Axis Security vs Netskope comparison

Cancel
You must select at least 2 products to compare!
Lookout Logo
575 views|450 comparisons
71% willing to recommend
HPE Aruba Networking Logo
558 views|344 comparisons
100% willing to recommend
Netskope Logo
8,076 views|6,504 comparisons
97% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Axis Security and Netskope based on real PeerSpot user reviews.

Find out in this report how the two Cloud Access Security Brokers (CASB) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed Axis Security vs. Netskope Report (Updated: March 2024).
768,886 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"On the outside, the main differentiation is because Lookout ingest. They have ingested basically all of the apps for the last ten years and all the versions of all the apps, and we have that in a corporate database that allows us to do very large-scale machine learning and analysis on that data set. That's not something that any of the competitors really have the capability to do because they don't have access to the data set. A lot of the apps you can no longer get them because that version of the app is five or six years old, and it just doesn't exist anywhere anymore, except within our infrastructure. So, the ability to have that very rich dataset and learn from that dataset is a real differentiator.""The protection offered by the product is the most valuable feature. It detects vulnerabilities or traps on our users' phones and then prompts them to clean up their devices. Tools we used previously would only discover, which required us to gather information on the backend, so Lookout is a welcome upgrade.""The solution is stable.""The most valuable features are the antivirus as a whole, the anti-malware, and all of the protection features that scan our enterprise devices."

More Lookout Pros →

"The way the access connectors work is valuable.""The most valuable aspect is its ability to restrict unauthorized access, ensuring that only approved devices can connect to the network. T""I would give it an A-plus for securing access to our applications, devices, and network. It does an extremely good job. Our security folks have analyzed it and tried to find loopholes, but they found none.""The most valuable part so far has been Axis Security's ability to create identity connections to various servers, allowing users to access them. By doing so, we've managed to replace any old or existing VPN access with Axis Security. We are slowly but surely getting rid of our traditional VPN.""The entire suite and the entire ZTNA process are very valuable."

More Axis Security Pros →

"A very straightforward interface.""The most useful feature of this solution is Cloud Control, which allows me to schedule cloud uploads.""It's one of the top-ranking solutions in the market, and it's very responsive. We are using Netskope, and Netskope provides a load of features for SQL, STP, and traffic control.""I have found the most useful features to be the Web Secure Gateway, CASB, infrastructural service scanning, and Zero Trust.""Netskope is a really good product. I cannot segregate which features are the most valuable. We find most of the features to be valuable. It gives us what we are looking for.""The client size and architectural components in Netskope are far better than other solutions.""Their technical support is very good.""Netskope is an efficient, reliable, and easy-to-manage solution."

More Netskope Pros →

Cons
"From the analysis that we've done, they do seem to be maybe a step behind in trying to enter the market with a new solution. But when they do pick up, they do come out with some good products.""We just submitted an enhancement request reflecting the main area we want to see improvement in; the APIs. Currently, we're able to build dashboards, but it's somewhat backward because we use our MDM API to create them. Lookout should provide API to customers so we can query our data and use it in our cloud, and this is the only outstanding area for improvement with the product right now.""The stability depends on the service from where you access it. Because sometimes, the place you are in, you have Gateway. You don't have Gateway. The gateway is overutilized. At the end, you need to go through their gateways. And this is the key point here. You have a tracking point. If it's not well orchestrated, and it scales up as you add more to the existing team, you will suffer""Lookout was moving into the SSE space. And so their work on SecureWeb Gateway and SD-WAN is still sort of evolving."

More Lookout Cons →

"I would appreciate more automated learning capabilities or increased integration with other security tools, allowing us to establish automation.""The support team should be more skilled in offering assistance.""I would like more statistics about what's going on in terms of usage. There is little-to-no usage reporting. That's one thing we've requested, and I think they're working on it.""They need to improve the networking and security tools a little in the troubleshooting and 'bad-actor' areas to help us analyze security threats a little better. They have some things built-in, but I would like to see more advanced tools.""I would like more detailed logging in the Axis Security interface."

