No more typing reviews! Try our Samantha, our new voice AI agent.

Menlo Secure vs Safe-T Secure Application Access comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jan 2, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Menlo Secure
Ranking in ZTNA
23rd
Average Rating
9.2
Reviews Sentiment
6.7
Number of Reviews
5
Ranking in other categories
Secure Web Gateways (SWG) (27th), Firewalls (53rd), Cloud Security Remediation (8th)
Safe-T Secure Application A...
Ranking in ZTNA
22nd
Average Rating
7.8
Reviews Sentiment
7.7
Number of Reviews
8
Ranking in other categories
Enterprise Infrastructure VPN (43rd), Access Management (31st)
 

Mindshare comparison

As of March 2026, in the ZTNA category, the mindshare of Menlo Secure is 1.7%, up from 0.7% compared to the previous year. The mindshare of Safe-T Secure Application Access is 1.0%, up from 0.5% compared to the previous year. It is calculated based on PeerSpot user engagement data.
ZTNA Mindshare Distribution
ProductMindshare (%)
Safe-T Secure Application Access1.0%
Menlo Secure1.7%
Other97.3%
ZTNA
 

Featured Reviews

reviewer2701794 - PeerSpot reviewer
Head Of Bluechip Enterprise at a manufacturing company with 51-200 employees
Provides strong protection and multiple use cases but struggles with market recognition
There aren't specific areas for improvement; however, they're not as well known as the big vendors such as Palo Alto. Menlo Secure is a smaller company with limited resources and funding, which makes it challenging to compete with larger companies such as Palo and Cisco. What can be improved is market awareness and adoption of the technology. When selling it in the channel, regardless of how good the technology might be, success depends more on market adoption and awareness.
it_user787671 - PeerSpot reviewer
Network and Security Engineer
Needs to be easier to configure and to display logs more simply
We use only it for scanning files for viruses. That's the only feature we use in this product It needs to be easier to configure, it should be something that's working well with other sources. It should be something that allows me to see the logs simply. One to three years. Sometimes it doesn't…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The solution is invisible to our end users, so it doesn't have any impact on their work or performance."
"For us, the primary goal is protection on the web, and that's extremely important. We're not using any of the other services at this time. The web part is key to the success of the organization. It gives us the ability to protect. It can isolate. It opens the session in an isolated format so that the code isn't running locally. It is running over in the Menlo environment, not in ours. It is not running on the local computer, whereas if you were to go to a normal website, it would run Java or something else on the local machine and potentially execute the malicious code locally. So, it does give us that level of protection."
"Accessing the internet with a proxy from anywhere is the most valuable feature. It ensures that users are only able to browse legitimate websites. If they happen to go to a legitimate website with a malicious payload, the isolation feature will take care of that."
"It has reduced security events to follow up on. While it is not 100%, there has been probably a 90% or more reduction. We were getting hit left, right, and center constantly from people browsing the Internet and hitting bad websites. It was not just bad websites that were stood up to be malicious, but good sites that were compromised."
"We have definitely seen ROI, as we save a ton of money and time because the numerous hits that we were receiving from our security tools prior to implementing them had to all be chased down, dispositioned, and endpoints had to be reimaged."
"This security technology addresses risk and enables people to conduct business without that risk, which is where the ROI is realized."
"Either you have access to something or don't have access to it, and if you do, we can ensure, 100 percent of the time, that there is nothing malicious that is going to impact our system in any way."
"We are not aware of a single compromise from the web since implementing the solution."
"We use only it for scanning files for viruses."
"Safe-T is very good for users because it has a plug-in for Outlook."
"Safe-T SDA has allowed my organization to secure my office applications and makes it harder for hackers to be able to hack into my internal office web applications."
"At the end of the day it's really good and really improved."
"Safe-T SDA has allowed my organization to secure my office applications and makes it harder for hackers to be able to hack into my internal office web applications."
"It's easy to use over the web. A user who is not in the office can use it and securely insert files."
"If you want a very flexible system that you can easily integrate, and develop interfaces for it or plug-ins to other application environments, it's probably the most flexible"
"Safe-T is very good for users because it has plug-in for Outlook."
 

