010-68421378
sales@cogitosoft.com
Categories
AddFlow  AmCharts JavaScript Stock Chart AmCharts 4: Charts Aspose.Total for Java Altova SchemaAgent Altova DatabaseSpy Altova MobileTogether Altova UModel  Altova MapForce Altova MapForce Server Altova Authentic Aspose.Total for .NET Altova RaptorXML Server ComponentOne Ultimate Chart FX for SharePoint Chart FX CodeCharge Studio ComponentOne Enterprise combit Report Server Controls for Visual C++ MFC Chart Pro for Visual C ++ MFC DbVisualizer version 12.1 DemoCharge DXperience Subscription .NET DevExpress Universal Subscription Essential Studio for ASP.NET MVC FusionCharts Suite XT FusionCharts for Flex  FusionExport V2.0 GrapeCity TX Text Control .NET for WPF GrapeCity Spread Studio Highcharts Gantt Highcharts 10.0 版 HelpNDoc Infragistics Ultimate  ImageKit9 ActiveX ImageKit.NET JetBrains--Fleet JetBrains-DataSpell JetBrains--DataGrip jQuery EasyUI jChart FX Plus OPC DA .NET Server Toolkit  OSS ASN.1/C Oxygen XML Author  OSS 4G NAS/C, C++ Encoder Decoder Library OSS ASN.1 Tools for C with 4G S1/X2 OSS ASN.1/C# OSS ASN.1/C++ OPC HDA .NET Server Toolkit OPC DA .Net Client Development Component PowerBuilder redgate NET Developer Bundle Report Control for Visual C++ MFC  Sencha Test SPC Control Chart Tools for .Net Stimulsoft Reports.PHP Stimulsoft Reports.JS Stimulsoft Reports.Java Stimulsoft Reports. Ultimate Stimulsoft Reports.Wpf Stimulsoft Reports.Silverlight SlickEdit Source Insight Software Verify .Net Coverage Validator Toolkit Pro for VisualC++MFC TeeChart .NET Telerik DevCraft Complete Altova XMLSpy Zend Server

Seqrite ZTNA

Securing user access to enterprise applications across borderless workspaces.

 

Why should organizations secure User Access across borderless workspaces?

In today's edgeless businesses, traditional enterprise perimeters are fading as multi-cloud collaborations become standard.Safeguarding sensitive data against evolving threats poses a significant challenge for security leaders as hybrid workspaces become the new norm.Conventional security measures like VPNs and enterprise perimeters are inadequate for the collaboration demands of modern workforces. BYOD and unmanaged devices introduce new vulnerabilities,compounded by data dispersed across platforms.Access privileges in the current setup become the most significant threat vector for any organization,necessitating the adoption of a modern security model that aligns with hybrid workplaces and verifies access regardless of location,user,or device.

 

Introducing Seqrite ZTNA

Seqrite ZTNA is a SaaS-delivered Zero Trust Network Access solution that provides secure remote access to corporate applications and services to employees,contractors,and vendor staff across borderless workspaces.

 

Holistic Zero Trust Approach - Security for a new world!

01 Take User Access into cognizance across borderless workspaces- with Seqrite Zero Trust Network Access

Enables your organization to enforce a zero-trust network access paradigm across any employee,contractor,or vendor staff with access to its systems and applications,whether from within or outside the corporate network.It utilizes contextual policies,processes,and technology approach to stop unauthorized access.

 

02 Adopt Zero-Trust cognizance

Authenticates every access attempt made by employee,contractor or vendor staff to enterprise critical applications.It leverages enforcement based on user attributes,devices,locations,network details and other identifiers before giving access to enterprise applications.

 

03 Adopt the principle of Least Privilege

Fits today's "work from anywhere"world.It leverages the principle of least privilege and shifts the focus from securing networks to giving least privileged application access to authenticated users.

 

04 Adopt an Integrated Security Posture

Integrates with solutions across your security stack to efficiently strengthen your organization's integrated security posture.Existing customers from the Seqrite CSM platform viz,Data Privacy,XDR,and EPP Cloud can avail Seqrite ZTNA to provide secured application access to their end-users.

 

Why does your enterprise need Seqrite ZTNA?

