Zentry

Zentry

Zentry Security
+
+

Related Products

  • UTunnel VPN and ZTNA
    119 Ratings
    Visit Website
  • Cloudbrink
    28 Ratings
    Visit Website
  • Cloudflare
    1,826 Ratings
    Visit Website
  • Proton VPN
    41,010 Ratings
    Visit Website
  • Kasm Workspaces
    125 Ratings
    Visit Website
  • NordVPN
    1,716 Ratings
    Visit Website
  • Keeper Security
    1,695 Ratings
    Visit Website
  • Google Chrome Enterprise
    1,972 Ratings
    Visit Website
  • ManageEngine ADSelfService Plus
    114 Ratings
    Visit Website
  • Unimus
    30 Ratings
    Visit Website

About

The way we work has changed. People now work from anywhere, not just from an office. Applications are based in the cloud, not just on-premise. And the company network perimeter is now spread across the internet. Using a traditional, network-centric VPN for remote access is not only outdated and difficult to maintain, but exposes businesses to security breaches. VPN infrastructure is costly and time-consuming to procure, deploy, and maintain. Inability to secure access at the app level means hacks can expose whole networks. Twingate enables organizations to rapidly implement a modern Zero Trust network that is more secure and maintainable than VPNs. Delivered as a cloud-based service, Twingate empowers IT teams to easily configure a software-defined perimeter without changing infrastructure, and centrally manage user access to internal apps, whether they are on-prem or in the cloud.

About

Least privileged application access with consistent security for any user, anywhere. Transient authentication provides granular, least-privileged access to mission-critical infrastructure. Zentry Trusted Access provides clientless, browser-based, streamlined zero-trust application access for small to medium-sized enterprises. Organizations see gains in security posture and compliance, a reduced attack surface, and greater visibility into users and applications. Zentry Trusted Access is a cloud-native solution that is simple to configure, and even simpler to use. Employees, contractors, and third parties just need an HTML5 browser to securely connect to applications in the cloud and data center, no clients are needed. Leveraging zero trust technologies like multi-factor authentication and single sign-on, only validated users obtain access to applications and resources. All sessions are encrypted end-to-end with TLS, and each is governed by granular policies.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Businesses looking for a secure remote access for distributed workforces

Audience

Enterprises and professionals in need of a cloud-native solution to secure their remote access operations

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

$10 per user per month
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Twingate
United States
www.twingate.com

Company Information

Zentry Security
United States
zentrysecurity.com

Alternatives

UTunnel VPN and ZTNA

UTunnel VPN and ZTNA

Secubytes LLC

Alternatives

ZoneZero

ZoneZero

Safe-T Data
InstaSafe

InstaSafe

InstaSafe Technologies
Perimeter 81

Perimeter 81

Check Point Software Technologies
Citrix Secure Private Access

Citrix Secure Private Access

Cloud Software Group

Categories

Categories

Integrations

Cisco ACI
Cisco Duo
Entitle
Fortinet SD-WAN
Indent
Juniper Identity Management Service
Microsoft Defender XDR
Microsoft Entra ID
Okta
Palo Alto Networks AutoFocus
RSA SecurID
Truto
daydream

Integrations

Cisco ACI
Cisco Duo
Entitle
Fortinet SD-WAN
Indent
Juniper Identity Management Service
Microsoft Defender XDR
Microsoft Entra ID
Okta
Palo Alto Networks AutoFocus
RSA SecurID
Truto
daydream
Claim Twingate and update features and information
Claim Twingate and update features and information
Claim Zentry and update features and information
Claim Zentry and update features and information