Cisco Umbrella offers flexible, cloud-delivered security according to users’ requirements Cisco Umbrella includes secure web gateway, firewall, and cloud access security broker (CASB) functionality all delivered from a single cloud security service. Cisco Umbrella’s protection is extended to devices, remote users, and distributed locations anywhere. As company employees work from many locations and devices, Cisco Umbrella is the easiest way to effectively protect users everywhere in minutes.
The pricing is fair.
You can request an evaluation license.
The pricing is fair.
You can request an evaluation license.
Microsoft Entra ID, previously known as Azure AD (Active Directory), is Microsoft's cloud-based identity and access management (IAM) solution. Designed to help organizations of all sizes manage user identities and create an intelligent security perimeter around their cloud and on-premise resources. Microsoft Entra ID or Azure AD is integral to the Microsoft 365 and Azure ecosystems. It provides a robust set of capabilities to manage users and groups and secure access to applications in a centralized, streamlined manner.
Microsoft Entra ID (Azure AD) is a login system, morphing into a sophisticated identity and access management (IAM) solution for the modern, hybrid workplace. Imagine a single vault for all your digital keys – that's the essence of Entra ID's identity management. It acts as a central repository for user identities, encompassing usernames, passwords, and even additional attributes like department or employee role.
These capabilities enabled simplified administration using a unified platform for adding, modifying, and deleting user accounts. Users no longer need to remember login credentials for a plethora of applications. Entra ID streamlines access by using the same identity across various cloud services and on-premises resources (if integrated). Centralized identity management allows for stricter enforcement of security policies and password complexity requirements across the organization.
Authentication sits at the heart of the solution, ensuring only authorized users gain access to sensitive resources. It employs a multi-pronged approach:
For organizations with on-premises infrastructure, Microsoft Entra ID (Azure AD) offers hybrid identity options. This allows for a smooth integration between on-premises Active Directory and Entra ID, providing a consistent identity for users across both environments. It enables organizations to leverage their existing investments in on-premises infrastructure while taking advantage of cloud scalability and flexibility.
In conclusion, Microsoft Entra ID (Azure AD) is a comprehensive IAM solution that addresses the complex challenges of managing and securing identities in a cloud-centric world. Its blend of ease of use, security, and integration capabilities makes it an essential component of modern IT infrastructure, supporting both operational efficiency and strategic business objectives.
The licensing cost is a bit prohibitive.
Licensing is easy.
The licensing cost is a bit prohibitive.
Licensing is easy.
Prisma Access by Palo Alto Networks provides consistent security for all users and applications across your remote networks. Prisma Access grants users safe access to the cloud and data center applications and the internet as well. In addition, the solution combines all of your security and networking capabilities into a single cloud-delivered platform, enabling flexible hybrid workforces.
Actually the solution is very expensive. I don't know the particulars since the purchasing team dealt with it.
The pricing for this solution is on the higher end.
Actually the solution is very expensive. I don't know the particulars since the purchasing team dealt with it.
The pricing for this solution is on the higher end.
CyberArk Privileged Access Manager is a next-generation solution that allows users to secure both their applications and their confidential corporate information. It is extremely flexible and can be implemented across a variety of environments. This program runs with equal efficiency in a fully cloud-based, hybrid, or on-premises environment. Users can now protect their critical infrastructure and access it in any way that best meets their needs.
Pricing and licensing depend on the environment.
It is not a cheap solution. It is expensive as compared with other solutions. However, it is one of the best solutions in their domain.
Pricing and licensing depend on the environment.
It is not a cheap solution. It is expensive as compared with other solutions. However, it is one of the best solutions in their domain.
The Zscaler Zero Trust Exchange enables fast, secure connections and allows your employees to work from anywhere using the internet as the corporate network. Based on the zero trust principle of least-privileged access, it provides comprehensive security using context-based identity and policy enforcement.
The pricing is expensive and on the higher end. Honestly, in my opinion, it is not worth the price.
The cost is expensive. It depends on the number of users.
The pricing is expensive and on the higher end. Honestly, in my opinion, it is not worth the price.
The cost is expensive. It depends on the number of users.
Okta Workforce Identity is a powerful solution that provides single sign-on capabilities and centralized access control for multiple applications. Its most valuable features include workflows, multiple SSO protocols, and Active Directory integrations. It helps organizations by simplifying access management, improving security with multi-factor authentication, and streamlining user provisioning. It is particularly beneficial for large employers, retail chains, and organizations with a significant number of employees. Okta Workforce Identity is easy to use, scalable, and reliable, making it an essential tool for identity and access management.
License is around US$20,000 annually.
It is costly for large companies.
License is around US$20,000 annually.
It is costly for large companies.
Netscope is a Secure Access Service Edge (SASE) platform that includes core products such as Cloud Access Security Broker (CASB) and Security Service Edge (SSE).
