Zero-Trust
Zero-Trust

Filter

Locations


Result types


Type of company


Industries


Company status

Number of employees

to

Founding year

to


Lock keywords

Exclude keywords

Optional keywords

Clear filters

Products and services for "Zero-Trust"

Image for Zero Trust Architecture Product Framework
Product

Verified

Zero Trust Architecture Product Framework

Loop Secure understands the challenges of achieving zero-trust security. From implementing the framework to understanding the zero trust architecture and recommending the best technologies

by Loop Secure

Image for Zero Trust Service - Defensive Security Services | Loop Secure
Product

Verified

Zero Trust Service - Defensive Security Services | Loop Secure

Increase visibility, eliminate unwanted access and achieve zero trust security to secure your organisation. Secure Microsoft 365 effectively. Find out how.

by Loop Secure

Image for Zero Trust
Product

Verified

Zero Trust

Zero Trust

by Quest Software Public Sector Inc.

Image for Zero Trust Solutions | Entrust
Product

Verified

Zero Trust Solutions | Entrust

Entrust offers an unmatched suite of Zero Trust solutions to help customers protect identities and data, reduce risk, and achieve compliance across their multi-cloud infrastructure.

by HyTrust

Image for A Zero Trust approach with Google Workspace: Virtual discussion - THE CLOUD COMMUNITY
Product

Verified

A Zero Trust approach with Google Workspace: Virtual discussion - THE CLOUD COMMUNITY

A Zero Trust approach with Google Workspace

by The Cloud Community

Image for Zero Trust - Titania
Product

Verified

Zero Trust - Titania

Zero Trust | "Trust nothing, verify everything." NIST | What is Zero Trust? | Zero Trust Principles | Zero Trust Requirements for U.S. Federal Agencies | The Challenge for Federal Agencies | The Zero Trust Maturity Model | Zero Trust Security for Private Sector Organizations | Zero Trust for PCI Compliance | How Nipper and Nipper Enterprise can work towards Zero Trust Maturity | Selected Resources

by Titania Ltd

Image for Zero-Trust — ECS
Product

Verified

Zero-Trust — ECS

ECS has the expertise to help guide enterprise organizations of all sizes to effective zero-trust implementation.

by IndraSoft, Inc.

Image for Zero Trust - LiveAction
Product

Verified

Zero Trust - LiveAction

ZERO TRUST | Power the proof that Zero Trust demands. | Accelerate your journey to Zero Trust. | Take a proactive approach to Zero Trust. | Always-On Network Visibility | Organizations that adopt a Zero Trust security model experience 31% fewer security incidents. | Advanced Security Analytics | Organizations that implemented Zero Trust see an ROI of ~123% over three years. | Maintain a Zero Trust security posture | Demonstrate compliance at all times | Get your risk closer to zero | Trusted by 1000+ of the world’s largest companies. | Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et | Your FAQs, answered. | FAQ Headline | Lorem ipsum dolor sit amet sed do eiusmod tempor incididunt ut labore et. | Lorem ipsum dolor sit amet sed do eiusmod tempor incididunt ut labore et. | Lorem ipsum dolor sit amet sed do eiusmod tempor incididunt ut labore et. | Add more, see more, protect more. | LiveNX | ThreatEye | LiveWire | Explore other Network Security Management Solutions. | Zero Trust is Powerful. So is ThreatEye.

by LiveAction

Image for  Zero Trust durchsetzen | Ping Identity
Product

Verified

Zero Trust durchsetzen | Ping Identity

Hier erfahren Sie, wie Sie mit einem auf Identität basierenden Zero Trust-Ansatz die Fernarbeit in Ihrem Unternehmen absichern, die digitale Transformation beschleunigen und reibungslose Online-Erfahrungen anbieten können.

by Ping Identity

Image for Zero Trust Architecture | Merlin Cyber
Product

Verified

Zero Trust Architecture | Merlin Cyber

Merlin Cyber has developed a holistic approach focused on zero trust architecture (ZTA)/.

by Merlin International

1087 companies for "Zero-Trust"

Datacloak's Logo

Shenzhen, China

11-50 Employees

2018

DataCloak (Shenzhen) Co., Ltd. (hereinafter referred to as DataCloak), founded in June 2018 and headquartered in Shenzhen, Guangdong, China, is a leading infrastructure innovation company in data security,and provide next-generation data security solution which meets the Zero Trust Architecture standard for enterprise customers. DataCloak is committed to the development of a zero trust data security platform to help enterprises quickly complete the digital transformation and infrastructure upgrades required in the cloud era, and achieve global borderless data security.

