We performed a comparison between Cloudflare Access and Netskope based on real PeerSpot user reviews.
Find out in this report how the two Secure Access Service Edge (SASE) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The solution is stable."
"The protection offered by the product is the most valuable feature. It detects vulnerabilities or traps on our users' phones and then prompts them to clean up their devices. Tools we used previously would only discover, which required us to gather information on the backend, so Lookout is a welcome upgrade."
"The most valuable features are the antivirus as a whole, the anti-malware, and all of the protection features that scan our enterprise devices."
"On the outside, the main differentiation is because Lookout ingest. They have ingested basically all of the apps for the last ten years and all the versions of all the apps, and we have that in a corporate database that allows us to do very large-scale machine learning and analysis on that data set. That's not something that any of the competitors really have the capability to do because they don't have access to the data set. A lot of the apps you can no longer get them because that version of the app is five or six years old, and it just doesn't exist anywhere anymore, except within our infrastructure. So, the ability to have that very rich dataset and learn from that dataset is a real differentiator."
"Cloudflare, in my opinion, was easy to implement."
"The tool also offers good scalability, and the dashboard, along with real-time analytics, is very good."
"Enables me to work from two locations."
"For Cloudflare Access, I am using the free plan...The most valuable feature is their protection."
"It's the endpoint exposition. We don't need to expose our VPN server to the internet and need a zero-test solution. I can apply some conditional access to the endpoint that's connecting to our network to check their security policies or the security condition of their workstation. Once the workstation is trying to connect to my internal network, then I would like to check the discrete condition of these endpoints that are trying to access my internal network. We created some conditional access. We have CrowdStrike, to check if the CrowdStrike is installed, to check if it's updated, and to check for Windows updates. We created some conditional policies to check it."
"The most useful feature of this solution is Cloud Control, which allows me to schedule cloud uploads."
"The automation offered by the product is pretty solid."
"In Azure, we have multiple subscriptions and with every subscription, we add some kind of instance ID. We can work with the instance ID so that we allow all of the instances containing nodules. Everything else, we block. This way, if you go to outlook.com and check your email, if you log in with your company account, the instance ID will show. The network will take action according to the instance ID and say, "You are using the enterprise email. I'll let you surf. I'll let you see your email." But when you try to log in with your own email address, like Hotmail or Gmail, the instance ID will be different. This way we are not completely blocking Outlook, but we are blocking people from accessing their Outlook. We are only allowing the enterprise-level emails, and we are not allowing user-based emails."
"It's one of the top-ranking solutions in the market, and it's very responsive. We are using Netskope, and Netskope provides a load of features for SQL, STP, and traffic control."
"Netskope has a diverse portfolio range, which includes cloud access security brokers, content filtering, behavior analytics, and security management."
"It's a comprehensive security portfolio solution."
"I have found the most useful features to be the Web Secure Gateway, CASB, infrastructural service scanning, and Zero Trust."
"Netskope's control is user-friendly and comprehensible. It also helps in conveying information effectively as a company, making it crucial for customer satisfaction."
"We just submitted an enhancement request reflecting the main area we want to see improvement in; the APIs. Currently, we're able to build dashboards, but it's somewhat backward because we use our MDM API to create them. Lookout should provide API to customers so we can query our data and use it in our cloud, and this is the only outstanding area for improvement with the product right now."
"The stability depends on the service from where you access it. Because sometimes, the place you are in, you have Gateway. You don't have Gateway. The gateway is overutilized. At the end, you need to go through their gateways. And this is the key point here. You have a tracking point. If it's not well orchestrated, and it scales up as you add more to the existing team, you will suffer"
"Lookout was moving into the SSE space. And so their work on SecureWeb Gateway and SD-WAN is still sort of evolving."
"From the analysis that we've done, they do seem to be maybe a step behind in trying to enter the market with a new solution. But when they do pick up, they do come out with some good products."
"When there are any dynamic changes in complex applications, the tool takes a lot of time, making its analytics-related area a major matter of concern where improvements are needed."
"They don't have a person to provide support for customers using the solution under their free plan."
"For the topic of improvement, providing some training material is one of my suggestions."
"The pricing is an area that can be improved. Pricing, as far as I recall, was the source of our problems."
"In terms of improvements, enhancing support, particularly for OEM support with quicker response times would be beneficial."
"Technical support and the user interface could be improved."
"I would like to have an identity theft protection function."
"Deployment and policy tweaking were two areas where improvement needs to be made."
"Lacking in local customer support."
"Compatibility with other proxy polars would be helpful."
"Third party integration with other cloud applications could be improved. Sometimes the API won't be working, but Netskope is taking it seriously. They accept all the feature requests, and they are trying to provide whatever we ask from them."
"There should be some granular custom roles that are not available. However, this is on the road map. There are many devices that do not have the Zero Trust feature and other enhancements available which they should have."
Cloudflare Access is ranked 11th in Secure Access Service Edge (SASE) with 5 reviews while Netskope is ranked 4th in Secure Access Service Edge (SASE) with 35 reviews. Cloudflare Access is rated 8.8, while Netskope is rated 8.4. The top reviewer of Cloudflare Access writes "Replaces traditional VPN and enables endpoint exposition ". On the other hand, the top reviewer of Netskope writes "Network proxy that provides visibility during deployment and allows you to control PII". Cloudflare Access is most compared with Twingate, Prisma Access by Palo Alto Networks, Zscaler Zero Trust Exchange, Auth0 and CyberArk Privileged Access Manager, whereas Netskope is most compared with Prisma Access by Palo Alto Networks, Zscaler Internet Access, Microsoft Defender for Cloud Apps, Cisco Umbrella and FortiSASE . See our Cloudflare Access vs. Netskope report.
See our list of best Secure Access Service Edge (SASE) vendors.
We monitor all Secure Access Service Edge (SASE) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.