Pricing is a little expensive but it is affordable.
They should work on licensing costs.
Pricing is a little expensive but it is affordable.
They should work on licensing costs.
Auth0 is a user-friendly platform that securely authenticates and authorizes users across multiple platforms. It offers easy integration, robust security measures, and customizable options for authentication. Users praise its scalability, comprehensive documentation, and responsive customer support.
Auth0 significantly improves organization operations, increasing efficiency, collaboration, and problem-solving capabilities. It streamlines processes, reduces errors, and facilitates seamless integration.
There are different price levels: B2B, B2C, and enterprise. The basic plan is about $1,500 per month.
It is a relatively inexpensive product in the industry.
There are different price levels: B2B, B2C, and enterprise. The basic plan is about $1,500 per month.
It is a relatively inexpensive product in the industry.
Cisco Duo is a cloud-based access management platform that secures access to all applications, for any user and device, from anywhere. It’s designed to be both easy to use and deploy, while providing complete endpoint visibility and control.
During testing we are allowed a certain number of licenses for free.
Its price is reasonable. It is not highly expensive.
During testing we are allowed a certain number of licenses for free.
Its price is reasonable. It is not highly expensive.
VMware Software-Defined Wide Area Network (SD-WAN) is a secure access service edge (SASE) platform that combines many types of software-based network technologies in an attempt to enable users to virtualize their wide area networks and reduce their reliance on hardware. In essence, this solution makes it possible for users to reliably access their applications from anywhere in the world by leveraging cloud technologies. Users can simply, efficiently, and completely control their network devices and traffic. It ensures that organizations are always able to use the best possible connection to their data centers. VMware SD-WAN steers traffic so that it is always using the most reliable connections and at the same time takes steps to remediate any problems that it detects in other network links. This guarantees that organizations can access high-priority applications at all times.
VeloCloud performs as well as the Cisco SD-WAN but it is cheaper in price.
The price of this solution is higher than that of other SD-WAN vendors.
VeloCloud performs as well as the Cisco SD-WAN but it is cheaper in price.
The price of this solution is higher than that of other SD-WAN vendors.
ForgeRock is a comprehensive open-source identity and access management solution designed to meet the unique needs of your users and workforce. With ForgeRock you can orchestrate, manage, and secure the complete lifecycle of identities in any cloud or hybrid environment. ForgeRock allows you to set up bot detection, identity proofing, and risk-based authentication.
It's a bit pricey and could be more competitive.
Its price is comparable to other products in the market.
It's a bit pricey and could be more competitive.
Its price is comparable to other products in the market.
Appgate SDP is a network access control tool for local and remote access, multifactor authentication, and micro-segmentation. It is a flexible, robust, and configurable tool with good documentation, interface improvements, and ease of deployment.
It is a pretty expensive tool. It is maybe about $20,000 per year for a hundred users or so.
We pay $100 per user per month. One license for the site is around $17.
It is a pretty expensive tool. It is maybe about $20,000 per year for a hundred users or so.
We pay $100 per user per month. One license for the site is around $17.
Skyhigh Security protects organizations with cloud-based Zero Trust security solutions that are both data-aware and simple to use. Skyhigh’s Security Service Edge portfolio goes beyond data access and focuses on data use, allowing organizations to collaborate from any device and from anywhere without sacrificing security, while providing the visibility and control required to monitor and mitigate security risks.
Skyhigh provided a FedRAMP solution, tokenization, a better shadow IT capability, and lower cost.
The biggest thing to watch for is the difference in price per monitored user for the different API integrations.
Skyhigh provided a FedRAMP solution, tokenization, a better shadow IT capability, and lower cost.
The biggest thing to watch for is the difference in price per monitored user for the different API integrations.
Perimeter 81 is a cloud-based network security and software-defined perimeter (SDP) solution designed to provide secure access to resources in the cloud, data centers, and on-premises environments. It offers a unified platform for organizations to manage and secure their network infrastructure, regardless of the location or type of resources.
Overall I am very happy with the solution’s flexibility and pricing.
The cost of the solution's licenses depends on the particular use cases.
Overall I am very happy with the solution’s flexibility and pricing.
The cost of the solution's licenses depends on the particular use cases.
Simplify management, enable app-defined SD-WAN policies and deliver a secure, cloud-delivered branch today with the Industry’s first next-generation SD-WAN.
This solution stood out because it cost considerably less than the other SD-WAN solutions out there from Cisco.
This solution stood out because it cost considerably less than the other SD-WAN solutions out there from Cisco.
