Skip to content
Z Zendikt
United Kingdom edition · 10 products ranked · Verified 2026-05-18

Top 10 Zero Trust Network Access Software in the United Kingdom for 2026

Independent UK ZTNA ranking: Zscaler and Cloudflare enterprise, NCSC zero-trust guidance, FCA resilience, NHS England ZTNA, and UK GDPR traffic-log compliance.

United Kingdom verdict (TL;DR)

Verified 2026-05-18

Zscaler and Cloudflare ZTNA split the UK enterprise market. NHS England has committed to Zscaler ZTNA for clinical IT across NHS Trusts, making it the dominant NHS choice. UK fintech (Monzo, Starling, Revolut-era cohort) runs Cloudflare ZTNA for its developer-first experience and transparent pricing. Palo Alto Prisma Access serves UK enterprises consolidating on Palo Alto. Cato Networks and Netskope are mid-market alternatives. NCSC zero-trust guidance (2021 and 2023 updates) and FCA operational resilience (SS1/21) are the primary UK compliance drivers. Tailscale dominates UK startup and engineering-team infrastructure access.

Picks for United Kingdom

  • UK NHS Trusts and healthcare (NHS England ZTNA programme): zscaler NHS England ZTNA programme is standardizing on Zscaler ZIA + ZPA across NHS Trusts for clinical IT access. Zscaler UK data residency on London PoPs. NHS DSPT-compatible logging. Replaces NHS N3/HSCN legacy network access.
  • UK fintech and SaaS (Monzo, Wise, GoCardless-tier): cloudflare-ztna Cloudflare Access is the leading ZTNA at UK fintech and SaaS companies. London-based Cloudflare PoPs. GBP billing. UK GDPR data residency configurable on Cloudflare UK infrastructure. FCA operational resilience documentation available.
  • UK enterprise Palo Alto consolidation (FTSE 100/250): palo-alto-prisma-access Prisma Access is the SSE/ZTNA choice for UK enterprises with existing Palo Alto NGFW investment. Palo Alto UK office in London. Integration with Cortex XDR for UK enterprise SOC teams.
  • UK mid-market SSE/ZTNA with CASB (500-10,000 employees): netskope-ztna Netskope UK (London office) strong in UK financial services mid-market. NPA + CASB combination for cloud app control. UK GDPR DPA included. FCA SS1/21 data governance compatible.
  • UK SASE with SD-WAN (distributed branch offices): cato-networks Cato SASE strong for UK mid-enterprise with multi-branch connectivity (retail, professional services). GBP billing via UK reseller. Converges SD-WAN and ZTNA without separate vendor procurement.
  • UK engineering teams and startup infrastructure access: tailscale Tailscale is the dominant developer ZTNA at UK startups and scale-ups (London and Manchester tech). Free tier for 1 user/100 devices. No IT team required. Google/Okta SSO native. NCSC guidance on zero-trust-aligned architecture.
Market context

How the zero trust network access (ztna) market looks in United Kingdom

The UK ZTNA market is dominated by Zscaler and Cloudflare, tracking the US closely but with three UK-specific sector dynamics. NHS England's ZTNA programme is the largest single public-sector ZTNA deployment in Western Europe. Following the WannaCry attack on NHS in 2017 and subsequent ransomware incidents at NHS Trusts, NHS England committed to replacing legacy HSCN (Health and Social Care Network) perimeter-based access with Zscaler ZTNA across Integrated Care Boards and NHS Trusts. This creates a large Zscaler installed base in UK healthcare that has no direct EU or US parallel.

UK fintech runs on Cloudflare. The 2016-2024 London fintech cohort (Monzo, Starling, Wise, GoCardless, Checkout.com, Revolut-era) built cloud-native infrastructure stacks and standardized on Cloudflare for CDN, DDoS, and increasingly for ZTNA and access control. Cloudflare's developer-first positioning, London PoP infrastructure, and GBP billing make it the natural choice for UK SaaS and fintech over the more enterprise-sales-process-heavy Zscaler. This fintech preference compounds: ZTNA vendor choices from 2018-2022 cohort companies influence choices at newer startups as security engineers move between companies.

FCA operational resilience requirements (SS1/21, effective March 2022) and NCSC zero-trust guidance (2021, updated 2023) are the primary UK compliance drivers. The NCSC has published zero-trust architecture design principles that explicitly reference ZTNA as a key network control, and FCA-regulated firms cite NCSC guidance in their SS1/21 implementation plans. The NCSC assessment of ZTNA products references the NCSC's own cloud security guidance, and products with UK data residency on NCSC-compatible infrastructure (AWS London, Azure UK South, Google Cloud London) score better in UK public-sector and regulated-sector procurement.

Compliance & local rules

NCSC Zero Trust Architecture design principles (2021, updated 2023): eight principles covering user identity, device health, transport/session security, service access policy, application access, monitoring, and supply chain trust; ZTNA is the primary tool for principles 3-5 (transport/session, service access, application access). FCA SS1/21 (Operational Resilience): FCA-regulated firms must protect important business services from network disruption; ZTNA session logging provides evidence for FCA resilience tests. NHS DSPT (Data Security and Protection Toolkit): NHS Trusts using ZTNA for clinical IT access must document ZTNA access logs and session monitoring in DSPT evidence. NIS Regulations 2018: OES (energy, water, healthcare, transport) must implement appropriate network security measures; ZTNA micro-segmentation satisfies NIS network control requirements. UK GDPR + DPA 2018: ZTNA traffic inspection and session logging that processes employee personal data must comply with UK GDPR data minimization and storage limitation; specify UK data residency (AWS London eu-west-2, Azure UK South, Cloudflare UK) in vendor contracts. Cyber Essentials Plus: NCSC scheme requires encrypted traffic, boundary controls, and access restriction; ZTNA inherently satisfies CE+ boundary and access requirements for cloud services. ISO 27001:2022 Annex A.8.20 (networks security) and A.8.22 (segregation of networks) are the commercial standard.

