Skip to Navigation
Skip to Navigation
G2 - Business Software Reviews
Enter product name, software category, service name...
Chat
Software
Expand/Collapse Software
Services
Expand/Collapse Services
G2 for Business
Expand/Collapse vendor
For Marketers
Enhance your G2 profile and reach in-market buyers
For Sales
Find, engage, and convert in-market buyers
For Services
Reach companies that need you, when they’re ready to buy
For Investments
Gain access to real-time software trends
For IT & Finance
Optimize your SaaS spend and utilization
Deals
Write a Review
Join or Log In
Search
Search Software and Services
Chat
Expand/Collapse
Home
...
All Categories
Cloud Edge Security Software Discussions
Cloud Edge Security Software Discussions
Share
All Cloud Edge Security Software Discussions
Search
Most Commented
Most Helpful
Pinned by G2
Newest
All Discussions
Discussions with Comments
Pinned by G2
Discussions without Comments
Filter
Filter
Filter by
Expand/Collapse
Sort by
Most Commented
Most Helpful
Pinned by G2
Newest
Filter by
All Discussions
Discussions with Comments
Pinned by G2
Discussions without Comments
Posted within
Cisco Umbrella
Up Vote
0
Down Vote
1
What is Cisco Umbrella used for?
Report
What is Cisco Umbrella used for?
DNS Security Solutions
Secure Web Gateways
Cloud Edge Security Software
Pinned by G2 as a
common question.
Posted within
Cloudflare SSE & SASE Platform
Up Vote
0
Down Vote
0
What is Cloudflare Area 1 Security used for?
Report
What is Cloudflare Area 1 Security used for?
Cloud Email Security Solutions
Email Anti-spam Software
Secure Email Gateway Software
Cloud Edge Security Software
Pinned by G2 as a
common question.
Posted within
Lookout
Up Vote
0
Down Vote
0
What is Lookout used for?
Report
What is Lookout used for?
Cloud Access Security Broker (CASB) Software
Data Loss Prevention (DLP) Software
Endpoint Management Software
Threat Intelligence Software
Secure Access Service Edge (SASE) Platforms
Secure Web Gateways
Zero Trust Networking Software
Cloud Edge Security Software
Pinned by G2 as a
common question.
Posted within
Cisco Umbrella
Up Vote
0
Down Vote
0
What is Open DNS Personal Internet Security used for?
Report
What is Open DNS Personal Internet Security used for?
DNS Security Solutions
Secure Web Gateways
Cloud Edge Security Software
Pinned by G2 as a
common question.
Posted within
Zentry Zero Trust Network Access
Up Vote
0
Down Vote
0
What is Zentry Zero Trust Network Access used for?
Report
What is Zentry Zero Trust Network Access used for?
Software-Defined Perimeter (SDP) Software
Zero Trust Networking Software
Cloud Edge Security Software
Pinned by G2 as a
common question.
Posted within
Cloudflare SSE & SASE Platform
Up Vote
0
Down Vote
0
What is Cloudflare Zero Trust Services used for?
Report
What is Cloudflare Zero Trust Services used for?
Zero Trust Networking Software
Cloud Email Security Solutions
Email Anti-spam Software
Secure Email Gateway Software
Secure Web Gateways
Browser Isolation Software
Cloud Access Security Broker (CASB) Software
Data Loss Prevention (DLP) Software
Firewall Software
Cloud Edge Security Software
Pinned by G2 as a
common question.
Posted within
Prisma Access
Up Vote
0
Down Vote
0
What is Prisma Access (formerly GlobalProtect cloud service) used for?
Report
What is Prisma Access (formerly GlobalProtect cloud service) used for?
Cloud Access Security Broker (CASB) Software
Cloud Edge Security Software
Secure Web Gateways
Software-Defined Perimeter (SDP) Software
Zero Trust Networking Software
Pinned by G2 as a
common question.
Posted within
VMware SASE
Up Vote
0
Down Vote
0
What is VMware SASE used for?
Report
What is VMware SASE used for?
Cloud Edge Security Software
Cloud Access Security Broker (CASB) Software
Zero Trust Networking Software
1
person commented
AK
Amarjeet K.
