Zero Trust Application Access
Private access, evolved
The Fall of the Wall
The assumption that internal networks are safe and that everything inside the perimeter can be trusted no longer holds. Networks and locations are no longer practical to establish sufficient trust for access.
A New Perimeter Emerges
In place of the traditional network perimeter, Zentry establishes a new perimeter – drawn tightly around individual users, devices and resources – to provide consistent, controlled access for any user, anywhere.
Request sent to access gateway, device validation verifies fingerprint and forwards status to Access Gateway.
User Identity, MFA & SSO
User enters credentials, access gateway performs SSO and MFA based on successful user authentication.
Intelligent Policy Engine
Policy engine conducts fine-grained access control checks, authorization is granted or denied.
Secure Access Gateway
Access gateway sends requests to Web apps or Web services broker, secure connectivity is established.
Web Services Broker
Broker delegates requests and Webifies apps, desktops and infrastructure on-premise or in the cloud.
Supports internal and public-facing Web applications, in addition to legacy enterprise applications. Webify desktops (RDP and VNC), SSH and Telnet, as well as legacy services that require specific client software. Web services emulation enables clientless HTML5 access over TLS from any modern browser.
Any Cloud or Data Center
Enable clientless, identity-aware, policy-based secure access to applications and resources located on-premise or in the cloud, and eliminate excessive trust placed on networks and locations by traditional security models. Access gateway supports all popular hypervisors and public cloud platforms.
OS & Browser Agnostic
Traditional VPN clients often require troubleshooting for specific OS and browser versions, imposing a heavy burden on both users and IT admins. In contrast, Zentry provides simplified, OS-agnostic clientless access through any HTML5 Web browser. No client to install, manage or explain to end users.