AIMultiple ResearchAIMultiple Research

Top 10 SDP Software in 2024: Based on 4,000+ Reviews

Updated on Apr 19
12 min read
Written by
Cem Dilmegani
Cem Dilmegani
Cem Dilmegani

Cem has been the principal analyst at AIMultiple since 2017. AIMultiple informs hundreds of thousands of businesses (as per similarWeb) including 55% of Fortune 500 every month. Cem's work has been cited by leading global publications including Business Insider, Forbes, Washington Post, global firms like Deloitte, HPE and NGOs like World Economic Forum and supranational organizations like European Commission. You can see more reputable companies and resources that referenced AIMultiple. Throughout his career, Cem served as a tech consultant, tech buyer and tech entrepreneur. He advised enterprises on their technology decisions at McKinsey & Company and Altman Solon for more than a decade. He also published a McKinsey report on digitalization. He led technology strategy and procurement of a telco while reporting to the CEO. He has also led commercial growth of deep tech company Hypatos that reached a 7 digit annual recurring revenue and a 9 digit valuation from 0 within 2 years. Cem's work in Hypatos was covered by leading technology publications like TechCrunch and Business Insider. Cem regularly speaks at international technology conferences. He graduated from Bogazici University as a computer engineer and holds an MBA from Columbia Business School.

View Full Profile
Drafted by
Mert Palazoğlu
Mert Palazoğlu
Mert Palazoğlu

Mert Palazoğlu is an AIMultiple industry analyst focused on network security.

View Full Profile

More than 60% of global corporate data is stored in the cloud,1 and more than 80% of data breach security incidents involved data stored on the cloud in 2023.2 Companies need a method for masking Internet-connected infrastructure (servers, routers, etc.) so that external parties and attackers cannot access data stored in the cloud. 

An SDP software can deliver a software-defined perimeter (SDP) by the cloud to determine who gets access to what resources. With SDP software network architects can use microsegmentation to isolate workloads across a virtualized network ensuring that physical network reconfiguration does not influence applications. Thus, applications can operate in secure segments behind a virtual network framework.

This article provides the top 10 SDP software, including an overview of each product, its important specs, and review-based pros and cons.

Top 10 SDP software

Table 1: Feature comparison of the top 10 SDP software

VendorPricing driverSupported OSsDeployment options
TufinUsage-basedTufinOS,
Red Hat Enterprise,
Linux (RHEL) 7,
CentOS 7
Physical appliances
Virtual appliances
Cloud-delivered
Zscaler Internet AccessUsage-based
Number of additional features
iOS 9 or later, Android 5 or later, Windows 7 orlater, Mac OS X 10.10 or later, CentOS 8 Ubuntu 20.04
Cloud-delivered
FortiGate SD-WANUsage-based
Number & type of endpoints
Microsoft Windows,
MacOS,
Linux,
Android OS,
Apple iOS,
Chrome OS
Physical appliances
Virtual appliances
Cloud-delivered
Citrix Workspace EssentialsUser-based licensing starting from 5 users
Windows 11, Windows 10, MacOS: High Sierra (10.13) and later, 64-bit Ubuntu, 64-bit RHEL 9, ARM64 Raspberry Pi OS
Physical appliances
Virtual appliances
Cloud-delivered
Absolute Secure AccessLicensing-based starting from $45 per year
iOS 11 and later, macOS (10.13 and later), Android ( 5.0 or later), Windows 8, 10, and 11
Physical appliances
Cloud-delivered
Citrix Secure Workspace AccessUser-based starting from $3
per user/month
iOS 11 and later, MacOS (10.13 and later), Android ( 5.0 or later), Windows 8, 10, and 11
Physical appliances
Virtual appliances
Cloud-delivered
GoodAccess$7 per user/month (min. 5 users) +$39/month per dedicated gatewayiOS,
MacOS,
Android,
Windows,
ChromeOS
Physical appliances
Virtual appliances
Cloud-delivered
Symantec Secure Access CloudUser-based licensing
Amazon Linux 2023 , Windows 11, Ubuntu 22.04 LTS, AIX 7.3 PPC, Red Hat Enterprise,Linux (RHEL) 9.x, AIX 7.1 Technology
Physical appliances
Virtual appliances
Cloud-delivered
Ivanti Connect SecureStarting at $157.00/user/one-time payment for 1 yearWindows 10, Redstone 6 Version,
MacOS,
Linux Ubuntu 16.04 LTS or later,