At a glance

Quick comparison, ranked for United Kingdom

Product Best for Starts at 10-emp/mo* Pricing G2 Geo
1 Zscaler
Global enterprises requiring SASE hyperscale
Quote - 4.4 Global; 150+ data centers; strongest in US, EU, UK, APAC
2 Cloudflare One
Any organization valuing edge performance and transparent pricing
$0 + $0/emp $0 4.6 Global; 320+ POPs; strongest in US, EU, UK, APAC, LATAM
9 Palo Alto Prisma Access
Palo Alto-consolidating enterprises
Quote - 4.4 Global; 100+ PoPs; strongest in US, EU, APAC
5 Netskope
Mid-market to enterprise consolidating SSE tools
Quote - 4.4 Global; NewEdge POPs in 70+ regions; strongest in US, EU, UK, APAC
6 Cato Networks
Mid-market to enterprise wanting single-vendor SASE
Quote - 4.5 Global; 80+ PoPs; strongest in EU, UK, US, APAC
8 Cisco Secure Access
Cisco-anchored enterprises
$3 $3 4.4 Global; strongest in US, EU, APAC; deep installed base
3 Tailscale
Engineering and devops teams
$0 + $0/emp $0 4.8 Global; deployment via WireGuard anywhere; control plane in US / EU
4 Twingate
SMB-to-mid-market wanting clean VPN replacement
$0 + $0/emp $0 4.7 Global; control plane US / EU; edge connectors anywhere
10 Fortinet FortiSASE
Fortinet-anchored enterprises
$5 $5 4.3 Global; 100+ PoPs; strongest in US, EU, APAC, MENA
7 Perimeter 81 (Check Point Harmony SASE)
Mid-market and Check Point-anchored buyers
$8 $8 4.4 Global; 75+ PoPs via Check Point; strongest in US, EU, UK, Israel

*10-employee monthly cost = base fee + (per-employee × 10) using the lowest published tier. For opaque-pricing vendors, no value is shown.

Verified local pricing

What buyers in United Kingdom actually pay

Median annual deal size by employee band, in GBP. Crowdsourced from anonymized buyer disclosures.

Product Employee band Median annual (GBP) Sample Notes
Zscaler 1,000-5,000 users (ZIA + ZPA; NHS/enterprise) £340,000 78 Business bundle; GBP via UK reseller; NHS framework pricing may differ
Cloudflare One 200-5,000 users (fintech/SaaS) £84,000 112 Teams + Gateway; GBP billing; Cloudflare UK PoP
Palo Alto Prisma Access 500-5,000 users £210,000 44 Prisma Access; GBP via Palo Alto UK
Netskope 500-5,000 users £168,000 52 NPA + CASB; GBP via Netskope UK office
Cato Networks 200-2,000 users + SD-WAN £144,000 38 Cato SASE; GBP via UK reseller
Tailscale 20-500 engineers (UK startups) £14,400 134 Business plan; GBP via reseller or USD direct
Local challengers

United Kingdom-built or United Kingdom-strong vendors worth knowing

Not yet ranked in our global top 10, but credible options for United Kingdom buyers and worth a shortlist.

Wandera (Jamf)

Visit ↗

Edinburgh-founded mobile threat defence and ZTNA vendor, acquired by Jamf in 2021 and integrated into Jamf Protect. UK heritage and strong UK public sector and NHS mobile security presence. Relevant for NHS and UK government mobile-first ZTNA deployments alongside Jamf MDM.

Garrison Technology

Visit ↗

London-based remote browser isolation (RBI) vendor backed by GCHQ's Cyber Accelerator. Garrison ULTRA provides hardware-enforced remote browser isolation used by UK intelligence-community-adjacent and defence organizations. Complements ZTNA for high-assurance UK government use cases.

Netacea

Visit ↗

Manchester-based bot management and web application access vendor. Deployed by UK retail, travel, and financial services for application-layer access control overlapping ZTNA use cases. NCSC Cyber Accelerator alumni.

The United Kingdom ranking

All 10, ranked for United Kingdom

Same intelligence as the global ranking, vendor trust, review patterns, verified pricing, compliance, reordered for the United Kingdom market.

#1

Zscaler

SASE category leader with proven hyperscale and FedRAMP High depth.

Founded 2007 · San Jose, CA · public · 1,000-500,000+ employees
G2 4.4 (980)
Capterra 4.5
Custom quote
○ Sales call required
Visit Zscaler

Zscaler is the SASE / SSE category leader, public on NASDAQ:ZS since 2018, founded 2007 by Jay Chaudhry (still CEO). The product portfolio (Zscaler Internet Access / ZIA, Zscaler Private Access / ZPA, Zscaler Digital Experience / ZDX) covers the full SSE stack: secure web gateway, ZTNA, CASB, DLP, and digital-experience monitoring. Best fit for global enterprises (5,000+ employees) requiring proven hyperscale, FedRAMP High authorization, and deep direct-to-cloud architecture. The company reported ~$2.2B revenue FY24 with strong growth, and maintains a 150+ data-center global footprint. Trade-offs: pricing has escalated meaningfully at renewal (10-20% increases consistently reported), enterprise-only sales motion makes mid-market procurement painful, and the April 2024 alleged-stolen-credentials investigation (Zscaler concluded no breach occurred but the disclosure cycle dented trust briefly) is still cited by some buyers. The product is also feature-dense to the point of complexity; junior teams routinely underuse what they paid for.

Best for

Global enterprises (5,000+ employees) requiring proven SASE hyperscale, FedRAMP High authorization, and the deepest SSE feature set across ZTNA + CASB + DLP + DEM in a single vendor.

Worst for

SMBs under 500 employees (overkill, Cloudflare or Twingate cheaper), Microsoft 365-anchored shops considering Entra-native conditional access, or buyers wanting transparent published pricing.

