Try our new research platform with insights from 80,000+ expert users

Google Cloud Identity-Aware Proxy vs Menlo Secure comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jan 15, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Google Cloud Identity-Aware...
Ranking in ZTNA
10th
Average Rating
8.4
Reviews Sentiment
7.5
Number of Reviews
45
Ranking in other categories
No ranking in other categories
Menlo Secure
Ranking in ZTNA
24th
Average Rating
9.2
Reviews Sentiment
6.7
Number of Reviews
5
Ranking in other categories
Secure Web Gateways (SWG) (26th), Firewalls (52nd), Cloud Security Remediation (9th)
 

Mindshare comparison

As of January 2026, in the ZTNA category, the mindshare of Google Cloud Identity-Aware Proxy is 2.5%, down from 2.7% compared to the previous year. The mindshare of Menlo Secure is 1.8%, up from 0.6% compared to the previous year. It is calculated based on PeerSpot user engagement data.
ZTNA Market Share Distribution
ProductMarket Share (%)
Google Cloud Platform Cloud Identity-Aware Proxy2.5%
Menlo Secure1.8%
Other95.7%
ZTNA
 

Featured Reviews

Nobuaki Kitamura - PeerSpot reviewer
managing director of IT Department at Nara OA System Inc
Google Cloud Platform works better with Google Workspace, stable product but a bit complicated, especially the networking
We used Google Workspace, so all my employees have Google Workspace accounts. I initially wanted to use Google Cloud Platform for subscription compatibility. Google Cloud Platform works better with Google Workspace, but unfortunately, it's a bit complicated, especially the networking. Oracle Cloud's virtual network system is much easier and more flexible. Also, Oracle was cheaper. That's the main reason we chose Oracle Cloud.
reviewer2701794 - PeerSpot reviewer
Head Of Bluechip Enterprise at a manufacturing company with 51-200 employees
Provides strong protection and multiple use cases but struggles with market recognition
There aren't specific areas for improvement; however, they're not as well known as the big vendors such as Palo Alto. Menlo Secure is a smaller company with limited resources and funding, which makes it challenging to compete with larger companies such as Palo and Cisco. What can be improved is market awareness and adoption of the technology. When selling it in the channel, regardless of how good the technology might be, success depends more on market adoption and awareness.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"We do not need to maintain the hardware."
"The most valuable features of the Google Cloud Platform Cloud Identity-Aware Proxy are file storage, a collaborative environment, and easy access."
"The solution is stable."
"Scalability-wise, it is a great product."
"It is a stable solution."
"The app provides ready-made services that we can talk to without issue."
"The solution has many features for stability and security."
"The latest versions of the managed Kubernetes clusters are good."
"It has reduced security events to follow up on. While it is not 100%, there has been probably a 90% or more reduction. We were getting hit left, right, and center constantly from people browsing the Internet and hitting bad websites. It was not just bad websites that were stood up to be malicious, but good sites that were compromised."
"Accessing the internet with a proxy from anywhere is the most valuable feature. It ensures that users are only able to browse legitimate websites. If they happen to go to a legitimate website with a malicious payload, the isolation feature will take care of that."
"This security technology addresses risk and enables people to conduct business without that risk, which is where the ROI is realized."
"For us, the primary goal is protection on the web, and that's extremely important. We're not using any of the other services at this time. The web part is key to the success of the organization. It gives us the ability to protect. It can isolate. It opens the session in an isolated format so that the code isn't running locally. It is running over in the Menlo environment, not in ours. It is not running on the local computer, whereas if you were to go to a normal website, it would run Java or something else on the local machine and potentially execute the malicious code locally. So, it does give us that level of protection."
"The fact that it is a cloud proxy solution is another feature we like. For example, if you acquire a new company, you can use it to protect that new company without the need to install anything physically on their networks."
 

