Cisco Umbrella offers flexible, cloud-delivered security according to users’ requirements Cisco Umbrella includes secure web gateway, firewall, and cloud access security broker (CASB) functionality all delivered from a single cloud security service. Cisco Umbrella’s protection is extended to devices, remote users, and distributed locations anywhere. As company employees work from many locations and devices, Cisco Umbrella is the easiest way to effectively protect users everywhere in minutes.
The pricing is fair.
You can request an evaluation license.
The pricing is fair.
You can request an evaluation license.
Prisma Access by Palo Alto Networks provides consistent security for all users and applications across your remote networks. Prisma Access grants users safe access to the cloud and data center applications and the internet as well. In addition, the solution combines all of your security and networking capabilities into a single cloud-delivered platform, enabling flexible hybrid workforces.
Actually the solution is very expensive. I don't know the particulars since the purchasing team dealt with it.
The pricing for this solution is on the higher end.
Actually the solution is very expensive. I don't know the particulars since the purchasing team dealt with it.
The pricing for this solution is on the higher end.
OpenVPN Access Server is a comprehensive VPN solution that enables secure remote access and site-to-site connectivity. It uses the open-source OpenVPN protocol with added encryption and authentication for robust security. The web-based admin interface simplifies setup and centralized management of users, devices, and access controls.
It is free, you buy support.
The Pro Edition has a reasonable price per user.
It is free, you buy support.
The Pro Edition has a reasonable price per user.
F5 BIG-IP LTM optimizes the speed and reliability of your apps via both network and application layers. Using real-time protocol and traffic management decisions based on app and server and connection management conditions, and TCP and content offloading, BIG-IP LTM dramatically improves application and infrastructure responsiveness. BIG-IP LTM's architecture includes protocol awareness to control traffic for the most important applications. BIG-IP LTM tracks the dynamic performance levels of servers and delivers SSL performance and visibility for inbound and outbound traffic, to protect the user experience by encrypting everything from the client to the server.
Though functionality is high, its cost can be considered slightly higher than its competitors.
The only area that has room for improvement would be pricing, so its competitors do not have a say.
Though functionality is high, its cost can be considered slightly higher than its competitors.
The only area that has room for improvement would be pricing, so its competitors do not have a say.
Okta Workforce Identity is a powerful solution that provides single sign-on capabilities and centralized access control for multiple applications. Its most valuable features include workflows, multiple SSO protocols, and Active Directory integrations. It helps organizations by simplifying access management, improving security with multi-factor authentication, and streamlining user provisioning. It is particularly beneficial for large employers, retail chains, and organizations with a significant number of employees. Okta Workforce Identity is easy to use, scalable, and reliable, making it an essential tool for identity and access management.
License is around US$20,000 annually.
It is costly for large companies.
License is around US$20,000 annually.
It is costly for large companies.
Netscope is a Secure Access Service Edge (SASE) platform that includes core products such as Cloud Access Security Broker (CASB) and Security Service Edge (SSE).
Pricing is a little expensive but it is affordable.
They should work on licensing costs.
Pricing is a little expensive but it is affordable.
They should work on licensing costs.
Cisco AnyConnect Secure Mobility is a unified agent that provides different security services to help empower and protect organizations. It offers the visibility and control you need to figure out who and what is gaining access to your extended company before, during, and after an attack.
Sometimes there is a problem with the number of licenses for the end-user. The number of concurrent users is limited due to a valid license.
The pricing depends on the requirement, so proper planning and an RF analysis help to properly size the solution and get the best pricing.
Sometimes there is a problem with the number of licenses for the end-user. The number of concurrent users is limited due to a valid license.
The pricing depends on the requirement, so proper planning and an RF analysis help to properly size the solution and get the best pricing.
Lookout is a well-established and powerful secure web gateway (SWG) solution that protects more than 200 million users from threats that can result from the penetration of unsecured web traffic into their networks. Lookout is designed to enable organizations to work remotely while maintaining a tight blanket of security over their confidential business data. It provides administrators with security that extends from their endpoints to the cloud service that they are using to run their organization’s network.
In terms of feature performance versus cost, they're a good value.
