They could provide a single-box solution to manage tools for 4000 users. Additionally, they could add extra features to enhance remote micro connection.
One limitation is that it's harder to provide access to multiple applications in the company with Appgate, but that's probably because of poor management. The solution is fine as it is, but it would be better if it could help us access general public sites. It would be better to not create a separate policy for that.
On the cloud, when you make some changes, it may be difficult. However, on-premises is very good, and I like it. We'd like to be able to change the VPN connection for different areas. For example, if finance wants to connect to SAP, you could grant access to certain people for that, on a specific server.
Manager of Network Engineering at a aerospace/defense firm with 201-500 employees
Real User
2021-11-04T23:11:13Z
Nov 4, 2021
It comes down to cost. It is a pretty expensive tool. One thing that kind of sticks out to me is the ability to do a proper non-split tunnel. VPN tunnel-wise, it is not really a true unsplit tunnel, but I think that's just because of the way it's designed. A split VPN basically allows your system to talk to other systems without being forced down the tunnel. A VPN running in a non-split tunnel mode forces all the traffic down the tunnel to wherever you're VPNing to. It forces the traffic down so that the traffic is subject to the firewall and rules that you have in your corporate environment and such. It helps to prevent remote malicious folks that may be talking directly to that box from piggybacking into the corporate environment through it. They do it partially, but it would be nice to see more of an enterprise-level solution there.
ZTNA as a Service is a cloud-based security solution that provides secure access to applications and data from anywhere, helping organizations protect themselves from data breaches and other security threats.
They could provide a single-box solution to manage tools for 4000 users. Additionally, they could add extra features to enhance remote micro connection.
The user interface should be improved as it is not very easy to work with the updates.
It would be better to connect to an application portal from any device. Documentation and support could be better.
One limitation is that it's harder to provide access to multiple applications in the company with Appgate, but that's probably because of poor management. The solution is fine as it is, but it would be better if it could help us access general public sites. It would be better to not create a separate policy for that.
On the cloud, when you make some changes, it may be difficult. However, on-premises is very good, and I like it. We'd like to be able to change the VPN connection for different areas. For example, if finance wants to connect to SAP, you could grant access to certain people for that, on a specific server.
It comes down to cost. It is a pretty expensive tool. One thing that kind of sticks out to me is the ability to do a proper non-split tunnel. VPN tunnel-wise, it is not really a true unsplit tunnel, but I think that's just because of the way it's designed. A split VPN basically allows your system to talk to other systems without being forced down the tunnel. A VPN running in a non-split tunnel mode forces all the traffic down the tunnel to wherever you're VPNing to. It forces the traffic down so that the traffic is subject to the firewall and rules that you have in your corporate environment and such. It helps to prevent remote malicious folks that may be talking directly to that box from piggybacking into the corporate environment through it. They do it partially, but it would be nice to see more of an enterprise-level solution there.