Pinned by G2 as a
common question.
Posted within
Zscaler Secure Access Service Edge (SASE)
Up Vote
0
Down Vote
0
What is Zscaler Secure Access Service Edge (SASE) used for?
Report
What is Zscaler Secure Access Service Edge (SASE) used for?
Cloud Edge Security Software
Pinned by G2 as a
common question.
Posted within
Cyolo
Up Vote
0
Down Vote
0
What is Cyolo used for?
Report
What is Cyolo used for?
Zero Trust Networking Software
Cloud Access Security Broker (CASB) Software
Cloud Edge Security Software
Software-Defined Perimeter (SDP) Software
Pinned by G2 as a
common question.
Posted within
Citrix Secure Internet Access
Up Vote
0
Down Vote
0
What is Citrix Secure Internet Access used for?
Report
What is Citrix Secure Internet Access used for?
Cloud Edge Security Software
Pinned by G2 as a
common question.
Posted within
Forcepoint ONE
Up Vote
0
Down Vote
0
What is Forcepoint CASB?
Report
What is Forcepoint CASB?
Cloud Access Security Broker (CASB) Software
Data Loss Prevention (DLP) Software
Cloud Edge Security Software
Pinned by G2 as a
common question.
Posted within
Twingate
Up Vote
0
Down Vote
0
How do you use Twingate?
Report
How do you use Twingate?
Cloud Edge Security Software
Software-Defined Perimeter (SDP) Software
Zero Trust Networking Software
Virtual Private Network (VPN) Software
Network Access Control Software
Pinned by G2 as a
common question.
Posted within
Check Point Harmony SASE
Up Vote
0
Down Vote
0
Is perimeter 81 a VPN?
Report
Is perimeter 81 a VPN?
Cloud Edge Security Software
Software-Defined Perimeter (SDP) Software
Zero Trust Networking Software
Virtual Private Network (VPN) Software
Cloud Access Security Broker (CASB) Software
1
person commented
FF
f1b8b3bda688b71c72c9d0ba9e47bb5742d40822 f.
Pinned by G2 as a
common question.
Posted within
Check Point CloudGuard Harmony Connect (CloudGuard Connect)
Up Vote
0
Down Vote
0
What is CloudGuard connect?
Report
What is CloudGuard connect?
Cloud Edge Security Software
Data Center Security Software
SD-WAN Software
Secure Web Gateways
Zero Trust Networking Software
Unified Threat Management Software
Pinned by G2 as a
common question.
Posted within
Netskope One Platform
Up Vote
0
Down Vote
0
Is Netskope a CASB?
Report
Is Netskope a CASB?
Cloud Edge Security Software
Cloud Access Security Broker (CASB) Software
Data Loss Prevention (DLP) Software
Secure Web Gateways
Zero Trust Networking Software
1
person commented
DN
Deepak N.
Pinned by G2 as a
common question.
Posted within
Zscaler Cloud Platform
Up Vote
0
Down Vote
0
What cloud does zscaler use?
Report
What cloud does zscaler use?
Cloud Data Security Software
Cloud Migration Software
Cloud Edge Security Software
Cloud Access Security Broker (CASB) Software
Microsegmentation Software
1
person commented
PP
PRAVEEN P.
Pinned by G2 as a
common question.
Posted within
Cloudflare SSE & SASE Platform
Up Vote
0
Down Vote
0
What is Gateway Cloudflare?
Report
What is Gateway Cloudflare?
Zero Trust Networking Software
Cloud Email Security Solutions
Email Anti-spam Software
Secure Email Gateway Software
Secure Web Gateways
Browser Isolation Software
Cloud Access Security Broker (CASB) Software
Data Loss Prevention (DLP) Software
Firewall Software
Cloud Edge Security Software
Pinned by G2 as a
common question.
Posted within
ProxySG and Advanced Secure Gateway (ASG)
Up Vote
0
Down Vote
0
What does Proxysg And Advanced Secure Gateway (Asg) do?
Report
What does Proxysg And Advanced Secure Gateway (Asg) do?
