Zentera Systems’ Zentera Secure Access (ZSA)
Promote this Nomination
Zentera Systems' Zentera Secure Access (ZSA)
|Company (that provides the nominated product / solution / service)||Zentera Systems, Inc.|
|Company size (employees)||10 to 49|
|Type of solution||Software|
In 3 bullets, summarize why this product or service is different from the competition and deserves recognition:
- Centralized policy management for end-to-end access control and visibility, with different levels of access based on user roles and responsibilities.
Zentera Secure Access (ZSA) is a privileged access platform that uses the principles of Zero Trust and SASE to dramatically simplify the process of configuring and managing privileged access. By identifying users, endpoints, and applications, administrators are able to create directed access to specific applications running on specific servers for users, based on roles and responsibilities, without providing them VPN access to the entire corporate network.
Current solutions are built on a patchwork of technologies: mobile device management to establish trust, VPNs to encrypt traffic, and UTM firewalls to filter out any unauthorized traffic. Deploying and managing user access requires wrangling a tangled web of policies, operated by separate teams. This approach requires constant tuning and upkeep to stay in step with increasingly mobile users and applications, and fails to cope with ever-increasing cybersecurity threats.
ZSA provides granular access for privileged users, who are identified using the customer’s existing identity provider. Without granting network level access, creating a VPN connection or opening a firewall, ZSA enables remote access, with built-in support for remote terminals, including VNC and RDP, as well as ssh, git, and any standard TCP/IP application.
Enabling remote access without opening the firewall significantly improves security. For example, ZSA can enable users to connect using Microsoft RDP without opening port 3389 to inbound traffic at the firewall, rendering that port inaccessible to unauthenticated users or client software.
End-to-end access control policies can be configured, managed and enforced centrally. Reducing the number of control knobs in the infrastructure significantly streamlines setup, reduces error-prone change requests, and minimizes troubleshooting effort.
ZSA also provides access logs, enabling auditing of user access to corporate resources for compliance initiatives or to inform digital forensics.
Customers have used ZSA to provide secure remote access for remote workers, 3rd parties, and securing access to OT environments.