prevention, data loss prevention, and secure remote access. It is designed to protect users, devices, and applications while supporting distributed workforces. Network traffic is monitored and inspected, enabling organizations to enforce security policies and minimize risk across various environments. The software consolidates multiple security functions to address threats and facilitate secure access to resources, helping businesses maintain operational continuity and safeguard digital assets.

Show More Details
Logo of Trend Micro Web Security (Legacy)

Trend Micro Web Security (Legacy)

By Trend Micro

4.7
(109 Ratings)

Trend Micro Web Security (Legacy) is a software designed to provide web threat protection and internet usage management for organizations. It offers URL filtering, malware detection, and real-time scanning to safeguard network endpoints against malicious content. The software enables administrators to set policies for web access, restrict potentially harmful sites, and monitor employee activity online. By analyzing web traffic and blocking unauthorized downloads or phishing attempts, Trend Micro Web Security (Legacy) helps reduce the risk of data breaches and productivity loss caused by unsafe browsing. This software is commonly used in corporate environments to enforce compliance with security standards and protect sensitive information from exposure via the internet.

Show More Details
Logo of SaaS Security

SaaS Security

By Palo Alto Networks

4.3
(92 Ratings)
customers choice 2025

SaaS Security is a software developed by Palo Alto Networks designed to provide security and compliance oversight for software-as-a-service applications in enterprise environments. The software enables organizations to discover, monitor, and control SaaS application usage, helping to identify potential risks associated with data exposure and unauthorized access. It addresses business challenges related to shadow IT and data privacy by offering visibility into user activity, data flows, and application behaviors across sanctioned and unsanctioned SaaS platforms. SaaS Security provides threat detection and policy enforcement to help organizations reduce the risk of data breaches and maintain regulatory compliance while using cloud-based applications.

Show More Details

Features of Security Service Edge

Updated May 2025

Mandatory Features:

  • Identity-aware forward proxy with decryption and protection capabilities

  • Management and data planes that are primarily cloud-delivered

  • In-line protection of data in SaaS and private apps.

  • Out of band protection of data in SaaS apps via API integration

  • Adaptive and granular access control supporting both devices with an SSE agent (or similar traffic steering method) and devices with no local SSE software or configurations.

  • Integration with external identity providers

Peer Lessons Learned for Security Service Edge

Published October 2024

These lessons focuses on the responses to the questions: “If you could start over, what would your organization do differently?” and “What one piece of advice would you give other prospective customers?”

Peer Lessons Learned for Security Service EdgeLessons learned by your peers shared on Gartner Peer Insights for Security Service EdgePeer Lessons Learned for Security Service EdgeLesson 1LESSON1Define Security and Business Requirements;Ensure Alignment With Key Stakeholders andTeamsLesson 2LESSON2Evaluate SSE Vendors; Conduct POCs andClarify License RequirementsLesson 3LESSON3Plan SSE Configuration and Integration toAddress Key Issues and Ensure Risk ControlLesson 4LESSON4Build a Cross-Functional Team and LeveragePartner Support to Address TechnicalChallengesLesson 5LESSON5Train Users to Accelerate Adoption andMaximize SSE Benefitsn = 652Source: Reviews (652) submitted to Gartner Peer InsightsID: 7306330Gartner ®
Read Full Insights

Gartner Research

Magic Quadrant for Security Service EdgeCritical Capabilities for Security Service Edge
Gartner Peer Insights 'Voice of the Customer': Security Service Edge

Top Trending Products

Prisma AccessCisco Secure ClientCisco Secure AccessFortiClientMicrosoft Defender for Cloud AppsNetskope One SSESkyhigh Cloud PlatformSkyhigh Security Service EdgeGlobalProtectSaaS Security

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.