Physical appliances
Virtual appliances
Cloud-delivered
Perimeter 81$8 per user/month (min. 10 users) +$40/month per gateway
Windows 8.1 or later, MacOS X 10.15 or later, Ubuntu 18.04 or later
Physical appliances
Virtual appliances
Cloud-delivered

Table 2: The market presence of the top 10 SDP software

VendorTotal reviews*Average rating (5-point scale)*
Tufin2834.0
Zscaler Internet Access9734.5
FortiGate SD-WAN8544.8
Citrix Workspace Essentials8004.3
Absolute Secure Access3344.6
Citrix Secure Workspace Access2374.0
GoodAccess2294.8
Symantec Secure Access Cloud2224.3
Ivanti Connect Secure2124.4
Perimeter 811584.7

*Based on the total number of reviews and average ratings on Gartner, G2, Capterra, and PeerSpot software review platforms as of 4/15/2024. 

Disclaimer: With Tufin (sponsored) placed at the top, other vendors are sorted by the total number of reviews in descending order.

Vendor selection criteria: Considering there are numerous SDP software, the list (above) is narrowed down based on the vendor criteria below.

  • Number of reviews: 100+ reviews on Gartner, G2, Capterra, and PeerSpot.
  • Average rating: Above 4.0/5 on Gartner, G2, Capterra, and PeerSpot.

1- Tufin

Tufin is a network security software specializing in network security policy management and microsegmentation to enable businesses to manage their network security rules. 

Tufin can assist in simplifying the operation of complex networks containing firewalls and network devices. With cybersecurity risk management and data compliance capabilities, its network security automation may assist enterprises in implementing changes in real-time.

Figure 3: Tufin’s device and vendor support spectrum

Source: Tufin3

Pros

Network segmentation: Users appreciate how their organization’s network segmentation is displayed on the Tufin portal.4

Network security policy management: Users argue that Tufin is efficient for centralized network security policy management.5

Unified network protection and microsegmentation: Customers indicate that Tufin’s unified network protection and microsegmentation capabilities are efficient in preventing the most common cyber attack vectors

Read more: Top 10 microsegmentation tools, top 10 network security policy management solutions.

Cons

Central management for firewalls: Network engineers say that Tufin requires central administration to deliver rules to edge firewalls from vendors like Palo Alto Networks, Fortinet, and Checkpoint.6

Read more: Firewall assessment.

Confidential data reports: Some IT consultants conclude that Tufin’s reporting functionality might be improved, noting that confidential data allows one person to examine it, however, they need multiple people to examine the data.7

Hardware requirements: Some users expect to see the hardware requirements improved. To operate, the hardware platform must meet extremely high criteria. These high standards are challenging to meet for users. 8

Read more: Tufin’s competitors: FireMon alternatives and AlgoSec alternatives.

2- Zscaler Internet Access

Zscaler Internet Access offers  AI-powered security and data protection services to prevent cyberattacks and data loss. Zscaler Internet Access includes the following modules:

  • Cloud secure web gateway (SWG): AI-powered analysis and URL filtering ensure a safe and fast browsing experience by preventing ransomware, malware, and other advanced threats.
  • Integrated cloud access security broker (CASB): Protects data, prevents attacks, and ensures compliance with SaaS and IaaS settings.
  • Cloud data loss prevention (DLP): Secures data using inline inspection such as exact data match (EDM) and optical character recognition.

Key features: 

  • Intrusion prevention: Provides threat protection against malware networks, complex attacks, and zero-day vulnerabilities. Cloud and web-based intrusion prevention systems, or IPS tools, integrate with firewalls, data loss prevention (DLP), and cloud access security broker (CASB) modules.
  • IoT device network visibility: Provide a picture of all IoT devices, servers, and uncontrolled user devices in the organization.
  • URL filtering: Control user access to specific online categories or destinations to prevent dangers and enforce company regulations.
  • SSL inspection: Access unrestricted transport layer security (TLS)  network traffic monitoring to detect potential risks (e.g. third-party cyber risk management) and data loss in encrypted traffic.
  • DNS security: Detect and transmit suspect command-and-control communications.

