Ensure that only authenticated users and devices can access your corporate applications and internet sites based on granular rule-based security policies.
Zero Trust Secure Access protects your organization from unauthorized access to internal
and
external applications, and allows you to take immediate or automated action against
possible
access violations or risky user behaviors. Zero Trust Secure Access provides multiple
access
control services to provide the optimal protection against unwanted access.
Service
|
Description
|
End-User Components
|
||
Risk Control
|
Takes action on user accounts or devices that exhibit risky or malicious behaviors
Through integration with your
IAM, Risk Control can identify users and devices that may pose a threat to the
integrity of your organization and allows you to take manual or automated mitigation
actions
(for example, disable a user account that was leaked to the dark web or isolate a
device
from the network after discovering known vulnerabilities).
|
None required
|
||
Private Access
|
The zero trust network access (ZTNA) solution that controls access to internal
applications, data centers, and IaaS environments
After identifying your organization's internal applications and resources through
use of
Private Access Connectors, you can create specific rules to manage user access
based on device usage, time of day, or location.
|
|
||
Internet Access
|
The secure web gateway (SWG) solution that secures access to external websites
Internet Access rules allows you to restrict access to external websites and applications
through use of an Internet Access Gateway. End-user traffic is evaluated against your
access
rules and blocked based on user account, device, security violations, or location.
|
|