Secure Web Gateways
Cloud Edge Security Software
Pinned by G2 as a
common question.
Posted within
iboss
Up Vote
0
Down Vote
0
Why do schools use iboss?
Report
Why do schools use iboss?
Cloud Edge Security Software
DNS Security Software
Cloud Access Security Broker (CASB) Software
Zero Trust Networking Software
Browser Isolation Software
SD-WAN Software
Secure Web Gateways
Secure Access Service Edge (SASE) Platforms
Pinned by G2 as a
common question.
Posted within
Cato SASE Cloud
Up Vote
0
Down Vote
0
How good is Cato networks?
Report
How good is Cato networks?
Cloud Edge Security Software
WAN Edge Infrastructure Software
SD-WAN Software
Cloud Access Security Broker (CASB) Software
Zero Trust Networking Software
Pinned by G2 as a
common question.
Posted within
Forcepoint ONE
Up Vote
0
Down Vote
0
What is Forcepoint cloud web security?
Report
What is Forcepoint cloud web security?
Cloud Access Security Broker (CASB) Software
Data Loss Prevention (DLP) Software
Cloud Edge Security Software
Pinned by G2 as a
common question.
Posted within
Twingate
Up Vote
0
Down Vote
0
What is Twingate used for?
Report
What is Twingate used for?
Cloud Edge Security Software
Software-Defined Perimeter (SDP) Software
Zero Trust Networking Software
Virtual Private Network (VPN) Software
Network Access Control Software
Pinned by G2 as a
common question.
Posted within
Check Point Harmony SASE
Up Vote
0
Down Vote
0
How does perimeter 81 work?
Report
How does perimeter 81 work?
Cloud Edge Security Software
Software-Defined Perimeter (SDP) Software
Zero Trust Networking Software
Virtual Private Network (VPN) Software
Cloud Access Security Broker (CASB) Software
1
person commented
BA
Boaz A.
Pinned by G2 as a
common question.
Posted within
Check Point CloudGuard Harmony Connect (CloudGuard Connect)
Up Vote
0
Down Vote
0
What does harmony Connect provide to customers?
Report
What does harmony Connect provide to customers?
Cloud Edge Security Software
Data Center Security Software
SD-WAN Software
Secure Web Gateways
Zero Trust Networking Software
Unified Threat Management Software
Pinned by G2 as a
common question.
Posted within
Netskope One Platform
Up Vote
0
Down Vote
0
What does a CASB do?
Report
What does a CASB do?
Cloud Edge Security Software
Cloud Access Security Broker (CASB) Software
Data Loss Prevention (DLP) Software
Secure Web Gateways
Zero Trust Networking Software
Pinned by G2 as a
common question.
Posted within
Zscaler Cloud Platform
Up Vote
0
Down Vote
0
What is unique about zscaler?
Report
What is unique about zscaler?
Cloud Data Security Software
Cloud Migration Software
Cloud Edge Security Software
Cloud Access Security Broker (CASB) Software
Microsegmentation Software
1
person commented
PP
PRAVEEN P.
Pinned by G2 as a
common question.
Posted within
Cloudflare SSE & SASE Platform
Up Vote
0
Down Vote
0
How do I set up a Cloudflare team?
Report
How do I set up a Cloudflare team?
Zero Trust Networking Software
Cloud Email Security Solutions
Email Anti-spam Software
Secure Email Gateway Software
Secure Web Gateways
Browser Isolation Software
Cloud Access Security Broker (CASB) Software
Data Loss Prevention (DLP) Software
Firewall Software
Cloud Edge Security Software
Pinned by G2 as a
common question.
Posted within
ProxySG and Advanced Secure Gateway (ASG)
Up Vote
0
Down Vote
0
What is Symantec ASG?
Report
What is Symantec ASG?
Secure Web Gateways
Cloud Edge Security Software
Pinned by G2 as a
common question.
Posted within
iboss
Up Vote
0
Down Vote
0
What is wrong with iboss?
Report
What is wrong with iboss?
DNS Security Software
Zero Trust Networking Software
Browser Isolation Software
SD-WAN Software
Secure Web Gateways
Cloud Access Security Broker (CASB) Software
Cloud Edge Security Software
Pinned by G2 as a
common question.
