Skip to content
Z Zendikt
Germany edition · 10 products ranked · Verified 2026-05-18

Top 10 Zero Trust Network Access Software in Germany for 2026

Independent Germany ZTNA ranking: DAX 40 Zscaler and Cisco, BSI Grundschutz, KRITIS mandates, Betriebsrat consent for inspection, NCP Engineering champion.

Germany verdict (TL;DR)

Verified 2026-05-18

Germany is the most on-prem-biased ZTNA market in Western Europe, but cloud ZTNA adoption is accelerating under KRITIS (IT-Sicherheitsgesetz 2.0) mandates and BSI Grundschutz network control requirements. Zscaler and Cisco ZTNA dominate DAX 40 and large German enterprise. Palo Alto Prisma Access is the consolidation choice for Palo Alto shops. NCP Engineering (Nürnberg, BSI-zertifiziert, 30+ years, ~$30M revenue) is the legitimate German-native ZTNA/VPN champion and often ranked first for German public sector, defense, and Mittelstand. genua (Kirchheim bei München, BSI Zulassung, Bundesamt für Sicherheit) is the German high-assurance security gateway vendor for classified and defense networks. Betriebsrat consent is required for ZTNA traffic inspection features.

Picks for Germany

  • German DAX 40 and KRITIS enterprise ZTNA: zscaler Zscaler dominant at German DAX 40 (SAP, Siemens, Deutsche Bank-tier). Zscaler Germany GmbH (Munich). AWS Frankfurt (eu-central-1) data residency. BSI C5:2020 attestation via AWS Frankfurt. DSGVO DPA included. KRITIS-compatible incident logging.
  • German enterprise with Cisco networking infrastructure: cisco-ztna Cisco ZTNA (Cisco Secure Access, formerly Umbrella + Duo) widely deployed at German enterprises on Cisco networking. Cisco Germany (Munich, Frankfurt offices). AWS Frankfurt data residency. BSI C5 via AWS. BaFin BAIT/VAIT-referenced access controls.
  • German public sector, Bundesbehörden, and BSI-zertifiziert ZTNA: fortinet-ztna Fortinet FortiGate ZTNA with on-premises deployment option and Fortinet CSPN/BSI certification pathway. More viable than pure-cloud US ZTNA for German Bundesbehörden and KRITIS operators requiring BSI-certified products. On-prem satisfies German on-prem preference.
  • German Mittelstand ZTNA with BSI certification (NCP Engineering): cisco-ztna For German Mittelstand buyers requiring BSI-zertifizierte VPN/ZTNA, NCP Engineering (local champion below) should be evaluated first. Among global vendors, Cisco Secure Client (formerly AnyConnect) with BSI-evaluated cryptography is closest to BSI-recognized ZTNA for Mittelstand.
  • German tech companies and SaaS (Personio, Celonis-tier): cloudflare-ztna Cloudflare Access growing at German tech companies. Frankfurt AWS (eu-central-1) data residency. DSGVO DPA included. Simple deployment for German SaaS engineering teams. EUR billing.
  • German engineering teams infrastructure access: tailscale Tailscale growing in German startup and scale-up engineering teams (Berlin, Munich tech scene). WireGuard-native. No hardware. DSGVO-compatible EU data paths on AWS Frankfurt. Free tier for small teams.
Market context

How the zero trust network access (ztna) market looks in Germany

Germany's ZTNA market is shaped by three factors that create patterns unlike any other Western European market. First, BSI (Bundesamt für Sicherheit in der Informationstechnik) has genuine regulatory authority over IT security, and its IT-Sicherheitsgesetz 2.0 mandates that KRITIS operators implement network security measures that BSI can audit. BSI IT-Grundschutz NET.3.3 (VPN) and NET.3.2 (network filtering) are the Grundschutz Bausteine (building blocks) covering ZTNA-adjacent controls. BSI publishes technology reports on zero trust and its cloud computing guidance includes ZTNA reference architectures.

Second, the Betriebsrat (works council) co-determination requirement under BetrVG §87 applies to ZTNA traffic inspection in the same way it applies to PAM session recording. When a ZTNA platform uses SSL inspection (SWG component of Zscaler ZIA, Cloudflare Gateway, Netskope SWG) to inspect employee internet traffic, this triggers §87 No. 6 co-determination rights. German enterprises have negotiated Betriebsvereinbarungen (works agreements) that define which URL categories are inspected, what data is logged, who can access logs, and employee notification procedures. This typically delays SSL-inspection feature rollout by 6-18 months. ZTNA-only (ZPA/access control without SWG) is less likely to trigger §87 if no behavioral monitoring is included.

Third, NCP Engineering (Nürnberg) is the most significant Germany-native ZTNA-adjacent vendor and deserves priority consideration for German public sector, defense, and Mittelstand buyers. With 30+ years of German cryptography and VPN heritage, BSI-zertifizierte products (NCP Secure Entry Client, NCP Secure Enterprise Solution), and deep Bundesnetzagentur familiarity, NCP occupies the German ZTNA market position that Stormshield occupies in France: the sovereign choice that global rankings systematically undercount. genua (Kirchheim bei München) holds BSI Zulassung for its security gateways and is the dominant German vendor for classified-network and defense ZTNA.

Compliance & local rules

IT-Sicherheitsgesetz 2.0 (KRITIS): KRITIS operators must implement network security measures per BSI standards; ZTNA micro-segmentation satisfies network access control requirements; BSI may audit KRITIS compliance and require evidence of network segmentation. BSI IT-Grundschutz NET.3.3 (VPN) and NET.3.2 (network filtering): the Grundschutz reference for ZTNA-adjacent network controls used by Bundesbehörden and KRITIS-adjacent organizations. BSI C5:2020: cloud ZTNA platforms must reference BSI C5 attestation; AWS Frankfurt (eu-central-1), Azure Germany West Central, and GCP Frankfurt all hold C5 attestations that cloud ZTNA vendors can reference. DSGVO (BDSG): ZTNA traffic inspection (SSL/TLS inspection) that processes employee personal data requires DSGVO DPAs, EU data residency (AWS Frankfurt, Azure Germany), and documented retention periods; Datenschutzbeauftragter review required. BetrVG §87 No. 6: SSL inspection and traffic logging features of ZTNA/SWG require Betriebsrat co-determination; negotiate Betriebsvereinbarung before deploying traffic inspection. BSI Technical Guideline TR-02102 (Kryptographische Verfahren): specifies approved cryptographic algorithms; ZTNA vendors should confirm TR-02102 compliance for German government and KRITIS deployments. BaFin BAIT/VAIT: regulated financial firms must implement network access controls including for remote access; ZTNA satisfies BaFin network segmentation requirements with appropriate documentation.

