The Zero Trust Secure Access app secures all access across internal and cloud applications and environments from any user, device, location, at any time.
Trend Vision One offers a comprehensive
solution - Zero Trust Secure Access - to ensure that only authenticated
users with compliant devices can connect to authorized applications and network resources
at a
given location and time. By eliminating the excessive trust placed on networks and
locations and
by providing device-aware, identity-based, and rule-powered access control, Zero Trust Secure Access allows you to make adaptive, automated decisions on
Private and Internet Access to mitigate, detect, and respond to risks in your network
environments. This complete security model helps you take advantage of the benefits
of cloud
applications while maintaining control of your corporate resources.
Zero Trust Secure Access manages user risk and controls access to
resources using the following kinds of rules:
-
Private access rules control access to private or internal apps, including private cloud apps. Enforce private access rules with connector virtual appliances associated with each private app.
-
Internet access rules control access to the internet, such as blocking certain kinds of risky sites or public cloud apps. Enforce internet access rules with an Internet Access Gateway.
-
Risk control rules control user accounts and devices based on risk scores and other behavior. Risk control rules can also block private or internet access for individual users under preset conditions.
A secure access module is installed on each device to enforce the rules, and secure
access
should be permitted by existing firewalls. Alternatively, PAC files and local gateways
can
facilitate access to network resources for devices that cannot install the secure
access
module.
The following table describes each screen in Zero Trust Secure Access
that you can access from the left navigation.
Screen
|
Description
|
Secure Access Overview
|
Provides a summary view of risk control, private access, and internet access rules
across
your environment
|
Secure Access Rules
|
Manage secure access rules to control access to internal/internet apps and services,
as
well as user access
|
Secure Access Resources
|
Manage the conditions and settings that are used in secure access rule configuration
|
Secure Access History
|
Provides detailed logs about user/device access to internal and internet resources
|
Secure Access Configuration
|
Deploy Private Access and Internet Access services
|