Overview
What is ZeroTrust?
ZeroTrust, developed by Cosmian, is a security model designed to protect data and resources within an organization's network. According to the vendor, ZeroTrust assumes that no user or device should be trusted by default, regardless of their location or network connection. The solution is aimed at businesses...
Leaving a review helps other professionals like you evaluate Data Loss Prevention Software
Be the first one in your network to review ZeroTrust, and make your voice heard!
Get StartedPricing
Entry-level set up fee?
- No setup fee
Offerings
- Free Trial
- Free/Freemium Version
- Premium Consulting/Integration Services
Would you like us to let the vendor know that you want pricing?
Alternatives Pricing
Product Details
- About
- Tech Details
What is ZeroTrust?
ZeroTrust, developed by Cosmian, is a security model designed to protect data and resources within an organization's network. According to the vendor, ZeroTrust assumes that no user or device should be trusted by default, regardless of their location or network connection. The solution is aimed at businesses of all sizes and is utilized by various professions and industries, including IT professionals, cybersecurity analysts, network administrators, financial institutions, healthcare organizations, banking and finance, human resources, fintech, SaaS providers, and government agencies.
Key Features
Zero Trust Security Model: According to the vendor, ZeroTrust implements a security model that continuously verifies and validates user and device identities, assuming no user or device should be trusted by default.
Rigorous Authentication and Access Control: ZeroTrust enforces strict authentication and access control measures, requiring thorough verification of user requests and authentication to minimize the risk of unauthorized access and potential security breaches.
Granular Access Control: ZeroTrust allows organizations to regain control over their IT network and cloud-based applications by implementing granular access control, ensuring that users need both software application privileges and attributes defined in the centralized key management system to access data.
Encrypted Search: According to the vendor, ZeroTrust offers encrypted search capabilities, allowing users to perform secure searches on encrypted data while maintaining the confidentiality of the search queries and responses.
Quantum-Resistant Encryption: ZeroTrust employs quantum-resistant encryption to enhance data integrity and user trust, even in the face of advancements in quantum computing, according to the vendor.
High-Performance and Scalability: ZeroTrust is designed to handle rigorous workloads with minimal cipher expansion and latency, providing enterprise-grade performance and scalability to support demanding production environments.
Open-Source Technology: ZeroTrust embraces open-source technology, allowing users to scrutinize and verify every aspect of the encryption tools, fostering continuous improvement through community contributions, according to the vendor.
Key Leasing and Rotation: ZeroTrust offers key leasing and proactive rotation features, enabling organizations to periodically rotate encryption keys to reduce the risk of key compromise and ensure compliance with industry regulations, according to the vendor.
Developer-Friendly KMIP REST API: ZeroTrust provides a developer-oriented Key Management System (KMS) with a KMIP REST API, making it easy for developers to integrate and streamline key storage and access control in various IT scenarios and applications, according to the vendor.
State-of-the-Art Crypto-Agility: ZeroTrust supports the latest NIST and ANSI standards for encryption, allowing organizations to adapt to new cryptographic algorithms and maintain a high level of security, according to the vendor.
ZeroTrust Technical Details
Deployment Types | Software as a Service (SaaS), Cloud, or Web-Based |
---|---|
Operating Systems | Web-Based, Mac, Windows |