Skip to main content
TrustRadius
Cyolo

Cyolo

Overview

What is Cyolo?

Cyolo is a zero trust access solution offered by Cyolo LTD. It aims to provide secure, identity-based asset access to on-prem, remote, and third-party users. According to the vendor, Cyolo can be utilized by organizations of all sizes, including small businesses and large enterprises. The product is...

Read more
Recent Reviews

TrustRadius Insights

Comprehensive and Easy to Administer: Users have found that the product has all the necessary features and is easy to administer and …
Continue reading
TrustRadius

Leaving a review helps other professionals like you evaluate Zero Trust Security Solutions Software

Be the first one in your network to review Cyolo, and make your voice heard!

Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Cyolo?

Cyolo’s unified platform securely connects local and mobile users to the tools and data in the organizational network, cloud or IoT environments and also offline networks, regardless of where they are or what device they are using. Cyolo can be used to deliver seamless zero trust access to assets…

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

3 people also want pricing

Alternatives Pricing

What is GoodAccess?

GoodAccess is a cloud VPN with zero-trust access controls specially designed for small and medium businesses. GoodAccess is a secure remote access solution that interconnects remote workers, applications, data centers, clouds, and offices via one resilient virtual network. No hardware or complex…

What is NordLayer?

NordLayer provides cybersecurity tools for businesses of any size or work model developed by the standard of NordVPN. NordLayer helps organizations secure networks and enhance internet security and modernizes network and resource access with technical improvements aligning with the best regulatory…

Return to navigation

Product Details

What is Cyolo?

Cyolo is a zero trust access solution offered by Cyolo LTD. It aims to provide secure, identity-based asset access to on-prem, remote, and third-party users. According to the vendor, Cyolo can be utilized by organizations of all sizes, including small businesses and large enterprises. The product is designed for use by IT professionals, security professionals, network administrators, financial institutions, and healthcare organizations. Cyolo is said to enhance user access security without disrupting business operations.

Key Features

Verify every user & device: According to the vendor, Cyolo validates every user and device using existing Identity Providers or the Cyolo IdP before granting access to any resource. It implements dynamic policy-based Multi-Factor Authentication (MFA) and Single Sign-On (SSO) to limit asset access to only the necessary applications, tools, and resources. The vendor claims that Cyolo can also detect and revoke user access in real time if suspicious activity is detected.

Assign policies that limit asset access: The vendor states that Cyolo enables the implementation of dynamic policies that restrict asset access to authorized users only. It supports Multi-Factor Authentication (MFA) and Single Sign-On (SSO) to ensure secure access to applications, tools, and resources. According to the vendor, organizations can also rescind access once work is complete.

Monitor user activity: Cyolo grants access to activity logs and session recordings for reporting needs and compliance goals, as per the vendor. This feature allows organizations to identify any suspicious activity by users and take necessary actions, such as revoking their access in real time.

Our Zero Trust Architecture: According to the vendor, Cyolo's Zero Trust Architecture ensures that inbound traffic from the outside is not allowed, keeping all applications and resources hidden from users, including cybercriminals. The product provides access only to valid and entitled users, ensuring unauthorized users cannot gain access. The vendor emphasizes that all decryption and connections occur within the trusted boundary of the organization, not in Cyolo's cloud broker.

We provide end-to-end encryption: The vendor claims that Cyolo ensures no data is visible or stored on Cyolo's cloud broker, keeping all sensitive data secure within the organization's environment. The product combines the best of multiple tech categories, including Identity & Access Management capabilities, according to the vendor. Additionally, the vendor states that Cyolo does not require the installation of additional agents on devices, although an agent is available if needed.

We work with every application: According to the vendor, Cyolo is compatible with every application, including legacy and custom applications. This compatibility ensures that all systems are secure and compatible with modern identity security practices such as MFA and SSO, even if the applications do not natively support them. The vendor highlights that Cyolo is a popular choice for the OT (Operational Technology) industry due to its ability to work with legacy systems.

Implement within a day, without disrupting business workflows: The vendor claims that Cyolo is compatible with any network topology and identity infrastructure, allowing for seamless integration into existing tech stacks. According to the vendor, the product does not require firewall changes, routing changes, GRE, or IPsec tunnels for deployment. The vendor emphasizes that Cyolo provides fast deployment and does not require change management, minimizing workflow disruption.

Secure legacy and custom applications: The vendor states that Cyolo seamlessly works with critical legacy applications, eliminating the need for costly upgrades or replacements. The product brings modern identity security to existing technology, ensuring the security of all applications and systems. According to the vendor, Cyolo provides a cost-effective solution for organizations with legacy systems.

Deploy within a day: According to the vendor, Cyolo can be installed in less than 10 minutes via Docker, allowing for quick and easy deployment. The product lives within the organization's own environment, ensuring data security and control.

Cyolo Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

Comprehensive and Easy to Administer: Users have found that the product has all the necessary features and is easy to administer and maintain. Many reviewers have stated that it meets their requirements effectively.

Efficient Installation and User-Friendly Access Control: The speed and ease of installation, as well as the intuitive and fast new access policies, have been appreciated by users. This indicates that the product is efficient in terms of setting up and managing access control.

Seamless Integration with Existing Infrastructure: Users have highlighted the easy integration into a SASE offering, indicating that the product seamlessly integrates with existing infrastructure. This ensures a smooth transition without disrupting established systems.

Slow Modifications: Some users have reported experiencing delays of a few minutes after making modifications, which can be frustrating for them. These delays may impact their productivity and overall user experience.

Limited Features: Many reviewers have expressed their desire for additional features that are currently on the company's roadmap. The lack of these features may limit the functionality and versatility of the product, leaving some users wanting more.

Buggy QA Process: Users have encountered several bugs during the quality assurance process, where new releases introduce issues in previously working use cases. This inconsistency in software performance has caused frustration among customers and may undermine their confidence in the product's reliability.

Sorry, no reviews are available for this product yet

Return to navigation