


Symantec Proxy and Axis Security compete in the cybersecurity market, offering network security solutions. Symantec Proxy has a slight advantage in data protection and filtering capabilities, while Axis Security aligns better with modern security needs through its innovative cloud-based access solutions.
Features: Symantec Proxy offers robust web security with URL filtering, malware protection, and data loss prevention. Axis Security provides secure access using zero trust network access (ZTNA) technology and micro-segmentation, enhancing dynamic user access management. Axis's focus on decentralized cloud-native solutions supports seamless remote access.
Room for Improvement: Symantec Proxy could improve its ease of deployment, cloud integration, and scalability options. Axis Security may enhance its data protection features, increase its integration with third-party services, and expand its on-premises support for hybrid environments.
Ease of Deployment and Customer Service: Symantec Proxy is more cumbersome to deploy due to on-premises hardware requirements, necessitating significant IT resources. Axis Security leverages a SaaS model with simpler cloud-based deployment and high flexibility, minimizing complexity. Axis often receives praise for responsive and proactive customer support, while Symantec might need more direct technical intervention.
Pricing and ROI: Symantec Proxy has high upfront costs due to hardware investments and maintenance, leading to slower ROI. In contrast, Axis Security's subscription-based model is more cost-effective and scalable, offering quicker ROI by adjusting expenses with scaling needs. While Axis's initial costs are lower, Symantec might incur hidden expenses due to infrastructure demands.
| Product | Mindshare (%) |
|---|---|
| iboss | 3.3% |
| Symantec Proxy | 1.7% |
| Axis Security | 1.0% |
| Other | 94.0% |



| Company Size | Count |
|---|---|
| Small Business | 6 |
| Midsize Enterprise | 7 |
| Large Enterprise | 8 |
| Company Size | Count |
|---|---|
| Small Business | 2 |
| Midsize Enterprise | 1 |
| Large Enterprise | 5 |
| Company Size | Count |
|---|---|
| Small Business | 6 |
| Midsize Enterprise | 4 |
| Large Enterprise | 12 |
Iboss offers a comprehensive cloud-based security platform valued for its scalability and autonomous features, ensuring robust security with easy deployment and management capabilities.
Renowned for its robust security architecture, Iboss integrates seamlessly within diverse networks, delivering efficient granular filtering and advanced content categorization. Its single pane of glass console provides ease of management, allowing rapid scalability suitable for rapidly deploying environments. Operates in BYOD setups due to inline filtering without device installation. Integration with cloud-based applications enhances user control, and features like SASE, SSL inspection, and ChatGPT risk protection stand as highlights. Despite its strengths, users have pointed out areas for enhancement like direct navigation in reports, SSL decryption, and better cloud integration while having room to improve data loss prevention.
What are the most important features of Iboss?The usage of Iboss spans educational institutions, specifically K-12, to enforce internet policies, protect data, and support remote work environments. It provides web filtering and security frameworks to ensure safe browsing. Its platform-as-a-service model offers flexibility for both cloud-based and on-premises requirements, integrating seamlessly to deliver enhanced security features suitable for various deployment needs including zero trust, CASB, and network security for work-from-home setups.
Axis Security provides secure and seamless access to cloud infrastructures with features that support both modern and legacy applications, enhancing connectivity and performance.
As a leader in secure connectivity, Axis Security simplifies access management with its easy deployment and configuration. It integrates directly with Okta for single sign-on and replaces traditional VPNs, ensuring trust for access requests while restricting unauthorized access. Its interface combines Zero Trust Network Access (ZTNA) and secure web gateway functions into one, offering a unified approach for managing secure connections across platforms including Azure, AWS, and Google. Users find its reporting capabilities beneficial for access analysis, supporting multiple protocols to establish secure connections effortlessly.
What are the most important features of Axis Security?In the biopharma industry, Axis Security enables entities to manage infrastructure access, safeguarding proprietary data and meeting compliance. Insurance subsidiaries use it to monitor access across retail environments, while cloud deployments help secure network devices against unauthorized access and manage code generation for site monitoring and authentication.
Symantec Proxy offers robust web security by providing features like content caching and URL filtering. It enhances security, optimizes performance, and simplifies policy management for enterprises, serving as a dynamic tool across cloud environments.
Symantec Proxy integrates with Broadcom's FireGlass, providing enhanced compatibility and seamless functionality. Known for a stable deployment and a precise URL database, it offers comprehensive threat detection and policy creation, utilizing the Global Intelligence Network. Users deploy it for web security, malware blocking, and traffic filtering. Symantec Proxy's reputation and site categorization bolster defense against malicious sites, although SSL inspection, dashboard integration, and technical support could benefit from improvements. The platform has shifted post-Broadcom acquisition, needing streamlined solutions. Current challenges include performance with O365 and complexities around pricing and licensing.
What features define Symantec Proxy?Enterprises leverage Symantec Proxy to secure web access and manage Internet usage across industries. Deployed across cloud providers like AWS, GCP, and Azure, it supports URL filtering, remote access, and bandwidth control by user privileges. Organizations also find value in its role within antivirus scanning, policy customization, and reporting.
We monitor all Secure Web Gateways (SWG) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.