Pros

Endpoint detection and zero-day threat prevention: Reviewers note that Zscaler Internet Access ensures that no attacks reach the endpoint, and efficiently prevents zero-day threats within the Zscaler cloud.9

Content scanning and sandbox services: Users appreciated the product’s real-time content scanning and sandbox services.10

Vulnerability detection: IT business analysts say that Zscaler Internet Access quickly discovers potential vulnerabilities and cyber attacks.11

Read more: Vulnerability testing.

Cons

Performance: Users have experienced sluggish system performance and inconsistent secure sockets layer (SSL) support for some URLs.12

Reporting: Some users claim that reporting can take longer to download at times.13

Costs: Some customers raise concerns regarding Zscaler Internet Access cost, which they consider relatively high compared to competing options.14

3- FortiGate SD-WAN

Fortinet’s Secure SD-WAN enables companies to improve security by providing network visibility, analytics, and automation capabilities throughout the network (LAN, WLAN, and WAN, including 4G/5G) to improve zero-trust initiatives.

Its centralized operating system includes SD-WAN, advanced routing, ZTNA application gateway, and NGFW features

Additionally, with Fortinet’s Secure SD-WAN companies may segment and prioritize application traffic to minimize attack surfaces and improve performance.

Read more: Network segmentation, microsegmentation, top 10 microsegmentation tools.

Key features:

  • Application identification and control: Includes over 5000 application signatures, 3000 industrial signatures, first packet identification, deep packet inspection, and secure sockets layer (SSL) decryption.
  • SD-WAN (application-aware traffic control): Includes granular application rules, service-level agreement (SLA) based path selection, dynamic bandwidth measurement, active/active/standby forwarding, and encryption overlay support.
  • SD-WAN implementation: Provides deployment options including hub-to-spoke (partial mesh), spoke-to-spoke (full mesh), and multi-WAN transport capability.
  • Secure access service edge (SASE): Creates IPSec tunnels (a set of communication rules or protocols) to multiple SD-WAN Hubs to secure distant users and branches accessing confidential applications.

Figure 1: FortiGate SD-WAN centralized management and visibility report

Source: Fortinet15

Pros

Functional workload management: Users express that Fortinet SD-WAN efficiently keeps thousands of users’ workloads secure while offering important data about vulnerabilities.16

Adding WAN member interfaces: Some users state that adding wide-area network (WAN) member interfaces to the SD-WAN zone is easy.17

Easy to use web console: Users indicate that Fortinet SD-WAN is easy to use, the web console allows for a wide range of choices and operational operations.18

Cons

Logging & reporting: Some users say that interface support has been removed from version 7.0 onwards, which needs additional configuring.19

Complex setup: Some reviews show that initial configuration and deployment can be complicated and time-consuming.20

Documentation limitations: According to some customers, the offered documentation may not cover all elements completely, resulting in difficulties during setup and troubleshooting.21

4- Citrix Workspace Essentials

Citrix Workspace Essentials gives end users, secure, and VPN-less access to SaaS, Web Apps, and data delivered by IT, leveraging single sign-on and multifactor authentication.

Citrix Workspace Essentials offers a cloud-hosted time-based one-time password (TOTP)* solution for enterprises that use Windows Active Directory as their primary identity.

With Citrix Workspace Essentials users may request and install fresh tokens, while administrators can easily enable and disable TOTP multifactor authentication. When two-factor authentication is enabled inside the Citrix Workspace experience, it is applied to all users across all access points.

*TOTP is a simple two-factor authentication method within the Citrix Workspace experience that uses a time-sensitive one-time password issued for the user on their registered device.

Figure 2: Access to SaaS and on-premises web apps

Source: Citrix22

Pros

Virtual environments: Some users state that the product is a valuable tool for businesses transitioning to remote employment since it efficiently generates virtual environments on devices and transforms them into business computers.23

Easy to use VPN connectivity: Cloud consultants note that the product easily enables them to block customers who follow a policy that prohibits direct VPN connectivity for security reasons.24

Service dashboard: Users appreciate the service dashboard and the Workspace Environment Manager service.25

Cons

User interface: Citrix Workspace Essentials may enhance its web-based interface. The web-based platform requires modifications to increase usability.26

Sluggish performance: The software can be sluggish and laggy.27

Windows 11 compatibility: Some IT engineers observed the current compatibility issue with the latest version of Windows 11. While the client supports Windows 11, it appears that the Citrix Workspace Essentials is only compatible with Windows 10, which does not include the latest version.28

5- Absolute Secure Access

Absolute Secure Access (previously NetMotion by Absolute) is one of the company’s major product lines, acquired in July 2021. The product line offers network connectivity, allowing users to connect to important resources in the public cloud, private data centers, and on-premises environments. These tools enable customers to migrate from a traditional VPN to a zero-trust strategy.

