Compare Palo Alto Networks Prisma Access vs. Safe-T Secure Application Access

Palo Alto Networks Prisma Access is ranked 5th in Enterprise Infrastructure VPN with 3 reviews while Safe-T Secure Application Access is ranked 3rd in Enterprise Infrastructure VPN with 3 reviews. Palo Alto Networks Prisma Access is rated 8.4, while Safe-T Secure Application Access is rated 7.4. The top reviewer of Palo Alto Networks Prisma Access writes "Good architecture, software, and interface with strong endpoint protection". On the other hand, the top reviewer of Safe-T Secure Application Access writes "The architecture is open to integration and development, making the product very flexible". Palo Alto Networks Prisma Access is most compared with Zscaler Private Access, Cisco AnyConnect Secure Mobility Client and OpenVPN, whereas Safe-T Secure Application Access is most compared with Zscaler Internet Access, F5 BIG-IP and Palo Alto Networks Prisma Access. See our Palo Alto Networks Prisma Access vs. Safe-T Secure Application Access report.
Cancel
You must select at least 2 products to compare!
Most Helpful Review
Find out what your peers are saying about Palo Alto Networks Prisma Access vs. Safe-T Secure Application Access and other solutions. Updated: November 2019.
384,324 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
The features I find most valuable is WildFire, user integration, and the basic technology features.It's very stable. Sometimes after installing the boxes, we leave them for one or two years. We would just touch the box in the case of the customer needing new requirements or changes to the setup.The initial setup is very straightforward.

Read more »

the security level is very high. After we tested it and checked all the security aspects of the product, we found that it's highly secure.If you want a very flexible system that you can easily integrate, and develop interfaces for it or plug-ins to other application environments, it's probably the most flexible

Read more »

Cons
I would like to see better pricing and an easier logging process. Also, if there was a way to log a global log, everything could go onto the system. It would be better if there was a third log, otherwise one would have to do everything manually.Their next release should provide solutions for the mobile environment.Dependencies of applications sometimes is a bit confusing.

Read more »

One important thing that we haven't found in this product is the ability to provide a read-only view for documents. Also, the ability for the customer to add annotations to these documents.

Read more »

Pricing and Cost Advice
The licensing cost is about 18,000 euros.

Read more »

Information Not Available
report
Use our free recommendation engine to learn which Enterprise Infrastructure VPN solutions are best for your needs.
384,324 professionals have used our research since 2012.
Ranking
Views
4,370
Comparisons
3,591
Reviews
3
Average Words per Review
445
Avg. Rating
8.3
Views
1,111
Comparisons
268
Reviews
6
Average Words per Review
569
Avg. Rating
7.8
Top Comparisons
Also Known As
Prisma Access, GlobalProtect, Palo Alto GlobalProtect Mobile Security ManagerSafe-T SDA, Safe-T, Safe-T Software-Defined Access
Learn
Palo Alto Networks
Safe-T
Overview

Prisma Access provides protection straight from the cloud to make access to the cloud secure. It combines the connectivity and security you need – and delivers it everywhere you need it.



Safe-T is a provider of Zero Trust Access solutions which mitigate attacks on enterprises’ business-critical services and sensitive data, while ensuring uninterrupted business continuity. 

Safe-T’s cloud and on-premises solutions ensure that an organization’s access use cases, whether into the organization or from the organization out to the internet, are secured according to the “validate first, access later” philosophy of Zero Trust. 

This means that no one is trusted by default from inside or outside the network, and verification is required from everyone trying to gain access to resources on the network or in the cloud. 

Safe-T’s wide range of access solutions reduce organizations’ attack surface and improve their ability to defend against modern cyberthreats. As an additional layer of security, our integrated business-grade global proxy solution cloud service enables smooth and efficient traffic flow, interruption-free service, unlimited concurrent connections, instant scaling and simple integration with our services. 

With Safe-T’s patented reverse-access technology and proprietary routing technology, organizations of all size and type can secure their data, services and networks against internal and external threats. 

At Safe-T, we empower enterprises to safely migrate to the cloud and enable digital transformation.

Offer
Learn more about Palo Alto Networks Prisma Access
Learn About Safe-T's Software-Defined Perimeter Solution

Safe-T’s Software-Defined Access Suite takes SDP to the next level, revolutionizing Zero Trust network design. Download this eBook to find out how Safe-T helps you keep your data in the right hands.

Sample Customers
Concord Hospital, State of Colorado, Essilor International, RheinLand Versicherungsgruppe, University of Westminster, Universidade Nove de Julho, SPAR Austria, CAME Group, ZipRealty, Greenhill & Co., IKT Agder, Aviva Stadium, Animal Logic, Management & Training Corporation, Brigham Young University Hawaii, School District of ChilliwackGovernment of Israel, eviCore Healthcore, Glen Imaging, Sarin, LBG, Rollomatic, Boegli-Gravures SA, Banque Heritage, Groupe Minoteries, Temenos, ZEK, RLM Finsbury, Harel Insurance, Meitav Dash
Top Industries
VISITORS READING REVIEWS
Software R&D Company43%
Media Company13%
Comms Service Provider11%
Real Estate/Law Firm4%
No Data Available
Find out what your peers are saying about Palo Alto Networks Prisma Access vs. Safe-T Secure Application Access and other solutions. Updated: November 2019.
384,324 professionals have used our research since 2012.
We monitor all Enterprise Infrastructure VPN reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.
Sign Up with Email