About Zentry Trusted Access

Zentry Trusted Access is a security platform from Zentry Security that provides secure access to applications and data. It includes identity verification, multi-factor authentication, and session management so organizations can protect sensitive information effectively. Zentry Trusted Access is designed to support diverse environments, addressing security needs for on-premises and cloud applications. The platform helps administrators manage access rights and enforce security policies across user accounts. Key capabilities: identity verification multi-factor authentication session management policy enforcement access control Best for: enterprises that need secure authentication and access management solutions.

Zentry Trusted Access Details

Vendor
Zentry Security
Year Launched
Location
San Francisco, California, United States
Deployment
Training Options
demo, account manager, community
Countries Served
All Countries
Languages
English, Spanish, French, German, Italian, Portuguese
Users
IT Administrators, Network Security Analysts, System Administrators, Remote Workers, IT Security Managers, Network Engineers, Help Desk Support Staff.
Industries Served
Healthcare, Education, Finance, Retail, Government, Manufacturing, Technology
Tags
Cybersecurity, Network Access Control, NAC, Network Security, VPN, Remote Monitoring and Management, Remote Work, Privileged Access Management

Zentry Trusted Access's In-App Market Place

Does Zentry Trusted Access have an in-app market place?

Yes

How many Mini-Apps in the marketplace?

8

Mini Apps

1. Zentry Trusted Access Mobile App: A mobile application that allows users to access the Zentry Trusted Access platform on the go

providing secure and convenient remote access to networks and resources.

2. Zentry Trusted Access SIEM Integration: Integration with Security Information and Event Management (SIEM) tools to enhance security monitoring and threat detection capabilities within the Zentry Trusted Access platform.

3. Zentry Trusted Access Secure VPN Add-On: An add-on that provides secure virtual private network (VPN) connectivity for remote users

ensuring encrypted and protected access to network resources.

4. Zentry Trusted Access Multi-Factor Authentication (MFA) Add-On: An MFA add-on that adds an extra layer of security to the Zentry Trusted Access platform

requiring users to verify their identities using multiple authentication factors.

5. Zentry Trusted Access Endpoint Security Integration: Integration with endpoint security solutions to enhance threat detection and protection capabilities for devices accessing the Zentry Trusted Access platform.

Pricing Options

Free trial
Free version
Request a quote
Promo Offer

Accepted Payment Currencies

USD ($), EUR (€), GBP (£), JPY (¥), AUD (A$), CAD (C$), CHF (CHF), CNY (¥), SEK (kr), NZD (NZ$), KRW (₩), RUB (₽), INR (₹), BRL (R$)

Pros & Cons

  • Secure network access control and enforcement
  • Strong VPN capabilities for remote work
  • Real-time monitoring and management of endpoints
  • Effective privileged access management for higher security
  • Ensures secure remote access for employees
  • Helps in protecting sensitive data and resources
  • Simplifies compliance with security policies and regulations
  • Limited compatibility with certain operating systems and devices
  • Steeper learning curve for new users compared to other similar software
  • Higher pricing compared to competitors with similar features
  • Lack of advanced customization options for specific use cases
  • Occasional usability issues and bugs reported by some users.

Zentry Trusted Access's Support Options

Zentry Trusted Access's Alternatives