In terms of feature performance versus cost, they're a good value.
Cisco Duo is a cloud-based access management platform that secures access to all applications, for any user and device, from anywhere. It’s designed to be both easy to use and deploy, while providing complete endpoint visibility and control.
During testing we are allowed a certain number of licenses for free.
Its price is reasonable. It is not highly expensive.
During testing we are allowed a certain number of licenses for free.
Its price is reasonable. It is not highly expensive.
Cato Networks is a leading SASE (Secure Access Service Edge) platform, combining SD-WAN and network security to obtain a cloud-native service. Cato Networks optimizes and secures application access for users and identities. The platform delivers a next-generation secure networking architecture that minimizes legacy IT infrastructures’ complexity, costs, and risks. The goal of Cato Suite is to connect any user to any application securely and optimally.
The price is not an issue for us, as it is priced more competitively than some other vendors.
If you compare with VeloCloud, the price is the same or even cheaper.
The price is not an issue for us, as it is priced more competitively than some other vendors.
If you compare with VeloCloud, the price is the same or even cheaper.
Remote secure access VPN is a solution that provides users with remote access to an organization’s network. The host may have VPN client software loaded or use a web-based client. The solution leverages security features like multi-factor authentication, endpoint scanning, and encryption of all data in motion.
The price of this product is good.
Organizations that already have the Check Point NGFW need to purchase an additional license to have access to the VPN functionality.
The price of this product is good.
Organizations that already have the Check Point NGFW need to purchase an additional license to have access to the VPN functionality.
VMware Software-Defined Wide Area Network (SD-WAN) is a secure access service edge (SASE) platform that combines many types of software-based network technologies in an attempt to enable users to virtualize their wide area networks and reduce their reliance on hardware. In essence, this solution makes it possible for users to reliably access their applications from anywhere in the world by leveraging cloud technologies. Users can simply, efficiently, and completely control their network devices and traffic. It ensures that organizations are always able to use the best possible connection to their data centers. VMware SD-WAN steers traffic so that it is always using the most reliable connections and at the same time takes steps to remediate any problems that it detects in other network links. This guarantees that organizations can access high-priority applications at all times.
VeloCloud performs as well as the Cisco SD-WAN but it is cheaper in price.
The price of this solution is higher than that of other SD-WAN vendors.
VeloCloud performs as well as the Cisco SD-WAN but it is cheaper in price.
The price of this solution is higher than that of other SD-WAN vendors.
Appgate SDP is a network access control tool for local and remote access, multifactor authentication, and micro-segmentation. It is a flexible, robust, and configurable tool with good documentation, interface improvements, and ease of deployment.
It is a pretty expensive tool. It is maybe about $20,000 per year for a hundred users or so.
We pay $100 per user per month. One license for the site is around $17.
It is a pretty expensive tool. It is maybe about $20,000 per year for a hundred users or so.
We pay $100 per user per month. One license for the site is around $17.
Skyhigh Security protects organizations with cloud-based Zero Trust security solutions that are both data-aware and simple to use. Skyhigh’s Security Service Edge portfolio goes beyond data access and focuses on data use, allowing organizations to collaborate from any device and from anywhere without sacrificing security, while providing the visibility and control required to monitor and mitigate security risks.
Skyhigh provided a FedRAMP solution, tokenization, a better shadow IT capability, and lower cost.
The biggest thing to watch for is the difference in price per monitored user for the different API integrations.
Skyhigh provided a FedRAMP solution, tokenization, a better shadow IT capability, and lower cost.
The biggest thing to watch for is the difference in price per monitored user for the different API integrations.
Cloudflare Access is a powerful identity and access management solution that provides secure and seamless access to internal resources. It eliminates the need for traditional VPNs and allows organizations to enforce granular access controls based on user identity and device posture. With Cloudflare Access, users can authenticate using their existing identity providers, such as Google or Okta, and access resources without exposing them to the public internet. This ensures that only authorized users can access sensitive data and applications.
The prices are slightly expensive.
The pricing is somewhere in the middle. I would rate the pricing a seven out of ten.
The prices are slightly expensive.
The pricing is somewhere in the middle. I would rate the pricing a seven out of ten.
