Software-Defined Perimeter (SDP) Software
Software-defined perimeter is a security method that creates segments of connections between users and the resources they access. +Show More
Products | Position | Customer satisfaction | |||
---|---|---|---|---|---|
|
Leader
|
Satisfactory
|
|
||
Basis for EvaluationWe made these evaluations based on the following parameters; Customer satisfaction
Average rating
Market presence
Company's number of employees
100-200 employees
Company's social media followers
5k-10k followers
|
|||||
|
Leader
|
Satisfactory
|
|
||
Perimeter 81 is a next-generation network security provider, driven by the mission to transform secure network access for the modern and distributed workforce. Unlike traditional VPN technology which is costly,
hardware-based and both difficult to install and manage, their innovative, Software-Defined Perimeter solution simply and securely connects employees to cloud-based and internal network resources. Built from scratch based on input from
security leaders needing a change from legacy technology, Perimeter 81’s unique API integration and centralized cloud architecture, gives companies of all industries and sizes the power to realize the full virtues of the cloud and be truly
mobile
Basis for EvaluationWe made these evaluations based on the following parameters; Customer satisfaction
Average rating
Market presence
Number of case studies
10-20 case studies
Company's number of employees
100-200 employees
Company's social media followers
30k-40k followers
Total funding
$100-250m
# of funding rounds
6
Latest funding date
June 5, 2022
Last funding amount
$100-250m
Company
Type of company
private
Founding year
2018
|
|||||
|
Leader
|
Satisfactory
|
|
||
Cisco DNA Center is the network management system, foundational controller, and analytics platform at the heart of Cisco’s intent-based network. Cisco DNA Center addresses the demands of digitization, cloud, IoT, and mobility by eliminating IT complexity and facilitating alignment with business intent, unifying policy, automation, and assurance with integrated security. How Cisco DNA Center works Your programmable network infrastructure sends data from routers, switches, and wireless devices to the Cisco DNA Center appliance. The appliance activates features and capabilities on your network devices using Cisco DNA software. Everything is managed from the Cisco DNA Center dashboard.
Basis for EvaluationWe made these evaluations based on the following parameters; Customer satisfaction
Average rating
Market presence
Company's number of employees
100k-1m employees
Company's social media followers
7m-8m followers
|
|||||
|
Leader
|
Satisfactory
|
|
||
Cato is the world’s first SASE platform, converging SD-WAN and network security into a global, cloud-native service. Cato optimizes and secures application access for all users and locations. Using Cato, customers easily migrate from MPLS to SD-WAN, optimize connectivity to on-premises and cloud applications, enable secure branch Internet access everywhere, and seamlessly integrate cloud datacenters and mobile users into the network with a zero-trust architecture. With Cato, the network, and your business, are ready for whatever’s next.
Basis for EvaluationWe made these evaluations based on the following parameters; Customer satisfaction
Average rating
Market presence
Number of case studies
50-100 case studies
Company's number of employees
1k-2k employees
Company's social media followers
100k-1m followers
Total funding
$1-1bn
# of funding rounds
8
Latest funding date
September 19, 2023
Last funding amount
$100-250m
Company
Type of company
private
Founding year
2015
|
|||||
|
Leader
|
Satisfactory
|
|
||
Basis for EvaluationWe made these evaluations based on the following parameters; Customer satisfaction
Average rating
Market presence
Number of case studies
50-100 case studies
Company's number of employees
5k-10k employees
Company's social media followers
100k-1m followers
|
|||||
|
Challenger
|
Satisfactory
|
|
||
InstaSafe is redefining the challenge of secure access to modern networks by leveraging Zero Trust principles with its security solutions, that ensure seamless access to cloud applications, SAP applications, on-premise data, IoT devices, and multiple other neoteric use cases. Instasafe discards traditional VPN based conceptions of a network perimeter, instead moving the perimeter to the individual users and the devices they access. The Zero Trust approach followed by InstaSafe mandates a “never trust, always verify' approach to privileged access, without focusing on network locality. InstaSafe ZTAA relies on continuously assessing the trust and risk associated with every user, and the context of their access request, and simultaneously employs a system of comprehensive authentication before grnating least privilege access. By only making authorised applications accessible to the user, and not exposing the network to these users, ZTAA serves to negate the exploitable attacks surface, and also eliminates the threat of insider attacks. In addition, ZTAA ensures that your security teams get complete visibility over all network activity for better identification and remediation of threat vectors. InstaSafe's solutions work across multiple environments, providing access to data and applications hosted on premise or on any cloud. With its easy to deploy, hyperscalable functionality, you can configure ZTAA across your network with 5 simple steps, and ensure complete security and visibility for your workforce.
Basis for EvaluationWe made these evaluations based on the following parameters; Customer satisfaction
Average rating
Market presence
Company's number of employees
50-100 employees
Company's social media followers
5k-10k followers
|
|||||
|
Challenger
|
Satisfactory
|
|
||
BloxOne™ DDI is the first and only cloud-native DDI solution that simplifies DDI control and management at scale.
Basis for EvaluationWe made these evaluations based on the following parameters; Customer satisfaction
Average rating
Market presence
Company's number of employees
2k-3k employees
Company's social media followers
100k-1m followers
Total funding
$50-100m
# of funding rounds
5
Latest funding date
September 8, 2020
Company
Type of company
delisted
Founding year
1999
|
|||||
|
Challenger
|
Satisfactory
|
|
||
Atmos is a modern Security Service Edge (SSE) platform powered by Axis. Atmos securely connects users to the business resources needed in order to get work done, regardless of application, device, or location. The platform artfully integrates ZTNA, SWG, CASB and Digital Experience monitoring into a single cloud-delivered platform, with one easy to use pane of glass to manage it all. With +350 cloud edges running across Amazon Web Services Global Accelerator, Google Cloud Platform, and Oracle networks, the Atmos platform helps security, networking, and IT leaders enable employees, partners, and customers to securely access business data - without the pitfalls of network-centric solutions or application limitations that every other zero trust service faces. Atmos sits inline, supporting all ports and protocols while inspecting all traffic. With agent and agentless support, Atmos brokers an orchestra of surgical, one-to-one, least-privileged connections based on identity and policy, and performs vital end user experience monitoring to track connections (hop-by-hop) and empower IT to pinpoint issues. Experience work in harmony with Atmos by Axis.
Basis for EvaluationWe made these evaluations based on the following parameters; Customer satisfaction
Average rating
Market presence
Number of case studies
1-5 case studies
Company's number of employees
200-300 employees
Company's social media followers
10k-20k followers
Total funding
$50-100m
# of funding rounds
5
Latest funding date
April 2, 2021
Company
Type of company
private
Founding year
2019
|
|||||
|
Challenger
|
Satisfactory
|
|
||
Dispel provides secure remote access to industrial control systems, also known as OT infrastructure. Dispel's platform offers unified identity & access management (IAM); logging and session recording; disposable systems to protect from ransomware and malware; Moving Target Defense-based SD-WAN connections to facilities; and access control list (ACL) enforcement. Together, the Dispel remote access platform gives utilities, manufacturing, and other OT operators control over third-party and internal employee access to their systems.
Basis for EvaluationWe made these evaluations based on the following parameters; Customer satisfaction
Average rating
Market presence
Company's number of employees
50-100 employees
Company's social media followers
5k-10k followers
|
|||||
|
Challenger
|
N/A
|
|
||
To address today’s EVER-CHANGING threat landscape, Check Point has introduced a MODULAR and dynamic security architecture that envisions a THREE-LAYER infrastructure that provides operational RESILIENCE and real-time, PROACTIVE protection.
Basis for EvaluationWe made these evaluations based on the following parameters; Customer satisfaction
Average rating
Market presence
Company's number of employees
5k-10k employees
Company's social media followers
100k-1m followers
# of funding rounds
2
Latest funding date
January 1, 2014
Company
Type of company
public
Founding year
1993
|
“-”: AIMultiple team has not yet verified that vendor provides the specified feature. AIMultiple team focuses on feature verification for top 10 vendors.
Sources
AIMultiple uses these data sources for ranking solutions and awarding badges in software-defined perimeter (SDP) software:
Software-Defined Perimeter Leaders
According to the weighted combination of 4 metrics





