Zentry

Zentry

Zentry Security
+
+

Related Products

  • UTunnel VPN and ZTNA
    119 Ratings
    Visit Website
  • Cloudbrink
    28 Ratings
    Visit Website
  • Proton VPN
    41,010 Ratings
    Visit Website
  • Cloudflare
    1,826 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • Keeper Security
    1,695 Ratings
    Visit Website
  • Venn
    28 Ratings
    Visit Website
  • Google Chrome Enterprise
    1,972 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,343 Ratings
    Visit Website
  • ManageEngine ADSelfService Plus
    114 Ratings
    Visit Website

About

Zero trust secure access to the cloud and data center. Reliable, secure access means higher productivity and lower costs. Ensures compliance before granting access to the cloud. Data protection with always-on VPN and lockdown mode. The most widely deployed SSL VPN for organizations of any size, across every major industry. Reduce management complexity with only one client for remote and on-site access. Directory Services, Identity Services, EMM/MDM, SIEM, NGFWs. Ensure that all devices comply with security requirements before connecting. Simple, secure and streamlined access to on-premises and cloud-based resources. Protect data-in-motion with on-demand, per-application and always-on VPN options. Centrally manage policy and track users, devices, security state and access activity. Access web-based apps and virtual desktop products with nothing to install. Data access and protection requisites for industry and regulatory compliance.

About

Least privileged application access with consistent security for any user, anywhere. Transient authentication provides granular, least-privileged access to mission-critical infrastructure. Zentry Trusted Access provides clientless, browser-based, streamlined zero-trust application access for small to medium-sized enterprises. Organizations see gains in security posture and compliance, a reduced attack surface, and greater visibility into users and applications. Zentry Trusted Access is a cloud-native solution that is simple to configure, and even simpler to use. Employees, contractors, and third parties just need an HTML5 browser to securely connect to applications in the cloud and data center, no clients are needed. Leveraging zero trust technologies like multi-factor authentication and single sign-on, only validated users obtain access to applications and resources. All sessions are encrypted end-to-end with TLS, and each is governed by granular policies.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Enterprise organizations and IT teams looking for a solution to manage policy and track users, devices, security state and access activity

Audience

Enterprises and professionals in need of a cloud-native solution to secure their remote access operations

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Ivanti
Founded: 2014
United States
www.ivanti.com/products/connect-secure-vpn

Company Information

Zentry Security
United States
zentrysecurity.com

Alternatives

Alternatives

ZoneZero

ZoneZero

Safe-T Data
Forescout

Forescout

Forescout Technologies
InstaSafe

InstaSafe

InstaSafe Technologies
Citrix Secure Private Access

Citrix Secure Private Access

Cloud Software Group

Categories

Categories

Integrations

AuthControl Sentry
Axonius
Cisco ACI
ConnectProtect Managed Detection and Response
ConverSense
Fortinet SD-WAN
GigaSECURE
Ivanti
Junos Traffic Vision
Microsoft Defender XDR
Okta
Palo Alto Networks AutoFocus
SecureIdentity IAM
SecureIdentity MFA
SecureIdentity PAM
SmartShare
SparkView
Spoom
ThreatAware
TrustBuilder

Integrations

AuthControl Sentry
Axonius
Cisco ACI
ConnectProtect Managed Detection and Response
ConverSense
Fortinet SD-WAN
GigaSECURE
Ivanti
Junos Traffic Vision
Microsoft Defender XDR
Okta
Palo Alto Networks AutoFocus
SecureIdentity IAM
SecureIdentity MFA
SecureIdentity PAM
SmartShare
SparkView
Spoom
ThreatAware
TrustBuilder
Claim Ivanti Connect Secure and update features and information
Claim Ivanti Connect Secure and update features and information
Claim Zentry and update features and information
Claim Zentry and update features and information