Cons

"The user monitoring could still be improved."
"Currently, I don't have a good way to see which of my rules are being used in the access control lists. I have numerous entries, but are they all still needed? A report that would show me my list of who is allowed and whether we're actually using it would be useful because I can then go clean up my list. It would be easier to manage. We would eliminate the vulnerability of unused services."
"Currently, I don't have a good way to see which of my rules are being used in the access control lists."
"Menlo Secure is a smaller company with limited resources and funding, which makes it challenging to compete with larger companies such as Palo and Cisco."
"We are now transitioning to another solution. The main reason for that is that managing all of the exceptions and troubleshooting all of the issues our users have had connecting to the internet has become too significant in terms of workload, compared to what we hope we will have with another solution."
"We are now transitioning to another solution. The main reason for that is that managing all of the exceptions and troubleshooting all of the issues our users have had connecting to the internet has become too significant in terms of workload, compared to what we hope we will have with another solution."
"The user monitoring could still be improved."
"In the best of all worlds, we wouldn't have to make any exceptions. However, that is a big ask because a lot of that depends on how websites are constructed. For example, there are some very complex, application-oriented sites that we end up making exceptions for. It is really not that big an issue for us to make the exceptions. We feel like we are doing that without a huge impact on our security posture, but we do have to make some exceptions for complex sites, e.g., mostly SaaS-type sites and applications."
"The Outlook agent is not working well for installing it in the entire office."
"The cloud solution is not that great especially with Swiss customers."
"Better UI. A better UI for the people that manage all the processes of Safe-T. Some of the UI is not as intuitive as you would like it to be."
"One important thing that we haven't found in this product is the ability to provide a read-only view for documents. Also, the ability for the customer to add annotations to these documents."
"Setting up Safe-T SDE is very complex. It is not straightforward, and it requires much understanding on the concepts of the product."
"In terms of improvement, they need to be much more strict regarding the roadmap, about timelines and when new features will be up in production."
"Setting up Safe-T SDE is very complex. It is not straightforward, and it requires much understanding on the concepts of the product."
"I'm not sure what advice I would give others about this product because I don't like Safe-T."
 

Pricing and Cost Advice

"We save a ton of money and time. Previously, the numerous hits that we were receiving from our security tools, prior to implementing them, had to all be chased down, dispositioned, and endpoints had to be reimaged. It was just a ton of effort to do all that. That is where the savings from time and money come in."
"The solution is expensive. It's more expensive than the solution I previously used. Compared with the other cloud-based solutions, it's very competitive."
"It is appropriately priced for what they're doing for us. Considering the protection provided, I feel their pricing is spot-on."
Information not available
report
Use our free recommendation engine to learn which ZTNA solutions are best for your needs.
885,311 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Manufacturing Company
15%
Retailer
11%
Computer Software Company
9%
Financial Services Firm
9%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
No data available
 

Questions from the Community

What needs improvement with Menlo Security Secure Web Gateway?
There aren't specific areas for improvement; however, they're not as well known as the big vendors such as Palo Alto. Menlo Secure is a smaller company with limited resources and funding, which mak...
What is your primary use case for Menlo Security Secure Web Gateway?
People are mainly using it for zero trust web access. Menlo Secure is built from the ground up to provide zero basic access, and by doing it that way, it has multiple use cases. For example, it man...
What advice do you have for others considering Menlo Security Secure Web Gateway?
Secure file sharing and data protection is not exactly what Menlo Secure is designed to do. While it can handle some of these functions, people typically choose another technology for those specifi...
Ask a question
Earn 20 points
 

Also Known As

Menlo Security Web Security, Menlo Web Security
Safe-T SDA, Safe-T, Safe-T Software-Defined Access
 

Overview

 

Sample Customers

Information Not Available
Government of Israel, eviCore Healthcore, Glen Imaging, Sarin, LBG, Rollomatic, Boegli-Gravures SA, Banque Heritage, Groupe Minoteries, Temenos, ZEK, RLM Finsbury, Harel Insurance, Meitav Dash
Find out what your peers are saying about Menlo Secure vs. Safe-T Secure Application Access and other solutions. Updated: March 2026.
885,311 professionals have used our research since 2012.