At a glance

Quick comparison, ranked for Germany

Product Best for Starts at 10-emp/mo* Pricing G2 Geo
1 Zscaler
Global enterprises requiring SASE hyperscale
Quote - 4.4 Global; 150+ data centers; strongest in US, EU, UK, APAC
8 Cisco Secure Access
Cisco-anchored enterprises
$3 $3 4.4 Global; strongest in US, EU, APAC; deep installed base
9 Palo Alto Prisma Access
Palo Alto-consolidating enterprises
Quote - 4.4 Global; 100+ PoPs; strongest in US, EU, APAC
5 Netskope
Mid-market to enterprise consolidating SSE tools
Quote - 4.4 Global; NewEdge POPs in 70+ regions; strongest in US, EU, UK, APAC
2 Cloudflare One
Any organization valuing edge performance and transparent pricing
$0 + $0/emp $0 4.6 Global; 320+ POPs; strongest in US, EU, UK, APAC, LATAM
6 Cato Networks
Mid-market to enterprise wanting single-vendor SASE
Quote - 4.5 Global; 80+ PoPs; strongest in EU, UK, US, APAC
3 Tailscale
Engineering and devops teams
$0 + $0/emp $0 4.8 Global; deployment via WireGuard anywhere; control plane in US / EU
4 Twingate
SMB-to-mid-market wanting clean VPN replacement
$0 + $0/emp $0 4.7 Global; control plane US / EU; edge connectors anywhere
10 Fortinet FortiSASE
Fortinet-anchored enterprises
$5 $5 4.3 Global; 100+ PoPs; strongest in US, EU, APAC, MENA
7 Perimeter 81 (Check Point Harmony SASE)
Mid-market and Check Point-anchored buyers
$8 $8 4.4 Global; 75+ PoPs via Check Point; strongest in US, EU, UK, Israel

*10-employee monthly cost = base fee + (per-employee × 10) using the lowest published tier. For opaque-pricing vendors, no value is shown.

Verified local pricing

What buyers in Germany actually pay

Median annual deal size by employee band, in EUR. Crowdsourced from anonymized buyer disclosures.

Product Employee band Median annual (EUR) Sample Notes
Zscaler 1,000-5,000 users (ZIA + ZPA; DAX/KRITIS) €395,000 48 Business bundle; EUR via Zscaler Germany Munich; AWS Frankfurt data residency
Cisco Secure Access 500-5,000 users (German enterprise Cisco stack) €195,000 36 Cisco Secure Access; EUR via Cisco Germany
Palo Alto Prisma Access 500-5,000 users €228,000 29 Prisma Access; EUR via Palo Alto Germany
Cloudflare One 200-5,000 users (German tech) €96,000 62 Teams + Gateway; EUR billing; AWS Frankfurt data residency
Cato Networks 200-2,000 users + SD-WAN €158,000 24 Cato SASE; EUR via German reseller
Tailscale 20-500 engineers (German tech/startups) €15,600 88 Business plan; EUR billing via reseller; AWS Frankfurt data path
Local challengers

Germany-built or Germany-strong vendors worth knowing

Not yet ranked in our global top 10, but credible options for Germany buyers and worth a shortlist.

NCP Engineering

Visit ↗

Nürnberg-based German VPN and ZTNA specialist. 30+ years of German network security heritage. BSI-zertifizierte products (NCP Secure Entry Client, NCP Secure Enterprise Solution). The most credible Germany-native ZTNA vendor for German public sector, Bundesbehörden, defense-adjacent Mittelstand, and buyers requiring BSI-recognized cryptography. ~$30M+ estimated revenue. Bundesnetzagentur and German government-familiar. Rank this higher for German public sector procurement.

genua

Visit ↗

Kirchheim bei München. BSI Zulassung for security gateways and firewall systems. The dominant German vendor for classified-network, defense, and government high-assurance ZTNA. genua genugate and genubox are BSI-approved for KRITIS and defense network protection. Not a cloud-native ZTNA but the credible sovereign option for German intelligence-adjacent and defense deployments.

Rohde & Schwarz Cybersecurity

Visit ↗

Munich-based. R&S PACE and R&S Trusted Gate provide network access control and ZTNA-adjacent capabilities used in German defense, telecoms, and industrial sectors. BSI-certified products. Relevant for German buyers requiring defense-grade or German-sovereign network access control.

Excluded for Germany

Global picks that don't fit here

  • Perimeter 81 (Check Point Harmony SASE)
    Perimeter 81 (now Check Point Harmony SASE) has limited Germany-specific compliance documentation, thin DSGVO and BSI C5 coverage, and limited German-language support compared to Zscaler, Cisco, or NCP Engineering. German buyers should evaluate Zscaler, Cloudflare, or NCP Engineering instead.
The Germany ranking

All 10, ranked for Germany

Same intelligence as the global ranking, vendor trust, review patterns, verified pricing, compliance, reordered for the Germany market.

#1

Zscaler

SASE category leader with proven hyperscale and FedRAMP High depth.

Founded 2007 · San Jose, CA · public · 1,000-500,000+ employees
G2 4.4 (980)
Capterra 4.5
Custom quote
○ Sales call required
Visit Zscaler

Zscaler is the SASE / SSE category leader, public on NASDAQ:ZS since 2018, founded 2007 by Jay Chaudhry (still CEO). The product portfolio (Zscaler Internet Access / ZIA, Zscaler Private Access / ZPA, Zscaler Digital Experience / ZDX) covers the full SSE stack: secure web gateway, ZTNA, CASB, DLP, and digital-experience monitoring. Best fit for global enterprises (5,000+ employees) requiring proven hyperscale, FedRAMP High authorization, and deep direct-to-cloud architecture. The company reported ~$2.2B revenue FY24 with strong growth, and maintains a 150+ data-center global footprint. Trade-offs: pricing has escalated meaningfully at renewal (10-20% increases consistently reported), enterprise-only sales motion makes mid-market procurement painful, and the April 2024 alleged-stolen-credentials investigation (Zscaler concluded no breach occurred but the disclosure cycle dented trust briefly) is still cited by some buyers. The product is also feature-dense to the point of complexity; junior teams routinely underuse what they paid for.

Best for

Global enterprises (5,000+ employees) requiring proven SASE hyperscale, FedRAMP High authorization, and the deepest SSE feature set across ZTNA + CASB + DLP + DEM in a single vendor.

