


Symantec Proxy and GoodAccess compete in the network security and VPN market. Symantec Proxy holds the upper hand in threat detection and management, while GoodAccess is favored for its VPN usability and multi-platform support.
Features: Symantec Proxy includes robust threat detection, advanced URL filtering, and extensive customization. GoodAccess features point-to-point security, static IPs, and fast VPN speeds.
Room for Improvement: Symantec Proxy needs better SSL inspection and clearer documentation. GoodAccess could enhance its pricing model and improve threat visibility.
Ease of Deployment and Customer Service: Symantec Proxy's on-premises setup is complex, and support quality has decreased post-acquisition. GoodAccess offers simpler cloud deployments and generally responsive support.
Pricing and ROI: Symantec Proxy is expensive, with complex licensing processes. GoodAccess provides competitive pricing models and clear value for budget-conscious businesses.
| Product | Market Share (%) |
|---|---|
| iboss | 2.4% |
| Symantec Proxy | 2.0% |
| GoodAccess | 0.3% |
| Other | 95.3% |

| Company Size | Count |
|---|---|
| Small Business | 6 |
| Midsize Enterprise | 6 |
| Large Enterprise | 5 |
| Company Size | Count |
|---|---|
| Small Business | 21 |
| Midsize Enterprise | 4 |
| Large Enterprise | 1 |
| Company Size | Count |
|---|---|
| Small Business | 6 |
| Midsize Enterprise | 4 |
| Large Enterprise | 12 |
Iboss offers a comprehensive cloud-based security platform valued for its scalability and autonomous features, ensuring robust security with easy deployment and management capabilities.
Renowned for its robust security architecture, Iboss integrates seamlessly within diverse networks, delivering efficient granular filtering and advanced content categorization. Its single pane of glass console provides ease of management, allowing rapid scalability suitable for rapidly deploying environments. Operates in BYOD setups due to inline filtering without device installation. Integration with cloud-based applications enhances user control, and features like SASE, SSL inspection, and ChatGPT risk protection stand as highlights. Despite its strengths, users have pointed out areas for enhancement like direct navigation in reports, SSL decryption, and better cloud integration while having room to improve data loss prevention.
What are the most important features of Iboss?The usage of Iboss spans educational institutions, specifically K-12, to enforce internet policies, protect data, and support remote work environments. It provides web filtering and security frameworks to ensure safe browsing. Its platform-as-a-service model offers flexibility for both cloud-based and on-premises requirements, integrating seamlessly to deliver enhanced security features suitable for various deployment needs including zero trust, CASB, and network security for work-from-home setups.
GoodAccess is a cybersecurity platform designed for medium-sized enterprises to implement Zero Trust Architecture efficiently, offering a rapid, hardware-free deployment that integrates smoothly with existing infrastructures.
GoodAccess provides organizations a powerful means to secure their networks through a scalable zero-trust cybersecurity platform. It supports remote and hybrid work environments by protecting critical assets and enabling seamless connectivity. This platform ensures robust security, facilitating compliance with the latest standards while integrating with SaaS and legacy systems. Businesses with 50 to 5000 employees across several industries benefit from its advanced capabilities, which include device security, multi-factor authentication, and identity-based access control.
What are the key features of GoodAccess?GoodAccess is widely implemented across industries needing secure, adaptable connectivity. It is ideal for sectors prioritizing remote and hybrid workforces, like tech and professional services, ensuring seamless access and compliance with complex regulatory requirements. Companies benefit from its application in controlling geolocation requirements, facilitating secure video conferencing, and ensuring high-speed access regardless of location.
Symantec Proxy is designed to provide web security, web access control, and secure web gateway functionalities for organizations. It helps protect against web-based threats, enforce web usage policies, and provide secure access to internet resources.
Symantec Proxy Benefits:
Symantec Proxy Features:
Reviews from Real Users
Below are some reviews and helpful feedback written by Symantec Proxy users.
PeerSpot user, Consultant at a financial services firm, says that Symantec Proxy "...enables us to manage bandwidth for users based on their privilege levels. For example, if a user wants to use a certain application or resource, we can provide access based on their privileges."
PeerSpot user, General Manager & founder at a engineering company, writes that Symantec Proxy has "A complex deployment, no proper user reporting, and a proxy component that works."
Muhammad Salahuddin, Unit Head - Network and Security Solutions at FPM Solutions, states that Symantec Proxy has "Good URL filtering but is expensive and doesn't have good technical support services."
We monitor all Secure Web Gateways (SWG) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.