TransientAccess

Zero Trust Network Access (ZTNA) Solution

TransientAccess is a zero trust network access(ZTNA) solution

TransientAccess is a zero trust network access (ZTNA) solution which uses application networking paradigm to simplify remote access, revolutionizing the way enterprises implement zero trust networks.

Users’ devices are never connected to corporate networks but instead apps on the user’s device and the apps in the corporate network are connected to each other independent of any physical network topology.

It couples zero trust architecture with granular access control policies, application segmentation and full visibility into users’ and applications’ activities.

Benefits

Software Defined Perimeter Architecture

  •  Stealth and transient access to business-critical apps and resources using app-based networks. Apps and resources are never exposed to the Internet
  •  Zero-Trust application level connectivity between authenticated users and app
  •  Private and end-to-end DTLS encrypted data traffic belongs to the customer and does not pass through third-party cloud gateways

App Segmentation and Full Visibility

  • Fine grained application access policies allow segmentation and apps, not networks nearby mitigating the risk of lateral movement
  • Full audit trail of user’ activities are available real-time
  • Endpoint data protection e.g. transparent data-at-rest encryption enables data leak prevention even on unmanaged devices, without an MDM or MAM solution

Frictionless Implementation

  • Integrates easily into the existing security configuration of enterprise and requires no ACL or inbound firewall rule changes
  • Support on-prem or SaaS based deployment models and integrates with existing automation tools through REST APIs

How it works

TransientAccesses has 3 components involved:

1

CONTROLLER:

The component which authenticates and authorizes users and orchestrates connections. This is normally deployed in TransientX cloud as a service (SaaS).

2

CONNECTOR:

Connectors are deployed in front of applications which will be accessed, usually in a private cloud or on-prem data center.

3

CLIENTS:

Users install TransientAccess clients on their devices in order to access enterprise resources.

When an authenticated user request access to the remote enterprise resource, a temporary network of apps on users’ device and the enterprise resource (e.g. enterprise apps, servers) is created as needed.

Key Scenarios

Secure Third-Party User Access and BYOD

Today’s dynamic business environment require a mobile workforce, partners like suppliers or resellers and contractors accessing enterprise resources and systems. TransientAccess provides zero-trust access to these resources without providing network access or exposing them to the Internet. No MDM or MAM is required.

Secure Secure IaaS Access

IT teams often need to simple way for allowing access to applications hosted public cloud environments like Azure and AWS, without management and setup complexities of existing tools. With TransientAccess, DevOps teams can access production workloads hosted in these environments using their favorite tools such as RDP or SSH anywhere in the world, securely.

Secure Access to SCADA Systems

Enterprise that host critical infrastructures have unique security and compliance challenges while governing access to SCADA systems. When contractors or employees need to access such systems located on various sites such as power plants in different cities, they are often required to travel. TransientAccess provides a secure and compliant alternative, in that such systems can be accessed by authorized users, without exposing them to the Internet through virtually air-gapped networks.

Transform device centric networks into Zero Trust Application Networks instantly

Transform now