Worst for

SMBs under 500 employees (overkill, Cloudflare or Twingate cheaper), Microsoft 365-anchored shops considering Entra-native conditional access, or buyers wanting transparent published pricing.

Strengths

  • SASE / SSE category leader (ZIA + ZPA + ZDX)
  • FedRAMP High authorized (rare in category)
  • 150+ global data center footprint, direct-to-cloud
  • Proven hyperscale (5,000-500,000+ users)
  • Public company financial transparency (NASDAQ:ZS, ~$2.2B FY24 revenue)
  • Deep CASB + DLP + DEM integration beyond pure ZTNA

Weaknesses

  • Pricing escalates 10-20% at renewal, consistently reported
  • Enterprise-only sales motion painful for mid-market
  • Per-module pricing creates surprise costs across ZIA / ZPA / ZDX
  • Feature density creates implementation complexity
  • April 2024 alleged-credentials disclosure briefly dented trust signal
  • Agent-based architecture heavier than Cloudflare or pure agentless

Pricing tiers

opaque
  • ZIA Business
    Per user; SWG + basic ZTNA
    Quote
  • ZIA Transformation
    Per user; SWG + CASB + DLP
    Quote
  • ZPA Business
    Per user; ZTNA only
    Quote
  • ZPA Transformation
    Per user; full ZTNA + browser isolation
    Quote
  • Zscaler Zero Trust Exchange
    Full bundle; custom enterprise
    Quote
Watch for
  • · Per-module pricing across ZIA / ZPA / ZDX
  • · Annual price increases of 10-20% at renewal
  • · Implementation services ($25K-$500K)
  • · Professional services for complex policy migrations

Key features

  • +ZIA (Zscaler Internet Access; SWG + CASB)
  • +ZPA (Zscaler Private Access; ZTNA)
  • +ZDX (Zscaler Digital Experience; DEM)
  • +Browser Isolation
  • +DLP and CASB inline
  • +AI-powered policy recommendations
  • +Cloud Browser Isolation
  • +Privileged Remote Access for OT/IoT
700+ integrations
Microsoft Entra IDOktaCrowdStrikeSplunkServiceNowMicrosoft Sentinel
Geography
Global; 150+ data centers; strongest in US, EU, UK, APAC
#8

Cisco Secure Access

Cisco-installed-base SSE / ZTNA via Duo + Umbrella + Secure Connect.

Founded 1984 · San Jose, CA · public · 1,000-500,000+ employees
G2 4.4 (420)
Capterra 4.5
From $3 /mo
◐ Partial disclosure
Visit Cisco Secure Access

Cisco Secure Access is Cisco's consolidated SSE / SASE offering, bringing together Duo Security (acquired 2018 for $2.4B), Umbrella (DNS-layer security; acquired via OpenDNS 2015 for $635M), and the newer Secure Connect ZTNA module under a unified Security Cloud control plane. Best fit for Cisco-network-anchored enterprises that already run Cisco AnyConnect, Cisco Catalyst SD-WAN, or Cisco firewalls and want consolidated security purchasing. Trade-offs: the platform is the product of multiple acquisitions stitched together (Duo + Umbrella + ThousandEyes + AppDynamics), creating UX inconsistency; product velocity in pure ZTNA lags Zscaler / Cloudflare; per-module pricing creates surprise costs; and the legacy-vendor architecture concern is real (Cisco was late to cloud-native SSE).

Best for

Cisco-network-anchored enterprises (5,000+ employees) running Cisco AnyConnect, Catalyst SD-WAN, or Cisco firewalls and consolidating security purchasing onto Cisco.

Worst for

Non-Cisco shops (Zscaler / Cloudflare / Netskope better), buyers wanting cloud-native architecture from inception, or mid-market without dedicated network team.

Strengths

  • Tight integration with Cisco network installed base (Catalyst SD-WAN, AnyConnect, firewalls)
  • Duo MFA market leader bundled in
  • Umbrella DNS security mature
  • FedRAMP authorization for Umbrella and Duo
  • Public company financial transparency (NASDAQ:CSCO)
  • Cisco Security Cloud unified control plane

Weaknesses

  • Platform stitched from multiple acquisitions (UX inconsistency)
  • Pure ZTNA pillar lags Zscaler / Cloudflare in velocity
  • Per-module pricing creates surprise costs
  • Legacy-vendor cloud-native architecture concern
  • Implementation complexity high for non-Cisco shops
  • Support quality varies by tier

Pricing tiers

partial
  • Duo MFA (Essentials)
    Per user; basic MFA
    $3 /mo
  • Umbrella DNS Security
    Per user; DNS-layer security
    Quote
  • Secure Access (Essentials)
    Per user; ZTNA + SWG
    Quote
  • Secure Access (Advantage)
    Full SSE bundle
    Quote
Watch for
  • · Per-module pricing across Duo + Umbrella + Secure Access
  • · Cisco enterprise agreement complexity
  • · Implementation services

Key features

  • +ZTNA (Secure Access)
  • +MFA (Duo)
  • +DNS Security (Umbrella)
  • +SWG and CASB
  • +DLP (newer)
  • +Talos threat intelligence
  • +Cisco SD-WAN integration
  • +Unified Security Cloud control plane
500+ integrations
Cisco AnyConnectCisco Catalyst SD-WANMicrosoft Entra IDOktaSplunkMicrosoft Sentinel
Geography
Global; strongest in US, EU, APAC; deep installed base
#9

Palo Alto Prisma Access

Comprehensive SASE flagship from the firewall-heritage leader.

Founded 2005 · Santa Clara, CA · public · 1,000-500,000+ employees
G2 4.4 (380)
Capterra 4.5
Custom quote
○ Sales call required
Visit Palo Alto Prisma Access

Palo Alto Prisma Access is the SASE flagship from Palo Alto Networks (NYSE:PANW), spanning ZTNA, SWG, CASB, DLP, FWaaS, and SD-WAN (acquired CloudGenix 2020). Best fit for Palo Alto-consolidating enterprises that already run Palo Alto NGFWs (PA-Series), Cortex XDR, or Prisma Cloud (CSPM/CNAPP) and want to extend the same security platform to cloud-delivered SASE. Trade-offs: pricing complexity is the consistent buyer complaint (Prisma Access pricing has multiple tiers, multiple SKUs, and a procurement process that requires Palo Alto sales engagement); the platform's feature density creates implementation complexity; and post-acquisition velocity in the SASE pillar has slowed despite the platform's technical depth.