Perimeter 81 is a cloud-based network security and software-defined perimeter (SDP) solution designed to provide secure access to resources in the cloud, data centers, and on-premises environments. It offers a unified platform for organizations to manage and secure their network infrastructure, regardless of the location or type of resources.
Overall I am very happy with the solution’s flexibility and pricing.
The cost of the solution's licenses depends on the particular use cases.
Overall I am very happy with the solution’s flexibility and pricing.
The cost of the solution's licenses depends on the particular use cases.
The Versa Unified Secure Access Service Edge (SASE) Platform is a comprehensive solution that provides secure access to cloud applications and services. It combines networking and security functions into a single platform, making it easier for organizations to manage their network infrastructure. The platform includes features such as SD-WAN, VPN, firewall, web filtering, and more. It also offers advanced security capabilities such as intrusion prevention, malware protection, and threat intelligence. With the Versa SASE Platform, organizations can ensure secure access to their cloud applications and services from any location, while also reducing costs and simplifying network management.
The price is expensive but it makes sense for the market.
While I cannot provide too much commentary on the price, I feel it to be fair for the moment.
The price is expensive but it makes sense for the market.
While I cannot provide too much commentary on the price, I feel it to be fair for the moment.
FortiSASE is a comprehensive security solution that combines SD-WAN, security, and Zero Trust Network Access (ZTNA) capabilities in a single platform. It provides secure access to applications and data from any device, anywhere, and at any time. FortiSASE offers advanced threat protection, real-time visibility, and control over network traffic, ensuring that organizations can securely connect their users and devices to the cloud and on-premises resources. With FortiSASE, organizations can simplify their security infrastructure, reduce costs, and improve their overall security posture.
Fortinet is very aggressive in its pricing.
I rate the product's price a six on a scale of one to ten, where one is low price and ten is high price.
Fortinet is very aggressive in its pricing.
I rate the product's price a six on a scale of one to ten, where one is low price and ten is high price.
Akamai Enterprise Application Access is a cloud-based solution that provides secure access to enterprise applications and data from any device, anywhere. It eliminates the need for traditional VPNs and allows organizations to easily manage access to applications and data for employees, partners, and customers. With its zero-trust approach, it ensures that only authorized users can access sensitive information, reducing the risk of data breaches.
Licensing is based on user count.
The license can be shared based on the number of active users.
Licensing is based on user count.
The license can be shared based on the number of active users.
iBoss is a leading provider of cloud-based cybersecurity solutions that help organizations protect their networks and data from cyber threats. The company's products include web security, email security, mobile security, and advanced threat protection. iBoss's solutions are designed to be easy to use and manage, while providing comprehensive protection against a wide range of cyber threats. One of the key features of iBoss's products is their ability to provide real-time threat intelligence and analysis. This allows organizations to quickly identify and respond to potential threats, before they can cause damage to their networks or data. iBoss's solutions also include advanced analytics and reporting capabilities, which help organizations gain insights into their network activity and identify potential vulnerabilities. Another important aspect of iBoss's products is their scalability and flexibility. The company's solutions are designed to work seamlessly with a wide range of network architectures and devices, making them ideal for organizations of all sizes and types. iBoss's cloud-based approach also means that organizations can easily scale their cybersecurity solutions as their needs evolve over time. iBoss's products provide a comprehensive and effective solution for organizations looking to protect their networks and data from cyber threats. With their advanced threat intelligence, analytics, and reporting capabilities, as well as their scalability and flexibility, iBoss's solutions are an excellent choice for any organization looking to enhance its cybersecurity posture.
It is expensive compared to one of its competitors.
It is expensive compared to one of its competitors.
Netskope Next Gen Secure Web Gateway is a comprehensive cloud-based security solution that provides advanced threat protection, data loss prevention, and web filtering capabilities. It offers real-time visibility and control over web traffic, enabling organizations to enforce policies and protect against web-based threats. The solution uses machine learning and behavioral analysis to detect and block advanced threats, including malware, phishing, and ransomware. It also provides granular control over web access, allowing organizations to block or allow specific websites and applications based on user, group, or location. With Netskope Next Gen Secure Web Gateway, organizations can ensure compliance with industry regulations and protect sensitive data from unauthorized access or exfiltration. The solution is easy to deploy and manage, with a user-friendly interface and centralized policy management.
