Don’t know too much about TwinGate.
Fortinet is a bit of mess with their general product strategy and identity, IMO. What exactly is their ZTNA and cloud strategy? I’m not sure they even know. They are certainly a portfolio company, so if you’re looking forward to adopting a platform solution, then Fortinet is probably furthest from that goal of all the big suppliers in this space.
Zscaler private access. Pretty mature. Cloud native architecture, but private access doesn’t provide any inline security inspection (think threat prevention). So, if the device is trusted, the user is authenticated and the app in question is allowed…doesn’t matter who you ACTUALLY are on that endpoint, your traffic is unscrutinized to the resource you are permitted to access. Kind of feels like all that ZERO TRUST marketing misses a pretty important detail here. You need to keep your traditional Firewall + ATP in place with Zscaler. Now, they’ll tell you they can provide you with ATP for your private access traffic, but it’s not a practical solution. It requires you add Internet Access (ZIA) subscription to the service and hairpin all the traffic from the DC back out to their cloud to hit their Cloud Firewall before coming back to the DC to access resources. Not a great option, IMO, and not something I’ve heard many (or any) actually put into practice.
Cloudflare, similar story to Zscaler on the inspection side of things. Also, kind of one trick pony in the context of Networking and Network Security. If you’re looking for platform solution (like SASE) as a long-term strategy, Cloudflare is quite a bit off. They do have a pretty massive network, but it’s unclear to me how their global network/CDN plays a role in VPN replacement or remote access. They certainly sell it like it does.
Palo, complicated and expensive. I was following something on X the other day and someone was promoting their full guide to deployment and configuration of Palo Prisma Access. It was like 300-400 pages long…just on Prisma Access. I’ve talked to many Palo engineers (former and current) and they’ve all mentioned how complicated of a deployment it is. Palo Prisma Access is tied to hyperscaler compute locations. They talk about their grand global network, but you’ll note in fine print, traffic inspection and processing happens only in the GCP or AWS compute locations (IaaS Datacenters). Also note, their PoPs are not service symmetrical. You have some security services running in some PoPs and others elsewhere. All these services might not be material to your current use case, but consider what happens down the road as your needs change. Also, lots of products in their portfolio. Very complicated “solution” in the long term if you align with Palo for many use cases. Of course, it’s not any easier for the business if you choose other suppliers for other things…it’s literally the same complex problem for IT.
I didn’t see Cato Networks in your list or Netskope, etc. Anything specific about those solutions you know about or don’t like? Why you wouldn’t consider them?
Netskope is similar to Zscaler. They don’t have an answer for inline ATP inspection. You’ll need to maintain that separate firewall with ATP between user and resource.
Cato Networks is actually a pretty comprehensive solution. They are cloud-native but their architecture is more like a traditional firewall than what Zscaler and Netskope are. Think of it like Zscaler was a PANW NGFW with full ATP…but in the cloud. Cato is often considered the easy button considering the access use cases it addresses (SD-WAN, Remote Access, etc.) and the full stack security coverage it provides vs. what’s otherwise pretty complex or incomplete elsewhere. Cato also covers “Universal ZTNA” which is the newest marketing term for saying…ZTNA Is about more than just remote access users and mobile endpoints. Universal ZTNA applies to all users and hosts, whether they are remote or in an office.