



Find out what your peers are saying about Palo Alto Networks, Zscaler, Cato Networks and others in Secure Access Service Edge (SASE).
| Product | Mindshare (%) |
|---|---|
| Cloudflare One | 6.0% |
| Prisma Access by Palo Alto Networks | 10.8% |
| Cato SASE Cloud Platform | 9.4% |
| Other | 73.8% |
| Product | Mindshare (%) |
|---|---|
| KerioControl | 1.1% |
| Fortinet FortiGate | 17.2% |
| OPNsense | 9.6% |
| Other | 72.1% |
| Product | Mindshare (%) |
|---|---|
| Trellix Intrusion Prevention System | 3.0% |
| Fortinet FortiGate | 11.4% |
| Darktrace | 10.8% |
| Other | 74.8% |


| Company Size | Count |
|---|---|
| Small Business | 7 |
| Midsize Enterprise | 7 |
| Large Enterprise | 8 |
| Company Size | Count |
|---|---|
| Small Business | 10 |
| Midsize Enterprise | 2 |
| Large Enterprise | 11 |
| Company Size | Count |
|---|---|
| Small Business | 44 |
| Midsize Enterprise | 9 |
| Large Enterprise | 3 |
| Company Size | Count |
|---|---|
| Small Business | 6 |
| Midsize Enterprise | 6 |
| Large Enterprise | 6 |
Iboss offers a comprehensive cloud-based security platform valued for its scalability and autonomous features, ensuring robust security with easy deployment and management capabilities.
Renowned for its robust security architecture, Iboss integrates seamlessly within diverse networks, delivering efficient granular filtering and advanced content categorization. Its single pane of glass console provides ease of management, allowing rapid scalability suitable for rapidly deploying environments. Operates in BYOD setups due to inline filtering without device installation. Integration with cloud-based applications enhances user control, and features like SASE, SSL inspection, and ChatGPT risk protection stand as highlights. Despite its strengths, users have pointed out areas for enhancement like direct navigation in reports, SSL decryption, and better cloud integration while having room to improve data loss prevention.
What are the most important features of Iboss?The usage of Iboss spans educational institutions, specifically K-12, to enforce internet policies, protect data, and support remote work environments. It provides web filtering and security frameworks to ensure safe browsing. Its platform-as-a-service model offers flexibility for both cloud-based and on-premises requirements, integrating seamlessly to deliver enhanced security features suitable for various deployment needs including zero trust, CASB, and network security for work-from-home setups.
Cloudflare One is a comprehensive platform for security, performance, and connectivity. It provides features like rate limiting, DDoS protection, and application access, tailored to enhance user experience while securing internet access and accelerating communications.
Designed to integrate security measures with ease of use and scalability, Cloudflare One offers a secure web gateway and zero trust network access. These features ensure seamless setup and operation, making connectivity reliable and protected. Users appreciate its integrated console, intuitive interface, and the ability to manage risk effectively. It offers straightforward deployment, improves latency, and boasts cost-effectiveness. While its onboarding process and documentation need enhancement, its value in content delivery and application shielding is notable. Despite challenges in integrating Cloudflare Access with existing VPNs and the need for better automation and support, it remains vital for DNS and infrastructure protection.
What features make Cloudflare One stand out?In industries like finance, retail, and technology, Cloudflare One is crucial for enabling secure remote access and protecting web applications against dynamic threats. It supports compliance access policies and enhances content delivery, playing a key role in safeguarding digital infrastructure.
KerioControl is a comprehensive network security solution integrating firewall, antivirus, and VPN in an easy-to-use interface for small to medium businesses seeking robust protection.
KerioControl offers a blend of essential security features wrapped in a user-friendly graphical interface that enables effective network management. It supports firewall protection, intrusion detection, real-time monitoring, and flexible VPN capabilities ensuring high reliability and productivity. Despite being suitable for small to medium enterprises, improvements could enhance its overall performance, such as better GUI updates, stronger connectivity, and advanced VPN functionality. Common uses include unified threat management, bandwidth management, remote access, and web filtering.
What are the important features of KerioControl?KerioControl is effectively implemented in industries needing strong security measures, supporting small to medium businesses in sectors like IT services, retail, and education. It's particularly well-suited for companies requiring efficient threat management and convenient internet service management across various sites.
Trellix Intrusion Prevention System provides robust network protection with signature-based detection, zero-day protection, and advanced threat prevention using machine learning and behavior analysis. It integrates with Trellix's ecosystem for detailed traffic insight and real-time threat blocking.
Businesses utilizing Trellix Intrusion Prevention System benefit from enhanced security in remote offices and data centers, comprehensive malware detection, and effective network monitoring. The system offers robust perimeter protection and Smart Blocking capabilities to detect and block harmful data. Companies favor Trellix for its endpoint security and vulnerability assessment functionalities. Despite its strong offerings, improvements are needed in AI-driven threat detection, user-friendliness of the management console, and flexibility in SaaS integration. Users highlight the absence of virtual patching and outdated GUI as areas for improvement.
What are the key features of Trellix Intrusion Prevention System?Trellix Intrusion Prevention System is implemented across industries such as finance, healthcare, and manufacturing for its ability to detect malware and enhance network safety. Its threat intelligence capabilities help sectors where data security and operational continuity are imperative, providing tailored protection solutions that align with specific industry needs.