Likelihood to Recommend It is best suited for larger companies with lots of remote workers that need complex access management. We've barely scratched the surface on what Appgate can do via its API.
Read full review Pros Software-Defined perimeter Hide resources to non-authorized/authenticated users. Read full review Cons Live logging in the client. Currently you have to "download" the logs into a zip file and then open that zipfile to look at the logs. There's no logfile to tail or watch. Load balancing between controllers could be better. Currently relies on round robin DNS and sometimes a browser will pick a different IP than previous and you'll get a big "LOST CONNECTION TO CONTROLLER" message. Read full review Support Rating The company has been supportive overall of our needs and desired features. I have not personally called the support services, but I've heard no direct complaints either.
Read full review Alternatives Considered The existing system was
FortiGate . The management of the system was a hassle. Because IT personnel had to manually create VPN accounts, user passwords were known to who created them and the end user did not have a way to change them. This created a security issue in the event an IT engineer left the company.
Read full review Return on Investment We are achieving our goals with this tool by hiding resources behind it. It is a new model that requires a different thought process for many in network operations. Read full review ScreenShots