Syxsense’s New Zero Trust Module for Zero Trust Security Product of the Year

Additional Info

Company size (employees)100 to 499
Headquarters RegionNorth America
Type of solutionSoftware


In 2022, Syxsense launched Syxsense Zero Trust, a module within Syxsense Enterprise enabling endpoint compliance with Zero Trust policies, the first solution of its kind. ZT initiatives often require focus on endpoint protection, but traditional authentication solutions don’t have the ability to evaluate device health, ensure granular policy compliance & automate risk remediation.

Designed to serve as an organization’s “Trust Evaluation Engine” for endpoints, it provides visibility and control over network access policies and enables security teams to build access policies and remediation workflows to ensure ZT compliance. As organizations build a ZT strategy, many face implementation challenges, such as ensuring that endpoints accessing the network are trustworthy and conform to policies. Most solutions merely accept or deny access without any understanding of the current Device Security Posture.

Today’s customers want the ability to evaluate endpoint access for ZT based on policies and if not compliant, be able to apply fixes or remediate in real time to enable proper access. With Syxsense Zero Trust, organizations have total control of endpoints and automating the end-to-end process.

The Syxsense Zero Trust module offers a suite of specific features, including:
•Visibility into all endpoints’ configuration and state of compliance using a single agent.
•Build access policies based on a large array of configuration and security parameters, setting policies for each corporate asset.
•Automate the immediate enforcement of access policy requirements and remediation of non-compliant endpoints using the Syxsense Cortex™ remediation engine.
•Verify trusted user authentication requests via the Syxsense console or optionally, connect with external multi-factor authentication (MFA) tools to provide devices a “go, no-go” security status. For example, if a customer uses Duo, Okta, or other MFA tools, connect those tools with the Syxsense API and it will report compliance on each endpoint looking to access corporate assets.

How we are different

The power of Syxsense Zero Trust differentiates itself in three key areas.

• First, the granularity of parameters IT can use to report and act on device compliance. For example, is a laptop accessing your NetSuite server after hours and with an unfamiliar IP address? If so, Syxsense Zero Trust can block it.
• Second, the power to enforce compliance with Zero Trust policies before granting access on an asset-by-asset basis.
• And third, the automated remediation of non-compliant endpoints, which could include patching the system, enabling an antivirus tool and making sure it is up to date on patterns, emailing IT about unauthorized access, and much, much more.