Symantec Secure Web Gateway and GoodAccess compete in the cybersecurity sector, focusing on web security solutions. Symantec excels in support and pricing, while GoodAccess outperforms in features, suggesting it offers better value.
Features: Symantec Secure Web Gateway includes advanced threat protection, data loss prevention, and comprehensive security coverage. GoodAccess highlights zero-trust networking, cloud integration, and innovative remote access solutions, offering flexibility and ease of use.
Room for Improvement: Symantec can improve its technical deployment complexity, user interface, and licensing management. GoodAccess could enhance geographic availability, feature consistency, and reporting capabilities to strengthen its offering.
Ease of Deployment and Customer Service: Symantec requires technical expertise for deployment but is supported by reliable customer service. GoodAccess offers straightforward deployment with effective customer service, allowing quicker setup and resolution.
Pricing and ROI: Symantec involves significant upfront costs with promising long-term ROI through robust security. GoodAccess provides a cost-efficient subscription model with quick ROI due to scalable solutions, making it economically viable from the start.
| Product | Market Share (%) |
|---|---|
| iboss | 2.4% |
| GoodAccess | 0.3% |
| Symantec Secure Web Gateway | 1.2% |
| Other | 96.1% |

| Company Size | Count |
|---|---|
| Small Business | 6 |
| Midsize Enterprise | 6 |
| Large Enterprise | 5 |
| Company Size | Count |
|---|---|
| Small Business | 21 |
| Midsize Enterprise | 4 |
| Large Enterprise | 1 |
| Company Size | Count |
|---|---|
| Small Business | 5 |
| Midsize Enterprise | 2 |
| Large Enterprise | 4 |
Iboss offers a comprehensive cloud-based security platform valued for its scalability and autonomous features, ensuring robust security with easy deployment and management capabilities.
Renowned for its robust security architecture, Iboss integrates seamlessly within diverse networks, delivering efficient granular filtering and advanced content categorization. Its single pane of glass console provides ease of management, allowing rapid scalability suitable for rapidly deploying environments. Operates in BYOD setups due to inline filtering without device installation. Integration with cloud-based applications enhances user control, and features like SASE, SSL inspection, and ChatGPT risk protection stand as highlights. Despite its strengths, users have pointed out areas for enhancement like direct navigation in reports, SSL decryption, and better cloud integration while having room to improve data loss prevention.
What are the most important features of Iboss?The usage of Iboss spans educational institutions, specifically K-12, to enforce internet policies, protect data, and support remote work environments. It provides web filtering and security frameworks to ensure safe browsing. Its platform-as-a-service model offers flexibility for both cloud-based and on-premises requirements, integrating seamlessly to deliver enhanced security features suitable for various deployment needs including zero trust, CASB, and network security for work-from-home setups.
GoodAccess is a cybersecurity platform designed for medium-sized enterprises to implement Zero Trust Architecture efficiently, offering a rapid, hardware-free deployment that integrates smoothly with existing infrastructures.
GoodAccess provides organizations a powerful means to secure their networks through a scalable zero-trust cybersecurity platform. It supports remote and hybrid work environments by protecting critical assets and enabling seamless connectivity. This platform ensures robust security, facilitating compliance with the latest standards while integrating with SaaS and legacy systems. Businesses with 50 to 5000 employees across several industries benefit from its advanced capabilities, which include device security, multi-factor authentication, and identity-based access control.
What are the key features of GoodAccess?GoodAccess is widely implemented across industries needing secure, adaptable connectivity. It is ideal for sectors prioritizing remote and hybrid workforces, like tech and professional services, ensuring seamless access and compliance with complex regulatory requirements. Companies benefit from its application in controlling geolocation requirements, facilitating secure video conferencing, and ensuring high-speed access regardless of location.
Symantec Secure Web Gateway is a comprehensive web security solution that provides advanced protection against web-based threats. It offers real-time threat detection and prevention, content filtering, and data loss prevention capabilities to safeguard organizations from web-based attacks. With its advanced threat intelligence and machine learning capabilities, it can detect and block even the most sophisticated web-based threats, including malware, phishing, and ransomware attacks. The solution also provides granular control over web access, allowing organizations to enforce web usage policies and prevent access to malicious or inappropriate websites. It offers flexible deployment options, including on-premises, cloud, and hybrid deployments, to meet the unique needs of different organizations. Additionally, it integrates seamlessly with other Symantec security solutions, such as Symantec Endpoint Protection and Symantec Data Loss Prevention, to provide a comprehensive security posture. Symantec Secure Web Gateway is designed to provide a seamless user experience, with minimal impact on web browsing performance. It offers a range of reporting and analytics capabilities, allowing organizations to gain insights into web usage patterns and identify potential security risks. With its comprehensive web security capabilities, Symantec Secure Web Gateway is an essential component of any organization's security infrastructure.
We monitor all Secure Web Gateways (SWG) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.