Absolute ZTNA (zero-trust network access) product offers a software-defined perimeter by establishing a context-based, logical access barrier around an application or collection of apps, regardless of where they are hosted. It protects apps from the Internet, keeping them inaccessible to unauthorized users. 

Pros 

Initial setup: Reviewers note that the setup is simple, and customer support is available if needed.29

Customization: Users claim that the product is highly flexible and customizable.30

Reporting: Users appreciate the reporting capabilities of Absolute Secure Access.31

Cons

Deployment: Customers express that the deployment is not smooth. Some of them encountered a problem where some batches of machines purchased with the absolute license did not appear on the site.32

Troubleshooting logs: Some reviews emphasize that troubleshooting logs may be easier to understand since it has an out-of-date UI.33

Disconnecting clients: Some IT professionals highlight that when anything fails with the VPN service, it is difficult for users to disconnect the client. This also causes an increase in login sessions.34

6-Citrix Secure Workspace Access

Citrix Secure Workspace Access enables users to secure their work environment from unauthorized access while also offering data governance and data protection controls for apps accessible through Citrix Workspace.

Citrix Secure Workspace Access offers a zero-trust solution for delivering secure access to business internal web apps, SaaS, and virtual applications. This enables the integration of traditional security products such as VPN, single sign-on, and browser isolation technologies.

Figure depicts how Citrix Workspace integrates point solutions such as VPNs, SSO, and reverse proxy solutions.

Figure 4: Citrix Secure Workspace Access’s zero-trust architecture

Source: Citrux35

Pros

Virtual machine connections: Users appreciated the product’s workspace where they may have their virtual machine connected to a VPN, ensuring no data transfers to external networks.36

Easy-to-use workspace: Users appreciate the fact that the workspace is accessible and simple to use via a specific URL or link.37

Data cleaning and filtering: Users note that Citrix Secure Workspace Access provides efficient cleaning and filtering options while extracting data from the customer’s computer.38

Cons

Learning curve: Reviewers assert that the product is difficult to understand.39

Disconnections: Data analysts claim that the product sometimes disconnects in the middle of work.40

Automated notifications: Users expect to get automated notifications about updates, functions, or troubleshooting cases.41

7- GoodAccess

GoodAccess is a cloud VPN with zero-trust limitations on access built specifically for small and medium-sized businesses. It links remote employees, apps, data centers, clouds, and offices over a single virtual network. The platform is cloud-based.

Key features:

  • A dedicated VPN gateway with a dedicated IP address for the team in 35+ locations across the world.
  • Whitelisting: one static IP shared by 100+ team members.
  • Mobile and desktop applications for Windows, macOS, iOS, Android, and Chrome OS.
  • Identity-based access controls (e.g. role-based access control (RBAC).
  • Two-factor authentication, and a threat filter for internet security.

Pros

VPN service: Reviews testify that GoodAccess’s VPN service ensures secure connections without losing speed.42

Gateway customization: Users appreciate the ability to set up several gateways to customize the service to their unique requirements.43

User interface: Customers state that the user-friendly interface makes it easy to manage VPN settings and user access.44

Cons

Network risk analysis and notifications: Users expect to see the capability to comprehend networking risks or get notifications if someone who is not allowed has access to the system.45

Pricing: Some users find the pricing expensive for the limited offerings.46

User access indicators: CRM managers say that GoodAccess may provide a link to show facts such as who connected directly to the app.47

8- Symantec Secure Access Cloud

Symantec Secure Access Cloud is a software-as-a-service (SaaS) solution designed by Broadcom that helps organizations build secure and granular access control of any business resource, whether hosted on-premises or in the cloud. It leverages zero trust architecture to provide point-to-point communication without the usage of agents or appliances.

Key features:

  • Provides secure access service edge (SASE) security access to applications.
  • Prevents network surface attacks by hiding programs from unauthorized users and restricting authorized users to approved applications.
  • Integrates ZTNA with any identity provider and reauthorizes user access and activity in real-time using a context-based least privilege approach. 
  • Enforces network security policy management practices for data governance and monitoring, including in-line inspection for compliance and malware protection. 

