# Banyan Security Software Pricing, Alternatives & More 2026 | Capterra

> With the help of Capterra, learn about Banyan Security Software - reviews, pricing plans, popular comparisons to other Network Access Control (NAC)  products and more.

Source: https://www.capterra.com/p/266750/Banyan-Security/alternatives

---

# 

 Banyan Security Software Review 2026: Features, Reviews, Integrations, Pros & Cons

Last updated on March 13, 2026

Provider data verified by our Software Research team, and reviews moderated by our Reviews Verification team.

[Description](#description)[Use cases](#use-cases)[Alternatives](#alternatives)[Features](#features)[Pricing](#pricing)[Integrations](#integrations)[Support](#support)[Reviews](#reviews)

Banyan Security

## What is Banyan Security?

Banyan Security’s Zero Trust Newtork Access (ZTNA) solution enables fast, easy provisioning of user-to-application segmentation, giving users passwordless, one-click access to corporate applications, resources, and infrastructure from anywhere – without needing network-centric legacy VPNs. Risk and security are continuously evaluated and enforced in real-time across hybrid, multi-cloud, and SaaS environments.

## What is Banyan Security used for?

[Network Access Control (NAC)](https://www.capterra.com/network-access-control-software/) [Endpoint Protection](https://www.capterra.com/endpoint-protection-software/)[Network Security](https://www.capterra.com/network-security-software/)

Overall rating

Based on 4 user reviews

Reviews sentiment

Positive

\-

Neutral

\-

Negative

\-

Contact vendor  
for pricing

Free trial  
not available

Capterra Shortlist charts the highest-rated and most popular products...

Our "Best of" badge program showcases products with the highest ratings...

Our "Best of" badge program showcases products with the highest ratings...

Do you work for Banyan Security?[Manage this product listing](https://digitalmarkets.gartner.com/get-listed/claim-bx?url=http://banyansecurity.io&name=Banyan Security)

## Compare with a popular alternative

Capterra selects software alternatives based on relevant features, verified user reviews and user interactions. Placement may be influenced by client status.

### Banyan Security

4.3 (4)

VS.

[4.6 (33)](https://www.capterra.com/p/203059/NordLayer/reviews/)

Starting Price

Contact vendor

Starting Price

$10

Per User, Per Month

Free Trial

Free Version

Pricing Options

Free Trial

Free Version

Ease Of Use

4.5 (4)

Ease Of Use

4.7 (80)

Value For Money

4.3 (3)

Value For Money

4.3 (53)

Customer Service

5.0 (3)

Customer Service

4.2 (59)

## Banyan Security alternatives

[4.5 (276)](https://www.capterra.com/p/146034/WebTitan/reviews/)

Starting price

$0.40

Per User, Per Month

[4.6 (264)](https://www.capterra.com/p/175092/JumpCloud-DaaS/reviews/)

Starting price

$3.00

Per User, Per Month

[Perimeter 81](https://www.capterra.com/p/166731/Perimeter-81/)

[4.8 (80)](https://www.capterra.com/p/166731/Perimeter-81/reviews/)

Starting price

$8.00

Per User, Per Month

[Learn More](https://www.capterra.com/p/166731/Perimeter-81/)

Highest Rated

[GoodAccess](https://www.capterra.com/p/208155/GoodAccess/)

[4.9 (103)](https://www.capterra.com/p/208155/GoodAccess/reviews/)

Starting price

$7.00

Per User, Per Month

[Learn More](https://www.capterra.com/p/208155/GoodAccess/)

## Features

Features with the highest number of reviews are displayed first. Those that have no reviews appear next, sorted alphabetically.

Remote Access/Control

4.7 (3)

33.33% of 3 reviewers that rated this feature as important or highly important

Access work applications remotely, for when working away from the office and/or traveling

Access Controls/Permissions

5.0 (2)

0.00% of 2 reviewers that rated this feature as important or highly important

Define levels of authorization for access to specific files or systems

Device Management

4.0 (2)

50.00% of 2 reviewers that rated this feature as important or highly important

Maintenance and upkeep of physical and/or virtual devices

Event Logs

4.0 (1)

100.00% of 1 reviewers that rated this feature as important or highly important

A chronological record of actions or occurrences within a network, software, or process

Intrusion Detection System

5.0 (1)

0.00% of 1 reviewers that rated this feature as important or highly important

Identify and alert about security breaches by third parties

Monitoring

4.0 (1)

100.00% of 1 reviewers that rated this feature as important or highly important

Observe and track the demand, usage, progress or quality of a system, product, or user

Banyan Security 69 features

Define levels of authorization for access to specific files or systems

Dashboard to view the status of ongoing processes, identify current incidents and track past activities

Track and report on everything that happens within the system or network

Track and document all activities across devices, networks, and other systems

Software program that continuously adjusts its behavior based on observed data

System alerts about the need to escalate an issue or request

Alerts or notifications of various types such as pop-up messages, sounds, banners, or badges

Techniques to prevent and filter unwanted or unsolicited email spam from reaching a user's inbox

Application programming interface that allows for integration with other systems/databases

Identify and respond to security threats to developed applications

Monitor the usage of assets, such as equipment, tools, software, etc., throughout their lifecycle

A record of all activities within the system, including user access, changes made, etc.

