4 Reviews and Ratings
1 Reviews and Ratings
It is best suited for larger companies with lots of remote workers that need complex access management. We've barely scratched the surface on what Appgate can do via its API.Incentivized
It's very well suited for geographically dispersed organizations, where deploying and managing remote firewalls and other network security functions aren't practical. Once deployed, and the deployment isn't difficult after planning and understanding the data flows of the IoT devices, the system is easily managed and flexible. You're able to allow front line operations people to add devices into a role without sacrificing the integrity of the security model.Incentivized
Software-Defined perimeterHide resources to non-authorized/authenticated users.Incentivized
Low capital and support cost structures.Ease of deployment.Ability to work over the existing network.Incentivized
Live logging in the client. Currently you have to "download" the logs into a zip file and then open that zipfile to look at the logs. There's no logfile to tail or watch.Load balancing between controllers could be better. Currently relies on round robin DNS and sometimes a browser will pick a different IP than previous and you'll get a big "LOST CONNECTION TO CONTROLLER" message.Incentivized
Integration with third-party security controls.Automating the on-boarding of devices.Reporting needs to be more detailed.Incentivized
The company has been supportive overall of our needs and desired features. I have not personally called the support services, but I've heard no direct complaints either.Incentivized
It's pretty darned good for a new company. We had to hash through a couple of instances that no one had ever run into, but once we got to the right person on the engineering team, they were able to work through the solution pretty quickly. The nice thing is, unlike Cisco, once you fix something, you don't find three new things that have to be changed.Incentivized
The existing system was FortiGate. The management of the system was a hassle. Because IT personnel had to manually create VPN accounts, user passwords were known to who created them and the end user did not have a way to change them. This created a security issue in the event an IT engineer left the company.Incentivized
The cost and complexity vs. ISE is as different as Uber and Lift are from trying to take a taxi in Duluth, Minnesota. The complexity of Cisco's IoT security is a joke. It was going to take us over a year just to deploy all the Cisco equipment, and that was if we could have gotten it all working together. We got the entire project deployed in just under 3 months, and that includes working out all the bugs and logistics. Honestly, I don't think all the Cisco parts would have ever been running like Cisco promised it would. It's just way too complicated.Incentivized
We are achieving our goals with this tool by hiding resources behind it.It is a new model that requires a different thought process for many in network operations.Incentivized
Capital cost to deploy was 1/4 the cost of doing Cisco.People and time frame to do the entire deployment was 1/12th the time/people to complete the installation.On-going management is being done without adding staff.Incentivized