Figure 5: Symantec Secure Access Cloud advantages and differentiators

Source: Broadcom48

Pros

Ease-of-use: IT engineers conclude that it is simple to test and use Symantec Secure Access Clouds functionality since it can run automatically without any glitches.49

Use of virtual environments: IT help desk users say that the program provides quick and efficient operation of virtual environments to carry out web activities and projects.50

Reports: Developers appreciate the fact that the program provides a full report of the most vulnerable points.51

Cons

Usability: Some IT engineers address that the program is not so simple to use.52

Report duplications: Customers note that when the program is updated it duplicates its reports which takes up unnecessary space on the system.53

Customer support for crashes: Developers note that the program may crash, and they cannot find a helpline that could help them with their issues.54

9- Ivanti Connect Secure

Ivanti Connect Secure offers a secure sockets layer (SSL) VPN solution for remote and mobile users to access corporate resources from any web-enabled devices.

Pros

User interface: Reviewers claim that Ivanti Connect Secure offers a simple user interface for remote and site access.55

Reliability of the VPN connection: Users consider the product to be a reliable mobile VPN network provider.56

Host checker: Users appreciate the host checker, which thoroughly evaluates the machine’s security posture before granting access.57

Cons

Whitelisting IP addresses: It’s difficult to approve or whitelist IP addresses for allowed access. Sometimes it disconnects for no apparent reason.58

Reporting: Customers believe that more detailed and automatic reporting capabilities can be enhanced.59

Mac OS compatibility: Soe users argue that compatibility on the Mac OS should be enhanced.60

10- Perimeter 81

Perimeter 81 is a cloud-based network security and software-defined perimeter (SDP) technology that enables safe access to resources in the data centers,  cloud, and on-premises settings. It provides enterprises with a single framework for managing and securing their network systems, independent of location or resource type.  

Pros

Ease-of-use: Customers say that the user interface (UI) is user-friendly and its loading page is quick.61

Customer support: Several users say the Perimeter 81 support team is highly responsive whenever difficulties or concerns arise.62

Site-to-site tunnels: With numerous geographical access points and specialized IP addresses, the team may create site-to-site VPNs with precise IP constraints.63

Plug-and-play Wireguard to decrease manual configuration: The plug-and-play wireguard site-to-site connector feature is appreciated by users; since it allows them to execute a script and have their whole network linked to Perimeter 81 without any manual configuration.64

Cons

Service gateways: Some product managers experience service gateways or interruptions across all of the locations.65

Dashboard customization: Some customers think that the software currently lacks relevant dashboards.66

Reporting and analytics: Some IT desk specialists argue that Perimeter 81 might improve its reporting and analytics capabilities to give more precise information about network activity.67

Further reading

AIMultiple can assist your organization in finding the right vendor. 

Find the Right Vendors
Access Cem's 2 decades of B2B tech experience as a tech consultant, enterprise leader, startup entrepreneur & industry analyst. Leverage insights informing top Fortune 500 every month.
Cem Dilmegani
Principal Analyst
Follow on
Cem Dilmegani
Principal Analyst

Cem has been the principal analyst at AIMultiple since 2017. AIMultiple informs hundreds of thousands of businesses (as per similarWeb) including 60% of Fortune 500 every month.

Cem's work has been cited by leading global publications including Business Insider, Forbes, Washington Post, global firms like Deloitte, HPE, NGOs like World Economic Forum and supranational organizations like European Commission. You can see more reputable companies and media that referenced AIMultiple.

Throughout his career, Cem served as a tech consultant, tech buyer and tech entrepreneur. He advised businesses on their enterprise software, automation, cloud, AI / ML and other technology related decisions at McKinsey & Company and Altman Solon for more than a decade. He also published a McKinsey report on digitalization.

He led technology strategy and procurement of a telco while reporting to the CEO. He has also led commercial growth of deep tech company Hypatos that reached a 7 digit annual recurring revenue and a 9 digit valuation from 0 within 2 years. Cem's work in Hypatos was covered by leading technology publications like TechCrunch and Business Insider.

Cem regularly speaks at international technology conferences. He graduated from Bogazici University as a computer engineer and holds an MBA from Columbia Business School.

To stay up-to-date on B2B tech & accelerate your enterprise:

Follow on

Next to Read

Comments

Your email address will not be published. All fields are required.

0 Comments