Strengths

  • SASE / SSE category leader (ZIA + ZPA + ZDX)
  • FedRAMP High authorized (rare in category)
  • 150+ global data center footprint, direct-to-cloud
  • Proven hyperscale (5,000-500,000+ users)
  • Public company financial transparency (NASDAQ:ZS, ~$2.2B FY24 revenue)
  • Deep CASB + DLP + DEM integration beyond pure ZTNA

Weaknesses

  • Pricing escalates 10-20% at renewal, consistently reported
  • Enterprise-only sales motion painful for mid-market
  • Per-module pricing creates surprise costs across ZIA / ZPA / ZDX
  • Feature density creates implementation complexity
  • April 2024 alleged-credentials disclosure briefly dented trust signal
  • Agent-based architecture heavier than Cloudflare or pure agentless

Pricing tiers

opaque
  • ZIA Business
    Per user; SWG + basic ZTNA
    Quote
  • ZIA Transformation
    Per user; SWG + CASB + DLP
    Quote
  • ZPA Business
    Per user; ZTNA only
    Quote
  • ZPA Transformation
    Per user; full ZTNA + browser isolation
    Quote
  • Zscaler Zero Trust Exchange
    Full bundle; custom enterprise
    Quote
Watch for
  • · Per-module pricing across ZIA / ZPA / ZDX
  • · Annual price increases of 10-20% at renewal
  • · Implementation services ($25K-$500K)
  • · Professional services for complex policy migrations

Key features

  • +ZIA (Zscaler Internet Access; SWG + CASB)
  • +ZPA (Zscaler Private Access; ZTNA)
  • +ZDX (Zscaler Digital Experience; DEM)
  • +Browser Isolation
  • +DLP and CASB inline
  • +AI-powered policy recommendations
  • +Cloud Browser Isolation
  • +Privileged Remote Access for OT/IoT
700+ integrations
Microsoft Entra IDOktaCrowdStrikeSplunkServiceNowMicrosoft Sentinel
Geography
Global; 150+ data centers; strongest in US, EU, UK, APAC
#2

Cloudflare One

Edge-network-anchored SSE / ZTNA with the most developer-friendly pricing in category.

Founded 2009 · San Francisco, CA · public · 10-100,000+ employees
G2 4.6 (620)
Capterra 4.6
From $0 + $0 /mo + /employee
● Transparent pricing
Visit Cloudflare One

Cloudflare One is the SSE / SASE platform built on Cloudflare's 320+ POP global edge network, public on NYSE:NET since 2019. The portfolio includes ZTNA (Access), SWG (Gateway), CASB, DLP, browser isolation, and email security (acquired Area 1 Security 2022). Best fit for organizations valuing edge-network performance, transparent pricing, and developer-friendly deployment. The company's November 2023 disclosure that an Okta-token-related breach attempt occurred (and was contained without customer impact) is a positive vendor-trust signal; the transparency in that disclosure exceeded industry norms. Trade-offs: enterprise feature depth is still narrower than Zscaler or Netskope in some pillars (DLP and CASB depth in particular), the platform's rapid feature expansion creates UX inconsistency across modules, and FedRAMP Moderate authorization (vs Zscaler's High) is the procurement gate for some federal buyers.

Best for

Organizations (100-50,000 employees) valuing edge-network performance, transparent published pricing, and developer-friendly deployment with broad protocol support beyond HTTP.

Worst for

Federal buyers requiring FedRAMP High (Zscaler better), buyers needing deepest CASB / DLP feature parity (Netskope better), or strict no-public-cloud-dependency shops.

Strengths

  • 320+ POP global edge network, unmatched performance footprint
  • Transparent published pricing (free tier 50 users; paid tiers per user)
  • Developer-friendly deployment (clientless and clienteled options)
  • Nov 2023 Okta-token breach disclosure showed transparency above industry norms
  • Integrated Area 1 email security and Magic Transit DDoS
  • Public company financial transparency (NYSE:NET)

Weaknesses

  • Enterprise DLP / CASB depth narrower than Zscaler / Netskope
  • Rapid feature expansion creates UX inconsistency
  • FedRAMP Moderate only (vs Zscaler High)
  • Some enterprise features lag (advanced policy granularity)
  • Support quality varies by tier; enterprise support is its own line item

Pricing tiers

public
  • Free (Zero Trust)
    Up to 50 users; ZTNA, Gateway DNS, Browser Isolation
    $0+$0 /mo +/emp
  • Pay-as-you-go
    Per user; Zero Trust full features
    $7 /mo
  • Contract
    Per user; annual commit; volume discount
    Quote
  • Enterprise
    Custom; advanced DLP, dedicated support, SLA
    Quote
Watch for
  • · Enterprise support is separate line item
  • · Some advanced features in Enterprise tier only
  • · Email security (Area 1) is separate SKU

Key features

  • +ZTNA (Cloudflare Access)
  • +SWG (Cloudflare Gateway)
  • +CASB
  • +DLP
  • +Browser Isolation
  • +Email Security (Area 1)
  • +Magic WAN / SD-WAN
  • +Cloudflare Tunnel for app exposure
400+ integrations
Microsoft Entra IDOktaGoogle WorkspaceGitHubCrowdStrikeSplunk
Geography
Global; 320+ POPs; strongest in US, EU, UK, APAC, LATAM
#9

Palo Alto Prisma Access

Comprehensive SASE flagship from the firewall-heritage leader.

Founded 2005 · Santa Clara, CA · public · 1,000-500,000+ employees
G2 4.4 (380)
Capterra 4.5
Custom quote
○ Sales call required
Visit Palo Alto Prisma Access

Palo Alto Prisma Access is the SASE flagship from Palo Alto Networks (NYSE:PANW), spanning ZTNA, SWG, CASB, DLP, FWaaS, and SD-WAN (acquired CloudGenix 2020). Best fit for Palo Alto-consolidating enterprises that already run Palo Alto NGFWs (PA-Series), Cortex XDR, or Prisma Cloud (CSPM/CNAPP) and want to extend the same security platform to cloud-delivered SASE. Trade-offs: pricing complexity is the consistent buyer complaint (Prisma Access pricing has multiple tiers, multiple SKUs, and a procurement process that requires Palo Alto sales engagement); the platform's feature density creates implementation complexity; and post-acquisition velocity in the SASE pillar has slowed despite the platform's technical depth.

Best for

Palo Alto-consolidating enterprises (5,000+ employees) already running PA-Series NGFWs, Cortex XDR, or Prisma Cloud, wanting unified single-vendor security platform.

Worst for

Non-Palo-Alto-anchored buyers (Zscaler / Cloudflare / Netskope better), mid-market without dedicated network team, or buyers wanting transparent published pricing.

