Zero Trust Access (ZTA)

Ensuring all traffic in and out of business is verified and authorized Checking dynamic environments and treating every request based on the “never trust, always verify” principle.

Zero Trust Access (ZTA)
Zero trust deployment and comprehensive cloud and on-premise protection

Increase team productivity

A unified and low-latency zero trust platform can simplify policy management, allow for faster troubleshooting, and improve the experience of end users

Reduce network risks

Threat intelligence can prevent multichannel phishing and ransomware, and reduce the attack surface

Improve technological effectiveness

Accelerating digital maturity and integrating point products with composable embedded security services can provide full network traffic visibility

Five Pillars
Helping Enterprises Implement Modern Zero Trust Security

Implementing the zero-trust principle to identity, device, network, application, workload, and data security through visibility and analysis, automation, and governance functions.


Identity Security

Integrate with common corporate identity verification providers (e.g., Okta, Azure AD, Google Workspace) to support safe cloud migration services and third-party user access. Whenever needed, external partners can use one-time PIN codes to access corporate systems, and social IDs, e.g., from LinkedIn and GitHub, can be identified.


Device Security

Assess the status of a device before granting resource access permissions, including checking if the gateway client, corporate device serial number, and mTLS certificate exist, to ensure that only safe known devices can connect to corporate resources. Integrate the device status checking functions of endpoint protection platform (EPP) providers including Crowdstrike, Carbon Black, Sentinel One, and Tanium to make sure that devices are safe for connection.


Network Security

Privately route any TCP or UDP traffic and perform one-time acceleration, authentication, and filtering to help improve remote transmission performance and network security. Restrict lateral movement between corporate resources by setting up an IP firewall and a zero-trust policy.


Application and Workload Security

Protect any applications deployed on SaaS, the cloud, or internally. Ensure safe web application and SSH connections without installing agents or setting up end users. For non-web application and RDP connections as well as private routers, comprehensive client agents are used for connection in different Internet and application access scenarios.


Visibility Management and Analysis Function

Record any requests made in protected applications, including account logins and logouts and any other user activities. Activity records can be compiled or exported to enterprises SIEM platforms.

Importance of ZTNA

01 Block hackers' social engineering attacks

02 Prevent sensitive data and information from being stolen

03 Prevent sensitive data and information from being stolen


Features and Advantages
  • Protection of internal assets without using VPN
  • Global edge network for high scalability
  • Industry-leading DDoS protection
  • Network firewall integration
  • Detailed access control