Zero Trust Network Access (ZTNA) Software

Zero Trust Network Access (ZTNA) Software Overview

What is Zero Trust Network Access (ZTNA) Software?


Zero Trust Network Access (ZTNA) solutions, also referred to as a software-defined perimeter or SDP, are used to provide secure access to private applications without allowing users access to enterprise networks. They are often described as a replacement for traditional technologies like VPN, and introduce various methods of authentication to remain identity and context aware of users accessing enterprise applications. ZTNA solutions are available self-hosted, from the cloud and self-managed, or as fully managed services.

Zero Trust Network Access (ZTNA) Products

(1-20 of 20) Sorted by Most Reviews

Pulse SDP
1 ratings
1 reviews
Pulse SDP is presented by the vendor as a Zero Trust secure access architecture for a modern application infrastructure. It enables direct, secure access to individual applications and requires users and their devices to be verified before access is allowed. They state the result is an enhanced sec…
AppGate SDP
1 ratings
1 reviews
AppGate SDP (software-defined perimeter) from Cyxtera Technologies headquartered in Addison is a zero trust network security product.
Illumio Adaptive Security Platform
The Illumio Adaptive Security Platform (ASP), from Illumio in Sunnyvale, is designed to help users prevent the spread of breaches and achieve regulatory compliance through real-time application dependency mapping and micro-segmentation that works in any data center and cloud environment (Azure, AWS,…
Unisys Stealth
Unisys offers the Stealth product cybersecurity and software-defined microsegmentation suite providing zero trust network access, designed to protect the enterprise network, cloud services, and data via cloaking and encryption, provide network visibility, and also provide detection and correlation f…
Zscaler Private Access
Zscaler Private Access (ZPA) is a ZTNA as a service, that takes a user- and application-centric approach to private application access. A cloud-delivered service, ZPA is built to ensure that only authorized users have access to specific private applications by creating secure segments of one between…
Safe-T Data
Safe-T in Herzliya is a provider of Zero Trust Access solutions which mitigate attacks on enterprises’ business-critical services and sensitive data. Safe-T’s cloud and on-premises solutions are designed to ensure that an organization’s access use cases, whether into the organization or from the org…
Certes Networks
Certes Networks in Pittsburgh protects data in transit, with software-defined security solutions deployed for both large and small commercial and government networks.
Meta Networks, from Proofpoint
Meta Networks, now from Proofpoint (acquired 2019) is a Software-Defined Perimeter delivered as a service, designed to provide a zero-trust alternative to VPN for secure remote access to any application, anywhere.
Cloudflare Access
Cloudflare Access is designed to replace corporate VPN clients by putting Cloudflare’s global edge network in front of internal applications.
Banyan Security
Banyan Security in San Francisco provides a Zero Trust Network Access platform, which provides remote access to corporate resources hosted in hybrid and multi-cloud environments.
Netskope Private Access
Netskope Private Access is a zero trust access solution, that allows users to provide remote access to applications running in the public cloud and private data center environments, and avoid the need for remote users to use a VPN through the corporate network to gain access to private applications.
Symantec Secure Access Cloud (formerly Luminate Security)
Symantec Secure Access Cloud (formerly Luminate Security, which was acquired by Symantec in February 2019) is a SaaS solution that enables more secure and granular access management to any corporate resource hosted on-premises or in the cloud. It uses Zero Trust Access principles in delivering point…
Wandera
Wandera in San Francisco provides a mobile security solution for enterprises with their multi-level solution to protect users, endpoints, and corporate applications from evolving mobile threats.
Perimeter 81
Perimeter 81 is a Zero Trust Network as a Service from the company of the same name in Tel Aviv, designed to simplify secure network, cloud and application access for the modern and distributed workforce.
Edgewise Networks
Founded in 2016, Edgewise Networks offers Zero Trust Auto-Segmentation technology designed to provide one-click microsegmentation with a security outcome that’s provable and “zero touch.” The tool reveals attack paths in dynamic cloud, container, and on-premises data center environments, protects bu…
Trustgrid Zero Trust Network
Zero Trust Network is an application and identity-centric connectivity solution designed for cloud-to-on-premise and multi-cloud networking. The software-defined networking solution focuses on providing connectivity between heterogeneous environments (cloud to data center, application to customer da…
Trustgrid Software-Defined Perimeter
Trustgrid Software-Defined Perimeter (SDP) combines advanced networking with cloud-native management tools to provide remote users Zero Trust network access between users and applications. The vendor states that by blending the best of networking, security and automation features, with the ability t…
Centrify Zero Trust Privilege Services
6 ratings
0 reviews
Centrify aims to redefine Privileged Access Management by delivering cloud-ready Zero Trust Privilege to secure the modern enterprise. Centrify Zero Trust Privilege promises to help customers grant least privilege access based on verifying who is requesting access, the context of the request, and th…
Odo
Odo, from Odo Security headquartered in Tel Aviv, is a centralized platform and ZTNA solution designed to help IT and DevOps teams manage and scale remote access across multi-cloud and on-premises infrastructures, without the need for VPNs.
Google BeyondCorp
BeyondCorp is Google's implementation of the zero trust security model. To shift access controls from the network perimeter to individual users and devices, BeyondCorp allows employees, contractors, and other users to work securely from virtually any location without the need for a traditional VPN.