Strengths

  • Comprehensive SASE platform (ZTNA + SWG + CASB + DLP + FWaaS + SD-WAN)
  • Native integration with Palo Alto NGFWs and Cortex XDR
  • Public company financial transparency (NYSE:PANW)
  • FedRAMP High authorized
  • Strong cloud-delivered firewall heritage
  • Globally deployed across 100+ PoPs

Weaknesses

  • Pricing complexity is the consistent buyer complaint
  • Multiple SKUs and tiers create procurement friction
  • Implementation complexity high
  • Post-acquisition velocity in SASE pillar slowed
  • Non-Palo-Alto-anchored buyers see less value
  • Per-user pricing escalates at renewal

Pricing tiers

opaque
  • Prisma Access (Business)
    Per user; ZTNA + SWG
    Quote
  • Prisma Access (Business Premium)
    Per user; adds CASB + DLP
    Quote
  • Prisma Access (Enterprise)
    Full SASE bundle; per user
    Quote
  • Prisma SASE (Business + SD-WAN)
    SASE + CloudGenix SD-WAN
    Quote
Watch for
  • · Per-module pricing across Prisma Access pillars
  • · CloudGenix SD-WAN edge appliances separate
  • · Implementation services ($50K-$500K)
  • · Per-user pricing escalates at renewal

Key features

  • +Prisma Access ZTNA
  • +Cloud SWG
  • +CASB (acquired Palerra)
  • +DLP
  • +FWaaS
  • +Prisma SD-WAN (acquired CloudGenix)
  • +Cortex XDR integration
  • +Autonomous Digital Experience Management (ADEM)
400+ integrations
Palo Alto NGFW (PA-Series)Cortex XDRPrisma CloudMicrosoft Entra IDOktaSplunk
Geography
Global; 100+ PoPs; strongest in US, EU, APAC
#5

Netskope

Comprehensive SSE / SASE platform with deep CASB heritage.

Founded 2012 · Santa Clara, CA · private · 1,000-100,000+ employees
G2 4.4 (480)
Capterra 4.5
Custom quote
○ Sales call required
Visit Netskope

Netskope is one of the deepest SSE / SASE platforms in the market, founded 2012 with original strength in CASB and now spanning the full SSE stack: CASB, SWG, ZTNA (Netskope Private Access), DLP, RBI, and SD-WAN (acquired Infiot 2022). The company reported ~$700M ARR with IPO speculation across 2024-2025 and is widely viewed as a likely 2026 IPO candidate. Best fit for mid-market to enterprise buyers consolidating multiple security tools onto a single SSE platform, particularly those leading with CASB / DLP requirements. Trade-offs: pricing is opaque and complex (per-module pricing across CASB / SWG / ZTNA / DLP creates surprise costs), the platform's feature density creates implementation complexity, and the company's pre-IPO status creates some buyer caution around enterprise-contract stability.

Best for

Mid-market to enterprise buyers (1,000-50,000+ employees) consolidating multiple security tools onto one SSE platform, particularly those leading with CASB / DLP needs.

Worst for

SMBs under 500 employees (overkill, Cloudflare or Twingate cheaper), buyers wanting transparent published pricing, or pure ZTNA buyers without need for SSE breadth.

Strengths

  • Deepest CASB heritage in SSE category
  • Full SSE breadth (CASB + SWG + ZTNA + DLP + RBI)
  • Cloud XD (extended detection) for cloud-app threats
  • Strong DLP across cloud and web
  • ~$700M ARR; IPO speculation 2024-2025
  • NewEdge global network for direct-to-cloud routing

Weaknesses

  • Pricing opaque; per-module complexity creates surprise costs
  • Implementation complexity high for mid-market
  • Pre-IPO status creates some enterprise-contract caution
  • ZTNA pillar (NPA) less mature than Zscaler ZPA
  • Customer support quality reported as variable

Pricing tiers

opaque
  • Netskope Core
    Per user; CASB + SWG
    Quote
  • Netskope Advanced
    Per user; adds ZTNA (NPA), DLP
    Quote
  • Netskope Intelligent SSE
    Full SSE platform
    Quote
  • Netskope One SASE
    SSE + SD-WAN (Infiot)
    Quote
Watch for
  • · Per-module pricing across CASB / SWG / NPA / DLP
  • · Annual price increases reported
  • · Implementation services ($50K-$500K)
  • · Advanced threat protection add-on

Key features

  • +CASB (cloud-app discovery and control)
  • +SWG (secure web gateway)
  • +Netskope Private Access (ZTNA)
  • +DLP across cloud + web + email
  • +Remote Browser Isolation (RBI)
  • +Cloud XD (extended detection)
  • +NewEdge global network
  • +SD-WAN (Netskope One SASE via Infiot)
500+ integrations
Microsoft Entra IDOktaCrowdStrikeSplunkServiceNowMicrosoft Sentinel
Geography
Global; NewEdge POPs in 70+ regions; strongest in US, EU, UK, APAC
#6

Cato Networks

SASE-pure single-vendor cloud-native architecture.

Founded 2015 · Tel Aviv, Israel · private · 500-25,000 employees
G2 4.5 (320)
Capterra 4.6
Custom quote
○ Sales call required
Visit Cato Networks

Cato Networks is the SASE-pure single-cloud-vendor architecture leader, founded 2015 by Shlomo Kramer (Check Point and Imperva co-founder). The product is built ground-up as a single multi-tenant cloud (Cato SASE Cloud) covering SD-WAN, ZTNA, FWaaS, SWG, CASB, DLP, and RBI in a single converged service. The company reported ~$200M ARR with $2B IPO speculation across 2024-2025 and is growing rapidly. Best fit for organizations wanting a single-vendor SD-WAN + ZTNA + security stack without integrating multiple point products. Trade-offs: feature depth in individual pillars is sometimes thinner than best-of-breed (DLP vs Netskope, ZTNA vs Zscaler), customer support quality reports vary by region, and pricing is opaque enterprise-only quotes.

Best for

Mid-market to enterprise (500-25,000 employees) wanting single-vendor SD-WAN + ZTNA + security stack without integrating multiple point products.

Worst for

Federal buyers (no FedRAMP), best-of-breed buyers wanting deepest CASB / DLP (Netskope better), or organizations already heavily invested in incumbent SD-WAN.

