Akamai Enterprise Application Access vs Safe-T Secure Application Access comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Akamai Enterprise Application Access and Safe-T Secure Application Access based on real PeerSpot user reviews.

Find out what your peers are saying about Microsoft, Auth0, Okta and others in Access Management.
To learn more, read our detailed Access Management Report (Updated: April 2024).
771,157 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"Application Access's most valuable feature is the accessibility of enterprise tech protection.""The capability of Akamai Enterprise Application Access is what you're looking for, it's giving you the service that you're looking for. It's simple and doesn't use an agent. It uses LCSD responders, and they have a lot of services around the globe. That's the reason that we were very interested in using it because it has a lot of coverage. This is because it's under the GDS umbrella.""The solution is very convenient and stable because you don't have to worry about attacks to public IPs or public networks."

More Akamai Enterprise Application Access Pros →

"the security level is very high. After we tested it and checked all the security aspects of the product, we found that it's highly secure.""Safe-T is very good for users because it has plug-in for Outlook.""If you want a very flexible system that you can easily integrate, and develop interfaces for it or plug-ins to other application environments, it's probably the most flexible""It's easy to use over the web. A user who is not in the office can use it and securely insert files."

More Safe-T Secure Application Access Pros →

Cons
"The solution has two agents so should combine its enterprise application and security access into one agent.""The technical enablement sessions are quite limited, and Akamai could help by providing more of them.""We need another approach to bring the solution to the cloud. In addition to Access Management, we would like to see if we can jump into Directories. I think ADs are going to go away and everything is going to be cloud-based and minimize the use of ADs because of the cost and some other dependencies to the cloud. Every time you buy AD it is more hardware, and everything's changing to software. The network's changing, the applications are changing, and for IT it is hard to keep up with it."

More Akamai Enterprise Application Access Cons →

"The Outlook agent is not working well for installing it in the entire office.""One important thing that we haven't found in this product is the ability to provide a read-only view for documents. Also, the ability for the customer to add annotations to these documents."

More Safe-T Secure Application Access Cons →

Pricing and Cost Advice
  • "The price is great it is all-inclusive, they use an enterprise cost model. That's what we like compared to other users. This is one of the main attractions of Akamai Enterprise Application Access. It's already an enterprise cost model established with us for services."
  • "Licensing is based on user count."
  • "The license can be shared based on the number of active users."
  • More Akamai Enterprise Application Access Pricing and Cost Advice →

    Information Not Available
    report
    Use our free recommendation engine to learn which Access Management solutions are best for your needs.
    771,157 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The solution is very convenient and stable because you don't have to worry about attacks to public IPs or public networks.
    Top Answer:The license can be shared based on the number of active users. If you have 5,000 users but only 1,000 active users at one time, then you buy a license for 1,000 users.
    Top Answer:The solution has two agents so should combine its enterprise application and security access into one agent. It is more comfortable for users if they don't have to install two agents.
    Ask a question

    Earn 20 points

    Ranking
    17th
    out of 37 in Access Management
    Views
    284
    Comparisons
    243
    Reviews
    1
    Average Words per Review
    273
    Rating
    8.0
    27th
    out of 37 in Access Management
    Views
    71
    Comparisons
    55
    Reviews
    0
    Average Words per Review
    0
    Rating
    N/A
    Comparisons
    Also Known As
    Soha
    Safe-T SDA, Safe-T, Safe-T Software-Defined Access
    Learn More
    Overview

    Akamai Enterprise Application Access is a cloud-based solution that provides secure access to enterprise applications and data from any device, anywhere. It eliminates the need for traditional VPNs and allows organizations to easily manage access to applications and data for employees, partners, and customers. With its zero-trust approach, it ensures that only authorized users can access sensitive information, reducing the risk of data breaches.



    Safe-T is a provider of Zero Trust Access solutions which mitigate attacks on enterprises’ business-critical services and sensitive data, while ensuring uninterrupted business continuity. 

    Safe-T’s cloud and on-premises solutions ensure that an organization’s access use cases, whether into the organization or from the organization out to the internet, are secured according to the “validate first, access later” philosophy of Zero Trust. 

    This means that no one is trusted by default from inside or outside the network, and verification is required from everyone trying to gain access to resources on the network or in the cloud. 

    Safe-T’s wide range of access solutions reduce organizations’ attack surface and improve their ability to defend against modern cyberthreats. As an additional layer of security, our integrated business-grade global proxy solution cloud service enables smooth and efficient traffic flow, interruption-free service, unlimited concurrent connections, instant scaling and simple integration with our services. 

    With Safe-T’s patented reverse-access technology and proprietary routing technology, organizations of all size and type can secure their data, services and networks against internal and external threats. 

    At Safe-T, we empower enterprises to safely migrate to the cloud and enable digital transformation.

    Sample Customers
    Bugcrowd, InPowered, Spirent Communications
    Government of Israel, eviCore Healthcore, Glen Imaging, Sarin, LBG, Rollomatic, Boegli-Gravures SA, Banque Heritage, Groupe Minoteries, Temenos, ZEK, RLM Finsbury, Harel Insurance, Meitav Dash
    Top Industries
    VISITORS READING REVIEWS
    Computer Software Company16%
    Manufacturing Company12%
    Financial Services Firm12%
    Healthcare Company6%
    No Data Available
    Company Size
    VISITORS READING REVIEWS
    Small Business18%
    Midsize Enterprise16%
    Large Enterprise66%
    No Data Available
    Buyer's Guide
    Access Management
    April 2024
    Find out what your peers are saying about Microsoft, Auth0, Okta and others in Access Management. Updated: April 2024.
    771,157 professionals have used our research since 2012.

    Akamai Enterprise Application Access is ranked 17th in Access Management with 3 reviews while Safe-T Secure Application Access is ranked 27th in Access Management. Akamai Enterprise Application Access is rated 9.0, while Safe-T Secure Application Access is rated 7.8. The top reviewer of Akamai Enterprise Application Access writes "Very scalable, convenient, and stable protection against attacks". On the other hand, the top reviewer of Safe-T Secure Application Access writes "The architecture is open to integration and development, making the product very flexible". Akamai Enterprise Application Access is most compared with Zscaler Zero Trust Exchange, Zscaler Internet Access, Appgate SDP, Netskope and Cloudflare Access, whereas Safe-T Secure Application Access is most compared with .

    See our list of best Access Management vendors and best ZTNA as a Service vendors.

    We monitor all Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.