Best for

Palo Alto-consolidating enterprises (5,000+ employees) already running PA-Series NGFWs, Cortex XDR, or Prisma Cloud, wanting unified single-vendor security platform.

Worst for

Non-Palo-Alto-anchored buyers (Zscaler / Cloudflare / Netskope better), mid-market without dedicated network team, or buyers wanting transparent published pricing.

Strengths

  • Comprehensive SASE platform (ZTNA + SWG + CASB + DLP + FWaaS + SD-WAN)
  • Native integration with Palo Alto NGFWs and Cortex XDR
  • Public company financial transparency (NYSE:PANW)
  • FedRAMP High authorized
  • Strong cloud-delivered firewall heritage
  • Globally deployed across 100+ PoPs

Weaknesses

  • Pricing complexity is the consistent buyer complaint
  • Multiple SKUs and tiers create procurement friction
  • Implementation complexity high
  • Post-acquisition velocity in SASE pillar slowed
  • Non-Palo-Alto-anchored buyers see less value
  • Per-user pricing escalates at renewal

Pricing tiers

opaque
  • Prisma Access (Business)
    Per user; ZTNA + SWG
    Quote
  • Prisma Access (Business Premium)
    Per user; adds CASB + DLP
    Quote
  • Prisma Access (Enterprise)
    Full SASE bundle; per user
    Quote
  • Prisma SASE (Business + SD-WAN)
    SASE + CloudGenix SD-WAN
    Quote
Watch for
  • · Per-module pricing across Prisma Access pillars
  • · CloudGenix SD-WAN edge appliances separate
  • · Implementation services ($50K-$500K)
  • · Per-user pricing escalates at renewal

Key features

  • +Prisma Access ZTNA
  • +Cloud SWG
  • +CASB (acquired Palerra)
  • +DLP
  • +FWaaS
  • +Prisma SD-WAN (acquired CloudGenix)
  • +Cortex XDR integration
  • +Autonomous Digital Experience Management (ADEM)
400+ integrations
Palo Alto NGFW (PA-Series)Cortex XDRPrisma CloudMicrosoft Entra IDOktaSplunk
Geography
Global; 100+ PoPs; strongest in US, EU, APAC
#5

Netskope

Comprehensive SSE / SASE platform with deep CASB heritage.

Founded 2012 · Santa Clara, CA · private · 1,000-100,000+ employees
G2 4.4 (480)
Capterra 4.5
Custom quote
○ Sales call required
Visit Netskope

Netskope is one of the deepest SSE / SASE platforms in the market, founded 2012 with original strength in CASB and now spanning the full SSE stack: CASB, SWG, ZTNA (Netskope Private Access), DLP, RBI, and SD-WAN (acquired Infiot 2022). The company reported ~$700M ARR with IPO speculation across 2024-2025 and is widely viewed as a likely 2026 IPO candidate. Best fit for mid-market to enterprise buyers consolidating multiple security tools onto a single SSE platform, particularly those leading with CASB / DLP requirements. Trade-offs: pricing is opaque and complex (per-module pricing across CASB / SWG / ZTNA / DLP creates surprise costs), the platform's feature density creates implementation complexity, and the company's pre-IPO status creates some buyer caution around enterprise-contract stability.

Best for

Mid-market to enterprise buyers (1,000-50,000+ employees) consolidating multiple security tools onto one SSE platform, particularly those leading with CASB / DLP needs.

Worst for

SMBs under 500 employees (overkill, Cloudflare or Twingate cheaper), buyers wanting transparent published pricing, or pure ZTNA buyers without need for SSE breadth.

Strengths

  • Deepest CASB heritage in SSE category
  • Full SSE breadth (CASB + SWG + ZTNA + DLP + RBI)
  • Cloud XD (extended detection) for cloud-app threats
  • Strong DLP across cloud and web
  • ~$700M ARR; IPO speculation 2024-2025
  • NewEdge global network for direct-to-cloud routing

Weaknesses

  • Pricing opaque; per-module complexity creates surprise costs
  • Implementation complexity high for mid-market
  • Pre-IPO status creates some enterprise-contract caution
  • ZTNA pillar (NPA) less mature than Zscaler ZPA
  • Customer support quality reported as variable

Pricing tiers

opaque
  • Netskope Core
    Per user; CASB + SWG
    Quote
  • Netskope Advanced
    Per user; adds ZTNA (NPA), DLP
    Quote
  • Netskope Intelligent SSE
    Full SSE platform
    Quote
  • Netskope One SASE
    SSE + SD-WAN (Infiot)
    Quote
Watch for
  • · Per-module pricing across CASB / SWG / NPA / DLP
  • · Annual price increases reported
  • · Implementation services ($50K-$500K)
  • · Advanced threat protection add-on

Key features

  • +CASB (cloud-app discovery and control)
  • +SWG (secure web gateway)
  • +Netskope Private Access (ZTNA)
  • +DLP across cloud + web + email
  • +Remote Browser Isolation (RBI)
  • +Cloud XD (extended detection)
  • +NewEdge global network
  • +SD-WAN (Netskope One SASE via Infiot)
500+ integrations
Microsoft Entra IDOktaCrowdStrikeSplunkServiceNowMicrosoft Sentinel
Geography
Global; NewEdge POPs in 70+ regions; strongest in US, EU, UK, APAC
#2

Cloudflare One

Edge-network-anchored SSE / ZTNA with the most developer-friendly pricing in category.

Founded 2009 · San Francisco, CA · public · 10-100,000+ employees
G2 4.6 (620)
Capterra 4.6
From $0 + $0 /mo + /employee
● Transparent pricing
Visit Cloudflare One

Cloudflare One is the SSE / SASE platform built on Cloudflare's 320+ POP global edge network, public on NYSE:NET since 2019. The portfolio includes ZTNA (Access), SWG (Gateway), CASB, DLP, browser isolation, and email security (acquired Area 1 Security 2022). Best fit for organizations valuing edge-network performance, transparent pricing, and developer-friendly deployment. The company's November 2023 disclosure that an Okta-token-related breach attempt occurred (and was contained without customer impact) is a positive vendor-trust signal; the transparency in that disclosure exceeded industry norms. Trade-offs: enterprise feature depth is still narrower than Zscaler or Netskope in some pillars (DLP and CASB depth in particular), the platform's rapid feature expansion creates UX inconsistency across modules, and FedRAMP Moderate authorization (vs Zscaler's High) is the procurement gate for some federal buyers.

