Zero Trust Network Access Reviews and Ratings

What is Zero Trust Network Access?

Gartner defines zero trust network access (ZTNA) as products and services that create an identity and context-based, logical-access boundary that encompasses an enterprise user and an internally hosted application or set of applications. The applications are hidden from discovery, and access is restricted via a trust broker to a collection of named entities, which limits lateral movement within a network.

Products In Zero Trust Network Access Market

"Secure Remote Access with Cisco AnyConnect VPN"

Cisco AnyConnect has been a trustworthy, secure VPN software that has allowed me to connect to to my organization's network and access sensitive data from a remote location.

Read reviews

"Does what it says on the tin."

Easy to use as a vpn client, we use it to connect to systems on our network. Simply log in with our credentials and we're done.

Read reviews

"Robust Tool Offers Swift, User-Friendly Network Access"

This is a robust Tool for safe and secure network access! It connects to VPN within a fraction of a second and the code sync mechanism is very user friendly both with the usage of code and biometrics. It has a very simple user interface for remote and secure network access.

Read reviews

"Cloudflare Access / Zero Trust is very easy to set up and then just works."

Zero Trust provides a very versatile featureset, with easy configuration via UI and Terraform. The performance of the tunnels is excellent and allowed us to fully replace our existing Nginx proxies. The competitive pricing and generous free tier (50 Users) allow evaluating the product before rolling it out to all users.

Read reviews

"NetMotion Mobility User Experience"

I have used and configured various VPN solutions and when i came across NetMotion Mobility, I find that NetMotion Mobility provides more with regards to traffic visibility, manageability, security, reliability and performance. I also find it to be very stable overall with exceptional user and administrator experience plus you get great support from dedicated and highly trained engineers with deep product experience. Traffic Visibility - Provides detailed information to analyze and troubleshoot client connections which are logged in real-time and provide administrators insight to identify and resolve connectivity issues. Security - With the Integrated Network Access Control (NAC), you can validate device configuration prior to connecting plus policy enforcement to restrict network access on a wide range of parameters e.g. Type of Network (Wi-Fi, Wired etc.), Application, Location, Protocol, IP Addresses, Port etc. Performance - Communication between client and server is optimized to improve reliability and performance and with session persistence, mobile workers remain connected during times of poor connectivity or when roaming between networks. It uses message coalescence to merge multiple application sessions into a single data stream and data is encrypted once and not by factor of the number of applications with only 8 bytes of encryption overhead used.

Read reviews

"Global Protect as ZTNA"

Global protect provides a robust security features that align well with the zero trust models such as MFA, device posture and granular access control. Global protect offers seamless connectivity for end users, automatically establish secure connection without constant reauthentication. The platform provides extensive monitoring and visibility into network traffic which is crusial for ZTNA approch. Implementing Global protect as a ZTNA solution is might be costly, especially for smaller organization. The ability to enforce device posture assessment is a key advantage.

Read reviews

"As User Review "

Fully secure, does not consume the bandwidth, remote access

Read reviews

"Revolutionizing Remote Access with Zscaler Private Access"

Zscaler Private Access (ZPA) has been a monumental leap from the traditional VPN services we were running. ZPA provided the connectivity, efficiency and productivity employees required while simultaneously enhancing the overall security posture we required. The ability to provide remote access almost immediately without being constrained by the worries of traditional VPN services has been instrumental throughout the organization.

Read reviews

"Harmony SASE Manifests Hybrid Architecture for Seamless Management"

We are satisfied with our overall experience with Harmony SASE deployment and configuration. We are a Check Point Shop, and once we had a demo of this product, we were excited to implement this into our current platform. Harmony SASE simplifies our hybrid internet access workflows, including instilling secure and granular zero-trust private access from / to users, as well as providing malware protection and web filtering as unique features. Our favorite part of Harmony SASE is how it applies an identity-centric focused policy to all users. This allows management and administering the policy that much easier. With remote work is at an all-time high, this product allows us to maximize high availability, create additional resilience, and also monitor cross-connections to and from any source of Internet. This product provides so many functionalities and has additional capabilities that overall increase security posture, exposure management, policy monitoring and much more.

Read reviews

"NordLayer VPN is easy to use/admin, your only concern will be kicking off behavior change"

NordLayerVPN is one of the main tools that our nonprofit organization uses to protect our online activity. The NordLayer team has been extremely responsive and helpful with everything we've thrown their way from helping to onboard new team members, debug unusual browser activity, and address billing questions and issues.

Read reviews

"Appgate is a stable and fast solution to protect the organization resources."

-The solution is easy to deploy, does not require advanced knowledge and takes less than an hour to get the portal working. -It does not require too much hardware resources for the Controller and gateways. -The HA is easy to configure.

Read reviews

"Cato is great for Zero Trust..."

Cato has been a perfect fit for us. We're a BYOD/WFH company and it lets us easily implement zero-trust access between our users and the resources they need securely and with a bunch of extra security features such as IDP, Malware scanning, and the like.

Read reviews

"Fortinet ZTNA simplifies secure connectivity and reduce the attack surface "

Fortinet ZTNA secures user access by granting it on the principle of least privilege rather than trusting on the basis of correct credential, zero trust authenticates only the correct context when the user , identity, device and other security posture match up. All devices and users including those working remotely are authenticated and verified before they are allowed to access particular application. It does not matter if applications are in data Centre, private cloud, public cloud. Specially good solution for remote users because today hybrid work culture are adopted by all organization and big security challenges have for remote users. Thanks fortinet

Read reviews

"Cisco Duo ZTN Solution Enhances Security through Comprehensive Approach"

Cisco duo zero trust network solution offers a comprehensive approach to security and it is highly positive with its user-friendly interface, seamless authentication via various methods, enhanced security and reliability of cisco duo ZTN solution.

Read reviews

"An Overview of Google Identity Aware Proxy"

Google Identity Aware proxy is a product provided by google and this app is quite beneficial as it adds a protective layer to the apps that are running on Google Cloud. One of the best features of this app that it's completely free of cost making it feasible for many businesses to implement. It's very easy to manage the app, IAP can be managed from the Google Cloud itself which makes it easy to configure and enforce policies. I have been using this software for the past few months and it's been of great help to me. I would highly recommend others to implement the app.

Read reviews

"easy to use across macs and windows"

This is a really easy software to install on machines. It is also very reliable. This is used across all our departments for internal workers and remote workers also.

Read reviews

"Forcepoint One for Unified security"

Best simplified security solution which offers unified platform for securing the organization's data on web, cloud and private applications. Supercool product which has greatly increased the productivity company wide. And i can present the risks and their solution to management more easily.

Read reviews

"Exploring Single Sign-On Capabilities with Cloud Identity"

The best and most widely used Account Creation Authentication tool (Device Login Management).

Read reviews

"Netskope' s Zero Trust : Elevating Security , Redefining Control "

Seamless security transformation with Netskope. Elevated security through Netskope, a true essence of zero trust.

Read reviews

"Review for Google BeyondCorp based on user experience"

Using google BeyondCorp has been a game-changerfor me. No more wrestling with complex security protocols or remembering a bunch of passwords. it;s like Google waved a magic wand over my digital life. I just log in from anywhere. it feels liberating, like breaking free from the shackles fo traditional security hassles. whether I am at the local coffee shop or cozied up at home, my digital space is my fortress, thanks to Beyondcorp. It's like having a personal bodyguard for my data. The simplicity of the experience is the real hero - no more jargon, just smooth sailing through the digital waves. If the goal was to make secuirty invisible yet robust, Goolgle beyondCorp nailed it.

Read reviews
Products 1 - 20