Appgate SDP vs. NC Protect

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Appgate SDP
Score 9.2 out of 10
N/A
AppGate SDP (software-defined perimeter) from Cyxtera Technologies headquartered in Addison is a zero trust network security product.N/A
NC Protect
Score 0.0 out of 10
N/A
NC Protect delivers dynamic, attribute-based access control (ABAC) and data protection that adjusts with users’ context to protect sensitive information against accidental and malicious data loss and misuse. It ensures only the right people – access the right information – at the right time – enforcing the principles of zero trust at the data layer in enterprise collaboration applications. Discover, classify and secure sensitive unstructured data including files, email messages and…N/A
Pricing
Appgate SDPNC Protect
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Appgate SDPNC Protect
Free Trial
NoNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details
More Pricing Information
Community Pulse
Appgate SDPNC Protect
Top Pros

No answers on this topic

Top Cons

No answers on this topic

Best Alternatives
Appgate SDPNC Protect
Small Businesses
ThreatLocker
ThreatLocker
Score 9.0 out of 10
ThreatLocker
ThreatLocker
Score 9.0 out of 10
Medium-sized Companies
Palo Alto Networks Prisma Access
Palo Alto Networks Prisma Access
Score 8.6 out of 10
Palo Alto Networks Prisma Access
Palo Alto Networks Prisma Access
Score 8.6 out of 10
Enterprises
Palo Alto Networks Prisma Access
Palo Alto Networks Prisma Access
Score 8.6 out of 10
Palo Alto Networks Prisma Access
Palo Alto Networks Prisma Access
Score 8.6 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Appgate SDPNC Protect
Likelihood to Recommend
9.0
(2 ratings)
-
(0 ratings)
Support Rating
9.0
(1 ratings)
-
(0 ratings)
User Testimonials
Appgate SDPNC Protect
Likelihood to Recommend
Appgate
It is best suited for larger companies with lots of remote workers that need complex access management. We've barely scratched the surface on what Appgate can do via its API.
Read full review
archTIS
No answers on this topic
Pros
Appgate
  • Software-Defined perimeter
  • Hide resources to non-authorized/authenticated users.
Read full review
archTIS
No answers on this topic
Cons
Appgate
  • Live logging in the client. Currently you have to "download" the logs into a zip file and then open that zipfile to look at the logs. There's no logfile to tail or watch.
  • Load balancing between controllers could be better. Currently relies on round robin DNS and sometimes a browser will pick a different IP than previous and you'll get a big "LOST CONNECTION TO CONTROLLER" message.
Read full review
archTIS
No answers on this topic
Support Rating
Appgate
The company has been supportive overall of our needs and desired features. I have not personally called the support services, but I've heard no direct complaints either.
Read full review
archTIS
No answers on this topic
Alternatives Considered
Appgate
The existing system was FortiGate. The management of the system was a hassle. Because IT personnel had to manually create VPN accounts, user passwords were known to who created them and the end user did not have a way to change them. This created a security issue in the event an IT engineer left the company.
Read full review
archTIS
No answers on this topic
Return on Investment
Appgate
  • We are achieving our goals with this tool by hiding resources behind it.
  • It is a new model that requires a different thought process for many in network operations.
Read full review
archTIS
No answers on this topic
ScreenShots

NC Protect Screenshots

Screenshot of Dynamically applied digital security watermarks prevent data loss and aid in forensics.Screenshot of NC Protect works natively with Microsoft collaboration and security products to augment native features to hide sensitive files from unauthorized users and apply other unique security features to enforce read-only access,  redact sensitive or classified information, and trim the application ribbon.