Posted within
Cato SASE Cloud
Up Vote
0
Down Vote
0
How does Cato VPN Work?
Report
How does Cato VPN Work?
Cloud Edge Security Software
WAN Edge Infrastructure Software
SD-WAN Software
Cloud Access Security Broker (CASB) Software
Zero Trust Networking Software
Pinned by G2 as a
common question.
Posted within
Forcepoint ONE
Up Vote
0
Down Vote
0
What does Forcepoint tool do?
Report
What does Forcepoint tool do?
Cloud Access Security Broker (CASB) Software
Data Loss Prevention (DLP) Software
Cloud Edge Security Software
Pinned by G2 as a
common question.
Posted within
Twingate
Up Vote
0
Down Vote
0
What do VPNs do?
Report
What do VPNs do?
Cloud Edge Security Software
Software-Defined Perimeter (SDP) Software
Zero Trust Networking Software
Virtual Private Network (VPN) Software
Network Access Control Software
Pinned by G2 as a
common question.
Posted within
Check Point Harmony SASE
Up Vote
0
Down Vote
0
What are the capabilities of software perimeter solution?
Report
What are the capabilities of software perimeter solution?
Cloud Edge Security Software
Software-Defined Perimeter (SDP) Software
Zero Trust Networking Software
Virtual Private Network (VPN) Software
1
person commented
BA
Boaz A.
Pinned by G2 as a
common question.
Posted within
Check Point CloudGuard Harmony Connect (CloudGuard Connect)
Up Vote
0
Down Vote
0
What are the five areas of the CloudGuard platform?
Report
What are the five areas of the CloudGuard platform?
Cloud Edge Security Software
Data Center Security Software
SD-WAN Software
Secure Web Gateways
Zero Trust Networking Software
Unified Threat Management Software
Pinned by G2 as a
common question.
Posted within
Netskope One Platform
Up Vote
0
Down Vote
0
How much does Netskope cost?
Report
How much does Netskope cost?
Cloud Edge Security Software
Cloud Access Security Broker (CASB) Software
Data Loss Prevention (DLP) Software
Secure Web Gateways
Zero Trust Networking Software
Pinned by G2 as a
common question.
Posted within
Zscaler Cloud Platform
Up Vote
0
Down Vote
0
What does zscaler software do?
Report
What does zscaler software do?
Cloud Data Security Software
Cloud Migration Software
Cloud Edge Security Software
Cloud Access Security Broker (CASB) Software
Microsegmentation Software
Pinned by G2 as a
common question.
Posted within
Cloudflare SSE & SASE Platform
Up Vote
0
Down Vote
0
How does Cloudflare teams work?
Report
How does Cloudflare teams work?
Zero Trust Networking Software
Cloud Email Security Solutions
Email Anti-spam Software
Secure Email Gateway Software
Secure Web Gateways
Browser Isolation Software
Cloud Access Security Broker (CASB) Software
Data Loss Prevention (DLP) Software
Firewall Software
Cloud Edge Security Software
Pinned by G2 as a
common question.
Posted within
ProxySG and Advanced Secure Gateway (ASG)
Up Vote
0
Down Vote
0
What is Symantec ProxySG?
Report
What is Symantec ProxySG?
Secure Web Gateways
Cloud Edge Security Software
Pinned by G2 as a
common question.
Posted within
Cato SASE Cloud
Up Vote
0
Down Vote
0
What is Cato technology?
Report
What is Cato technology?
Cloud Edge Security Software
WAN Edge Infrastructure Software
SD-WAN Software
Cloud Access Security Broker (CASB) Software
Zero Trust Networking Software
Pinned by G2 as a
common question.
Posted within
Forcepoint ONE
Up Vote
0
Down Vote
0
What is cloud security gateway?
Report
What is cloud security gateway?
Cloud Access Security Broker (CASB) Software
Data Loss Prevention (DLP) Software
Cloud Edge Security Software
Pinned by G2 as a
common question.
Posted within
Check Point Harmony SASE
Up Vote
0
Down Vote
0
What services do perimeter 81 provide?