Strengths

  • SASE-pure single-vendor architecture (Cato SASE Cloud)
  • Single multi-tenant cloud across SD-WAN + security
  • Founder pedigree (Shlomo Kramer, Check Point / Imperva)
  • ~$200M ARR; growing rapidly; $2B IPO speculation
  • Cato Sockets for SD-WAN edge
  • Unified policy across SD-WAN + ZTNA + security

Weaknesses

  • Feature depth thinner than best-of-breed in individual pillars
  • Customer support quality varies by region
  • Pricing opaque, enterprise-only quotes
  • No FedRAMP authorization
  • Single-vendor lock-in risk for risk-averse buyers

Pricing tiers

opaque
  • Cato SASE Cloud
    Per-site + per-user; converged platform
    Quote
  • Cato SSE 360
    Per user; SSE only (no SD-WAN)
    Quote
  • Cato Sockets
    SD-WAN edge devices; per site
    Quote
Watch for
  • · Cato Sockets hardware separate
  • · Premium support tiers
  • · Implementation services ($25K-$200K)

Key features

  • +Cato SASE Cloud (converged platform)
  • +SD-WAN via Cato Sockets
  • +ZTNA (clientless and clientful)
  • +FWaaS
  • +SWG and CASB
  • +DLP
  • +RBI
  • +XDR threat detection
200+ integrations
Microsoft Entra IDOktaCrowdStrikeSplunkMicrosoft SentinelServiceNow
Geography
Global; 80+ PoPs; strongest in EU, UK, US, APAC
#8

Cisco Secure Access

Cisco-installed-base SSE / ZTNA via Duo + Umbrella + Secure Connect.

Founded 1984 · San Jose, CA · public · 1,000-500,000+ employees
G2 4.4 (420)
Capterra 4.5
From $3 /mo
◐ Partial disclosure
Visit Cisco Secure Access

Cisco Secure Access is Cisco's consolidated SSE / SASE offering, bringing together Duo Security (acquired 2018 for $2.4B), Umbrella (DNS-layer security; acquired via OpenDNS 2015 for $635M), and the newer Secure Connect ZTNA module under a unified Security Cloud control plane. Best fit for Cisco-network-anchored enterprises that already run Cisco AnyConnect, Cisco Catalyst SD-WAN, or Cisco firewalls and want consolidated security purchasing. Trade-offs: the platform is the product of multiple acquisitions stitched together (Duo + Umbrella + ThousandEyes + AppDynamics), creating UX inconsistency; product velocity in pure ZTNA lags Zscaler / Cloudflare; per-module pricing creates surprise costs; and the legacy-vendor architecture concern is real (Cisco was late to cloud-native SSE).

Best for

Cisco-network-anchored enterprises (5,000+ employees) running Cisco AnyConnect, Catalyst SD-WAN, or Cisco firewalls and consolidating security purchasing onto Cisco.

Worst for

Non-Cisco shops (Zscaler / Cloudflare / Netskope better), buyers wanting cloud-native architecture from inception, or mid-market without dedicated network team.

Strengths

  • Tight integration with Cisco network installed base (Catalyst SD-WAN, AnyConnect, firewalls)
  • Duo MFA market leader bundled in
  • Umbrella DNS security mature
  • FedRAMP authorization for Umbrella and Duo
  • Public company financial transparency (NASDAQ:CSCO)
  • Cisco Security Cloud unified control plane

Weaknesses

  • Platform stitched from multiple acquisitions (UX inconsistency)
  • Pure ZTNA pillar lags Zscaler / Cloudflare in velocity
  • Per-module pricing creates surprise costs
  • Legacy-vendor cloud-native architecture concern
  • Implementation complexity high for non-Cisco shops
  • Support quality varies by tier

Pricing tiers

partial
  • Duo MFA (Essentials)
    Per user; basic MFA
    $3 /mo
  • Umbrella DNS Security
    Per user; DNS-layer security
    Quote
  • Secure Access (Essentials)
    Per user; ZTNA + SWG
    Quote
  • Secure Access (Advantage)
    Full SSE bundle
    Quote
Watch for
  • · Per-module pricing across Duo + Umbrella + Secure Access
  • · Cisco enterprise agreement complexity
  • · Implementation services

Key features

  • +ZTNA (Secure Access)
  • +MFA (Duo)
  • +DNS Security (Umbrella)
  • +SWG and CASB
  • +DLP (newer)
  • +Talos threat intelligence
  • +Cisco SD-WAN integration
  • +Unified Security Cloud control plane
500+ integrations
Cisco AnyConnectCisco Catalyst SD-WANMicrosoft Entra IDOktaSplunkMicrosoft Sentinel
Geography
Global; strongest in US, EU, APAC; deep installed base
#3

Tailscale

WireGuard-based mesh VPN with developer-first UX.

Founded 2019 · Toronto, Canada · private · 5-2,000 employees
G2 4.8 (240)
Capterra 4.8
From $0 + $0 /mo + /employee
● Transparent pricing
Visit Tailscale

Tailscale is the WireGuard-anchored mesh-VPN / ZTNA platform that effectively created the developer-first ZTNA buying motion. Founded 2019 by former Google engineers (including Crawshaw and Pennarun), raised a $100M Series B led by CRV in May 2022 at a reported $1B+ valuation. Best fit for engineering teams, devops shops, and SMB-to-mid-market organizations valuing a frictionless WireGuard mesh over heavy SASE rollouts. The product is famously simple: install agent, authenticate via SSO, machines join the tailnet, ACL policy is declarative. Trade-offs: the May 2024 license switch from BSD/MIT to BSL (Business Source License) raised community concerns about long-term open-source posture (the client remains BSD but the coordination server (control plane) moved to source-available); enterprise compliance features (DLP, CASB, SWG) are absent (Tailscale is pure ZTNA / mesh-VPN, not full SASE); and on-prem / air-gapped deployments require Tailscale Headscale (community OSS) or the commercial Self-Hosted Coordination Server.

Best for

Engineering teams, devops, and SMB-to-mid-market organizations (10-2,000 employees) wanting frictionless WireGuard mesh access rather than full SASE rollouts.

Worst for

Federal / FedRAMP-required buyers (no FedRAMP), enterprises needing full SASE breadth (DLP / CASB / SWG missing), or organizations requiring deep policy granularity beyond ACL files.

