TransientAccess is a zero trust network access(ZTNA) solution
TransientAccess is a zero trust network access (ZTNA) solution which uses application networking paradigm to simplify remote access, revolutionizing the way enterprises implement zero trust networks.
Users’ devices are never connected to corporate networks but instead apps on the user’s device and the apps in the corporate network are connected to each other independent of any physical network topology.
It couples zero trust architecture with granular access control policies, application segmentation and full visibility into users’ and applications’ activities.
TransientAccesses has 3 components involved:
The component which authenticates and authorizes users and orchestrates connections. This is normally deployed in TransientX cloud as a service (SaaS).
Connectors are deployed in front of applications which will be accessed, usually in a private cloud or on-prem data center.
Users install TransientAccess clients on their devices in order to access enterprise resources.
When an authenticated user request access to the remote enterprise resource, a temporary network of apps on users’ device and the enterprise resource (e.g. enterprise apps, servers) is created as needed.
Today’s dynamic business environment require a mobile workforce, partners like suppliers or resellers and contractors accessing enterprise resources and systems. TransientAccess provides zero-trust access to these resources without providing network access or exposing them to the Internet. No MDM or MAM is required.
IT teams often need to simple way for allowing access to applications hosted public cloud environments like Azure and AWS, without management and setup complexities of existing tools. With TransientAccess, DevOps teams can access production workloads hosted in these environments using their favorite tools such as RDP or SSH anywhere in the world, securely.
Enterprise that host critical infrastructures have unique security and compliance challenges while governing access to SCADA systems. When contractors or employees need to access such systems located on various sites such as power plants in different cities, they are often required to travel. TransientAccess provides a secure and compliant alternative, in that such systems can be accessed by authorized users, without exposing them to the Internet through virtually air-gapped networks.