
Absolute EdgeAbsolute
Absolute ZTNA provides secure, resilient access to applications by creating a context-based access boundary. It minimizes risks, optimizes user experience, and ensures continuous real-time risk assessments with a tamper-proof infrastructure.
Vendor
Absolute
Company Website
Product details
Absolute Edge
The best user experience for the software-defined perimeter.
Embrace a Zero Trust approach
Many organizations have started to embrace a Zero Trust approach and are considering augmenting their conventional network access security concepts such as enterprise virtual private networks (VPNs), with Zero Trust Network Access (ZTNA) solutions. Absolute ZTNA, delivered as part of the Absolute Edge™ product package, stands out in a crowded field.
Highlights
- Broad OS support (Windows, Apple iOS and MacOS, Android). Resilient Windows client makes ZTNA tamper-proof.
- Minimize risk while optimizing user experience
- Allows for continuous real-time risk assessments
- Creates a context-based, logical access boundary around a set of applications – wherever they're hosted
- Makes applications invisible to unauthorized users, which reduces the attack surface
- Resilient, self-healing infrastructure for cloud and on-premises deployment
- Optional Secure Web Gateway Service delivers a secure browsing experience for all – desk, mobile, or hybrid users
Stay resilient with Absolute ZTNA
Threat detection and prevention
- Ensure uninterrupted secure access, no matter where your employees do their work with the world’s first self-healing ZTNA solution from Absolute.
- The self-healing Secure Access client for Windows can automatically repair or reinstall itself if tampered with, accidentally removed, or otherwise stops working.
- ZTNA policy actions strengthen the foundation of your Zero Trust security posture, bolstering the protection for employees and restricting lateral movement through your network.
- Optionally, scan for the presence of malware, including worms, Trojan horses, and spyware.
Secure and optimized remote access
Secure application access
- Applications are made invisible to unsanctioned users, ensuring your organization is safe from intruders or high-risk connections. Control access to the Web, as well as private and public cloud applications based on risk and compliance requirements associated with a multitude of contextual factors like time of day, user, device’s security posture, geolocation, network connection, etc.
- Control access to the Web and cloud applications based on risk, including contextual factors like time of day, user, device security posture, geolocation, network connection, etc.
- Enforce consistent policies for all user access - in the office, on the road, and at home - by applying Zero Trust Network Access principles.
- Optionally, block malware (including zero-day threats) from reaching endpoints and networks by rendering websites in isolated containers located on remote servers far from the endpoint.
Enforcing dynamic policies at the endpoint
Mobile-friendly
- Dynamic ZTNA policies are enforced as closely as possible to the end user, meaning at the endpoint. This eliminates chokepoints as well as protects device data and meets the most advanced NIST SP 800-207 Zero Trust Architecture recommendations.
- On-premises to cloud doesn’t happen overnight. Neither does full Zero Trust. Absolute is the only vendor to provide a world-class VPN and ZTNA solution as part of its platform, allowing for rapid or gradual ZTNA adoption.