UTunnel VPN vs Banyan Security
GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links.
Learn more
Overview
UTunnel offers easy-to-deploy Cloud VPN, Zero Trust Access, and Mesh Networking solutions. Safeguard your business with secure remote access and encrypted site-to-site connectivity between distributed business networks. Deployment in minutes, Robust Support, and Affordable Pricing Plans!
UTunnel offers easy-to-deploy Cloud VPN, Zero Trust Access, and Mesh Networking solutions. Safeguard your business with secure remote access and...
Deployment
- Cloud-based
- On-premise
Support Options
- Email/Help Desk
- FAQs/Forum
- Knowledge Base
- Phone Support
- 24/7 (Live rep)
- Chat
Banyan Security is zero-trust remote access that enables fast, easy provisioning of user-to-application segmentation, giving users and developers passwordless, one-click access to complex infrastructure and applications from anywhere, without relying on network-centric legacy VPNs.
Banyan Security is zero-trust remote access that enables fast, easy provisioning of user-to-application segmentation, giving users and developers...
Deployment
- Cloud-based
- On-premise
Support Options
- Email/Help Desk
- FAQs/Forum
- Knowledge Base
- Phone Support
- 24/7 (Live rep)
- Chat
Images
Pricing
Starting from
US$6.00/month
- Free Version
- Free Trial
- Subscription
Starting from
Not provided by vendor
- Free Version
- Free Trial
- Subscription
Reviews
Ease of Use
5.0/ 5Features
5.0/ 5Customer Service
5.0/ 5Value for Money
5.0/ 5Ease of Use
4.5/ 5Features
4.3/ 5Customer Service
5/ 5Value for Money
4.3/ 5Features
Total features 59
- AI/Machine Learning
- API
- Access Controls/Permissions
- Activity Dashboard
- Activity Monitoring
- Activity Tracking
- Ad Blocker
- Alerts/Escalation
- Alerts/Notifications
- Anonymous Browsing
- Anti Spam
- Application Encryption
- Application Security
- Asset Tracking
- Audit Trail
- Authentication
- Behavior Tracking
- Behavioral Analytics
- Cloud Application Security
- Cloud Encryption
- Cloud Security Policy Management
- Compliance Management
- Continuous Monitoring
- Customizable Reports
- DDoS Protection Software
- DNS Leak Protection
- Dashboard
- Data Security
- Data Visualization
- Device Management
- Encryption
- Endpoint Management
- Endpoint Protection Software
- Event Logs
- Financial Data Protection
- Firewalls
- Geo-spoofing
- HIPAA Compliant
- IP Masking
- Incident Management
- Intrusion Detection System
- Kill Switch
- Mobile Access
- Mobile Alerts
- Monitoring
- Multi-Device Support
- Multi-Language
- Multi-Protocol
- Multiple Authentication Methods
- Network Security Software
- No-log VPN
- PCI Compliance
- Password Management
- Performance Testing Tools
- Policy Creation
- Policy Management
- Prioritization
- Profiling
- Real-Time Analytics
- Real-Time Data
- Real-Time Monitoring
- Real-Time Notifications
- Real-Time Reporting
- Remote Access/Control
- Remote Monitoring & Management
- Reporting & Statistics
- Reporting/Analytics
- Risk Assessment
- Rules-Based Workflow
- SSL Security
- Search/Filter
- Secure Browsing
- Secure Login
- Security Auditing
- Server Monitoring
- Single Sign On
- Summary Reports
- Third-Party Integration
- Third-Party Integrations
- Threat Intelligence
- Two-Factor Authentication
- User Management
- VPN Software
- VPN Tunneling
- Visual Analytics
- Vulnerability Protection
- Vulnerability Scanning
- Web Threat Management
- Web Traffic Reporting
- Whitelisting/Blacklisting
Total features 72
- AI/Machine Learning
- API
- Access Controls/Permissions
- Activity Dashboard
- Activity Monitoring
- Activity Tracking
- Ad Blocker
- Alerts/Escalation
- Alerts/Notifications
- Anonymous Browsing
- Anti Spam
- Application Encryption
- Application Security
- Asset Tracking
- Audit Trail
- Authentication
- Behavior Tracking
- Behavioral Analytics
- Cloud Application Security
- Cloud Encryption
- Cloud Security Policy Management
- Compliance Management
- Continuous Monitoring
- Customizable Reports
- DDoS Protection Software
- DNS Leak Protection
- Dashboard
- Data Security
- Data Visualization
- Device Management
- Encryption
- Endpoint Management
- Endpoint Protection Software
- Event Logs
- Financial Data Protection
- Firewalls
- Geo-spoofing
- HIPAA Compliant
- IP Masking
- Incident Management
- Intrusion Detection System
- Kill Switch
- Mobile Access
- Mobile Alerts
- Monitoring
- Multi-Device Support
- Multi-Language
- Multi-Protocol
- Multiple Authentication Methods
- Network Security Software
- No-log VPN
- PCI Compliance
- Password Management
- Performance Testing Tools
- Policy Creation
- Policy Management
- Prioritization
- Profiling
- Real-Time Analytics
- Real-Time Data
- Real-Time Monitoring
- Real-Time Notifications
- Real-Time Reporting
- Remote Access/Control
- Remote Monitoring & Management
- Reporting & Statistics
- Reporting/Analytics
- Risk Assessment
- Rules-Based Workflow
- SSL Security
- Search/Filter
- Secure Browsing
- Secure Login
- Security Auditing
- Server Monitoring
- Single Sign On
- Summary Reports
- Third-Party Integration
- Third-Party Integrations
- Threat Intelligence
- Two-Factor Authentication
- User Management
- VPN Software
- VPN Tunneling
- Visual Analytics
- Vulnerability Protection
- Vulnerability Scanning
- Web Threat Management
- Web Traffic Reporting
- Whitelisting/Blacklisting
Integrations
- AWS CloudFormation
- AWS Config
- AWS Lambda
- Amazon EC2
- Amazon Redshift
- Azure Active Directory
- Carbon Black App Control
- Carbon Black EDR
- Carbon Black Endpoint
- Cisco Meraki
- Citrix ADC
- Citrix Endpoint Management
- Citrix Hypervisor
- Citrix Workspace
- DigitalOcean
- Exoscale
- Google Cloud Identity
- Google Cloud SQL
- Google Cloud Storage
- Jamf Connect
- Jamf Now
- Jamf Pro
- Jamf Protect
- Jamf School
- Kamatera
- Linode
- Microsoft 365 License Optimization
- Microsoft Azure
- Okta
- OneLogin
- Ping Identity
- SentinelOne
- UpCloud
- Vultr
- AWS CloudFormation
- AWS Config
- AWS Lambda
- Amazon EC2
- Amazon Redshift
- Azure Active Directory
- Carbon Black App Control
- Carbon Black EDR
- Carbon Black Endpoint
- Cisco Meraki
- Citrix ADC
- Citrix Endpoint Management
- Citrix Hypervisor
- Citrix Workspace
- DigitalOcean
- Exoscale
- Google Cloud Identity
- Google Cloud SQL
- Google Cloud Storage
- Jamf Connect
- Jamf Now
- Jamf Pro
- Jamf Protect
- Jamf School
- Kamatera
- Linode
- Microsoft 365 License Optimization
- Microsoft Azure
- Okta
- OneLogin
- Ping Identity
- SentinelOne
- UpCloud
- Vultr