Ensure that only authenticated users and devices can access your corporate applications and internet sites based on granular rule-based security policies.
Zero Trust Secure Access protects your organization from unauthorized access to internal
and
external applications, and allows you to take immediate or automated action against
possible
access violations or risky user behaviors. Zero Trust Secure Access provides multiple
access
control services to provide the optimal protection against unwanted access.
Service
|
Description
|
End-User Components
|
||
Risk Control
|
Takes action on user accounts or devices that exhibit risky or malicious behaviors
Through integration with your
IAM, Risk Control can identify users and devices that may pose a threat to the
integrity of your organization and allows you to take manual or automated mitigation
actions
(for example, disable a user account that was leaked to the dark web or isolate a
device
from the network after discovering known vulnerabilities).
|
None required
|
||
Private Access
|
The zero trust network access (ZTNA) solution that controls access to internal
applications, data centers, and IaaS environments
After identifying your organization's internal applications and resources through
use of
Private Access Connectors, you can create specific rules to manage user access
based on device usage, time of day, or location.
|
|
||
Internet Access
|
The secure web gateway (SWG) solution that secures access to external websites
Internet access rules allow you to restrict access to external websites and applications
through use of an Internet Access gateway. End-user traffic is evaluated against your
access rules and blocked based on user account, device, security violations, or location.
|
|
||
AI Service Access
|
Advanced AI content inspection and access control capabilities that ensure secure
use of public and private generative AI services and resources
AI service access rules allow you to prevent prompt injection, malicious large language
model attacks, and data leakage through advanced content inspection and content filtering.
End user prompts and AI responses are evaluated and monitored or blocked based on
data filtering rules, content violations, or potential malicious content.
|
|