Zentry

Zentry

Zentry Security
+
+

Related Products

  • UTunnel VPN and ZTNA
    118 Ratings
    Visit Website
  • Cloudbrink
    28 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,195 Ratings
    Visit Website
  • Bitdefender Ultimate Small Business Security
    3 Ratings
    Visit Website
  • SOCRadar Extended Threat Intelligence
    90 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,482 Ratings
    Visit Website
  • Jscrambler
    33 Ratings
    Visit Website
  • IPVanish
    111 Ratings
    Visit Website
  • Criminal IP
    15 Ratings
    Visit Website
  • Source Defense
    7 Ratings
    Visit Website

About

Security is an arms race. Innovation happens simultaneously on the attack and protects sides of the environment. By authenticating identity and implementing security policy at the earliest possible time, on the first packet of a network session setup, BlackRidge provides deterministic, scalable, and cost-effective cyber defense. BlackRidge Transport Access Control (TAC), using our patented First Packet Authentication™, provides a new level of cyber defense for network and cloud resources. TAC operates pre-session, in real-time, before other security defenses engage. TAC is address and topology independent, supporting NAT and automatically adjusting to changing network topologies. Cyber-attacks are stopped dead in their tracks by preventing unauthorized users and attackers from performing reconnaissance of network and cloud resources, and by denying them the ability to communicate anonymously.

About

Least privileged application access with consistent security for any user, anywhere. Transient authentication provides granular, least-privileged access to mission-critical infrastructure. Zentry Trusted Access provides clientless, browser-based, streamlined zero-trust application access for small to medium-sized enterprises. Organizations see gains in security posture and compliance, a reduced attack surface, and greater visibility into users and applications. Zentry Trusted Access is a cloud-native solution that is simple to configure, and even simpler to use. Employees, contractors, and third parties just need an HTML5 browser to securely connect to applications in the cloud and data center, no clients are needed. Leveraging zero trust technologies like multi-factor authentication and single sign-on, only validated users obtain access to applications and resources. All sessions are encrypted end-to-end with TLS, and each is governed by granular policies.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Companies searching for a solution for authenticating identity and implementing security policies

Audience

Enterprises and professionals in need of a cloud-native solution to secure their remote access operations

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

BlackRidge
United States
www.blackridge.us/products/technologies

Company Information

Zentry Security
United States
zentrysecurity.com

Alternatives

Quantum Armor

Quantum Armor

Silent Breach

Alternatives

ZoneZero

ZoneZero

Safe-T Data
RidgeShield

RidgeShield

Ridge Security
InstaSafe

InstaSafe

InstaSafe Technologies
Ridgeback

Ridgeback

Ridgeback Network Defense

Categories

Categories

Integrations

Cisco ACI
Cisco Duo
Fortinet SD-WAN
Juniper Identity Management Service
Microsoft Defender XDR
Microsoft Entra ID
Okta
Palo Alto Networks AutoFocus
RSA SecurID

Integrations

Cisco ACI
Cisco Duo
Fortinet SD-WAN
Juniper Identity Management Service
Microsoft Defender XDR
Microsoft Entra ID
Okta
Palo Alto Networks AutoFocus
RSA SecurID
Claim BlackRidge Transport Access Control and update features and information
Claim BlackRidge Transport Access Control and update features and information
Claim Zentry and update features and information
Claim Zentry and update features and information