TransientAccess is a next-generation Zero Trust Network Access (ZTNA) solution which builds ephemeral zero trust application networks for every user. Instead of connecting devices to each other, TransientAccess connects apps on those devices to each other, using isolated overlay networks built for every user. Devices, managed or unmanaged, are never trusted or given direct access to corporate networks. Coupled with granular access control policies and full visibility into application and user activities, It provides true zero trust access by using microcontainers that isolate trusted apps and provide application-level connectivity independent of the underlying physical network topology. Simple isn’t easy - we’ve done the hard work making ZTNA easy to deploy, integrate and use.
TransientAccesses has 3 components:
The component which authenticates and authorizes users and orchestrates connections. This is normally deployed in TransientX cloud as a service (SaaS).
Connectors are deployed in front of applications which will be accessed, usually in a private cloud or on-prem data center.
Users install TransientAccess clients on their devices in order to access enterprise resources.
When an authenticated user request access to the remote enterprise resource, a temporary network of apps on users’ device and the enterprise resource (e.g. enterprise apps, servers) is created as needed.
Software Defined Perimeter Architecture
App Segmentation and Full Visibility
Challenge: Connecting remote users
TransientAccess Delivers True Zero Trust Applications Access:
Challenge: Access Sensitive Data Securely
Challenge: Existing solutions are complex, difficult to deploy
TransientAccess has Frictionless Deployment