More Axis Security Cons →

"The solution's documentation still needs to be improved.""The solution's implementations can be made much easier because, currently, it is complex in nature.""The product's high price is an area of concern where improvements are required.""In terms of improvements, enhancing support, particularly for OEM support with quicker response times would be beneficial.""It needed some fine-tuning on core business sites that we used, which were sensitive to what we term a man-in-the-middle certificate by design. Some sites were not tolerant because they presented as potentially malicious. So, we just had to make some tweaks so that it would bypass or interpret it.""The initial setup is complex and should be simplified.""Third party integration with other cloud applications could be improved. Sometimes the API won't be working, but Netskope is taking it seriously. They accept all the feature requests, and they are trying to provide whatever we ask from them.""I would like to have an identity theft protection function."

More Netskope Cons →

Pricing and Cost Advice
  • "The pricing is fair; it's comparable to our previous solution, and we carried out multiple POCs and POVs (proof of value). The product is worth the money we pay for it."
  • "Lookout is definitely on the lower end when it comes to price point and that seems to be the only differentiator. The technology is in place in this space and it's really about who is coming in at the better price point now."
  • "In terms of feature performance versus cost, they're a good value."
  • "The licensing costs are good. Prisma has much more options and support for security, but it has a higher cost. For example, Lookout costs 2/3rd of Prisma's licensing price."
  • More Lookout Pricing and Cost Advice →

  • "The pricing is quite fair. It's better than what we gave up, which was Cisco AnyConnect."
  • "The pricing is very competitive from what I've seen."
  • More Axis Security Pricing and Cost Advice →

  • "Pricing is a little expensive but it is affordable."
  • "They should work on licensing costs."
  • "The pricing is competitive."
  • "Licensing is on a yearly basis."
  • "The price of the solution is fair but it depends on your use case."
  • "There is a license required for this solution and there are many licensing models available. For example, what applications are covered as part of the license."
  • "I recall that the price was considerably cheaper than that of Zscaler. It was around 60,000 AUD for 1,000 users per year and included some training and some premier support offerings. If we wanted to take advantage of the CASB capabilities, then there was an additional subscription fee, for which we didn't have the budget. On price, I would give Netskope a three or four out of five because it's quite expensive, but it offers a lot of value."
  • "Licensing fees are paid annually."
  • More Netskope Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Cloud Access Security Brokers (CASB) solutions are best for your needs.
    768,886 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The licensing costs are good. Prisma has much more options and support for security, but it has a higher cost. For… more »
    Top Answer:The solution could improve identity integration as well. Zero trust, it's a good start as a zero-trust solution… more »
    Top Answer:The most valuable aspect is its ability to restrict unauthorized access, ensuring that only approved devices can connect… more »
    Top Answer:The support team should be more skilled in offering assistance.
    Top Answer:We researched Netskope but ultimately chose Zscaler Netskope is a cloud access security broker that helps identify… more »
    Top Answer:The product's analytics part is pretty fine.
    Comparisons
    Also Known As
    CipherCloud
    Netskope CASB
    Learn More
    Overview

    Lookout is a well-established and powerful secure web gateway (SWG) solution that protects more than 200 million users from threats that can result from the penetration of unsecured web traffic into their networks. Lookout is designed to enable organizations to work remotely while maintaining a tight blanket of security over their confidential business data. It provides administrators with security that extends from their endpoints to the cloud service that they are using to run their organization’s network. 

    Users of Lookout are able to proactively detect threats and keep themselves secure from a field of threats that constantly evolves. IT teams can protect their organizations without having to rely on any other security solutions. This singular solution can run on multiple kinds of mobile devices. The privacy of individuals is preserved while keeping compliance rules intact. Additionally, users gain access to a number of tools that enable them to prevent security breaches from taking place.

    Lookout Benefits

    Some of the ways that organizations can benefit by deploying Lookout include:

    • Ease of deployment. Lookout is a solution whose design makes it easy for users to deploy it. It provides users with simple, step-by-step instructions that remove the need for organizations to devote extensive amounts of time to make sure that it is properly set up. Anyone can quickly set up the solution without undergoing technical training. 
    • Built-in support. Users of the Lookout application have access to built-in demos that can teach them how to use various solution features. Instead of spending time trying to figure out the application, users can watch the demo that is most relevant to them and see for themselves how that particular feature is used.
    • Easy-to-use user interface. Lookout’s user interface is laid out in an intuitive way that makes it easy for administrators to navigate. This interface is present in both the mobile and desktop versions of this solution. 
    • Settings customization. Lookout has a built-in settings customization menu. This makes it possible for administrators to easily customize their settings so that they best conform to their needs. 

