Zentry

Zentry

Zentry Security
+
+

Related Products

  • ESET PROTECT Advanced
    2,249 Ratings
    Visit Website
  • Guardz
    109 Ratings
    Visit Website
  • Control D
    182 Ratings
    Visit Website
  • NINJIO
    415 Ratings
    Visit Website
  • EasyDMARC
    188 Ratings
    Visit Website
  • Cloudflare
    1,948 Ratings
    Visit Website
  • Google Chrome Enterprise
    2,053 Ratings
    Visit Website
  • ThreatLocker
    502 Ratings
    Visit Website
  • Aikido Security
    224 Ratings
    Visit Website
  • Bitdefender Ultimate Small Business Security
    3 Ratings
    Visit Website

About

Identify vulnerabilities across your entire attack surface, covering both your technical and human assets. All in one unified platform. One risk model. One workflow. Keep up with current threats and protect your entire infrastructure, including cloud, operational technology, and remote workforce. Our all-in-one platform offers unparalleled insight and visibility, covering all your assets across your organization’s technical assets, including local and public systems, computers, cloud infrastructure and services, networks, web applications, APIs, and human assets - your users. Gain complete visibility and actionable context on your most critical misconfigurations, so your teams can proactively and continuously improve your cloud security posture. Reduce risk to your organization by maintaining least-privilege access for cloud workloads, data, and applications.

About

Least privileged application access with consistent security for any user, anywhere. Transient authentication provides granular, least-privileged access to mission-critical infrastructure. Zentry Trusted Access provides clientless, browser-based, streamlined zero-trust application access for small to medium-sized enterprises. Organizations see gains in security posture and compliance, a reduced attack surface, and greater visibility into users and applications. Zentry Trusted Access is a cloud-native solution that is simple to configure, and even simpler to use. Employees, contractors, and third parties just need an HTML5 browser to securely connect to applications in the cloud and data center, no clients are needed. Leveraging zero trust technologies like multi-factor authentication and single sign-on, only validated users obtain access to applications and resources. All sessions are encrypted end-to-end with TLS, and each is governed by granular policies.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

IT teams interested in a tool that helps find vulnerabilities

Audience

Enterprises and professionals in need of a cloud-native solution to secure their remote access operations

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Holm Security
Founded: 2015
Sweden
www.holmsecurity.com

Company Information

Zentry Security
United States
zentrysecurity.com

Alternatives

Tenable One

Tenable One

Tenable

Alternatives

ZoneZero

ZoneZero

Safe-T Data
InstaSafe

InstaSafe

InstaSafe Technologies
CrowdStrike Falcon

CrowdStrike Falcon

CrowdStrike

Categories

Categories

Integrations

Azure Marketplace
Cisco ACI
Cisco Duo
Fortinet SD-WAN
Jenkins
Jira
Juniper Identity Management Service
Microsoft Azure
Microsoft Defender XDR
Microsoft Entra ID
Microsoft Teams
Okta
Palo Alto Networks AutoFocus
RSA SecurID
Slack
Splunk Cloud Platform
Zabbix

Integrations

Azure Marketplace
Cisco ACI
Cisco Duo
Fortinet SD-WAN
Jenkins
Jira
Juniper Identity Management Service
Microsoft Azure
Microsoft Defender XDR
Microsoft Entra ID
Microsoft Teams
Okta
Palo Alto Networks AutoFocus
RSA SecurID
Slack
Splunk Cloud Platform
Zabbix
Claim Holm Security and update features and information
Claim Holm Security and update features and information
Claim Zentry and update features and information
Claim Zentry and update features and information