Likelihood to Recommend It is best suited for larger companies with lots of remote workers that need complex access management. We've barely scratched the surface on what Appgate can do via its API.
Read full review The best usage scenario for Citrix Netscaler Gateway is in enterprises with a high volume of telecommuting users or in situations where the user needs to access certain applications from anywhere. In our case as a hospital, we need our doctors to access the medical records of the patients and be able to carry out any required action, with a high level of security and with a certain agility.
Read full review Pros Software-Defined perimeter Hide resources to non-authorized/authenticated users. Read full review allows seamless use of 2-factor authentication for heightened security within the VPN, and lowers risk of an external hack because of it. it allows for differing levels of security. access can be set specifically through the VPN so 2 users can use the same site and get different results depending on their active directory security policy. It can grant the ability to launch a single application or an entire VPN envelope David Reese ConnectCare Hospital Billing Claims Application Coordinator
Read full review Cons Live logging in the client. Currently you have to "download" the logs into a zip file and then open that zipfile to look at the logs. There's no logfile to tail or watch. Load balancing between controllers could be better. Currently relies on round robin DNS and sometimes a browser will pick a different IP than previous and you'll get a big "LOST CONNECTION TO CONTROLLER" message. Read full review I suggest make it more faster because sometimes its lagging but not all the time. When it comes to Notepad I suggest having options for the size of fonts, and color of fonts, to make it look nicer. I suggest making it more user-friendly, and more features so that users can perfectly maximize this tool. Read full review Support Rating The company has been supportive overall of our needs and desired features. I have not personally called the support services, but I've heard no direct complaints either.
Read full review Support is pretty good and pretty fast to respond. I can't say I can really complain about the support experience I've had with them, as they've resolved issues within a reasonable time-frame. Of course, they could always be faster and better, but I think for what we pay, it's well worth the money.
Read full review Alternatives Considered The existing system was
FortiGate . The management of the system was a hassle. Because IT personnel had to manually create VPN accounts, user passwords were known to who created them and the end user did not have a way to change them. This created a security issue in the event an IT engineer left the company.
Read full review The only other SSL VPN type product I have used was Citrix Secure Gateway. Netscaler is a MUCH more feature filled product. CSG was a free add on to older versions of Citrix Metaframe and
XenApp and was specifically just used for securing Citrix infrastructure. Netscaler excels in securing Citrix but can also be used to secure shared apps of all kinds regardless of how they are published. I did do a test run on 2X's product which did include a secure gateway but then base 2X product was not really comparable to Citrix so did not go too far with it.
Read full review Return on Investment We are achieving our goals with this tool by hiding resources behind it. It is a new model that requires a different thought process for many in network operations. Read full review Our data is secure and protected from the outside world which is priceless. It saves our business money as we can provide our clients with a safe and secure alternative to accessing their data remotely rather than having to take the more expensive route of travelling on-site to gather the data we need. It gives us the opportunity to host on-site training using gated cloud based environments which enhances our business services. The ability to easily change access information, such as a password, after administering a training course gives us the flexibility we need to provide and subsequently restrict access to our training environments to suit our needs. Read full review ScreenShots