    Lookout Features

    • Activity monitoring and activity tracking. Lookout’s activity monitoring and activity tracking capabilities enable users to keep a close eye on the activities that are taking place in their networks. IT teams and administrators have the ability to watch their networks for any unusual activity. These features ensure that organizations can keep ahead of any potential threats. They provide the kinds of insights and warnings that make the jobs of those IT teams and administrators much easier and more streamlined. 
    • Encryption. Organizations that employ Lookout can encrypt their networks and keep crucial business data from being read by unauthorized parties. This feature keeps the secrets organizations are trying to keep out of the wrong hands.
    • Anti-virus tools. Lookout provides users with tools to block threats from harming their networks. These tools can successfully block 99.6 percent of threats without raising false alarms. 

    Axis Security is a prominent enterprise security solution, specializing in Zero Trust Network Access (ZTNA). The Axis Security Application Access Cloud platform is designed to secure remote access to applications and services hosted in the cloud or on-premises. It aims to simplify and enhance access controls while maintaining strong security measures.

    Axis Security's platform stands out by offering a comprehensive, cloud-native solution designed to enable secure access to private applications. Their Application Access Cloud simplifies network security, eliminating the need for traditional VPNs, and provides a more secure and efficient way to connect users to private applications, regardless of where the users or the applications are located.

    Axis Security users on PeerSpot have highlighted the ease of deployment and the non-intrusive nature of Axis Security's solution as major advantages. One IT Director noted, "The implementation was straightforward and didn’t disrupt our existing operations, which was a major plus." Another user, a Security Manager, praised the platform's robust security features, saying, "Axis Security has significantly enhanced our ability to control and monitor application access, giving us peace of mind in our security operations."

    Axis Security follows the principles of zero-trust architecture, which means it treats every access request as potentially untrusted, regardless of the user's location or network. It applies rigorous authentication and authorization controls to ensure only authorized users can access specific applications and resources. Axis Security enables secure remote access to applications and services without requiring a VPN (Virtual Private Network). It establishes a secure connection between users and applications, protecting against potential threats and reducing the attack surface.

    With Axis Security, organizations can granularly control user access to specific applications or services. This ensures that users only have access to the resources they need, reducing the risk of unauthorized access or data breaches. The platform simplifies access management by providing a centralized control point for managing user access policies. IT administrators can define access rules based on user roles, groups, or other criteria, making it easier to enforce security policies and maintain compliance.

    Axis Security continuously monitors user activity and application access, detecting potential threats and anomalies in real-time. It provides insights into user behavior, allowing organizations to identify and mitigate security risks promptly.

    Axis Security is built on a cloud-native architecture, allowing it to scale and adapt to dynamic cloud environments. It can seamlessly integrate with various cloud services and supports hybrid deployments, making it suitable for organizations with diverse infrastructure setups.

      Axis Security aims to provide secure and simplified remote access to applications while adhering to the principles of zero trust. By implementing granular access controls and continuous monitoring, it helps organizations protect their critical resources and reduce the risk of unauthorized access or data breaches.

      Netscope is a Secure Access Service Edge (SASE) platform that includes core products such as Cloud Access Security Broker (CASB) and Security Service Edge (SSE).

      Netskope CASB is a cloud access security broker tool that allows you to adopt cloud applications and services without sacrificing security. The solution makes it possible to manage the movement of sensitive data between cloud app instances and in the context of app risk and user risk. With Netskope’s industry-leading cloud security solution, you can also prevent sensitive data from being exfiltrated from your environment by risky insiders or malicious cybercriminals who have breached your perimeter.

      Netskope CASB Features

      Netskope CASB has many valuable key features. Some of the most useful ones include:

      • Cloud app risk scoring: With this feature you can automatically audit your traffic to discover your overall risk profile.
      • Advanced data loss protection: The solution’s data loss protection capabilities provide contextual awareness of content being used in the cloud and include machine learning enhancements to simplify, expedite, and accurately scan and classify data.
      • Granular visibility and control: The Netskope CASB solution gives you inline visibility for thousands of apps (managed and unmanaged) in use, including users, file names, activity, and other contextual information.
      • Real-time enforcement: Netskope CASB offers real-time enforcement of security policies to prevent data loss and stop threats.
      • Streamlined operations: Because of its streamlined operations, you can identify, mitigate, and remediate insider threats, compromised accounts, and privileged user threats across web and cloud applications within a single centralized administrative console.
      • Global scale and performance: The solution runs on NewEdge, a carrier-class global network, to provide maximum performance and efficacy worldwide.