What are software-defined perimeter
customer satisfaction leaders?
Taking into account the latest metrics outlined below, these are the current software-defined perimeter customer satisfaction leaders:





Which software-defined perimeter solution provides the most customer satisfaction?
AIMultiple uses product and service reviews from multiple review platforms in determining customer satisfaction.
While deciding a product's level of customer satisfaction, AIMultiple takes into account its number of reviews, how reviewers rate it and the recency of reviews.
- Number of reviews is important because it is easier to get a small number of high ratings than a high number of them.
- Recency is important as products are always evolving.
- Reviews older than 5 years are not taken into consideration
- older than 12 months have reduced impact in average ratings in line with their date of publishing.
What are software-defined perimeter
market leaders?
Taking into account the latest metrics outlined below, these are the current software-defined perimeter market leaders:





Which one has collected the most reviews?
AIMultiple uses multiple datapoints in identifying market leaders:
- Product line revenue (when available)
- Number of reviews
- Number of case studies
- Number and experience of employees
- Social media presence and engagement
What are the most mature software-defined perimeter (SDP) software?
Which one has the most employees?





Which software-defined perimeter companies have the most employees?
144 employees work for a typical company in this solution category which is 121 more than the number of employees for a typical company in the average solution category.
In most cases, companies need at least 10 employees to serve other businesses with a proven tech product or service. 30 companies with >10 employees are offering software-defined perimeter (sdp) software. Top 3 products are developed by companies with a total of 100k employees. The largest company in this domain is Cisco with more than 100,000 employees. Cisco provides the software-defined perimeter solution: Cisco DNA Center
Insights
What are the most common words describing software-defined perimeter (SDP) software?
This data is collected from customer reviews for all software-defined perimeter companies. The most positive word describing software-defined perimeter (SDP) software is “Easy to use” that is used in 5% of the reviews. The most negative one is “Difficult” with which is used in 1% of all the software-defined perimeter reviews.
What is the average customer size?
According to customer reviews, most common company size for software-defined perimeter customers is 51-1,000 employees. Customers with 51-1,000 employees make up 45% of software-defined perimeter customers. For an average Cybersecurity solution, customers with 51-1,000 employees make up 21% of total customers.
Customer Evaluation
These scores are the average scores collected from customer reviews for all software-defined perimeter (SDP) software. Software-Defined Perimeter (SDP) Software are most positively evaluated in terms of "Overall" but falls behind in "Likelihood to Recommend".
Where are software-defined perimeter vendors' HQs located?
Trends
What is the level of interest in software-defined perimeter (SDP) software?
This category was searched on average for 0 times per month on search engines in 2024. This number is still 0 in 2025. If we compare with other cybersecurity solutions, a typical solution was searched 918 times in 2024 and this decreased to 0 in 2025.