We pay a licensing fee of $10,000 on a yearly basis.
The license model is based on the number of users. You have the possibility to have 10,000 users if you wish.
We pay a licensing fee of $10,000 on a yearly basis.
The license model is based on the number of users. You have the possibility to have 10,000 users if you wish.
Menlo Security Remote Browser Isolation (RBI) fully enables the way people work by giving administrators the ability to set acceptable use policies to block malicious activity—including compromised websites, cybersquatting, file uploads and downloads, social posting, and other unknown threats. All web content and documents, across a broad browser ecosystem, are safely and accurately rendered in the cloud, away from your endpoints. Admins get all the granular controls and policies they need, while minimizing power draw and keeping the user experience intact. Enable rapid provisioning of users, while guaranteeing connectivity from any location. The Global Elastic Cloud promises secure, optimal web access for remote sites and mobile users worldwide.
Menlo Security RBI can be very costly.
Menlo Security RBI can be very costly.
Axis Security is a prominent enterprise security solution, specializing in Zero Trust Network Access (ZTNA). The Axis Security Application Access Cloud platform is designed to secure remote access to applications and services hosted in the cloud or on-premises. It aims to simplify and enhance access controls while maintaining strong security measures.
The pricing is quite fair. It's better than what we gave up, which was Cisco AnyConnect.
The pricing is very competitive from what I've seen.
The pricing is quite fair. It's better than what we gave up, which was Cisco AnyConnect.
The pricing is very competitive from what I've seen.
Forcepoint ONE is a comprehensive cybersecurity platform that provides organizations with a unified approach to protecting their critical data and assets. It offers a range of solutions that cover everything from network security and cloud security to data protection and insider threat prevention. With Forcepoint ONE, organizations can gain complete visibility into their security posture, identify potential threats, and take proactive measures to mitigate risks. One of the key features of Forcepoint ONE is its ability to provide real-time visibility into user behavior across all endpoints, networks, and cloud environments. This allows organizations to quickly identify and respond to potential threats, such as insider threats or malicious activity from external actors. Additionally, Forcepoint ONE offers advanced threat intelligence capabilities that leverage machine learning and AI to detect and respond to emerging threats. Another important aspect of Forcepoint ONE is its data protection capabilities. The platform offers a range of solutions for protecting sensitive data, including data loss prevention (DLP), encryption, and secure web gateways. These solutions help organizations ensure that their critical data is protected both at rest and in transit, regardless of where it is stored or accessed. Forcepoint ONE is a powerful cybersecurity platform that offers a comprehensive set of solutions for protecting organizations against a wide range of threats. With its advanced threat intelligence capabilities, real-time visibility into user behavior, and robust data protection features, Forcepoint ONE is an ideal choice for organizations looking to take a proactive approach to cybersecurity.
Typically, the longer you price forward, the better off you're going to be. They have been very willing to work with us on pricing.
We have our pricing by user. We do our pricing agreements annually. There are also additional costs for maintenance.
Typically, the longer you price forward, the better off you're going to be. They have been very willing to work with us on pricing.
We have our pricing by user. We do our pricing agreements annually. There are also additional costs for maintenance.
Netskope Private Access is an integral component of the Netskope Security Cloud platform that provides zero-trust secure access to enterprise applications and data in hybrid IT (public cloud and data center) environments. It offers comprehensive policy management, compliance assessment, and supports any application, protocol, and device to reduce risk and simplify security operations.
When it comes to pricing, Netskope Private Access is relatively cheap compared to other solutions.
I believe that the price for Netskope Private Access is included in the features or functionality my company purchased from NetSkope.
When it comes to pricing, Netskope Private Access is relatively cheap compared to other solutions.
I believe that the price for Netskope Private Access is included in the features or functionality my company purchased from NetSkope.
Google’s mission is to organize the world‘s information and make it universally accessible and useful.
I think that the cost is metered based on the data, but I don't have the details.