Amazon Cognito is a simple user identity and data synchronization service that helps you securely manage and synchronize app data for your users across their mobile devices. You can create unique identities for your users through a number of public login providers (Amazon, Facebook, and Google) and also support unauthenticated guests. You can save app data locally on users’ devices allowing your applications to work even when the devices are offline. With Amazon Cognito, you can save any kind of data in the AWS Cloud, such as app preferences or game state, without writing any backend code or managing any infrastructure. This means you can focus on creating great app experiences instead of having to worry about building and managing a backend solution to handle identity management, network state, storage, and sync.
The pricing of this solution is good compared to other solutions on the market.
The pricing is bad so I rate it a two out of ten.
The pricing of this solution is good compared to other solutions on the market.
The pricing is bad so I rate it a two out of ten.
Twingate is a cloud-based network security platform that offers secure, zero-trust access to corporate applications and resources. Its primary use case is to provide remote access to employees, contractors, and partners, allowing them to work securely from anywhere. Twingate's most valuable functionality is its ability to create secure access policies based on user identity, device, and network context. This enables organizations to enforce granular access controls, reducing the risk of data breaches and insider threats.
CyberArk Identity is a versatile identity management solution suitable for a wide range of enterprises. CyberArk Identity users have expressed satisfaction with various aspects, highlighting its quality, functionality, and value for money. They appreciate its user-friendly interface and the convenience it offers. Overall, the user reviews indicate a positive experience with the product or service.
We find that the pricing and licensing of this solution is adequate, as compared to the other competitors in the market.
There is an initial license and then there is a subscription needed.
We find that the pricing and licensing of this solution is adequate, as compared to the other competitors in the market.
There is an initial license and then there is a subscription needed.
JumpCloud is a comprehensive cloud-based directory platform that provides secure and centralized user management for organizations. It offers a wide range of features including user authentication, single sign-on, device management, and multi-factor authentication.
Licensing cost can be anywhere between $2 and $18 a month depending on what you want to do.
The cost was around $5 per user per month.
Licensing cost can be anywhere between $2 and $18 a month depending on what you want to do.
The cost was around $5 per user per month.
FortiSASE is a comprehensive security solution that combines SD-WAN, security, and Zero Trust Network Access (ZTNA) capabilities in a single platform. It provides secure access to applications and data from any device, anywhere, and at any time. FortiSASE offers advanced threat protection, real-time visibility, and control over network traffic, ensuring that organizations can securely connect their users and devices to the cloud and on-premises resources. With FortiSASE, organizations can simplify their security infrastructure, reduce costs, and improve their overall security posture.
Fortinet is very aggressive in its pricing.
I rate the product's price a six on a scale of one to ten, where one is low price and ten is high price.
Fortinet is very aggressive in its pricing.
I rate the product's price a six on a scale of one to ten, where one is low price and ten is high price.
Akamai Enterprise Application Access is a cloud-based solution that provides secure access to enterprise applications and data from any device, anywhere. It eliminates the need for traditional VPNs and allows organizations to easily manage access to applications and data for employees, partners, and customers. With its zero-trust approach, it ensures that only authorized users can access sensitive information, reducing the risk of data breaches.
Licensing is based on user count.
The license can be shared based on the number of active users.
Licensing is based on user count.
The license can be shared based on the number of active users.
Netskope Next Gen Secure Web Gateway is a comprehensive cloud-based security solution that provides advanced threat protection, data loss prevention, and web filtering capabilities. It offers real-time visibility and control over web traffic, enabling organizations to enforce policies and protect against web-based threats. The solution uses machine learning and behavioral analysis to detect and block advanced threats, including malware, phishing, and ransomware. It also provides granular control over web access, allowing organizations to block or allow specific websites and applications based on user, group, or location. With Netskope Next Gen Secure Web Gateway, organizations can ensure compliance with industry regulations and protect sensitive data from unauthorized access or exfiltration. The solution is easy to deploy and manage, with a user-friendly interface and centralized policy management.
We pay a licensing fee of $10,000 on a yearly basis.
The license model is based on the number of users. You have the possibility to have 10,000 users if you wish.
We pay a licensing fee of $10,000 on a yearly basis.
The license model is based on the number of users. You have the possibility to have 10,000 users if you wish.
Cloudflare Access is preferred over iboss. Users highly appreciate the secure connection and the ability to control access to resources without a VPN. The integration with other Cloudflare services and the straightforward setup process are also highlighted. The pricing is reasonable and well-documented, and users experience a positive ROI with increased security and cost savings. Users suggest enhancements in customization options and access rules configuration, as well as a simpler authentication process and improved documentation and support resources.
It is expensive compared to one of its competitors.
It is expensive compared to one of its competitors.