Report
What services do perimeter 81 provide?
Cloud Edge Security Software
Software-Defined Perimeter (SDP) Software
Zero Trust Networking Software
1
person commented
BA
Boaz A.
Pinned by G2 as a
common question.
Posted within
Check Point CloudGuard Harmony Connect (CloudGuard Connect)
Up Vote
0
Down Vote
0
Which security services does CloudGuard Connect provide?
Report
Which security services does CloudGuard Connect provide?
Unified Threat Management Software
Zero Trust Networking Software
Secure Web Gateways
SD-WAN Software
Data Center Security Software
Cloud Edge Security Software
Pinned by G2 as a
common question.
Posted within
Netskope One Platform
Up Vote
0
Down Vote
0
What is Netskope client used for?
Report
What is Netskope client used for?
Zero Trust Networking Software
Secure Web Gateways
Data Loss Prevention (DLP) Software
Cloud Access Security Broker (CASB) Software
Cloud Edge Security Software
Pinned by G2 as a
common question.
Posted within
Zscaler Cloud Platform
Up Vote
0
Down Vote
0
What are the features of Zscaler?
Report
What are the features of Zscaler?
Microsegmentation Software
Cloud Edge Security Software
Cloud Access Security Broker (CASB) Software
Cloud Data Security Software
Cloud Migration Software
Pinned by G2 as a
common question.
Posted within
Cato SASE Cloud
Up Vote
0
Down Vote
0
What is Cato cloud?
Report
What is Cato cloud?
Zero Trust Networking Software
Cloud Access Security Broker (CASB) Software
SD-WAN Software
WAN Edge Infrastructure Software
Cloud Edge Security Software
Pinned by G2 as a
common question.
Posted within
Netskope One Platform
Up Vote
0
Down Vote
1
For IPsec tunnel do we need to install netskope ssl certificate in evey system?
Report
We have created IPsec tunnel for non domain system, and diverted all the traffic through IPsec tunnel. It is not working as much as expected.
Cloud Edge Security Software
Cloud Access Security Broker (CASB) Software
Data Loss Prevention (DLP) Software
Secure Web Gateways
Zero Trust Networking Software
Posted by:
G2
Verified User
Pinned by G2 as a
common question.
Posted within
Zscaler Cloud Platform
Up Vote
0
Down Vote
1
Why there is lag in zscaler while logging in and while updating the policy and also IDP integrati...
Report
-- It failed when login into SAML authentication IDP error 0x4d40cac0.
Microsegmentation Software
Cloud Edge Security Software
Cloud Access Security Broker (CASB) Software
Cloud Data Security Software
Cloud Migration Software
Posted by:
G2
Verified User
Pinned by G2 as a
common question.
Start A Discussion
Top Contributors in Cloud Edge Security Software
1
BA
Loading...
Boaz A.
3
2
PP
Loading...
PRAVEEN P.
2
3
MM
Loading...
Manjunath M.
1
4
NK
Loading...
Nitin K.
1
5
FF
Loading...
f1b8b3bda688b71c72c9d0ba9e47bb5742d40822 f.
1
Popular Discussions without Comments
Up Vote
0
Down Vote
1
What is cisco umbrella used for?
Up Vote
0
Down Vote
1
For ipsec tunnel do we need to install netskope ssl certificate in evey system?
Up Vote
0
Down Vote
1
Why there is lag in zscaler while logging in and while updating the policy and also idp integration could be better.
Up Vote
0
Down Vote
0
What is cloudflare area 1 security used for?
Up Vote
0
Down Vote
0
What is lookout used for?
Hunting for software
insights
?
With over 2.5 million reviews, we can provide the specific details that help you make an informed software buying decision for your business. Finding the right product is important, let us help.
G2 - Business Software Reviews
Create an account
Already have an account?
Log in
G2 - Business Software Reviews
Create an account
Already have an account?
Log in
or continue with
LinkedIn
Google
Google (Business)
Gmail.com addresses not permitted. A business domain using Google is allowed.
By proceeding, you agree to our
Terms of Use
and
Privacy Policy