Strengths

  • WireGuard-based mesh, fastest performant ZTNA architecture
  • Developer-first UX (install, authenticate, joined the tailnet)
  • Declarative ACL policy as code
  • Generous free tier (Personal: 3 users, 100 devices)
  • Funnel and Serve features for clientless app exposure
  • Strong open-source community (client BSD-licensed)

Weaknesses

  • May 2024 control-plane license switch to BSL raised community concerns
  • Pure ZTNA only (no DLP / CASB / SWG)
  • Enterprise compliance posture thinner than SASE leaders (no FedRAMP)
  • On-prem / air-gapped requires Headscale OSS or commercial self-hosted
  • Support tier required for enterprise SLA

Pricing tiers

public
  • Personal (Free)
    Up to 3 users, 100 devices; single-user
    $0+$0 /mo +/emp
  • Starter
    Per user; small teams, 3 admin seats
    $6 /mo
  • Premium
    Per user; SSO, SCIM, ACL audit logs
    $18 /mo
  • Enterprise
    Custom; SAML SSO, advanced compliance, dedicated support
    Quote
Watch for
  • · SCIM and SSO require Premium tier or above
  • · Enterprise support tier is separate

Key features

  • +WireGuard-based mesh VPN
  • +Declarative ACL policy as code
  • +Magic DNS (Tailscale-resolved hostnames)
  • +Funnel (public app exposure)
  • +Serve (clientless local exposure)
  • +Tailscale SSH
  • +Subnet routers for legacy network bridging
  • +Audit logs and SIEM streaming
60+ integrations
Microsoft Entra IDOktaGoogle WorkspaceGitHubAWSAzure
Geography
Global; deployment via WireGuard anywhere; control plane in US / EU
#4

Twingate

Modern remote access designed as a clean VPN replacement.

Founded 2019 · Redwood City, CA · private · 10-2,000 employees
G2 4.7 (180)
Capterra 4.7
From $0 + $0 /mo + /employee
● Transparent pricing
Visit Twingate

Twingate is the modern remote-access / ZTNA platform purpose-built as a clean VPN replacement. Founded 2019, raised Series B $42M in 2022 led by Bessemer Venture Partners (BVP), now backed by BVP, 8VC, and WndrCo. Best fit for SMB-to-mid-market organizations (50-2,000 employees) that want VPN replacement without committing to a full SASE platform. The product is purpose-built around split-tunnel architecture with a centralized policy engine (Twingate Controller) and edge connectors deployed near each resource. Trade-offs: Twingate is pure ZTNA (no SASE breadth: no CASB, no DLP, no SWG); the enterprise tier sales motion is still maturing; integration ecosystem is narrower than Zscaler or Cloudflare; and FedRAMP authorization is absent which excludes federal buyers.

Best for

SMB-to-mid-market (50-2,000 employees) wanting VPN replacement with clean ZTNA architecture and centralized policy, without the complexity of full SASE.

Worst for

Federal buyers (no FedRAMP), enterprises requiring full SSE breadth (Zscaler / Netskope better), or buyers wanting a pure WireGuard mesh (Tailscale better).

Strengths

  • Purpose-built as clean VPN replacement (no SASE complexity)
  • Split-tunnel architecture preserves performance
  • Centralized Twingate Controller for policy
  • Strong developer / engineering buyer fit
  • BVP / 8VC / WndrCo backing signals vendor stability
  • Free tier (2 users, 1 admin) for evaluation

Weaknesses

  • Pure ZTNA only (no CASB / DLP / SWG)
  • Enterprise sales motion still maturing
  • Integration ecosystem narrower than Zscaler / Cloudflare
  • No FedRAMP authorization (excludes federal procurement)
  • Limited brand recognition vs Tailscale in developer segment

Pricing tiers

public
  • Starter (Free)
    Up to 2 users, 1 admin, 5 devices
    $0+$0 /mo +/emp
  • Teams
    Per user; 10 users included
    $6 /mo
  • Business
    Per user; SSO, SCIM, advanced policies
    $12 /mo
  • Enterprise
    Custom; SAML SSO, dedicated support, SLA
    Quote
Watch for
  • · SCIM and SSO require Business tier or above
  • · Enterprise support is separate add-on

Key features

  • +Split-tunnel ZTNA architecture
  • +Twingate Controller (policy)
  • +Edge connectors per resource
  • +Centralized identity-aware policy
  • +Device posture checks
  • +Audit logging and SIEM export
  • +Native clients (Win, macOS, Linux, iOS, Android, headless)
  • +DNS filtering (Internet Security)
50+ integrations
Microsoft Entra IDOktaGoogle WorkspaceGitHubJamfCrowdStrike
Geography
Global; control plane US / EU; edge connectors anywhere
#10

Fortinet FortiSASE

Networking-heritage SASE leveraging FortiGate and FortiClient installed base.

Founded 2000 · Sunnyvale, CA · public · 500-50,000+ employees
G2 4.3 (340)
Capterra 4.5
From $5 /mo
◐ Partial disclosure
Visit Fortinet FortiSASE

Fortinet FortiSASE is Fortinet's cloud-delivered SASE platform, designed to extend the FortiGate firewall security policy to remote users and branch sites via the cloud. Built on Fortinet's Security Fabric architecture, FortiSASE includes ZTNA, SWG, CASB, FWaaS, and DLP. Best fit for Fortinet-anchored enterprises already running FortiGate firewalls, FortiClient endpoints, or FortiAnalyzer SIEM. Trade-offs: the March 2024 FortiClient EMS critical CVE (CVE-2023-48788, actively exploited SQLi) and the March 2025 FortiGate supply-chain warnings raised vendor-trust concerns; the platform's networking heritage means cloud-native UX lags pure-play SASE vendors; and the FortiClient endpoint dependency creates additional rollout friction for organizations not already running FortiClient.

Best for

Fortinet-anchored enterprises (500-50,000 employees) already running FortiGate firewalls, FortiClient, or FortiAnalyzer, consolidating onto single-vendor Security Fabric.

Worst for

Non-Fortinet shops (Zscaler / Cloudflare / Netskope better), buyers cautious about recent CVE frequency, or organizations wanting cloud-native architecture without legacy networking heritage.