Its price is good. For each server, we are saving $300 a month. We have at least thousands of servers. It is a huge cost reduction for us.
I think that the cost is metered based on the data, but I don't have the details.
Its price is good. For each server, we are saving $300 a month. We have at least thousands of servers. It is a huge cost reduction for us.
Google BeyondCorp Remote Access is a secure solution that enables organizations to provide remote access to their internal resources without the need for a traditional VPN. The primary use case for this product is to allow employees to securely access company resources from anywhere, ensuring productivity and flexibility.
The most valuable functionality of Google BeyondCorp Remote Access is its zero-trust approach. It verifies every user and device attempting to connect, irrespective of their location, ensuring only authorized users gain access to resources. This eliminates the need for complex VPN configurations and reduces the risk of unauthorized access.
By adopting Google BeyondCorp Remote Access, organizations can enhance their security posture and simplify access management. It provides granular control over user access, allowing administrators to set policies based on device health, user context, and other attributes. This reduces the attack surface and minimizes the risk of data breaches or unauthorized access to sensitive information. Furthermore, the product integrates seamlessly with other Google Cloud services, making it easy to manage and scale as per organizational requirements.
SonicWall Mobile Connect gives your employees safe, easy access to the data and resources they need to be productive from a range of devices, including iOS, OS X, Android, Chrome OS, Kindle Fire and Windows. Display only the resources to which your workforce is authorized based on your policies for each user and mobile platform. Ensure that your corporate network is protected from mobile threats and unauthorized access with our durable secure VPN client.
Secure Access Service Edge (SASE) promises a better way to protect hybrid work and cloud networks. But existing solutions are fragmented and frustrating for users. Quantum SASE from Check Point is different. Quantum SASE delivers 2x faster internet security combined with full mesh Zero Trust Access and optimized SD-WAN performance—all with an emphasis on ease-of-use and streamlined management.
Annual licenses cost $30 to $40 each.
I would rate Harmony Connect's pricing at six out of ten. It wasn't particularly expensive, but it wasn't super cheap either.
Annual licenses cost $30 to $40 each.
I would rate Harmony Connect's pricing at six out of ten. It wasn't particularly expensive, but it wasn't super cheap either.
Wandera Threat Defense helps businesses ensure a productive workforce, by defending both managed and unmanaged devices against the full spectrum of mobile threats. The solution includes security protections on the device and in the network, allowing for effective and targeted policy actions against even the most sophisticated attacks. Wandera Threat Defense is powered by MI:RIAM, a leading threat intelligence engine that learns in real-time through signals from 425 million sensors around the globe.
It's relatively inexpensive.
The solution's price is reasonable.
It's relatively inexpensive.
The solution's price is reasonable.
NordLayer, developed by the high standards of NordVPN, offers flexible and easy-to-implement cybersecurity tools for companies of any size or work model.
Symantec CloudSOC CASB is a cloud access security broker that provides visibility and control over cloud applications and services. It offers a comprehensive set of security capabilities, including data loss prevention, threat protection, and compliance management. With CloudSOC CASB, organizations can gain insight into cloud usage patterns, identify potential risks, and enforce policies to protect sensitive data. The solution integrates with leading cloud providers, such as Microsoft Office 365, Salesforce, and Box, to provide seamless protection across multiple cloud environments.
SDP – provides knowledge of who connected, from where, to what, when etc. in real-time and with far fewer resources than SEIMs require.
Zscaler B2B (ZB2B) is a cloud service that provides your business customers fast, seamless, and secure access to applications over the internet, whether they’re hosted in the data center or public and private clouds.
Maintaining user privacy is critical to the success of any mobile enterprise. But user privacy isn’t just limited to personal apps and content on the device; it extends to the network as well. That means IT must be able to secure traffic from enterprise apps without capturing personal traffic, such as a user posting a family photo on Facebook. As a result, protecting employee privacy requires IT to move beyond device-wide VPNs to more secure, intelligent, and granular app VPNs.
The product has average pricing.
The product has average pricing.
We are not happy with the recent increase in the price.
We are not happy with the recent increase in the price.
