Axis Security vs Google Cloud Platform Cloud Identity-Aware Proxy comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Axis Security and Google Cloud Platform Cloud Identity-Aware Proxy based on real PeerSpot user reviews.

Find out in this report how the two ZTNA as a Service solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed Axis Security vs. Google Cloud Platform Cloud Identity-Aware Proxy Report (Updated: May 2024).
771,170 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The most valuable part so far has been Axis Security's ability to create identity connections to various servers, allowing users to access them. By doing so, we've managed to replace any old or existing VPN access with Axis Security. We are slowly but surely getting rid of our traditional VPN.""The entire suite and the entire ZTNA process are very valuable.""I would give it an A-plus for securing access to our applications, devices, and network. It does an extremely good job. Our security folks have analyzed it and tried to find loopholes, but they found none.""The most valuable aspect is its ability to restrict unauthorized access, ensuring that only approved devices can connect to the network. T""The way the access connectors work is valuable."

More Axis Security Pros →

"Google Cloud Platform Cloud Identity-Aware Proxy is an easy-to-use solution.""Google Cloud Platform Cloud Identity-Aware Proxy is a scalable solution.""The solution's speed, processing power, and user functionality are some of its most valuable features.""UI representation is the aspect I like the most about GCP, even more than Azure or AWS.""The initial setup wasn't too difficult.""We do not need to maintain the hardware.""The solution can be used for building the infrastructure on the cloud.""It is totally awesome in terms of scalability. Its scalability was the main reason for moving to Google Cloud. It also comes with a lot of features. We are satisfied with the features it has."

More Google Cloud Platform Cloud Identity-Aware Proxy Pros →

Cons
"The support team should be more skilled in offering assistance.""They need to improve the networking and security tools a little in the troubleshooting and 'bad-actor' areas to help us analyze security threats a little better. They have some things built-in, but I would like to see more advanced tools.""I would like more detailed logging in the Axis Security interface.""I would appreciate more automated learning capabilities or increased integration with other security tools, allowing us to establish automation.""I would like more statistics about what's going on in terms of usage. There is little-to-no usage reporting. That's one thing we've requested, and I think they're working on it."

More Axis Security Cons →

"People who don't have experience in IT may find the tool challenging. It needs to improve its pricing.""Google Cloud Platform is not a product that is very flexible for end-users, especially owing to the fact that there is not much documentation available for the product.""The solution's AI integration could be improved.""The platform’s stability and scalability need improvement.""Sometimes, it just fails to get some documents, and then it resumes normally. Google should work to enhance the overall features of the solution.""The support can be more efficient. Google has different layers of support, like layer one, layer two, and layer three, but normally, the response from layer one is not very useful.""The solution is quite expensive.""Google Cloud Platform Cloud Identity-Aware Proxy has certain limitations as a document or file management system, especially for non-workspace accounts. Manual management is required for most actions, and group management can be challenging. The process of managing permissions individually is time-consuming and not very efficient. For education purposes, the collaboration tools for working on files, assignments, and groups need improvement. The existing tools are inadequate and can be difficult to work with. Additionally, the grading books for teachers are not very useful and require improvement."

More Google Cloud Platform Cloud Identity-Aware Proxy Cons →

Pricing and Cost Advice
  • "The pricing is quite fair. It's better than what we gave up, which was Cisco AnyConnect."
  • "The pricing is very competitive from what I've seen."
  • More Axis Security Pricing and Cost Advice →

  • "I think that the cost is metered based on the data, but I don't have the details."
  • "Its price is good. For each server, we are saving $300 a month. We have at least thousands of servers. It is a huge cost reduction for us."
  • "The customer purchases an annually sponsored license."
  • "I think the price of Google Cloud Platform is reasonable. However, Microsoft is the most cost-effective solution for us because of Azure's integration. And we already have licenses for Windows Server and the databases, so the price is attractive."
  • "When comparing the price of GCP to other solutions it provides more value for the money."
  • "The licensing costs us $100,000 so pricing could be better."
  • "It is expensive to scale up the solution."
  • "The solution is inexpensive for personal use."
  • More Google Cloud Platform Cloud Identity-Aware Proxy Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which ZTNA as a Service solutions are best for your needs.
    771,170 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The most valuable aspect is its ability to restrict unauthorized access, ensuring that only approved devices can connect to the network. T
    Top Answer:The support team should be more skilled in offering assistance.
    Top Answer:I can access the information whenever I want. It's integration is easy. The tool's GUI is easy to use with an IT background. The value benefits of using it include the ability to avoid storing data on… more »
    Top Answer:I use the tool for servers. I don't think I have paid anything to personally use the tool. In general, I can say that I use a free tool. I don't think that cost is an issue. I don't pay for the… more »
    Top Answer:People who don't have experience in IT may find the tool challenging. It needs to improve its pricing.
    Ranking
    12th
    out of 34 in ZTNA as a Service
    Views
    1,583
    Comparisons
    993
    Reviews
    4
    Average Words per Review
    1,231
    Rating
    9.5
    6th
    out of 34 in ZTNA
    Views
    199
    Comparisons
    129
    Reviews
    33
    Average Words per Review
    334
    Rating
    8.4
    Comparisons
    Also Known As
    GCP Cloud IAP, Google Cloud Platform Cloud IAP, Cloud Identity-Aware Proxy
    Learn More
    HPE Aruba Networking
    Video Not Available
    Overview

    Axis Security is a prominent enterprise security solution, specializing in Zero Trust Network Access (ZTNA). The Axis Security Application Access Cloud platform is designed to secure remote access to applications and services hosted in the cloud or on-premises. It aims to simplify and enhance access controls while maintaining strong security measures.