Menlo Security Remote Browser Isolation (RBI) fully enables the way people work by giving administrators the ability to set acceptable use policies to block malicious activity—including compromised websites, cybersquatting, file uploads and downloads, social posting, and other unknown threats. All web content and documents, across a broad browser ecosystem, are safely and accurately rendered in the cloud, away from your endpoints. Admins get all the granular controls and policies they need, while minimizing power draw and keeping the user experience intact. Enable rapid provisioning of users, while guaranteeing connectivity from any location. The Global Elastic Cloud promises secure, optimal web access for remote sites and mobile users worldwide.
Menlo Security RBI can be very costly.
Menlo Security RBI can be very costly.
WSO2 Identity Server can be used to simplify identity and access management (IAM) related activities in the enterprise. The product is based on open standards and open source principles. WSO2 Identity Server comes with seamless, easy to use integration capabilities that help connect applications, user stores, directories and identity management systems.
We have to take their support, but that is a minimal charge if I'm comparing it to other identity managers.
I have found the solutions license is priced competitively compared to others.
We have to take their support, but that is a minimal charge if I'm comparing it to other identity managers.
I have found the solutions license is priced competitively compared to others.
Forcepoint ONE is a comprehensive cybersecurity platform that provides organizations with a unified approach to protecting their critical data and assets. It offers a range of solutions that cover everything from network security and cloud security to data protection and insider threat prevention. With Forcepoint ONE, organizations can gain complete visibility into their security posture, identify potential threats, and take proactive measures to mitigate risks. One of the key features of Forcepoint ONE is its ability to provide real-time visibility into user behavior across all endpoints, networks, and cloud environments. This allows organizations to quickly identify and respond to potential threats, such as insider threats or malicious activity from external actors. Additionally, Forcepoint ONE offers advanced threat intelligence capabilities that leverage machine learning and AI to detect and respond to emerging threats. Another important aspect of Forcepoint ONE is its data protection capabilities. The platform offers a range of solutions for protecting sensitive data, including data loss prevention (DLP), encryption, and secure web gateways. These solutions help organizations ensure that their critical data is protected both at rest and in transit, regardless of where it is stored or accessed. Forcepoint ONE is a powerful cybersecurity platform that offers a comprehensive set of solutions for protecting organizations against a wide range of threats. With its advanced threat intelligence capabilities, real-time visibility into user behavior, and robust data protection features, Forcepoint ONE is an ideal choice for organizations looking to take a proactive approach to cybersecurity.
Typically, the longer you price forward, the better off you're going to be. They have been very willing to work with us on pricing.
We have our pricing by user. We do our pricing agreements annually. There are also additional costs for maintenance.
Typically, the longer you price forward, the better off you're going to be. They have been very willing to work with us on pricing.
We have our pricing by user. We do our pricing agreements annually. There are also additional costs for maintenance.
Netskope Private Access is an integral component of the Netskope Security Cloud platform that provides zero-trust secure access to enterprise applications and data in hybrid IT (public cloud and data center) environments. It offers comprehensive policy management, compliance assessment, and supports any application, protocol, and device to reduce risk and simplify security operations.
When it comes to pricing, Netskope Private Access is relatively cheap compared to other solutions.
I believe that the price for Netskope Private Access is included in the features or functionality my company purchased from NetSkope.
When it comes to pricing, Netskope Private Access is relatively cheap compared to other solutions.
I believe that the price for Netskope Private Access is included in the features or functionality my company purchased from NetSkope.
Google’s mission is to organize the world‘s information and make it universally accessible and useful.
I think that the cost is metered based on the data, but I don't have the details.
Its price is good. For each server, we are saving $300 a month. We have at least thousands of servers. It is a huge cost reduction for us.
I think that the cost is metered based on the data, but I don't have the details.
Its price is good. For each server, we are saving $300 a month. We have at least thousands of servers. It is a huge cost reduction for us.
Google BeyondCorp Remote Access is a secure solution that enables organizations to provide remote access to their internal resources without the need for a traditional VPN. The primary use case for this product is to allow employees to securely access company resources from anywhere, ensuring productivity and flexibility.
The most valuable functionality of Google BeyondCorp Remote Access is its zero-trust approach. It verifies every user and device attempting to connect, irrespective of their location, ensuring only authorized users gain access to resources. This eliminates the need for complex VPN configurations and reduces the risk of unauthorized access.
By adopting Google BeyondCorp Remote Access, organizations can enhance their security posture and simplify access management. It provides granular control over user access, allowing administrators to set policies based on device health, user context, and other attributes. This reduces the attack surface and minimizes the risk of data breaches or unauthorized access to sensitive information. Furthermore, the product integrates seamlessly with other Google Cloud services, making it easy to manage and scale as per organizational requirements.
NordLayer, developed by the high standards of NordVPN, offers flexible and easy-to-implement cybersecurity tools for companies of any size or work model.
Based in Melbourne, AVG Technologies AU sells AVG Technologies' range of internet security, PC performance optimisation, mobile security and identity protection products to the Australian, New Zealand and South Pacific markets.