Verify the identity of users/devices to enable secure access

Track visitors'/audience's responses across web pages and other optimized content

Track and analyse user behavior within a system or network

Identify and respond to security threats to cloud applications

A set of guidelines regarding cloud security management

Track and manage adherence to policies for any service, product, process, or supplier

Conduct tracking and assessment of application and device behavior without breaks or interruptions

Alter the layout and content of reports

Assembly of graphs and charts for visualizing and tracking statistics/metrics

Protect sensitive data for digital privacy

Graphical representation of data

Maintenance and upkeep of physical and/or virtual devices

Prevention of DNS leaks that allows ISPs to track internet movements

Convert data into a code for security

Track status, assign actions, and control access to systems for devices within the organization

Protect users working remotely and provide secure environments for personal devices to access company programs

A chronological record of actions or occurrences within a network, software, or process

Compliant with HIPAA, which sets standards for sensitive patient data protection

Manage and track all disruptions and incidents

Identify and alert about security breaches by third parties

Immediately stop the process from executing

Access software remotely via mobile devices

Observe and track the demand, usage, progress or quality of a system, product, or user

Support multiple types of devices

Manage and support multiple languages

Authenticate user identities through different methods such as ID cards, PINs, passwords, RFID, and biometrics

Prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources

Generate and store passwords in an encrypted database and assist in retrieving lost or forgotten passwords

Store, process, and transmit cardholder data in compliance with the Payment Card Industry Data Security Standard (PCI DSS)

Create new policies or alter existing policies

Create, manage, and track policies and procedures within an organization

Arrange tasks based on the level of priority or urgency

Analyze and gain insights into data in real-time

Receive data and information in real time

Active monitoring of systems, applications, or networks

Notifications that are delivered to users as soon as an event occurs

Active reporting of data and metrics

Access work applications remotely, for when working away from the office and/or traveling

Remotely monitor and manage client networks, endpoints, systems, and devices via locally installed applications

Collection, analysis, and representation of numerical data and generation of reports to understand various patterns

View and track pertinent metrics to find patterns and gain insights from data

Initiate collection and analysis of known risks

Search and filter data across systems to locate required information by entering keywords or certain criteria

At least a username and password is required to access the system

Systematic evaluation of the security of a company's overall security system and situation

Continuously scan servers on a designated network to monitor health and search for any irregularities or failures

Allow users to access multiple services after entering their login credentials once

Security protocol that ensures secure, encrypted communication over the internet, safeguarding sensitive data from unauthorized access

Addition of necessary external data, applications, tools, or features

Set up connections to third-party platforms to improve business processes

Extra layer of security that requires not only a password and username but also something specific to that user

Manage user accounts, profiles, roles, permissions, and other details across applications, devices or networks

Interact with data visualization elements, such as charts and graphs, to drill down into data

Extend virtual private network over public networks to enable protected information exchange

Safeguards to protect network vulnerabilities

Discover patch statuses and vulnerabilities

Control system access and/or deliverability for applications and email addresses

Features

4.3 (4)

4.3

Based on 4 reviews

## Pricing

Value for money

4.3 (3)

### Starting price

Contact vendor  
for pricing

Free trial  
available

Value for money

4.3 (3)

4.3

Based on 3 reviews

## Integrations

[

Google Cloud Storage](https://www.capterra.com/p/253631/Google-Cloud-Storage/)[

Microsoft Azure](https://www.capterra.com/p/16365/Azure/)[

Okta](https://www.capterra.com/p/119653/Okta/)[

Jamf Pro](https://www.capterra.com/p/164492/Jamf-Pro/)[

Amazon EC2](https://www.capterra.com/p/219781/EC2/)[

Cisco Meraki](https://www.capterra.com/p/176649/Meraki-Systems-Manager/)[

Citrix Workspace](https://www.capterra.com/p/220624/Citrix-Workspace/)[

SentinelOne](https://www.capterra.com/p/152564/Endpoint-Protection-Platform/)

## Support, customer service and training options

Customer Service

5.0 (3)

Support

-   Email/Help Desk
-   FAQs/Forum
-   Knowledge Base
-   Phone Support
-   24/7 (Live rep)
-   Chat

Training

-   In Person
-   Live Online
-   Webinars
-   Documentation
-   Videos

Deployment

-   Web
-   Android
-   iPhone/iPad

Typical users

-   Freelancers
-   Small businesses
-   Mid size businesses
-   Enterprises

Customer Service

5.0 (3)

5.0

Based on 3 reviews

## User reviews

Overall rating

4.3

Based on 4 reviews

Filter by rating

5(1)

4(3)

3(0)

2(0)

1(0)

Mentioned topic

Sorted by most recent

VT

Viktor T.