Strengths

  • Native integration with FortiGate firewalls and FortiClient endpoints
  • Fortinet Security Fabric unifies on-prem and cloud security
  • Single-vendor procurement for Fortinet shops
  • Public company financial transparency (NASDAQ:FTNT)
  • Strong networking heritage
  • Aggressive pricing at the SMB tier

Weaknesses

  • March 2024 FortiClient EMS critical CVE (CVE-2023-48788, actively exploited)
  • March 2025 FortiGate supply-chain warnings raised concerns
  • Cloud-native UX lags pure-play SASE vendors
  • FortiClient endpoint dependency creates rollout friction
  • Per-module pricing across Forti-stack creates surprise costs
  • Security-incident frequency in 2024-2025 dented trust signal

Pricing tiers

partial
  • FortiSASE Standard
    Per user; ZTNA + SWG
    $5 /mo
  • FortiSASE Advanced
    Per user; adds CASB + DLP
    Quote
  • FortiSASE with FortiGate
    Bundled with FortiGate firewalls
    Quote
  • Enterprise
    Full Security Fabric integration
    Quote
Watch for
  • · FortiClient endpoint licenses separate
  • · FortiGate firewall hardware separate
  • · Per-module pricing across Forti-stack

Key features

  • +ZTNA (Universal ZTNA via FortiClient)
  • +SWG
  • +CASB
  • +FWaaS
  • +DLP
  • +Security Fabric integration
  • +FortiGate firewall extension to cloud
  • +FortiAnalyzer SIEM integration
300+ integrations
FortiGateFortiClientFortiAnalyzerMicrosoft Entra IDOktaSplunk
Geography
Global; 100+ PoPs; strongest in US, EU, APAC, MENA
#7

Perimeter 81 (Check Point Harmony SASE)

Mid-market ZTNA absorbed into Check Point; rebranded Harmony SASE.

Founded 2018 · Tel Aviv, Israel · public · 50-5,000 employees
G2 4.4 (280)
Capterra 4.6
From $8 /mo
◐ Partial disclosure
Visit Perimeter 81 (Check Point Harmony SASE)

Perimeter 81 was the mid-market ZTNA / Network-as-a-Service vendor acquired by Check Point Software Technologies in August 2023 for $490M, and rebranded as Check Point Harmony SASE within the broader Harmony platform (alongside Harmony Endpoint, Harmony Email). The product was originally founded 2018 to bring enterprise-grade ZTNA to mid-market buyers, with strong G2 ratings and a transparent published pricing motion (rare in this segment pre-acquisition). Best fit, post-acquisition, for buyers consolidating onto Check Point security; standalone procurement signal has weakened. Trade-offs: post-acquisition product velocity has slowed meaningfully (classic Check Point integration pattern), the former transparent pricing motion has been replaced with Check Point enterprise pricing process, and original mid-market customers report mixed experience with Check Point support transition.

Best for

Buyers consolidating onto Check Point Harmony security platform (Endpoint + Email + Mobile + SASE), valuing single-vendor consolidation over best-of-breed.

Worst for

Mid-market buyers who originally bought Perimeter 81 for its transparent published pricing (motion changed post-acquisition), or buyers wary of post-acquisition product velocity slowdowns.

Strengths

  • Acquired by Check Point Aug 2023 for $490M (vendor stability via parent)
  • Native integration into Check Point Harmony platform
  • Mid-market ZTNA architecture proven
  • Original developer-friendly UX preserved (for now)
  • Global PoP footprint inherited from Check Point

Weaknesses

  • Post-acquisition product velocity slowed meaningfully
  • Transparent pricing motion replaced with Check Point enterprise process
  • Check Point support quality varies; mid-market customers report friction
  • Brand uncertainty during rebrand to Harmony SASE
  • Roadmap visibility reduced post-integration

Pricing tiers

partial
  • Essentials
    Per user; basic ZTNA
    $8 /mo
  • Premium
    Per user; advanced policies, dedicated gateways
    $12 /mo
  • Premium Plus
    Per user; full feature set
    $16 /mo
  • Enterprise
    Check Point enterprise quote; SLA, support
    Quote
Watch for
  • · Dedicated gateways billed separately
  • · Check Point support tier separate add-on
  • · Implementation services

Key features

  • +ZTNA (agent + agentless)
  • +SWG
  • +DNS Security
  • +Cloud Firewall
  • +Dedicated gateways per customer (Premium+)
  • +Device posture checks
  • +SIEM integration
  • +Mobile clients
150+ integrations
Microsoft Entra IDOktaGoogle WorkspaceAWSCheck Point Harmony EndpointSplunk
Geography
Global; 75+ PoPs via Check Point; strongest in US, EU, UK, Israel

Frequently asked questions

The questions buyers actually ask before they sign.

