Citrix Secure Workspace Access vs Unisys Stealth comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Citrix Secure Workspace Access and Unisys Stealth based on real PeerSpot user reviews.

Find out what your peers are saying about Tailscale, Twingate, Perimeter 81 and others in ZTNA.
To learn more, read our detailed ZTNA Report (Updated: April 2024).
768,578 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pricing and Cost Advice
  • "There are costs in addition to the standard licensing fees. They should provide better licensing options."
  • More Citrix Secure Workspace Access Pricing and Cost Advice →

    Information Not Available
    report
    Use our free recommendation engine to learn which ZTNA solutions are best for your needs.
    768,578 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:Virtual desktops and virtual apps are most valuable.
    Top Answer:INGPU for engineering software is an area of improvement. There should be better licensing options.
    Top Answer:It is used for INGPU AutoCAD and clerical work. Its deployment is hybrid. It is deployed on a public Azure cloud and on-prem.
    Ask a question

    Earn 20 points

    Ranking
    10th
    out of 34 in ZTNA
    Views
    239
    Comparisons
    120
    Reviews
    1
    Average Words per Review
    395
    Rating
    8.0
    17th
    out of 34 in ZTNA
    Views
    105
    Comparisons
    61
    Reviews
    0
    Average Words per Review
    0
    Rating
    N/A
    Comparisons
    Also Known As
    Citrix Access Control, Citrix Secure Internet Access
    Learn More
    Overview

    Access control is a fundamental component of data security that dictates who’s allowed to access and use company information and resources. Through authentication and authorization, access control policies make sure users are who they say they are and that they have appropriate access to company data. Access control can also be applied to limit physical access to campuses, buildings, rooms, and data centers.

    Unisys Stealth products and services offer cybersecurity solutions that maximize your security posture, maintain regulatory compliance and protect your organization.

    Sample Customers
    The Messenger
    ACH Colombia, Air France KLM, ANBIMA, ANGKASA, Banco de Costa Rica, Barksdale Federal Credit Union, Banestes, Bancolombia
    Top Industries
    VISITORS READING REVIEWS
    Financial Services Firm30%
    Computer Software Company24%
    Comms Service Provider10%
    University6%
    VISITORS READING REVIEWS
    Government22%
    Manufacturing Company14%
    Computer Software Company10%
    Insurance Company7%
    Company Size
    No Data Available
    VISITORS READING REVIEWS
    Small Business25%
    Midsize Enterprise15%
    Large Enterprise60%
    Buyer's Guide
    ZTNA
    April 2024
    Find out what your peers are saying about Tailscale, Twingate, Perimeter 81 and others in ZTNA. Updated: April 2024.
    768,578 professionals have used our research since 2012.

    Citrix Secure Workspace Access is ranked 10th in ZTNA with 2 reviews while Unisys Stealth is ranked 17th in ZTNA. Citrix Secure Workspace Access is rated 8.6, while Unisys Stealth is rated 0.0. The top reviewer of Citrix Secure Workspace Access writes "Makes it convenient to work from home, supports everything I need, and is easy to use". On the other hand, Citrix Secure Workspace Access is most compared with Appgate SDP, Cato SASE Cloud Platform and Perimeter 81, whereas Unisys Stealth is most compared with VMware NSX, Illumio, Cisco Secure Workload and Zscaler Zero Trust Exchange.

    See our list of best ZTNA vendors.

    We monitor all ZTNA reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.