Software engineer in test

Information Technology and Services

### "Mandatory app for corporate employees"

4.0

Overall Rating

4.0

4.0

Ease of Use

4.0

4.0

Features

4.0

4.0

Customer Service

0.0

0.0

Likelihood to Recommend

7/10

March 12, 2023

The right application to control users and enforce the use of corporate applications.

Pros

Simple authentication via SSO. Ease to use - Banyan works in the background and alerts me if I don't have any security features running or updated on my computer.

Cons

But for me - the user, it is annoying that the session expires every 24 hours. Sometimes Banyan just ties my hands and do some mistakes/bugs when loading (business) web pages.

Review source

Non-incentivized review: any software user can leave a review for any product listed on our site. All submitted reviews are subject to our verification process prior to publication.

Response from Vendor

March 20, 2023

Hi Viktor, Banyan Security allows administrators the ability to control the session expiry duration. Some organizations require an end-user to authenticate every 24 hours. Some organizations may opt for a change every 5 business days. We provide administrators the flexibility to choose that duration based on their organization's requirements. I have included a link to change that setting for your Admin. https://docs.banyansecurity.io/docs/feature-guides/administer-security-policies/manage-tokens-certs/#authentication-tokens-and-certificates

JD

Joe D.

Director, TechOps

Computer & Network Security

### "Banyan ZTNA "

4.0

Overall Rating

4.0

4.0

Ease of Use

5.0

5.0

Features

5.0

5.0

Customer Service

5.0

5.0

Likelihood to Recommend

9/10

November 7, 2022

Overall my experience has been a good one. The Banyan team was always there to help when needed and helped to explain things and run through the setup until we were good to go.

Pros

Easy to use, and allows for very granular access to systems and services.

Cons

The administration side needs a bit of polish for setup and configuration. Not as intuitive and it can be.

Review source

Incentivized review: software users are invited to submit an honest review and offered a nominal incentive for their time and effort. All incentivized reviews are subject to our verification process prior to publication.

CE

Cesar E.

Staff Security Engineer

Financial Services

### "Banyan Security the next step to ZeroTrust"

5.0

Overall Rating

5.0

5.0

Ease of Use

5.0

5.0

Features

4.0

4.0

Customer Service

5.0

5.0

Likelihood to Recommend

10/10

October 26, 2022

Banyan Security has been great to work with and deal with from proof-of-concept to implementation in production with exceptional support.

Pros

Ease of Implementation and use for our end-users

Cons

Some features like reporting are limited

Switched from

[Panorama](https://www.capterra.com/p/192172/Panorama/)

Support

Alternatives considered

[Zscaler](https://www.capterra.com/p/175516/Zscaler-Internet-Access/)

Reasons for choosing Banyan Security

Expert in the field

Review source

Incentivized review: software users are invited to submit an honest review and offered a nominal incentive for their time and effort. All incentivized reviews are subject to our verification process prior to publication.

UB

Uttej B.

Senior Security Engineer

Financial Services

### "Secure Zero Trust Implementation!"

4.0

Overall Rating

4.0

4.0

Ease of Use

4.0

4.0

Features

4.0

4.0

Customer Service

5.0

5.0

Likelihood to Recommend

7/10

October 13, 2022

Overall, it is a good experience and I have seen the product getting matured over the time

Pros

It is good to implement zero trust architecture for secure access within the cloud infrastructure and Banyan does a good job in covering all the components.

Cons

There are times when we have customized engineering use cases and it needs little bit of troubleshooting

Alternatives considered

[OpenVPN Access Server](https://www.capterra.com/p/159435/access-server/)

Review source

Incentivized review: software users are invited to submit an honest review and offered a nominal incentive for their time and effort. All incentivized reviews are subject to our verification process prior to publication.

Independent research methodology

Capterra's researchers use a mix of verified reviews, independent research and objective methodologies to bring you selection and ranking information you can trust. While we may earn a referral fee when you visit a provider through our links or speak to an advisor, this has no influence on our research or methodology.

[Learn more](https://www.capterra.com/resources/proprietary-data-research/)

How Capterra verifies reviews

Capterra carefully verified over 2.5 million+ reviews to bring you authentic software experiences from real users. Our human moderators verify that reviewers are real people and that reviews are authentic. They use leading tech to analyze text quality and to detect plagiarism and generative AI.

[Learn more](https://www.capterra.com/resources/how-we-verify-reviews/)

How Capterra ensures transparency

Capterra lists all providers across its website—not just those that pay us—so that users can make informed purchase decisions. Capterra is free for users. Software providers pay us for sponsored profiles to receive web traffic and sales opportunities. Sponsored profiles include a link-out icon that takes users to the provider's website.

[Learn more](https://www.capterra.com/resources/how-we-ensure-transparency/)