Twingate vs. Unisys Stealth

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Twingate
Score 9.3 out of 10
N/A
Twingate allows businesses to secure remote access to their private applications, data, and environments, whether they are on-premise or in the cloud. Built to make the lives of DevOps teams, IT teams, and end users easier, it replaces outdated corporate VPNs which were not built to handle a world in which "work from anywhere" and cloud-based assets are increasingly the norm. Twingate’s modern zero trust-based approach to securing remote access focuses on improving security,…
$0
Unisys Stealth
Score 0.0 out of 10
N/A
Unisys offers the Stealth product cybersecurity and software-defined microsegmentation suite providing zero trust network access, designed to protect the enterprise network, cloud services, and data via cloaking and encryption, provide network visibility, and also provide detection and correlation for advanced threat prevention.N/A
Pricing
TwingateUnisys Stealth
Editions & Modules
Starter Plan
$0
Teams Plan
$5
per user per month
Business Plan
$10
per user per month
No answers on this topic
Offerings
Pricing Offerings
TwingateUnisys Stealth
Free Trial
YesNo
Free/Freemium Version
YesNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional DetailsAn Enterprise Plan with customized pricing is also available.
More Pricing Information
Community Pulse
TwingateUnisys Stealth
Top Pros

No answers on this topic

Top Cons

No answers on this topic

Best Alternatives
TwingateUnisys Stealth
Small Businesses
ThreatLocker
ThreatLocker
Score 9.0 out of 10
ThreatLocker
ThreatLocker
Score 9.0 out of 10
Medium-sized Companies
Palo Alto Networks Prisma Access
Palo Alto Networks Prisma Access
Score 8.7 out of 10
Palo Alto Networks Prisma Access
Palo Alto Networks Prisma Access
Score 8.7 out of 10
Enterprises
Palo Alto Networks Prisma Access
Palo Alto Networks Prisma Access
Score 8.7 out of 10
Palo Alto Networks Prisma Access
Palo Alto Networks Prisma Access
Score 8.7 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
TwingateUnisys Stealth
Likelihood to Recommend
9.5
(3 ratings)
-
(0 ratings)
Usability
10.0
(1 ratings)
-
(0 ratings)
Support Rating
9.5
(3 ratings)
-
(0 ratings)
User Testimonials
TwingateUnisys Stealth
Likelihood to Recommend
Twingate
The product as well as the admin panel is getting richer. Would love port-level access control as well as some more analytics in the admin panel. From what I hear, the team is actively working on it
Read full review
Unisys
No answers on this topic
Pros
Twingate
  • Easy access management for cloud resources, better security than VPN or IP allow lists
  • 2FA via Google Login or OKTA
  • Easy to onboard external team members (contractors, partners, clients, etc)
  • Was easily approved by my partner security teams to use alongside their VPN client with no conflicts.
  • Zero-trust security is a must-have feature these days!
  • You pay for User, not Client or Resources--easy to roll out to all devices used by your users.
  • No more hassle of maintaining IP allow lists for WFH/remote teams
Read full review
Unisys
No answers on this topic
Cons
Twingate
  • Windows installation had a small glitch, customer support helped quickly resolve the issue
Read full review
Unisys
No answers on this topic
Usability
Twingate
For the end-user, it is essentially an on-off switch integrated with our Identify Protection Solution
Read full review
Unisys
No answers on this topic
Support Rating
Twingate
Support team understood my challenge and was able to influence product direction to expedite support for my features - A+!
Read full review
Unisys
No answers on this topic
Return on Investment
Twingate
  • The ROI has been immediate especially since we are all working remotely during the COVID-19 situation.
Read full review
Unisys
No answers on this topic
ScreenShots

Twingate Screenshots

Screenshot of Screenshot of