Zero Trust Network Access (ZTNA)Zero Trust Network Access (ZTNA) solutions, also referred to as a software-defined perimeter or SDP, are used to provide secure access to private applications without allowing users access to enterprise networks. They are often described as a replacement for traditional technologies like VPN, and introduce various methods of authentication to remain identity and context aware of users accessing enterprise applications. ZTNA solutions are available self-hosted, from the cloud and self-managed, or as fully managed services.Pulse SDP1https://media.trustradius.com/vendor-logos/Z6/4U/3ZDVW5LUSK7L-180x180.PNGAppGate SDP2https://media.trustradius.com/vendor-logos/6i/u4/MTWIP5CJG5M4-180x180.PNGIllumio Adaptive Security Platform3https://media.trustradius.com/vendor-logos/Tb/Gz/VK2LF6OS7S2A-180x180.JPEGUnisys Stealth4https://media.trustradius.com/vendor-logos/ih/uf/FI6S542IVPJK-180x180.JPEGZscaler Private Access5https://media.trustradius.com/vendor-logos/o7/2K/DTZQIS81DUEM-180x180.JPEGPerimeter 816https://media.trustradius.com/vendor-logos/0L/8l/XJ83KWV6V2LS-180x180.JPEGSafe-T Data7https://media.trustradius.com/vendor-logos/tH/4f/GF73JD3WX4Q1-180x180.JPEGCertes Networks8https://media.trustradius.com/vendor-logos/cV/Eo/G2EWTO2X2TKO-180x180.JPEGMeta Networks, from Proofpoint9https://media.trustradius.com/product-logos/mb/4E/RTJ8TRFOORDS-180x180.JPEGCloudflare Access10https://media.trustradius.com/vendor-logos/hX/QA/OZAMPT25VJ8G-180x180.PNGBanyan Security11https://media.trustradius.com/vendor-logos/PK/Zu/DCC7QOJMT301-180x180.PNGNetskope Private Access12https://media.trustradius.com/vendor-logos/O9/f2/SSTMAVTFP3XU-180x180.JPEGSymantec Secure Access Cloud (formerly Luminate Security)13https://media.trustradius.com/vendor-logos/cS/FP/URPNU3J7IUQ9-180x180.PNGWandera14https://media.trustradius.com/product-logos/Vu/gM/UNQ3T9FXQ62H-180x180.JPEGCentrify Zero Trust Privilege Services15https://media.trustradius.com/vendor-logos/e9/VT/ZK0AX2SCS5T5-180x180.JPEG

Zero Trust Network Access (ZTNA) Software

Zero Trust Network Access (ZTNA) Software Overview

What is Zero Trust Network Access (ZTNA) Software?


Zero Trust Network Access (ZTNA) solutions, also referred to as a software-defined perimeter or SDP, are used to provide secure access to private applications without allowing users access to enterprise networks. They are often described as a replacement for traditional technologies like VPN, and introduce various methods of authentication to remain identity and context aware of users accessing enterprise applications. ZTNA solutions are available self-hosted, from the cloud and self-managed, or as fully managed services.

Zero Trust Network Access (ZTNA) Products

Listings (1-15 of 15)

1 Ratings

Pulse SDP is presented by the vendor as a Zero Trust secure access architecture for a modern application infrastructure. It enables direct, secure access to individual applications and requires users and their devices to be verified before access is allowed. They state the result is an enhanced sec…

We don't have enough ratings and reviews to provide an overall score.

The Illumio Adaptive Security Platform (ASP), from Illumio in Sunnyvale, is designed to help users prevent the spread of breaches and achieve regulatory compliance through real-time application dependency mapping and micro-segmentation that works in any data center and cloud environment (Azure, AWS,…

We don't have enough ratings and reviews to provide an overall score.

Unisys offers the Stealth product cybersecurity and software-defined microsegmentation suite providing zero trust network access, designed to protect the enterprise network, cloud services, and data via cloaking and encryption, provide network visibility, and also provide detection and correlation f…

We don't have enough ratings and reviews to provide an overall score.

Zscaler Private Access (ZPA) is a ZTNA as a service, that takes a user- and application-centric approach to private application access. A cloud-delivered service, ZPA is built to ensure that only authorized users have access to specific private applications by creating secure segments of one between…

We don't have enough ratings and reviews to provide an overall score.

Perimeter 81 is a Zero Trust Network as a Service from the company of the same name in Tel Aviv, designed to simplify secure network, cloud and application access for the modern and distributed workforce.

We don't have enough ratings and reviews to provide an overall score.

Safe-T in Herzliya is a provider of Zero Trust Access solutions which mitigate attacks on enterprises’ business-critical services and sensitive data. Safe-T’s cloud and on-premises solutions are designed to ensure that an organization’s access use cases, whether into the organization or from the org…

We don't have enough ratings and reviews to provide an overall score.

Certes Networks in Pittsburgh protects data in transit, with software-defined security solutions deployed for both large and small commercial and government networks.

We don't have enough ratings and reviews to provide an overall score.

Cloudflare Access is designed to replace corporate VPN clients by putting Cloudflare’s global edge network in front of internal applications.

We don't have enough ratings and reviews to provide an overall score.

Banyan Security in San Francisco provides a Zero Trust Network Access platform, which provides remote access to corporate resources hosted in hybrid and multi-cloud environments.

We don't have enough ratings and reviews to provide an overall score.

Netskope Private Access is a zero trust access solution, that allows users to provide remote access to applications running in the public cloud and private data center environments, and avoid the need for remote users to use a VPN through the corporate network to gain access to private applications.

We don't have enough ratings and reviews to provide an overall score.

Wandera in San Francisco provides a mobile security solution for enterprises with their multi-level solution to protect users, endpoints, and corporate applications from evolving mobile threats.