Zero Trust Network Access (ZTNA): Which solution is best?
PeerSpot users review the highest rated solutions in the Zero Trust Network Access (ZTNA) market

-
What advice would you give to aspiring IT leaders? “I would say ‘Just do it and always be curious.’...
-
What is the best current trend in cybersecurity? “Currently, the best trend is getting back to...
-
PeerSpot users review the highest rated solutions in the deduplication software market.
-
Which emerging technology are you most excited about the prospect of? “Low code… the most...
Peerspot
- Operating system (OS) for business:...
- Network detection and response (NDR):...
- Application Virtualisation: Which...
- Security orchestration, automation and...
- Business Process Management (BPM):...
As businesses continue to embrace digital innovation, cloud applications, and the new work-from-anywhere normal, enterprise networks have become far more complicated and dispersed with an ever-growing number of edges. To protect this greatly expanded attack surface from modern threats, organisations must implement a “never trust, always verify” zero-trust security model. However, selecting a ZTNA solution isn’t straightforward and there are many factors for businesses to consider.
Over 540,000 professionals have used PeerSpot research to inform their purchasing decisions. Its latest paper looks at the highest rated ZTNA vendors, profiling each and examining what they can offer enterprise.
Here’s a breakdown of the key players currently active in the market:
Appgate SDP
Average Rating: 9.0
Top Comparison: Zscaler Internet Access
Overview: Delivers complete enterprise user and workload coverage from a unified policy engine. This includes remote and in-office users, connected devices, hybrid and multi-cloud workloads, microservices and on-prem and legacy infrastructure.
Citrix Secure Workspace Access
Average Rating: 8.5
Top Comparison: Appgate SDP
Overview: Through authentication and authorisation, access control policies make sure users are who they say they are and that they have appropriate access to company data.
Google Cloud Platform Cloud Identity-Aware Proxy
Average Rating: 8.3
Top Comparison: Okta Workforce Identity
Overview: Includes numerous features that can be used to protect access to Google Cloud hosted resources and applications hosted on Google Cloud. It also provides a single point of control for managing user access to web applications and cloud resources.
Lookout
Average Rating: 8.0
Top Comparison: McAfee MVISION Mobile
Overview: Designed to enable organisations to work remotely while maintaining a tight blanket of security over their confidential business data. It provides administrators with security that extends from their endpoints to the cloud service that they are using.
Perimeter 81
Average Rating: 9.8
Top Comparison: Zscaler Private Access
Overview: A leading network cybersecurity solution offering secure remote access and network capabilities managed over a multi-tenant cloud and highly scalable for organisations worldwide.