Best for

Organizations (100-50,000 employees) valuing edge-network performance, transparent published pricing, and developer-friendly deployment with broad protocol support beyond HTTP.

Worst for

Federal buyers requiring FedRAMP High (Zscaler better), buyers needing deepest CASB / DLP feature parity (Netskope better), or strict no-public-cloud-dependency shops.

Strengths

  • 320+ POP global edge network, unmatched performance footprint
  • Transparent published pricing (free tier 50 users; paid tiers per user)
  • Developer-friendly deployment (clientless and clienteled options)
  • Nov 2023 Okta-token breach disclosure showed transparency above industry norms
  • Integrated Area 1 email security and Magic Transit DDoS
  • Public company financial transparency (NYSE:NET)

Weaknesses

  • Enterprise DLP / CASB depth narrower than Zscaler / Netskope
  • Rapid feature expansion creates UX inconsistency
  • FedRAMP Moderate only (vs Zscaler High)
  • Some enterprise features lag (advanced policy granularity)
  • Support quality varies by tier; enterprise support is its own line item

Pricing tiers

public
  • Free (Zero Trust)
    Up to 50 users; ZTNA, Gateway DNS, Browser Isolation
    $0+$0 /mo +/emp
  • Pay-as-you-go
    Per user; Zero Trust full features
    $7 /mo
  • Contract
    Per user; annual commit; volume discount
    Quote
  • Enterprise
    Custom; advanced DLP, dedicated support, SLA
    Quote
Watch for
  • · Enterprise support is separate line item
  • · Some advanced features in Enterprise tier only
  • · Email security (Area 1) is separate SKU

Key features

  • +ZTNA (Cloudflare Access)
  • +SWG (Cloudflare Gateway)
  • +CASB
  • +DLP
  • +Browser Isolation
  • +Email Security (Area 1)
  • +Magic WAN / SD-WAN
  • +Cloudflare Tunnel for app exposure
400+ integrations
Microsoft Entra IDOktaGoogle WorkspaceGitHubCrowdStrikeSplunk
Geography
Global; 320+ POPs; strongest in US, EU, UK, APAC, LATAM
#6

Cato Networks

SASE-pure single-vendor cloud-native architecture.

Founded 2015 · Tel Aviv, Israel · private · 500-25,000 employees
G2 4.5 (320)
Capterra 4.6
Custom quote
○ Sales call required
Visit Cato Networks

Cato Networks is the SASE-pure single-cloud-vendor architecture leader, founded 2015 by Shlomo Kramer (Check Point and Imperva co-founder). The product is built ground-up as a single multi-tenant cloud (Cato SASE Cloud) covering SD-WAN, ZTNA, FWaaS, SWG, CASB, DLP, and RBI in a single converged service. The company reported ~$200M ARR with $2B IPO speculation across 2024-2025 and is growing rapidly. Best fit for organizations wanting a single-vendor SD-WAN + ZTNA + security stack without integrating multiple point products. Trade-offs: feature depth in individual pillars is sometimes thinner than best-of-breed (DLP vs Netskope, ZTNA vs Zscaler), customer support quality reports vary by region, and pricing is opaque enterprise-only quotes.

Best for

Mid-market to enterprise (500-25,000 employees) wanting single-vendor SD-WAN + ZTNA + security stack without integrating multiple point products.

Worst for

Federal buyers (no FedRAMP), best-of-breed buyers wanting deepest CASB / DLP (Netskope better), or organizations already heavily invested in incumbent SD-WAN.

Strengths

  • SASE-pure single-vendor architecture (Cato SASE Cloud)
  • Single multi-tenant cloud across SD-WAN + security
  • Founder pedigree (Shlomo Kramer, Check Point / Imperva)
  • ~$200M ARR; growing rapidly; $2B IPO speculation
  • Cato Sockets for SD-WAN edge
  • Unified policy across SD-WAN + ZTNA + security

Weaknesses

  • Feature depth thinner than best-of-breed in individual pillars
  • Customer support quality varies by region
  • Pricing opaque, enterprise-only quotes
  • No FedRAMP authorization
  • Single-vendor lock-in risk for risk-averse buyers

Pricing tiers

opaque
  • Cato SASE Cloud
    Per-site + per-user; converged platform
    Quote
  • Cato SSE 360
    Per user; SSE only (no SD-WAN)
    Quote
  • Cato Sockets
    SD-WAN edge devices; per site
    Quote
Watch for
  • · Cato Sockets hardware separate
  • · Premium support tiers
  • · Implementation services ($25K-$200K)

Key features

  • +Cato SASE Cloud (converged platform)
  • +SD-WAN via Cato Sockets
  • +ZTNA (clientless and clientful)
  • +FWaaS
  • +SWG and CASB
  • +DLP
  • +RBI
  • +XDR threat detection
200+ integrations
Microsoft Entra IDOktaCrowdStrikeSplunkMicrosoft SentinelServiceNow
Geography
Global; 80+ PoPs; strongest in EU, UK, US, APAC
#3

Tailscale

WireGuard-based mesh VPN with developer-first UX.

Founded 2019 · Toronto, Canada · private · 5-2,000 employees
G2 4.8 (240)
Capterra 4.8
From $0 + $0 /mo + /employee
● Transparent pricing
Visit Tailscale

Tailscale is the WireGuard-anchored mesh-VPN / ZTNA platform that effectively created the developer-first ZTNA buying motion. Founded 2019 by former Google engineers (including Crawshaw and Pennarun), raised a $100M Series B led by CRV in May 2022 at a reported $1B+ valuation. Best fit for engineering teams, devops shops, and SMB-to-mid-market organizations valuing a frictionless WireGuard mesh over heavy SASE rollouts. The product is famously simple: install agent, authenticate via SSO, machines join the tailnet, ACL policy is declarative. Trade-offs: the May 2024 license switch from BSD/MIT to BSL (Business Source License) raised community concerns about long-term open-source posture (the client remains BSD but the coordination server (control plane) moved to source-available); enterprise compliance features (DLP, CASB, SWG) are absent (Tailscale is pure ZTNA / mesh-VPN, not full SASE); and on-prem / air-gapped deployments require Tailscale Headscale (community OSS) or the commercial Self-Hosted Coordination Server.

Best for

Engineering teams, devops, and SMB-to-mid-market organizations (10-2,000 employees) wanting frictionless WireGuard mesh access rather than full SASE rollouts.

Worst for

Federal / FedRAMP-required buyers (no FedRAMP), enterprises needing full SASE breadth (DLP / CASB / SWG missing), or organizations requiring deep policy granularity beyond ACL files.

