Zentry

Zentry

Zentry Security
+
+

Related Products

  • UTunnel VPN and ZTNA
    118 Ratings
    Visit Website
  • Cloudbrink
    28 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,683 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • ManageEngine OpManager
    1,635 Ratings
    Visit Website
  • ThreatLocker
    502 Ratings
    Visit Website
  • Google Cloud Platform
    60,526 Ratings
    Visit Website
  • Kasm Workspaces
    125 Ratings
    Visit Website
  • Airlock Digital
    35 Ratings
    Visit Website
  • Auth0
    1,008 Ratings
    Visit Website

About

DxOdyssey is lightweight software built on patented technology that enables you to create highly available application-level micro-tunnels across any mix of locations and platforms. And it does so more easily, more securely, and more discreetly than any other solution on the market. Using DxOdyssey puts you on a path to zero trust security and helps networking and security admins secure multi-site & multi-cloud operations. The network perimeter has evolved. And DxOdyssey’s unVPN technology is designed with this in mind. Old VPN and direct link approaches are cumbersome to maintain and open up the entire network to lateral movement. DxOdyssey takes a more secure approach, giving users app-level access rather than network-level access, reducing attack surface. And it does all of this with the most secure and performant approach to create a Software Defined Perimeter (SDP) to grant connectivity to distributed apps and clients running across multiple sites, clouds, and domains.

About

Least privileged application access with consistent security for any user, anywhere. Transient authentication provides granular, least-privileged access to mission-critical infrastructure. Zentry Trusted Access provides clientless, browser-based, streamlined zero-trust application access for small to medium-sized enterprises. Organizations see gains in security posture and compliance, a reduced attack surface, and greater visibility into users and applications. Zentry Trusted Access is a cloud-native solution that is simple to configure, and even simpler to use. Employees, contractors, and third parties just need an HTML5 browser to securely connect to applications in the cloud and data center, no clients are needed. Leveraging zero trust technologies like multi-factor authentication and single sign-on, only validated users obtain access to applications and resources. All sessions are encrypted end-to-end with TLS, and each is governed by granular policies.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Organizations and security administrators interested in unVPN networking software for zero trust security

Audience

Enterprises and professionals in need of a cloud-native solution to secure their remote access operations

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

DH2i
Founded: 2010
United States
dh2i.com/dxodyssey/

Company Information

Zentry Security
United States
zentrysecurity.com

Alternatives

Perimeter 81

Perimeter 81

Check Point Software Technologies

Alternatives

ZoneZero

ZoneZero

Safe-T Data
InstaSafe

InstaSafe

InstaSafe Technologies
Cisco ACI

Cisco ACI

Cisco

Categories

Categories

Integrations

Cisco ACI
Cisco Duo
Fortinet SD-WAN
Juniper Identity Management Service
Microsoft Defender XDR
Microsoft Entra ID
Okta
Palo Alto Networks AutoFocus
RSA SecurID

Integrations

Cisco ACI
Cisco Duo
Fortinet SD-WAN
Juniper Identity Management Service
Microsoft Defender XDR
Microsoft Entra ID
Okta
Palo Alto Networks AutoFocus
RSA SecurID
Claim DxOdyssey and update features and information
Claim DxOdyssey and update features and information
Claim Zentry and update features and information
Claim Zentry and update features and information