Ensure that only authenticated users and devices can access your corporate applications and internet sites based on granular rule-based security policies.
Zero Trust Secure Access protects your organization from unauthorized access to internal and external applications, and allows you to take immediate or automated action against possible access violations or risky user behaviors. Zero Trust Secure Access provides multiple access control services to provide the optimal protection against unwanted access.
Service |
Description |
End-User Components |
---|---|---|
Risk Control |
Takes action on user accounts or devices that exhibit risky or malicious behaviors Through integration with your IAM, Risk Control can identify users and devices that may pose a threat to the integrity of your organization and allows you to take manual or automated mitigation actions (for example, disable a user account that was leaked to the dark web or isolate a device from the network after discovering known vulnerabilities). |
None required Tip:
To further enhance the risk identification of your users and devices, deploy additional solutions and configure additional data sources using the Operations Dashboard. |
Private Access |
The zero trust network access (ZTNA) solution that controls access to internal applications, data centers, and IaaS environments After identifying your organization's internal applications and resources through use of Private Access Connectors, you can create specific rules to manage user access based on device usage, time of day, or location. |
|
Internet Access |
The secure web gateway (SWG) solution that secures access to external websites Internet Access rules allows you to restrict access to external websites and applications through use of an Internet Access Gateway. End-user traffic is evaluated against your access rules and blocked based on user account, device, security violations, or location. |
|