AT&T Virtual Private Network (AT&T VPN) is a network-based IP VPN solution with a wide range of features and the flexibility to choose the options you require today, and over time. ... Network Convergence Integrate multiple disparate voice, video and data networks to a single MPLS IP network.
NetFoundry is a cloud-native networking solution that enables businesses to securely and easily connect their applications and data across any set of endpoints, clouds, and networks. With NetFoundry, businesses can create and manage their own private networks, without the need for complex VPNs or dedicated hardware. NetFoundry's solution is built on a zero-trust security model, which means that all traffic is authenticated and encrypted, and access is only granted to authorized users and devices. This ensures that businesses can protect their data and applications from cyber threats, without compromising on performance or user experience. NetFoundry's solution is also highly flexible and scalable, allowing businesses to easily add or remove endpoints, clouds, and networks as their needs change. This makes it an ideal solution for businesses of all sizes, from small startups to large enterprises. Overall, NetFoundry's cloud-native networking solution provides businesses with a secure, flexible, and easy-to-use way to connect their applications and data across any set of endpoints, clouds, and networks. With NetFoundry, businesses can focus on their core operations, without worrying about the complexities of networking and security.
The price is very reasonable compared to others and the cloud service is free.
I don't have the cost, but in terms of its management viability, it is acceptable for most of our clients. It seems quite fair.
The price is very reasonable compared to others and the cloud service is free.
I don't have the cost, but in terms of its management viability, it is acceptable for most of our clients. It seems quite fair.
Unisys Stealth products and services offer cybersecurity solutions that maximize your security posture, maintain regulatory compliance and protect your organization.
Open Systems Secure SD-WAN is a cloud-native solution designed to deliver secure and reliable connectivity to distributed organizations. Its primary use case is to connect remote offices, data centers, and cloud resources while ensuring that all traffic is encrypted and protected from cyber threats. The most valuable functionality of Open Systems Secure SD-WAN is its ability to provide end-to-end security and visibility across all network traffic. It uses advanced threat intelligence to detect and prevent cyber threats in real-time, and it can automatically route traffic to the most optimal path based on performance and security requirements. With Open Systems Secure SD-WAN, organizations can benefit from reduced costs and increased productivity by consolidating multiple network functions into a single platform. It also provides centralized management and monitoring, making it easy to configure and troubleshoot the network from a single pane of glass.
Vidder's PrecisionAccess screens both user and device to ensure they’re trusted before connecting them to protected applications — in three simple steps:
Juniper Secure Edge is a comprehensive security solution designed to protect organizations from cyber threats. Its primary use case is to provide secure access to corporate resources for remote employees and guests. The solution includes a range of features such as firewall, VPN, web filtering, and intrusion prevention. The most valuable functionality of Juniper Secure Edge is its ability to provide secure access to corporate resources from anywhere, at any time. It enables organizations to extend their security perimeter beyond the traditional network edge and secure remote access for their employees and guests. This is especially important in today's distributed work environment where employees work from home, coffee shops, airports, and other unsecured locations. Juniper Secure Edge helps organizations by providing a single platform to manage their security policies and enforce them consistently across their network. It helps IT teams to reduce the complexity of managing multiple security solutions and simplifies the process of securing remote access. The solution provides real-time visibility into network traffic and alerts IT teams to potential security threats. In summary, Juniper Secure Edge is a comprehensive security solution that provides secure access to corporate resources for remote employees and guests. Its most valuable functionality is its ability to extend the security perimeter beyond the traditional network edge and secure remote access from anywhere. It helps organizations by simplifying the management of security policies and providing real-time visibility into network traffic.
Based in Melbourne, AVG Technologies AU sells AVG Technologies' range of internet security, PC performance optimisation, mobile security and identity protection products to the Australian, New Zealand and South Pacific markets.
Cloud over IP (CoIP) is the next-generation virtual overlay network that is secure, portable, easy to implement, and does not disrupt the existing enterprise network or perimeter security infrastructure. CoIP implements an overlay network for hybrid cloud applications that enables migration from the enterprise to the cloud while shielding applications running in a hybrid cloud environment. In sum, CoIP provides the cloud ecosystem with the security, ease of deployment and accelerated time-to-production that will drive widespread cloud adoption.