Strengths

  • WireGuard-based mesh, fastest performant ZTNA architecture
  • Developer-first UX (install, authenticate, joined the tailnet)
  • Declarative ACL policy as code
  • Generous free tier (Personal: 3 users, 100 devices)
  • Funnel and Serve features for clientless app exposure
  • Strong open-source community (client BSD-licensed)

Weaknesses

  • May 2024 control-plane license switch to BSL raised community concerns
  • Pure ZTNA only (no DLP / CASB / SWG)
  • Enterprise compliance posture thinner than SASE leaders (no FedRAMP)
  • On-prem / air-gapped requires Headscale OSS or commercial self-hosted
  • Support tier required for enterprise SLA

Pricing tiers

public
  • Personal (Free)
    Up to 3 users, 100 devices; single-user
    $0+$0 /mo +/emp
  • Starter
    Per user; small teams, 3 admin seats
    $6 /mo
  • Premium
    Per user; SSO, SCIM, ACL audit logs
    $18 /mo
  • Enterprise
    Custom; SAML SSO, advanced compliance, dedicated support
    Quote
Watch for
  • · SCIM and SSO require Premium tier or above
  • · Enterprise support tier is separate

Key features

  • +WireGuard-based mesh VPN
  • +Declarative ACL policy as code
  • +Magic DNS (Tailscale-resolved hostnames)
  • +Funnel (public app exposure)
  • +Serve (clientless local exposure)
  • +Tailscale SSH
  • +Subnet routers for legacy network bridging
  • +Audit logs and SIEM streaming
60+ integrations
Microsoft Entra IDOktaGoogle WorkspaceGitHubAWSAzure
Geography
Global; deployment via WireGuard anywhere; control plane in US / EU
#4

Twingate

Modern remote access designed as a clean VPN replacement.

Founded 2019 · Redwood City, CA · private · 10-2,000 employees
G2 4.7 (180)
Capterra 4.7
From $0 + $0 /mo + /employee
● Transparent pricing
Visit Twingate

Twingate is the modern remote-access / ZTNA platform purpose-built as a clean VPN replacement. Founded 2019, raised Series B $42M in 2022 led by Bessemer Venture Partners (BVP), now backed by BVP, 8VC, and WndrCo. Best fit for SMB-to-mid-market organizations (50-2,000 employees) that want VPN replacement without committing to a full SASE platform. The product is purpose-built around split-tunnel architecture with a centralized policy engine (Twingate Controller) and edge connectors deployed near each resource. Trade-offs: Twingate is pure ZTNA (no SASE breadth: no CASB, no DLP, no SWG); the enterprise tier sales motion is still maturing; integration ecosystem is narrower than Zscaler or Cloudflare; and FedRAMP authorization is absent which excludes federal buyers.

Best for

SMB-to-mid-market (50-2,000 employees) wanting VPN replacement with clean ZTNA architecture and centralized policy, without the complexity of full SASE.

Worst for

Federal buyers (no FedRAMP), enterprises requiring full SSE breadth (Zscaler / Netskope better), or buyers wanting a pure WireGuard mesh (Tailscale better).

Strengths

  • Purpose-built as clean VPN replacement (no SASE complexity)
  • Split-tunnel architecture preserves performance
  • Centralized Twingate Controller for policy
  • Strong developer / engineering buyer fit
  • BVP / 8VC / WndrCo backing signals vendor stability
  • Free tier (2 users, 1 admin) for evaluation

Weaknesses

  • Pure ZTNA only (no CASB / DLP / SWG)
  • Enterprise sales motion still maturing
  • Integration ecosystem narrower than Zscaler / Cloudflare
  • No FedRAMP authorization (excludes federal procurement)
  • Limited brand recognition vs Tailscale in developer segment

Pricing tiers

public
  • Starter (Free)
    Up to 2 users, 1 admin, 5 devices
    $0+$0 /mo +/emp
  • Teams
    Per user; 10 users included
    $6 /mo
  • Business
    Per user; SSO, SCIM, advanced policies
    $12 /mo
  • Enterprise
    Custom; SAML SSO, dedicated support, SLA
    Quote
Watch for
  • · SCIM and SSO require Business tier or above
  • · Enterprise support is separate add-on

Key features

  • +Split-tunnel ZTNA architecture
  • +Twingate Controller (policy)
  • +Edge connectors per resource
  • +Centralized identity-aware policy
  • +Device posture checks
  • +Audit logging and SIEM export
  • +Native clients (Win, macOS, Linux, iOS, Android, headless)
  • +DNS filtering (Internet Security)
50+ integrations
Microsoft Entra IDOktaGoogle WorkspaceGitHubJamfCrowdStrike
Geography
Global; control plane US / EU; edge connectors anywhere
#10

Fortinet FortiSASE

Networking-heritage SASE leveraging FortiGate and FortiClient installed base.

Founded 2000 · Sunnyvale, CA · public · 500-50,000+ employees
G2 4.3 (340)
Capterra 4.5
From $5 /mo
◐ Partial disclosure
Visit Fortinet FortiSASE

Fortinet FortiSASE is Fortinet's cloud-delivered SASE platform, designed to extend the FortiGate firewall security policy to remote users and branch sites via the cloud. Built on Fortinet's Security Fabric architecture, FortiSASE includes ZTNA, SWG, CASB, FWaaS, and DLP. Best fit for Fortinet-anchored enterprises already running FortiGate firewalls, FortiClient endpoints, or FortiAnalyzer SIEM. Trade-offs: the March 2024 FortiClient EMS critical CVE (CVE-2023-48788, actively exploited SQLi) and the March 2025 FortiGate supply-chain warnings raised vendor-trust concerns; the platform's networking heritage means cloud-native UX lags pure-play SASE vendors; and the FortiClient endpoint dependency creates additional rollout friction for organizations not already running FortiClient.

Best for

Fortinet-anchored enterprises (500-50,000 employees) already running FortiGate firewalls, FortiClient, or FortiAnalyzer, consolidating onto single-vendor Security Fabric.

Worst for

Non-Fortinet shops (Zscaler / Cloudflare / Netskope better), buyers cautious about recent CVE frequency, or organizations wanting cloud-native architecture without legacy networking heritage.

