Compare the Top Secure Access Service Edge (SASE) Software that integrates with Indent as of November 2025

This a list of Secure Access Service Edge (SASE) software that integrates with Indent. Use the filters on the left to add additional filters for products that have integrations with Indent. View the products that work with Indent in the table below.

What is Secure Access Service Edge (SASE) Software for Indent?

Secure Access Service Edge (SASE) software combines wide-area networking (WAN) and network security functions into a unified cloud-native service to securely connect users, devices, and applications regardless of location. It integrates capabilities such as secure web gateways, firewall-as-a-service, zero trust network access (ZTNA), and cloud access security broker (CASB) to provide comprehensive, scalable, and flexible security. SASE software enables organizations to enforce consistent security policies, reduce complexity, and improve performance for remote workforces and distributed environments. By delivering security and networking as a single service, it supports digital transformation and cloud adoption while minimizing risks. SASE solutions are critical for modern enterprises aiming to protect data and users in a highly connected, cloud-driven world. Compare and read user reviews of the best Secure Access Service Edge (SASE) software for Indent currently available using the table below. This list is updated regularly.

  • 1
    Perimeter 81

    Perimeter 81

    Check Point Software Technologies

    Perimeter 81 is transforming the world of secure network access and helping businesses of all industries and sizes smoothly transition to the cloud. Unlike hardware-based firewall and traditional VPN technology, Perimeter 81’s cloud-based and user-centric Secure Network as a Service utilizes the Zero Trust approach and SASE model framework to offer greater network visibility, seamless onboarding, and automatic integration with all the major cloud providers. Named a Gartner Cool Vendor, Perimeter 81 is considered by industry leaders to be winning the “SASE space race". Network security doesn’t have to be complicated – join Perimeter 81 on a mission to radically simplify the cybersecurity experience!
    Starting Price: $8 per user per month
  • 2
    Zscaler

    Zscaler

    Zscaler

    Zscaler, creator of the Zero Trust Exchange platform, uses the largest security cloud on the planet to make doing business and navigating change a simpler, faster, and more productive experience. The Zscaler Zero Trust Exchange enables fast, secure connections and allows your employees to work from anywhere using the internet as the corporate network. Based on the zero trust principle of least-privileged access, it provides comprehensive security using context-based identity and policy enforcement. The Zero Trust Exchange operates across 150 data centers worldwide, ensuring that the service is close to your users, co-located with the cloud providers and applications they are accessing, such as Microsoft 365 and AWS. It guarantees the shortest path between your users and their destinations, providing comprehensive security and an amazing user experience. Use our free service, Internet Threat Exposure Analysis. It’s fast, safe, and confidential.
  • 3
    Cato SASE

    Cato SASE

    Cato Networks

    Cato enables customers to gradually transform their WAN for the digital business. Cato SASE Cloud is a global converged cloud-native service that securely and optimally connects all branches, datacenters, people, and clouds. Cato can be gradually deployed to replace or augment legacy network services and security point solutions. Secure Access Service Edge (SASE) is a new enterprise networking category introduced by Gartner. SASE converges SD-WAN and network security point solutions (FWaaS, CASB, SWG, and ZTNA) into a unified, cloud-native service. In the past, network access was implemented with point solutions, managed as silos that were complex and costly. This hurt IT agility. With SASE, enterprises can reduce the time to develop new products, deliver them to the market, and respond to changes in business conditions or the competitive landscape.
    Starting Price: $1.00/year
  • 4
    Twingate

    Twingate

    Twingate

    The way we work has changed. People now work from anywhere, not just from an office. Applications are based in the cloud, not just on-premise. And the company network perimeter is now spread across the internet. Using a traditional, network-centric VPN for remote access is not only outdated and difficult to maintain, but exposes businesses to security breaches. VPN infrastructure is costly and time-consuming to procure, deploy, and maintain. Inability to secure access at the app level means hacks can expose whole networks. Twingate enables organizations to rapidly implement a modern Zero Trust network that is more secure and maintainable than VPNs. Delivered as a cloud-based service, Twingate empowers IT teams to easily configure a software-defined perimeter without changing infrastructure, and centrally manage user access to internal apps, whether they are on-prem or in the cloud.
    Starting Price: $10 per user per month
  • 5
    SafeGuard Cyber

    SafeGuard Cyber

    SafeGuard Cyber

    SafeGuard Cyber is a SaaS security platform providing cloud-native defense for critical cloud communication applications that organizations are increasingly reliant upon, such as Microsoft Teams, Slack, Zoom, Salesforce, and social media. A blind-spot is growing for security operations as adoption of these tools increases, creating more risk and vulnerability to ransomware, business compromise, and confidential information leakage. Email security lacks the ability to both create visibility outside of email, and primarily defend against malicious files and links. CASB/SASE solutions are difficult to deploy and manage, and the control function is typically left “open” to prevent false positives. Manage day-to-day business communication risk extending beyond email and into enterprise collaboration applications. According to the Verizon DBIR, 92% of social engineering attacks achieve infiltration.
  • Previous
  • You're on page 1
  • Next