    Axis Security's platform stands out by offering a comprehensive, cloud-native solution designed to enable secure access to private applications. Their Application Access Cloud simplifies network security, eliminating the need for traditional VPNs, and provides a more secure and efficient way to connect users to private applications, regardless of where the users or the applications are located.

    Axis Security users on PeerSpot have highlighted the ease of deployment and the non-intrusive nature of Axis Security's solution as major advantages. One IT Director noted, "The implementation was straightforward and didn’t disrupt our existing operations, which was a major plus." Another user, a Security Manager, praised the platform's robust security features, saying, "Axis Security has significantly enhanced our ability to control and monitor application access, giving us peace of mind in our security operations."

    Axis Security follows the principles of zero-trust architecture, which means it treats every access request as potentially untrusted, regardless of the user's location or network. It applies rigorous authentication and authorization controls to ensure only authorized users can access specific applications and resources. Axis Security enables secure remote access to applications and services without requiring a VPN (Virtual Private Network). It establishes a secure connection between users and applications, protecting against potential threats and reducing the attack surface.

    With Axis Security, organizations can granularly control user access to specific applications or services. This ensures that users only have access to the resources they need, reducing the risk of unauthorized access or data breaches. The platform simplifies access management by providing a centralized control point for managing user access policies. IT administrators can define access rules based on user roles, groups, or other criteria, making it easier to enforce security policies and maintain compliance.

    Axis Security continuously monitors user activity and application access, detecting potential threats and anomalies in real-time. It provides insights into user behavior, allowing organizations to identify and mitigate security risks promptly.

    Axis Security is built on a cloud-native architecture, allowing it to scale and adapt to dynamic cloud environments. It can seamlessly integrate with various cloud services and supports hybrid deployments, making it suitable for organizations with diverse infrastructure setups.

      Axis Security aims to provide secure and simplified remote access to applications while adhering to the principles of zero trust. By implementing granular access controls and continuous monitoring, it helps organizations protect their critical resources and reduce the risk of unauthorized access or data breaches.

      Google’s mission is to organize the world‘s information and make it universally accessible and useful.

      Since our founding in 1998, Google has grown by leaps and bounds. From offering search in a single language we now offer dozens of products and services—including various forms of advertising and web applications for all kinds of tasks—in scores of languages. And starting from two computer science students in a university dorm room, we now have thousands of employees and offices around the world. A lot has changed since the first Google search engine appeared. But some things haven’t changed: our dedication to our users and our belief in the possibilities of the Internet itself.

      Sample Customers
      Cardenas Markets, Armis, Alnylam Pharmaceuticals, Visionworks
      Information Not Available
      Top Industries
      VISITORS READING REVIEWS
      Computer Software Company18%
      Educational Organization14%
      Financial Services Firm6%
      Manufacturing Company6%
      REVIEWERS
      Financial Services Firm31%
      Retailer17%
      Computer Software Company14%
      Media Company7%
      VISITORS READING REVIEWS
      Computer Software Company19%
      Financial Services Firm11%
      Manufacturing Company9%
      Comms Service Provider8%
      Company Size
      VISITORS READING REVIEWS
      Small Business30%
      Midsize Enterprise24%
      Large Enterprise47%
      REVIEWERS
      Small Business33%
      Midsize Enterprise24%
      Large Enterprise42%
      VISITORS READING REVIEWS
      Small Business27%
      Midsize Enterprise15%
      Large Enterprise58%
      Buyer's Guide
      Axis Security vs. Google Cloud Platform Cloud Identity-Aware Proxy
      May 2024
      Find out what your peers are saying about Axis Security vs. Google Cloud Platform Cloud Identity-Aware Proxy and other solutions. Updated: May 2024.
      771,170 professionals have used our research since 2012.

      Axis Security is ranked 12th in ZTNA as a Service with 5 reviews while Google Cloud Platform Cloud Identity-Aware Proxy is ranked 6th in ZTNA with 44 reviews. Axis Security is rated 9.6, while Google Cloud Platform Cloud Identity-Aware Proxy is rated 8.4. The top reviewer of Axis Security writes "Easy to deploy, improved reliability and performance of our connectivity, and greatly reduced costs". On the other hand, the top reviewer of Google Cloud Platform Cloud Identity-Aware Proxy writes "User-friendly, easy to navigate, and intuitive interface". Axis Security is most compared with Zscaler Zero Trust Exchange, Netskope , Prisma Access by Palo Alto Networks, Fortinet FortiGate SWG and Cato SASE Cloud Platform, whereas Google Cloud Platform Cloud Identity-Aware Proxy is most compared with Cloudflare Access, Okta Workforce Identity, Zscaler Zero Trust Exchange, Cato SASE Cloud Platform and Cisco Duo. See our Axis Security vs. Google Cloud Platform Cloud Identity-Aware Proxy report.

      See our list of best ZTNA as a Service vendors.

      We monitor all ZTNA as a Service reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.