Safe-T Secure Application Access vs Thru comparison

Cancel
You must select at least 2 products to compare!
Netgate Logo
63 views|25 comparisons
100% willing to recommend
Safe-T Logo
68 views|52 comparisons
85% willing to recommend
Thru Logo
168 views|57 comparisons
100% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Safe-T Secure Application Access and Thru based on real PeerSpot user reviews.

Find out what your peers are saying about OpenVPN, Fortinet, Cisco and others in Enterprise Infrastructure VPN.
To learn more, read our detailed Enterprise Infrastructure VPN Report (Updated: March 2024).
768,578 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"It's an ideal gateway solution for small and medium businesses, i.e., around 300 devices can be easily handled.""The solution has good performance."

More Netgate TNSR Pros →

"Safe-T is very good for users because it has plug-in for Outlook.""If you want a very flexible system that you can easily integrate, and develop interfaces for it or plug-ins to other application environments, it's probably the most flexible""It's easy to use over the web. A user who is not in the office can use it and securely insert files.""the security level is very high. After we tested it and checked all the security aspects of the product, we found that it's highly secure."

More Safe-T Secure Application Access Pros →

"The stability of Thru is very good."

More Thru Pros →

Cons
"There must be a more easy-to-use GUI."

More Netgate TNSR Cons →

"The Outlook agent is not working well for installing it in the entire office.""One important thing that we haven't found in this product is the ability to provide a read-only view for documents. Also, the ability for the customer to add annotations to these documents."

More Safe-T Secure Application Access Cons →

"The initial setup of Thru needed an engineer to be involved."

More Thru Cons →

Pricing and Cost Advice
  • "There is not a license required for this solution but the price should be less expensive."
  • More Netgate TNSR Pricing and Cost Advice →

    Information Not Available
  • "Overall, the price of the solution is good for what it does, but when you want to add some features it can get expensive."
  • More Thru Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Enterprise Infrastructure VPN solutions are best for your needs.
    768,578 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:It's an ideal gateway solution for small and medium businesses, i.e., around 300 devices can be easily handled.
    Top Answer:The product is very cost-effective and has no requirement for additional licenses. The setup is not easy. Users need… more »
    Top Answer:THe solution is used as a primary gateway with two lease lines of 450 Mbps total. Around 200 users are under it. There… more »
    Ask a question

    Earn 20 points

    Top Answer:The stability of Thru is very good.
    Top Answer:We purchased the basic solution, only to realize that there is an add-on model that would allow us to manage workflows… more »
    Top Answer:I've been specialising in MFT solutions since 1999, so have quite a lot of experience in this space. I know Thru's… more »
    Comparisons
    Also Known As
    TNSR
    Safe-T SDA, Safe-T, Safe-T Software-Defined Access
    Learn More
    Interactive Demo
    Netgate
    Demo Not Available
    Safe-T
    Demo Not Available
    Overview

    TNSR is an advanced open source-based secure networking software platform with highly-scalable packet processing, manageability, and service expansion capabilities. This video provides a high-level introduction. that address a number of commonly asked new product questions - in just a couple of minutes.



    Safe-T is a provider of Zero Trust Access solutions which mitigate attacks on enterprises’ business-critical services and sensitive data, while ensuring uninterrupted business continuity. 

    Safe-T’s cloud and on-premises solutions ensure that an organization’s access use cases, whether into the organization or from the organization out to the internet, are secured according to the “validate first, access later” philosophy of Zero Trust. 

    This means that no one is trusted by default from inside or outside the network, and verification is required from everyone trying to gain access to resources on the network or in the cloud. 

    Safe-T’s wide range of access solutions reduce organizations’ attack surface and improve their ability to defend against modern cyberthreats. As an additional layer of security, our integrated business-grade global proxy solution cloud service enables smooth and efficient traffic flow, interruption-free service, unlimited concurrent connections, instant scaling and simple integration with our services. 

    With Safe-T’s patented reverse-access technology and proprietary routing technology, organizations of all size and type can secure their data, services and networks against internal and external threats. 

    At Safe-T, we empower enterprises to safely migrate to the cloud and enable digital transformation.

    Thru’s enterprise-class managed file transfer as a service (MFTaaS) started in the cloud in 2002 and continues to provide cloud-based automated file transfer and ad hoc file sharing capabilities to some of the world’s largest corporations. Our cloud-native architecture continually delivers tangible, escalating returns on investment by uniquely addressing the most challenging secure file transfer requirements.

    Meet governance and compliance standards with the help of Thru: Every layer of our service has antivirus scanning, end-to-end encryption and a full audit trail.

    Significantly reduce IT overhead and costs from on-premises servers: Migrate to our cloud to hand off deployment, maintenance, scaling and more to Thru’s award-winning team of file transfer experts.

    Our out-of-the-box MFT connectors and APIs extend integration platform (iPaaS) capabilities, adding persistence and guaranteed delivery to file transfers.

    Execute internal or external file transfers with Thru's distributed hybrid architecture: The Thru Node (an MFT agent) is installed on-premises for internal transfers with orchestration by the cloud.

    Contact Thru to discuss your managed file transfer options.

    Sample Customers
    UCLA, COLUMBIA UNIVERSITY, shopify
    Government of Israel, eviCore Healthcore, Glen Imaging, Sarin, LBG, Rollomatic, Boegli-Gravures SA, Banque Heritage, Groupe Minoteries, Temenos, ZEK, RLM Finsbury, Harel Insurance, Meitav Dash
    Dell EMC, Plus 500, Manhattan Associates, NetworkRail, Blackbaud, AB InBev, Blackwoods, Sage, Crocs
    Top Industries
    VISITORS READING REVIEWS
    Computer Software Company16%
    Comms Service Provider10%
    Manufacturing Company8%
    Government7%
    No Data Available
    No Data Available
    Company Size
    VISITORS READING REVIEWS
    Small Business29%
    Midsize Enterprise18%
    Large Enterprise53%
    No Data Available
    No Data Available
    Buyer's Guide
    Enterprise Infrastructure VPN
    March 2024
    Find out what your peers are saying about OpenVPN, Fortinet, Cisco and others in Enterprise Infrastructure VPN. Updated: March 2024.
    768,578 professionals have used our research since 2012.

    Safe-T Secure Application Access is ranked 44th in Enterprise Infrastructure VPN while Thru is ranked 19th in Managed File Transfer (MFT) with 1 review. Safe-T Secure Application Access is rated 7.8, while Thru is rated 8.0. The top reviewer of Safe-T Secure Application Access writes "The architecture is open to integration and development, making the product very flexible". On the other hand, the top reviewer of Thru writes "Scalable, reliable, and excellent support". Safe-T Secure Application Access is most compared with , whereas Thru is most compared with .

    We monitor all Enterprise Infrastructure VPN reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.