Cons

"The product must be more user-friendly."
"We encounter issues while setting up emails for the solution."
"The solution could be more reasonably priced. We find it to be a bit expensive right now."
"There is room for improvement in the tools and features available on the GCP. In particular, the managed databases and queues could be improved, and it would be beneficial to have more offerings in areas such as data science and data warehousing. Additionally, GCP could benefit from offering similar tools to those offered by its competitors, such as Amazon AWS's Redshift."
"The stability regarding voice commands in the solution has certain shortcomings that need improvement."
"There is room for improvement in the pricing."
"The solution's AI integration could be improved."
"The solution should be more user-friendly and should have descriptive manuals on the page website."
"We are now transitioning to another solution. The main reason for that is that managing all of the exceptions and troubleshooting all of the issues our users have had connecting to the internet has become too significant in terms of workload, compared to what we hope we will have with another solution."
"The user monitoring could still be improved."
"Currently, I don't have a good way to see which of my rules are being used in the access control lists. I have numerous entries, but are they all still needed? A report that would show me my list of who is allowed and whether we're actually using it would be useful because I can then go clean up my list. It would be easier to manage. We would eliminate the vulnerability of unused services."
"Menlo Secure is a smaller company with limited resources and funding, which makes it challenging to compete with larger companies such as Palo and Cisco."
"In the best of all worlds, we wouldn't have to make any exceptions. However, that is a big ask because a lot of that depends on how websites are constructed. For example, there are some very complex, application-oriented sites that we end up making exceptions for. It is really not that big an issue for us to make the exceptions. We feel like we are doing that without a huge impact on our security posture, but we do have to make some exceptions for complex sites, e.g., mostly SaaS-type sites and applications."
 

Pricing and Cost Advice

"There are different pricing plans depending on data volumes and services, but it's comparable to other providers. The value and benefits depend on what we're developing and the specific use case."
"Google Cloud Platform Cloud Identity-Aware Proxy is expensive."
"The solution's price is normal."
"It is expensive to scale up the solution."
"I think that the cost is metered based on the data, but I don't have the details."
"The product's costing model needs improvement."
"The solution is inexpensive for personal use."
"We need to make yearly payments towards the licensing costs. It is an expensive and premium solution."
"We save a ton of money and time. Previously, the numerous hits that we were receiving from our security tools, prior to implementing them, had to all be chased down, dispositioned, and endpoints had to be reimaged. It was just a ton of effort to do all that. That is where the savings from time and money come in."
"It is appropriately priced for what they're doing for us. Considering the protection provided, I feel their pricing is spot-on."
"The solution is expensive. It's more expensive than the solution I previously used. Compared with the other cloud-based solutions, it's very competitive."
report
Use our free recommendation engine to learn which ZTNA solutions are best for your needs.
881,082 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Manufacturing Company
14%
Comms Service Provider
13%
Performing Arts
10%
Computer Software Company
7%
Manufacturing Company
14%
Retailer
12%
Computer Software Company
12%
Financial Services Firm
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business17
Midsize Enterprise12
Large Enterprise19
No data available
 

Questions from the Community

What do you like most about Google Cloud Platform Cloud Identity-Aware Proxy?
I can access the information whenever I want. It's integration is easy. The tool's GUI is easy to use with an IT background. The value benefits of using it include the ability to avoid storing data...
What is your experience regarding pricing and costs for Google Cloud Platform Cloud Identity-Aware Proxy?
There are different pricing plans depending on data volumes and services, but it's comparable to other providers. The value and benefits depend on what we're developing and the specific use case.
What needs improvement with Google Cloud Platform Cloud Identity-Aware Proxy?
Google Cloud Platform Cloud Identity-Aware Proxy should improve stability.
What needs improvement with Menlo Security Secure Web Gateway?
There aren't specific areas for improvement; however, they're not as well known as the big vendors such as Palo Alto. Menlo Secure is a smaller company with limited resources and funding, which mak...
What is your primary use case for Menlo Security Secure Web Gateway?
People are mainly using it for zero trust web access. Menlo Secure is built from the ground up to provide zero basic access, and by doing it that way, it has multiple use cases. For example, it man...
What advice do you have for others considering Menlo Security Secure Web Gateway?
Secure file sharing and data protection is not exactly what Menlo Secure is designed to do. While it can handle some of these functions, people typically choose another technology for those specifi...
 

Also Known As

GCP Cloud IAP, Google Cloud Platform Cloud IAP, Cloud Identity-Aware Proxy
Menlo Security Web Security, Menlo Web Security
 

Overview

Find out what your peers are saying about Google Cloud Identity-Aware Proxy vs. Menlo Secure and other solutions. Updated: December 2025.
881,082 professionals have used our research since 2012.