      Netskope CASB Benefits

      There are many benefits to implementing Netskope CASB. Some of the biggest advantages the solution offers include:

      • Granular control of personal devices: With Netskope CASB, you can enforce granular control of unmanaged devices that have single-sign-on (SSO) access to managed cloud services, like Box and Microsoft 365.
      • Data protection: The solution has a single pane of glass and a policy interface that is easy to use to create security policies across cloud services, apps, and digital assets.
      • Find cloud services in use and assess risk: Netskope CASB can help you discover 50,000+ cloud apps and also provides risk-ratings for cloud apps so you can devise appropriate security policies.
      • Data exfiltration prevention: By using this solution, you can prevent users on corporate cloud services who download sensitive data from uploading that data to unmanaged or personal cloud apps.
      • Protection against cloud threats: Netskope CASB enables you to stop malware and advanced threats from infected users spreading through your organization. The solution directly blocks malware, whether it’s delivered from collaboration tools or downloaded from a cloud storage service to a sync client.

      Reviews from Real Users

      Netskope CASB is a solution that stands out when compared to many of its competitors. Some of its major advantages are that it offers great reporting, has a good tracking mechanism, and has a solid Cloud Control feature.

      Prerna S., Senior Information Security Analyst II at Workato, says, “[Netskope] CASB has a lot of good features; their reporting and tracking mechanism is amazing.”

      PeerSpot reviewer Dima Z., Director at Irangers International Inc., mentions, “The most useful feature of this solution is Cloud Control, which allows me to schedule cloud uploads.”

      Syed H., Lead Cloud Security Practice at Vincacyber, states, "I have found the most useful features to be the Web Secure Gateway, CASB, infrastructural service scanning, and Zero Trust."

      Sample Customers
      Cardenas Markets, Armis, Alnylam Pharmaceuticals, Visionworks
      NetApp, Genomic Health, Caterpillar, Apollo, Pandora, Continental Resources, Fractal, infinera, Tesla
      Top Industries
      VISITORS READING REVIEWS
      Computer Software Company20%
      Financial Services Firm10%
      Manufacturing Company10%
      Government6%
      VISITORS READING REVIEWS
      Computer Software Company18%
      Educational Organization14%
      Manufacturing Company6%
      Healthcare Company6%
      REVIEWERS
      Computer Software Company24%
      Manufacturing Company24%
      Financial Services Firm14%
      Security Firm10%
      VISITORS READING REVIEWS
      Computer Software Company17%
      Financial Services Firm15%
      Manufacturing Company8%
      Insurance Company5%
      Company Size
      VISITORS READING REVIEWS
      Small Business22%
      Midsize Enterprise16%
      Large Enterprise62%
      VISITORS READING REVIEWS
      Small Business29%
      Midsize Enterprise24%
      Large Enterprise47%
      REVIEWERS
      Small Business39%
      Midsize Enterprise18%
      Large Enterprise42%
      VISITORS READING REVIEWS
      Small Business21%
      Midsize Enterprise14%
      Large Enterprise66%
      Buyer's Guide
      Axis Security vs. Netskope
      March 2024
      Find out what your peers are saying about Axis Security vs. Netskope and other solutions. Updated: March 2024.
      768,886 professionals have used our research since 2012.

      Axis Security is ranked 9th in Cloud Access Security Brokers (CASB) with 5 reviews while Netskope is ranked 4th in Cloud Access Security Brokers (CASB) with 35 reviews. Axis Security is rated 9.6, while Netskope is rated 8.4. The top reviewer of Axis Security writes "Easy to deploy, improved reliability and performance of our connectivity, and greatly reduced costs". On the other hand, the top reviewer of Netskope writes "Network proxy that provides visibility during deployment and allows you to control PII". Axis Security is most compared with Zscaler Zero Trust Exchange, Prisma Access by Palo Alto Networks, Fortinet FortiGate SWG, Cato SASE Cloud Platform and Zscaler B2B, whereas Netskope is most compared with Zscaler Internet Access, Prisma Access by Palo Alto Networks, Microsoft Defender for Cloud Apps, Cisco Umbrella and Zscaler Zero Trust Exchange. See our Axis Security vs. Netskope report.

      See our list of best Cloud Access Security Brokers (CASB) vendors and best Secure Access Service Edge (SASE) vendors.

      We monitor all Cloud Access Security Brokers (CASB) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.