What is Zero Trust Secure Access?

Ensure that only authenticated users and devices can access your corporate applications and internet sites based on granular rule-based security policies.

Zero Trust Secure Access protects your organization from unauthorized access to internal and external applications, and allows you to take immediate or automated action against possible access violations or risky user behaviors. Zero Trust Secure Access provides multiple access control services to provide the optimal protection against unwanted access.

Service

Description

End-User Components

Risk Control

Takes action on user accounts or devices that exhibit risky or malicious behaviors

Through integration with your IAM, Risk Control can identify users and devices that may pose a threat to the integrity of your organization and allows you to take manual or automated mitigation actions (for example, disable a user account that was leaked to the dark web or isolate a device from the network after discovering known vulnerabilities).

None required

Tip:

To further enhance the risk identification of your users and devices, deploy additional solutions and configure additional data sources using the Operations Dashboard.

Private Access

The zero trust network access (ZTNA) solution that controls access to internal applications, data centers, and IaaS environments

After identifying your organization's internal applications and resources through use of Private Access Connectors, you can create specific rules to manage user access based on device usage, time of day, or location.

  • Secure Access Module: Installed on end-user devices and integrated with your IAM solution, the module transfers connection attempts to configured Private Access Connectors that enforce Private Access Control rules.

  • User Portal: For external users that require access to internal resources, the User Portal allows your end users to sign into your integrated IAM and view a list of all internal resources permitted by your Private Access Control rules.

Internet Access

The service web gateway (SWG) solution that secures access to external websites

Internet Access rules allows you to restrict access to external websites and applications through use of an Internet Access Gateway. End-user traffic is evaluated against your access rules and blocked based on user account, device, security violations, or location.

  • Secure Access Module: Installed on end-user devices and integrated with your IAM solution, the module transfers connection attempts to the Internet Access Gateway that enforces Internet Access Control rules.

  • Traffic forwarding: Proxy-based solutions (PAC files, proxy chaining, port forwarding) forward your end-user traffic to the Internet Access Gateway that enforces Internet Access Control rules