Quick and easy on-boarding:

  • Get deploy-ready within a few minutes.
  • Start with a few users and apps and expand gradually.
  • Integrate with your existing IT infrastructure easily for identity management.

 

Visual-first zero-trust for admins:

  • Rich graphical views to demonstrate how users are accessing corporate applications.

 

Simplified policy management:

  • Use business tags or labels applied to users and applications to define policies that ease the process of user changes in your enterprise.

 

Boost your branch office efficiency:

  • Upgrade your branch office performance without breaking the bank.
  • By phasing out Multi-Protocol Label Switching (MPLS)and changing to application access over the Internet as a means of transport,you can enjoy a cost-effective solution without sacrificing performance.

 

Reduce complexity and enhance security:

  • Simplify your technology infrastructure and minimize technical debt by adopting a user and application-centric secure access model.
  • With this innovative solution,you can streamline your processes,reduce complexity,and enhance security while minimizing costs.

 

Product Highlights

Identity Management

  • Integrate with your existing cloud IdPs such as Google Workspace, Microsoft Azure.
  • Connect with Active Directory servers 2012/16/19/ADFS or Local User Management through Seqrite Centralized Security Management.
  • Password less OTP-based authentication for local user database.

 

Application Access

  • Agentless and agent-based access options for applications with protocols:HTTP,HTTPS,RDP,SSH,Telnet,VNC,FTP,SMB,etc.
  • Secure application authentication and access to SaaS apps such as Office365,Google Workspace,Zoho,Zoom,Salesforce and so on.
  • Seamless access to Network Applications that include both TCP&UDP protocol support.(Available as additional license pack)

 

Zero Trust Policies

  • Zero Trust Policy to define which user(s)has access to which app(s) with a default deny approach.
  • Layer 7 Firewall Policy to block traffic originating from unwanted IP(s)/countries and allow only necessary.
  • Layer 7 DDoS Policy to allow only a certain number of requests in each timeframe and deny the rest.
  • Device Posture Assessment is based on multiple factors to grant access to the correct devices.

 

Granular Controls over Applications

  • Provision for restricting remote desktop sessions to a limited application;granting remote application access instead of exposing the entire server.
  • Restrictions for clipboard access and file transfer.
  • View user activity through application session recordings.
  • WAF Rules to protect business-critical applications from layer 7 attacks such as SQL Injections,Cross Site Scripting,OS Command Injections,System Resource Access,and Server-Side Template Injections.

 

Licensing Model for Seqrite ZTNA

 

Feature Name

 

TRIAL EDITION 30-days

STANDARD EDITION

1-year/3-years

ENTERPRISE EDITION

1-year/3-years

Description

 

Try secure remote access for FREE for 30-days.

Connect your own users, apps, and services.

Secure remote access for small and medium

enterprises

Secure remote access for large enterprises

Price

FREE for 30-days

Annual Subscription

Annual Subscription

Remote Access:

Cloud Administration Portal

 

YES

YES

YES

Number of sites

 

1 site

1 site

1 site

Number of app

connector groups

 

1 group

 

Up to 3 groups

 

Unlimited

 

Supports agent-less and agent-based secure remote access

YES

YES

YES

Support for Network Apps (includes both TCP-UDP protocol)

NO

 

Add-on

 

Add-on

 

Configuration:

Supports custom domain for user-apps cloud portal

YES

Requires DNS verification from the customer’s side

YES

Requires DNS verification from the customer’s side

YES

Requires DNS verification from the customer’s side

Number of applications

and services

Up to 10 applications

and services

Up to 100 applications nd services

Unlimited

 

Supports Application

Session Recording for

WebRDP,WebSSH,

WebTelnet & WebVNC

NO

 

Add-on

 

Add-on

 

Number of users for cloud user portal (employees,contractors, vendors)

Up to 10 users

 

Up to 1,000 users

 

Unlimited

 

Number of endpoints

with ZTNA agent

Up to 30 users

 

Up to 500 users

 

Unlimited

 

Logs Retention:

Number of days for which cloud, system, and application logs

will be retained

Up to 30-days

 

Up to 180-days

 

Up to 180-days

 

Number of days for which audit trail will be retained

 

Up to 30-days

Up to 180-days

Up to 180-days

 

Quick Navigation;

© Copyright 2000-2025  COGITO SOFTWARE CO.,LTD. All rights reserved