No more typing reviews! Try our Samantha, our new voice AI agent.

Menlo Secure vs Twingate comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Menlo Secure
Ranking in ZTNA
23rd
Average Rating
9.2
Reviews Sentiment
6.7
Number of Reviews
5
Ranking in other categories
Secure Web Gateways (SWG) (27th), Firewalls (53rd), Cloud Security Remediation (8th)
Twingate
Ranking in ZTNA
7th
Average Rating
8.0
Reviews Sentiment
7.5
Number of Reviews
1
Ranking in other categories
Network Access Control (NAC) (12th), Internet Security (12th), Enterprise Infrastructure VPN (15th), ZTNA as a Service (15th), Secure Access Service Edge (SASE) (18th)
 

Mindshare comparison

As of April 2026, in the ZTNA category, the mindshare of Menlo Secure is 1.7%, up from 0.7% compared to the previous year. The mindshare of Twingate is 6.8%, down from 26.5% compared to the previous year. It is calculated based on PeerSpot user engagement data.
ZTNA Mindshare Distribution
ProductMindshare (%)
Twingate6.8%
Menlo Secure1.7%
Other91.5%
ZTNA
 

Featured Reviews

reviewer2701794 - PeerSpot reviewer
Head Of Bluechip Enterprise at a manufacturing company with 51-200 employees
Provides strong protection and multiple use cases but struggles with market recognition
There aren't specific areas for improvement; however, they're not as well known as the big vendors such as Palo Alto. Menlo Secure is a smaller company with limited resources and funding, which makes it challenging to compete with larger companies such as Palo and Cisco. What can be improved is market awareness and adoption of the technology. When selling it in the channel, regardless of how good the technology might be, success depends more on market adoption and awareness.
Joey Benamy - PeerSpot reviewer
Senior Cyber Liability Engineer at OncoLens
Helps reduce access-related support tickets, is quick to deploy, and streamlines onboarding
We were able to add Twingate into our infrastructure without having to change our infrastructure or how people work. We reaped the benefits of Twingate immediately because it replaced an alternative solution with a lot of overhead. Twingate helped reduce access-related support tickets by 80 percent. Twingate streamlines onboarding for our company, especially for the engineering team, by automating resource access through directory integrations. New employees generally require no manual configuration within Twingate, saving us significant time and effort. The resiliency is directly proportional to the level of control we exert over its components. We can manage Twingate connectors to support high availability, ensuring the system is as reliable as needed. This flexibility and control enhance Twingate's resiliency capabilities significantly.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"We have definitely seen ROI, as we save a ton of money and time because the numerous hits that we were receiving from our security tools prior to implementing them had to all be chased down, dispositioned, and endpoints had to be reimaged."
"For us, the primary goal is protection on the web, and that's extremely important. We're not using any of the other services at this time. The web part is key to the success of the organization. It gives us the ability to protect. It can isolate. It opens the session in an isolated format so that the code isn't running locally. It is running over in the Menlo environment, not in ours. It is not running on the local computer, whereas if you were to go to a normal website, it would run Java or something else on the local machine and potentially execute the malicious code locally. So, it does give us that level of protection."
"We are not aware of a single compromise from the web since implementing the solution."
"This security technology addresses risk and enables people to conduct business without that risk, which is where the ROI is realized."
"Either you have access to something or don't have access to it, and if you do, we can ensure, 100 percent of the time, that there is nothing malicious that is going to impact our system in any way."
"The fact that it is a cloud proxy solution is another feature we like. For example, if you acquire a new company, you can use it to protect that new company without the need to install anything physically on their networks."
"The solution is invisible to our end users, so it doesn't have any impact on their work or performance."
"It has reduced security events to follow up on. While it is not 100%, there has been probably a 90% or more reduction. We were getting hit left, right, and center constantly from people browsing the Internet and hitting bad websites. It was not just bad websites that were stood up to be malicious, but good sites that were compromised."
"I appreciate Twingate's developer-first approach, particularly its excellent developer tools for deployment and management."
 

Cons

"Currently, I don't have a good way to see which of my rules are being used in the access control lists. I have numerous entries, but are they all still needed? A report that would show me my list of who is allowed and whether we're actually using it would be useful because I can then go clean up my list. It would be easier to manage. We would eliminate the vulnerability of unused services."
"We are now transitioning to another solution. The main reason for that is that managing all of the exceptions and troubleshooting all of the issues our users have had connecting to the internet has become too significant in terms of workload, compared to what we hope we will have with another solution."
"The user monitoring could still be improved."
"Currently, I don't have a good way to see which of my rules are being used in the access control lists."
"In the best of all worlds, we wouldn't have to make any exceptions. For example, there are some very complex, application-oriented sites that we end up making exceptions for."
"We are now transitioning to another solution. The main reason for that is that managing all of the exceptions and troubleshooting all of the issues our users have had connecting to the internet has become too significant in terms of workload, compared to what we hope we will have with another solution."
"The user monitoring could still be improved."
"Menlo Secure is a smaller company with limited resources and funding, which makes it challenging to compete with larger companies such as Palo and Cisco."
"Twingate's lack of native support for Windows Server is a significant limitation."
 

Pricing and Cost Advice

"The solution is expensive. It's more expensive than the solution I previously used. Compared with the other cloud-based solutions, it's very competitive."
"It is appropriately priced for what they're doing for us. Considering the protection provided, I feel their pricing is spot-on."
"We save a ton of money and time. Previously, the numerous hits that we were receiving from our security tools, prior to implementing them, had to all be chased down, dispositioned, and endpoints had to be reimaged. It was just a ton of effort to do all that. That is where the savings from time and money come in."
"Twingate's pricing is fair."
report
Use our free recommendation engine to learn which ZTNA solutions are best for your needs.
885,376 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Manufacturing Company
14%
Retailer
10%
Construction Company
9%
Computer Software Company
8%
Comms Service Provider
18%
Financial Services Firm
7%
University
7%
Computer Software Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
No data available
 

Questions from the Community

What needs improvement with Menlo Security Secure Web Gateway?
There aren't specific areas for improvement; however, they're not as well known as the big vendors such as Palo Alto. Menlo Secure is a smaller company with limited resources and funding, which mak...
What is your primary use case for Menlo Security Secure Web Gateway?
People are mainly using it for zero trust web access. Menlo Secure is built from the ground up to provide zero basic access, and by doing it that way, it has multiple use cases. For example, it man...
What advice do you have for others considering Menlo Security Secure Web Gateway?
Secure file sharing and data protection is not exactly what Menlo Secure is designed to do. While it can handle some of these functions, people typically choose another technology for those specifi...
What needs improvement with Twingate?
Twingate's lack of native support for Windows Server is a significant limitation. While it hasn't directly affected my company, I've encountered this issue when assisting others. Additionally, the ...
 

Also Known As

Menlo Security Web Security, Menlo Web Security
No data available
 

Overview

 

Sample Customers

Information Not Available
Blend, Modern Health, Webflow, Liberis, Cerebral, Homebase, Bloomreach, Cameo, Hippo and Bitpanda
Find out what your peers are saying about Fortinet, Check Point Software Technologies, Cloudflare and others in ZTNA. Updated: February 2026.
885,376 professionals have used our research since 2012.