Skip to main content
TrustRadius
ZeroTrust

ZeroTrust

Overview

What is ZeroTrust?

ZeroTrust, developed by Cosmian, is a security model designed to protect data and resources within an organization's network. According to the vendor, ZeroTrust assumes that no user or device should be trusted by default, regardless of their location or network connection. The solution is aimed at businesses...

Read more
Recent Reviews
TrustRadius

Leaving a review helps other professionals like you evaluate Data Loss Prevention Software

Be the first one in your network to review ZeroTrust, and make your voice heard!

Return to navigation

Pricing

View all pricing
N/A
Unavailable

Sorry, this product's description is unavailable

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

Alternatives Pricing

What is MX Layer?

MX Layer is an enterprise security company based in the United States, focusing on providing cloud-based solutions for email security, business continuity, data loss prevention and email archiving services. MX Layer aims to ensure that their comprehensive email security platform protects company's…

What is Rewind Backups?

Rewind from Third Blink Software in Ontario (dba Rewind) is a service that protects the data that is driving your ecommerce and small to midsize businesses, focusing on backing up data that lives in the cloud – specifically in apps like Shopify, BigCommerce, and QuickBooks Online.

Return to navigation

Product Details

What is ZeroTrust?

ZeroTrust, developed by Cosmian, is a security model designed to protect data and resources within an organization's network. According to the vendor, ZeroTrust assumes that no user or device should be trusted by default, regardless of their location or network connection. The solution is aimed at businesses of all sizes and is utilized by various professions and industries, including IT professionals, cybersecurity analysts, network administrators, financial institutions, healthcare organizations, banking and finance, human resources, fintech, SaaS providers, and government agencies.

Key Features

Zero Trust Security Model: According to the vendor, ZeroTrust implements a security model that continuously verifies and validates user and device identities, assuming no user or device should be trusted by default.

Rigorous Authentication and Access Control: ZeroTrust enforces strict authentication and access control measures, requiring thorough verification of user requests and authentication to minimize the risk of unauthorized access and potential security breaches.

Granular Access Control: ZeroTrust allows organizations to regain control over their IT network and cloud-based applications by implementing granular access control, ensuring that users need both software application privileges and attributes defined in the centralized key management system to access data.

Encrypted Search: According to the vendor, ZeroTrust offers encrypted search capabilities, allowing users to perform secure searches on encrypted data while maintaining the confidentiality of the search queries and responses.

Quantum-Resistant Encryption: ZeroTrust employs quantum-resistant encryption to enhance data integrity and user trust, even in the face of advancements in quantum computing, according to the vendor.

High-Performance and Scalability: ZeroTrust is designed to handle rigorous workloads with minimal cipher expansion and latency, providing enterprise-grade performance and scalability to support demanding production environments.

Open-Source Technology: ZeroTrust embraces open-source technology, allowing users to scrutinize and verify every aspect of the encryption tools, fostering continuous improvement through community contributions, according to the vendor.

Key Leasing and Rotation: ZeroTrust offers key leasing and proactive rotation features, enabling organizations to periodically rotate encryption keys to reduce the risk of key compromise and ensure compliance with industry regulations, according to the vendor.

Developer-Friendly KMIP REST API: ZeroTrust provides a developer-oriented Key Management System (KMS) with a KMIP REST API, making it easy for developers to integrate and streamline key storage and access control in various IT scenarios and applications, according to the vendor.

State-of-the-Art Crypto-Agility: ZeroTrust supports the latest NIST and ANSI standards for encryption, allowing organizations to adapt to new cryptographic algorithms and maintain a high level of security, according to the vendor.

ZeroTrust Technical Details

Deployment TypesSoftware as a Service (SaaS), Cloud, or Web-Based
Operating SystemsWeb-Based, Mac, Windows
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews

Sorry, no reviews are available for this product yet

Return to navigation