Zero Trust Network Access (ZTNA)Zero Trust Network Access (ZTNA) solutions, also referred to as a software-defined perimeter or SDP, are used to provide secure access to private applications without allowing users access to enterprise networks. They are often described as a replacement for traditional technologies like VPN, and introduce various methods of authentication to remain identity and context aware of users accessing enterprise applications. ZTNA solutions are available self-hosted, from the cloud and self-managed, or as fully managed services.AppGate SDP1https://media.trustradius.com/vendor-logos/6i/u4/MTWIP5CJG5M4-180x180.PNGUnisys Stealth2https://media.trustradius.com/vendor-logos/ih/uf/FI6S542IVPJK-180x180.JPEGZscaler Private Access3https://media.trustradius.com/vendor-logos/o7/2K/DTZQIS81DUEM-180x180.JPEGPerimeter 814https://media.trustradius.com/vendor-logos/0L/8l/XJ83KWV6V2LS-180x180.JPEGSafe-T Data5https://media.trustradius.com/vendor-logos/tH/4f/GF73JD3WX4Q1-180x180.JPEGCertes Networks6https://media.trustradius.com/vendor-logos/cV/Eo/G2EWTO2X2TKO-180x180.JPEGMeta Networks, from Proofpoint7https://media.trustradius.com/product-logos/mb/4E/RTJ8TRFOORDS-180x180.JPEGCloudflare Access8https://media.trustradius.com/vendor-logos/hX/QA/OZAMPT25VJ8G-180x180.PNGBanyan Security9https://media.trustradius.com/vendor-logos/PK/Zu/DCC7QOJMT301-180x180.PNGNetskope Private Access10https://media.trustradius.com/vendor-logos/O9/f2/SSTMAVTFP3XU-180x180.JPEGSymantec Secure Access Cloud (formerly Luminate Security)11https://media.trustradius.com/vendor-logos/cS/FP/URPNU3J7IUQ9-180x180.PNGIllumio Adaptive Security Platform12https://media.trustradius.com/vendor-logos/Tb/Gz/VK2LF6OS7S2A-180x180.JPEGCentrify Zero Trust Privilege Services13https://media.trustradius.com/vendor-logos/e9/VT/ZK0AX2SCS5T5-180x180.JPEGPulse SDP14https://media.trustradius.com/vendor-logos/Z6/4U/3ZDVW5LUSK7L-180x180.PNG

Zero Trust Network Access (ZTNA) Software

Zero Trust Network Access (ZTNA) Software Overview

What is Zero Trust Network Access (ZTNA) Software?


Zero Trust Network Access (ZTNA) solutions, also referred to as a software-defined perimeter or SDP, are used to provide secure access to private applications without allowing users access to enterprise networks. They are often described as a replacement for traditional technologies like VPN, and introduce various methods of authentication to remain identity and context aware of users accessing enterprise applications. ZTNA solutions are available self-hosted, from the cloud and self-managed, or as fully managed services.

Zero Trust Network Access (ZTNA) Products

Listings (1-14 of 14)

We don't have enough ratings and reviews to provide an overall score.

Unisys offers the Stealth product cybersecurity and software-defined microsegmentation suite providing zero trust network access, designed to protect the enterprise network, cloud services, and data via cloaking and encryption, provide network visibility, and also provide detection and correlation f…

We don't have enough ratings and reviews to provide an overall score.

Zscaler Private Access (ZPA) is a ZTNA as a service, that takes a user- and application-centric approach to private application access. A cloud-delivered service, ZPA is built to ensure that only authorized users have access to specific private applications by creating secure segments of one between…

We don't have enough ratings and reviews to provide an overall score.

Perimeter 81 is a Zero Trust Network as a Service from the company of the same name in Tel Aviv, designed to simplify secure network, cloud and application access for the modern and distributed workforce.

We don't have enough ratings and reviews to provide an overall score.

Safe-T in Herzliya is a provider of Zero Trust Access solutions which mitigate attacks on enterprises’ business-critical services and sensitive data. Safe-T’s cloud and on-premises solutions are designed to ensure that an organization’s access use cases, whether into the organization or from the org…

We don't have enough ratings and reviews to provide an overall score.

Certes Networks in Pittsburgh protects data in transit, with software-defined security solutions deployed for both large and small commercial and government networks.

We don't have enough ratings and reviews to provide an overall score.

Cloudflare Access is designed to replace corporate VPN clients by putting Cloudflare’s global edge network in front of internal applications.

We don't have enough ratings and reviews to provide an overall score.

Banyan Security in San Francisco provides a Zero Trust Network Access platform, which provides remote access to corporate resources hosted in hybrid and multi-cloud environments.

We don't have enough ratings and reviews to provide an overall score.

Netskope Private Access is a zero trust access solution, that allows users to provide remote access to applications running in the public cloud and private data center environments, and avoid the need for remote users to use a VPN through the corporate network to gain access to private applications.

We don't have enough ratings and reviews to provide an overall score.

The Illumio Adaptive Security Platform (ASP), from Illumio in Sunnyvale, is designed to help users prevent the spread of breaches and achieve regulatory compliance through real-time application dependency mapping and micro-segmentation that works in any data center and cloud environment (Azure, AWS,…

We don't have enough ratings and reviews to provide an overall score.

Pulse SDP is presented by the vendor as a Zero Trust secure access architecture for a modern application infrastructure. It enables direct, secure access to individual applications and requires users and their devices to be verified before access is allowed. They state the result is an enhanced sec…