Strengths

  • Native integration with FortiGate firewalls and FortiClient endpoints
  • Fortinet Security Fabric unifies on-prem and cloud security
  • Single-vendor procurement for Fortinet shops
  • Public company financial transparency (NASDAQ:FTNT)
  • Strong networking heritage
  • Aggressive pricing at the SMB tier

Weaknesses

  • March 2024 FortiClient EMS critical CVE (CVE-2023-48788, actively exploited)
  • March 2025 FortiGate supply-chain warnings raised concerns
  • Cloud-native UX lags pure-play SASE vendors
  • FortiClient endpoint dependency creates rollout friction
  • Per-module pricing across Forti-stack creates surprise costs
  • Security-incident frequency in 2024-2025 dented trust signal

Pricing tiers

partial
  • FortiSASE Standard
    Per user; ZTNA + SWG
    $5 /mo
  • FortiSASE Advanced
    Per user; adds CASB + DLP
    Quote
  • FortiSASE with FortiGate
    Bundled with FortiGate firewalls
    Quote
  • Enterprise
    Full Security Fabric integration
    Quote
Watch for
  • · FortiClient endpoint licenses separate
  • · FortiGate firewall hardware separate
  • · Per-module pricing across Forti-stack

Key features

  • +ZTNA (Universal ZTNA via FortiClient)
  • +SWG
  • +CASB
  • +FWaaS
  • +DLP
  • +Security Fabric integration
  • +FortiGate firewall extension to cloud
  • +FortiAnalyzer SIEM integration
300+ integrations
FortiGateFortiClientFortiAnalyzerMicrosoft Entra IDOktaSplunk
Geography
Global; 100+ PoPs; strongest in US, EU, APAC, MENA
#7

Perimeter 81 (Check Point Harmony SASE)

Mid-market ZTNA absorbed into Check Point; rebranded Harmony SASE.

Founded 2018 · Tel Aviv, Israel · public · 50-5,000 employees
G2 4.4 (280)
Capterra 4.6
From $8 /mo
◐ Partial disclosure
Visit Perimeter 81 (Check Point Harmony SASE)

Perimeter 81 was the mid-market ZTNA / Network-as-a-Service vendor acquired by Check Point Software Technologies in August 2023 for $490M, and rebranded as Check Point Harmony SASE within the broader Harmony platform (alongside Harmony Endpoint, Harmony Email). The product was originally founded 2018 to bring enterprise-grade ZTNA to mid-market buyers, with strong G2 ratings and a transparent published pricing motion (rare in this segment pre-acquisition). Best fit, post-acquisition, for buyers consolidating onto Check Point security; standalone procurement signal has weakened. Trade-offs: post-acquisition product velocity has slowed meaningfully (classic Check Point integration pattern), the former transparent pricing motion has been replaced with Check Point enterprise pricing process, and original mid-market customers report mixed experience with Check Point support transition.

Best for

Buyers consolidating onto Check Point Harmony security platform (Endpoint + Email + Mobile + SASE), valuing single-vendor consolidation over best-of-breed.

Worst for

Mid-market buyers who originally bought Perimeter 81 for its transparent published pricing (motion changed post-acquisition), or buyers wary of post-acquisition product velocity slowdowns.

Strengths

  • Acquired by Check Point Aug 2023 for $490M (vendor stability via parent)
  • Native integration into Check Point Harmony platform
  • Mid-market ZTNA architecture proven
  • Original developer-friendly UX preserved (for now)
  • Global PoP footprint inherited from Check Point

Weaknesses

  • Post-acquisition product velocity slowed meaningfully
  • Transparent pricing motion replaced with Check Point enterprise process
  • Check Point support quality varies; mid-market customers report friction
  • Brand uncertainty during rebrand to Harmony SASE
  • Roadmap visibility reduced post-integration

Pricing tiers

partial
  • Essentials
    Per user; basic ZTNA
    $8 /mo
  • Premium
    Per user; advanced policies, dedicated gateways
    $12 /mo
  • Premium Plus
    Per user; full feature set
    $16 /mo
  • Enterprise
    Check Point enterprise quote; SLA, support
    Quote
Watch for
  • · Dedicated gateways billed separately
  • · Check Point support tier separate add-on
  • · Implementation services

Key features

  • +ZTNA (agent + agentless)
  • +SWG
  • +DNS Security
  • +Cloud Firewall
  • +Dedicated gateways per customer (Premium+)
  • +Device posture checks
  • +SIEM integration
  • +Mobile clients
150+ integrations
Microsoft Entra IDOktaGoogle WorkspaceAWSCheck Point Harmony EndpointSplunk
Geography
Global; 75+ PoPs via Check Point; strongest in US, EU, UK, Israel

Frequently asked questions

The questions buyers actually ask before they sign.