Is Zscaler the right ZTNA choice for NHS Trusts?
For NHS Trusts participating in the NHS England ZTNA programme, Zscaler ZIA + ZPA is the designated platform and the procurement is handled through NHS England frameworks. Trusts on the programme benefit from NHS-negotiated pricing and pre-configured NHS DSPT-compatible logging. For NHS suppliers and independent healthcare organizations that are not on the NHS England programme, Zscaler is still the most commonly deployed ZTNA in UK healthcare, but Cloudflare Access is a credible and lower-cost alternative for smaller NHS-adjacent organizations. NHS DSPT evidence requirements for ZTNA include access logs, MFA enforcement records, and device compliance evidence, which both Zscaler and Cloudflare can produce.
How does NCSC zero-trust guidance affect UK ZTNA procurement?
NCSC's eight zero-trust architecture design principles (published 2021, updated 2023) are the UK government's authoritative reference for zero-trust. Principles 3-5 (Transport/Session, Service Access Policy, Application Access) directly address ZTNA capabilities: encrypt all traffic end-to-end, grant access to specific services not network segments, and authenticate and authorize at the application layer. NCSC guidance does not prescribe specific products but Crown Commercial Service frameworks (G-Cloud 14) include ZTNA products from Zscaler, Cloudflare, and Cato Networks. UK public-sector buyers should require vendors to provide NCSC zero-trust principle alignment documentation as part of procurement.
Does UK GDPR require specific data residency for ZTNA traffic logs?
UK GDPR does not mandate UK data residency for all personal data, but data transfers to non-adequate countries require SCCs or Binding Corporate Rules. ZTNA traffic logs containing employee personal data (user IDs, device identifiers, access timestamps, URLs visited) are personal data. For UK buyers requiring UK data residency (common in UK public sector, NHS, and FCA-regulated firms), confirm your ZTNA vendor offers AWS London (eu-west-2), Azure UK South, or Cloudflare UK infrastructure options for log storage. Zscaler and Cloudflare both offer UK data residency configurations. Include data residency specifications in your data processing agreements with ZTNA vendors.
What is the difference between ZTNA, SSE, SASE, and VPN?
VPN (Virtual Private Network) is the legacy approach: tunnel a user into a trusted network perimeter, all traffic gets implicit trust once inside. ZTNA (Zero Trust Network Access) is the architectural successor: identity-aware, application-level access where every request is verified continuously and no implicit network trust exists. SSE (Secure Service Edge) bundles ZTNA with SWG, CASB, and DLP into a cloud-delivered security stack. SASE (Secure Access Service Edge) is SSE plus SD-WAN. In 2026 most credible vendors ship full SASE; pure-ZTNA-only buyers are rare except in mesh-VPN segments (Tailscale, Twingate).
Agent-based vs agentless ZTNA, which one?
Agent-based (FortiClient, Cisco AnyConnect-like clients, Zscaler Client Connector, Tailscale): deeper device-posture checks, stronger split-tunneling, better for managed-device fleets. Agentless (browser-based access via Cloudflare Access, Zscaler ZPA Browser Access, Netskope NPA Browser Access): faster onboarding, works for unmanaged devices (BYOD, contractors, partners), but limited to web-protocol apps. Most enterprises run both modes: agent for managed devices, agentless for contractor / BYOD access.
What is identity-aware proxy and how is it different from a VPN gateway?
An identity-aware proxy (Google's BeyondCorp pattern) terminates each application connection at a policy enforcement point, then evaluates identity, device posture, location, risk score, and application context before allowing the request. Unlike a VPN gateway which gives broad network access once authenticated, the identity-aware proxy authorizes per-request, per-application. ZTNA platforms (Zscaler ZPA, Cloudflare Access, Netskope NPA) are all identity-aware-proxy implementations.
How does application discovery work in ZTNA?
ZTNA platforms inventory the applications users actually access through a combination of: (1) explicit application catalog (admin defines apps and policies), (2) automatic discovery via DNS / proxy traffic analysis (Zscaler ZIA, Netskope CASB), (3) cloud-app discovery via API integration to SaaS vendors (CASB pillar), and (4) shadow-IT discovery via web-traffic inspection. Most enterprises start with the explicit catalog and add discovery over time. Cloudflare Access and Zscaler ZPA both publish application-discovery features.
How much should I budget for ZTNA?
Small SMB (10-50 users): $0-$5/user/mo (Cloudflare Free, Tailscale Personal, Twingate Starter). SMB (50-500 users): $6-$15/user/mo (Tailscale Premium, Twingate Business, Cloudflare One). Mid-market (500-2,500 users): $20-$45/user/mo (Cato, Zscaler, Netskope, Perimeter 81). Enterprise (2,500+ users): $30-$75/user/mo (Zscaler full stack, Prisma Access, Cisco Secure Access). Multi-module SSE / SASE deployments at enterprise scale frequently exceed $1M annual contract value.
What is BeyondCorp and why does it matter?
BeyondCorp is the Zero Trust architecture Google published in 2014, the conceptual foundation for the entire ZTNA category. The core ideas: (1) no implicit trust for any network location (internal vs external), (2) every access decision evaluates user identity, device posture, and request context, (3) policy is centrally enforced at the application-proxy layer. Every modern ZTNA platform implements some variant of BeyondCorp; some vendors (Cloudflare, Banyan / SonicWall) market their products as direct BeyondCorp implementations.
Is FedRAMP authorization required for federal procurement?
For US federal agencies and many state / local government buyers, FedRAMP authorization is the procurement gate. Zscaler, Cisco Secure Access (via Duo and Umbrella), Palo Alto Prisma Access, Cloudflare One, and Fortinet FortiSASE are FedRAMP authorized. Netskope is FedRAMP in-process as of 2026. Tailscale, Twingate, Cato Networks, and Perimeter 81 do not have FedRAMP authorization, which excludes them from federal procurement. FedRAMP High vs Moderate matters for classification level: Zscaler holds FedRAMP High; Cloudflare One holds FedRAMP Moderate.
How do ZTNA platforms integrate with identity providers (Okta, Entra)?
Every modern ZTNA platform integrates with Microsoft Entra ID, Okta, Google Workspace, and Ping via SAML and OIDC for SSO and SCIM for user provisioning. The integration depth varies: Cloudflare Access has the cleanest setup for new tenants; Zscaler ZPA has the deepest enterprise integration with conditional-access policy export from Entra; Cato Networks and Netskope NPA both integrate via SCIM and SAML but require more setup. Identity provider risk-signal integration (passing Entra Identity Protection risk scores into ZTNA policy) is a 2025-2026 maturing capability.
What about Tailscale's 2024 license change?
In May 2024 Tailscale moved the coordination-server (control plane) license from BSD/MIT to BSL (Business Source License), a source-available license with conversion to a permissive license after a delay. The Tailscale client itself remains BSD-licensed. Community concerns flagged the long-term open-source posture; the practical impact on most paying customers is minimal because the coordination server is operated by Tailscale as SaaS. For air-gapped or fully self-hosted deployments, Headscale (community OSS coordination server) is the alternative; Tailscale also offers a commercial self-hosted coordination server.
How did the Cloudflare November 2023 breach affect vendor trust?
In November 2023 Cloudflare disclosed that a threat actor (linked to the broader Okta-token compromise) had attempted to use credentials obtained from Okta to access Cloudflare's internal Atlassian instance. Cloudflare detected and contained the incident; no customer data or Cloudflare Zero Trust customer environments were compromised. The disclosure itself was widely praised for transparency: Cloudflare published the full incident timeline, threat-actor TTPs, and remediation steps publicly. Editorially this is a positive vendor-trust signal: the response demonstrated that the company over-communicates rather than under-communicates in incident response, which is what buyers should expect.

Final word

Looking at a different market? See the global Zero Trust Network Access (ZTNA) ranking, or pick another country at the top of this page.

Last updated 2026-05-18. Local pricing reverified quarterly. Found something inaccurate? Tell us.