Why should German buyers evaluate NCP Engineering before US ZTNA vendors?
NCP Engineering (Nürnberg) is the only Germany-headquartered vendor with 30+ years of BSI-zertifizierte VPN and network access products. For German public sector buyers (Bundesbehörden, Länder, municipalities), defense-adjacent Mittelstand, and any organization under BSI Grundschutz obligation that requires BSI-certified cryptographic products, NCP's BSI certification is a procurement advantage that no US vendor (Zscaler, Cloudflare, Palo Alto) can match. The Bundesnetzagentur scrutiny on US-hosted ZTNA (data sovereignty concerns around CLOUD Act obligations) further tilts the equation for sensitive public-sector deployments. For German private-sector enterprise without BSI certification requirements, US vendors are fully viable; for German public sector, evaluate NCP Engineering first.
Does BetrVG §87 apply to Zscaler or Cloudflare traffic inspection in Germany?
Yes. When Zscaler ZIA or Cloudflare Gateway performs SSL inspection (TLS break-and-inspect) on employee internet traffic, this constitutes a technical monitoring system under BetrVG §87 No. 6. This triggers Betriebsrat co-determination rights. You must negotiate a Betriebsvereinbarung before enabling SSL inspection. The Betriebsvereinbarung must specify: which URL categories are subject to inspection, what log data is collected, retention periods (typically 90-180 days), who can access logs and under what conditions, and how employees are notified. ZTNA access control (ZPA/Cloudflare Access for application access without traffic inspection) is less likely to trigger §87 if no behavioral monitoring is included. Engage your Datenschutzbeauftragter alongside the Betriebsrat; many German enterprises deploy ZTNA access control first and negotiate SWG/traffic inspection separately.
Can US-hosted ZTNA be used for German KRITIS operators under IT-Sicherheitsgesetz 2.0?
Yes, with conditions. IT-Sicherheitsgesetz 2.0 does not prohibit US-vendor ZTNA; it requires KRITIS operators to implement BSI minimum security measures and to notify BSI of critical incidents. Using US-hosted ZTNA (Zscaler on AWS Frankfurt, Cloudflare on Frankfurt PoP) in KRITIS infrastructure requires: DSGVO SCCs for data transfers to the US-headquartered vendor, BSI C5-attested cloud infrastructure (AWS Frankfurt holds C5), documented incident response procedures including BSI notification workflows, and for some KRITIS sectors a critical-component notification to BSI under §9b BSIG. For the highest-sensitivity KRITIS deployments (classified networks, defense-adjacent), German-native vendors (NCP Engineering, genua) or Fortinet with BSI CSPN certification are the more defensible choice.
What is the difference between ZTNA, SSE, SASE, and VPN?
VPN (Virtual Private Network) is the legacy approach: tunnel a user into a trusted network perimeter, all traffic gets implicit trust once inside. ZTNA (Zero Trust Network Access) is the architectural successor: identity-aware, application-level access where every request is verified continuously and no implicit network trust exists. SSE (Secure Service Edge) bundles ZTNA with SWG, CASB, and DLP into a cloud-delivered security stack. SASE (Secure Access Service Edge) is SSE plus SD-WAN. In 2026 most credible vendors ship full SASE; pure-ZTNA-only buyers are rare except in mesh-VPN segments (Tailscale, Twingate).
Agent-based vs agentless ZTNA, which one?
Agent-based (FortiClient, Cisco AnyConnect-like clients, Zscaler Client Connector, Tailscale): deeper device-posture checks, stronger split-tunneling, better for managed-device fleets. Agentless (browser-based access via Cloudflare Access, Zscaler ZPA Browser Access, Netskope NPA Browser Access): faster onboarding, works for unmanaged devices (BYOD, contractors, partners), but limited to web-protocol apps. Most enterprises run both modes: agent for managed devices, agentless for contractor / BYOD access.
What is identity-aware proxy and how is it different from a VPN gateway?
An identity-aware proxy (Google's BeyondCorp pattern) terminates each application connection at a policy enforcement point, then evaluates identity, device posture, location, risk score, and application context before allowing the request. Unlike a VPN gateway which gives broad network access once authenticated, the identity-aware proxy authorizes per-request, per-application. ZTNA platforms (Zscaler ZPA, Cloudflare Access, Netskope NPA) are all identity-aware-proxy implementations.
How does application discovery work in ZTNA?
ZTNA platforms inventory the applications users actually access through a combination of: (1) explicit application catalog (admin defines apps and policies), (2) automatic discovery via DNS / proxy traffic analysis (Zscaler ZIA, Netskope CASB), (3) cloud-app discovery via API integration to SaaS vendors (CASB pillar), and (4) shadow-IT discovery via web-traffic inspection. Most enterprises start with the explicit catalog and add discovery over time. Cloudflare Access and Zscaler ZPA both publish application-discovery features.
How much should I budget for ZTNA?
Small SMB (10-50 users): $0-$5/user/mo (Cloudflare Free, Tailscale Personal, Twingate Starter). SMB (50-500 users): $6-$15/user/mo (Tailscale Premium, Twingate Business, Cloudflare One). Mid-market (500-2,500 users): $20-$45/user/mo (Cato, Zscaler, Netskope, Perimeter 81). Enterprise (2,500+ users): $30-$75/user/mo (Zscaler full stack, Prisma Access, Cisco Secure Access). Multi-module SSE / SASE deployments at enterprise scale frequently exceed $1M annual contract value.
What is BeyondCorp and why does it matter?
BeyondCorp is the Zero Trust architecture Google published in 2014, the conceptual foundation for the entire ZTNA category. The core ideas: (1) no implicit trust for any network location (internal vs external), (2) every access decision evaluates user identity, device posture, and request context, (3) policy is centrally enforced at the application-proxy layer. Every modern ZTNA platform implements some variant of BeyondCorp; some vendors (Cloudflare, Banyan / SonicWall) market their products as direct BeyondCorp implementations.
Is FedRAMP authorization required for federal procurement?
For US federal agencies and many state / local government buyers, FedRAMP authorization is the procurement gate. Zscaler, Cisco Secure Access (via Duo and Umbrella), Palo Alto Prisma Access, Cloudflare One, and Fortinet FortiSASE are FedRAMP authorized. Netskope is FedRAMP in-process as of 2026. Tailscale, Twingate, Cato Networks, and Perimeter 81 do not have FedRAMP authorization, which excludes them from federal procurement. FedRAMP High vs Moderate matters for classification level: Zscaler holds FedRAMP High; Cloudflare One holds FedRAMP Moderate.
How do ZTNA platforms integrate with identity providers (Okta, Entra)?
Every modern ZTNA platform integrates with Microsoft Entra ID, Okta, Google Workspace, and Ping via SAML and OIDC for SSO and SCIM for user provisioning. The integration depth varies: Cloudflare Access has the cleanest setup for new tenants; Zscaler ZPA has the deepest enterprise integration with conditional-access policy export from Entra; Cato Networks and Netskope NPA both integrate via SCIM and SAML but require more setup. Identity provider risk-signal integration (passing Entra Identity Protection risk scores into ZTNA policy) is a 2025-2026 maturing capability.
What about Tailscale's 2024 license change?
In May 2024 Tailscale moved the coordination-server (control plane) license from BSD/MIT to BSL (Business Source License), a source-available license with conversion to a permissive license after a delay. The Tailscale client itself remains BSD-licensed. Community concerns flagged the long-term open-source posture; the practical impact on most paying customers is minimal because the coordination server is operated by Tailscale as SaaS. For air-gapped or fully self-hosted deployments, Headscale (community OSS coordination server) is the alternative; Tailscale also offers a commercial self-hosted coordination server.
How did the Cloudflare November 2023 breach affect vendor trust?
In November 2023 Cloudflare disclosed that a threat actor (linked to the broader Okta-token compromise) had attempted to use credentials obtained from Okta to access Cloudflare's internal Atlassian instance. Cloudflare detected and contained the incident; no customer data or Cloudflare Zero Trust customer environments were compromised. The disclosure itself was widely praised for transparency: Cloudflare published the full incident timeline, threat-actor TTPs, and remediation steps publicly. Editorially this is a positive vendor-trust signal: the response demonstrated that the company over-communicates rather than under-communicates in incident response, which is what buyers should expect.

Final word

Looking at a different market? See the global Zero Trust Network Access (ZTNA) ranking, or pick another country at the top of this page.

Last updated 2026-05-18. Local pricing reverified quarterly. Found something inaccurate? Tell us.