+

Featured

Product
Image for DACS Pro Zero Trust Endpoint Secure Workspace

DACS Pro Zero Trust Endpoint Secure Workspace

... DataCloak | Zero Trust Endpoint Secure Workspace|DACS Pro|Data Security|Secure Workspace|Data Hierarchical Classification|Adaptive Security|Software Defined Perimeter|AI Engine|Trusted ...

BastionZero's Logo

Boston, United States

11-50 Employees

2017

Read unique technical insights from the BastionZero team. Learn how BastionZero works and get it working in your environment. Learn more about BastionZero from our resource center. With BastionZero, infrastructure teams can easily configure, manage and secure fine-grained access controls to infrastructure targets in any cloud or on-prem environments. If BastionZero’s cloud service is compromised, then the adversary’s options are limited.

+

Featured

Core business
Image for Zero trust infrastructure access platform | BastionZero

Zero trust infrastructure access platform | BastionZero

... BastionZero’s leading infrastructure access platform delivers fast zero trust access without creating a single point of compromise. ...

Zentera Systems's Logo

San Jose, United States

11-50 Employees

2012

Our CoIP® Platform provides award-winning Zero Trust networking, security, and multi-cloud connectivity that overlays on top of any infrastructure in any fragmented environment, allowing customers to be up and running in less than a day. The CoIP Platform has been deployed by global enterprises to secure employee and third-party network access for compliance, protect sensitive data against leaks, and instantly connect hybrid applications and containers running in the cloud and on premises. The Silicon Valley-based company has received numerous recognitions, including Cool Vendor for Cloud Security by Gartner. Zentera Systems was founded by Jaushin Lee, President and CEO, in 2012. Realizing that networking and security would converge in the cloud, he architected the company’s revolutionary CoIP Platform.Zentera was inspired by Jaushin’s experiences at Silicon Graphics in the late 1990s.

+

Featured

Product
Image for Zero Trust Security with CoIP Platform

Zero Trust Security with CoIP Platform

... The CoIP overlay provides an instant on-ramp for Zero Trust, enabling companies to adopt a Zero Trust security posture for even legacy apps and data. ...

Worldr's Logo

London, United Kingdom

11-50 Employees

2019

All product and company names are trademarks or registered trademarks of their respective holders. Use of them does not imply any affiliation with or endorsement by them.

+

Featured

Product
Image for Zero trust, zero disruption

Zero trust, zero disruption

... Zero trust, zero ...

Route443's Logo

Maastricht, Netherlands

11-50 Employees

2016

Organizations, in a wave of frenetic activity, are resetting their security posture. These actions require a shift in mindset in building cybersecurity resilience. Businesses worldwide struggle against continued extortion attempts by attackers. Business e-mail compromise, ransomware and data fraud acts, are becoming more commonplace and organizations must radically change their security posture; to evolve and match shifts in technology representative of business move to cloud, the proliferation of mobile, whilst facilitating these digital transformation efforts. Systemic cybersecurity challenges have crept up on organizations, with a realization that cyber resilience is both a must and a public good.

+

Featured

Core business
Image for Route443

Route443

... and its most valuable assets and sensitive data. However, embracing zero-trust is neither simple nor effortless. The process involves a learning curve, and despite what other cybersecurity companies may want you to believe, zero-trust isn’t a technology that you can just simply buy. ...

Gradient's Logo

Boston, United States

11-50 Employees

2018

Gradient Cybersecurity Mesh (GCM) is a true zero-trust solution that stitches together hardware-based roots of trust with nation-state hardened software to eliminate the threat of credential-based cyberattacks. In addition, GCM creates a frictionless and passwordless user experience without requiring any changes to your existing infrastructure. Cybersecurity Forensics Lead Fortune 500 Oil & Gas Supermajor.

+

Featured

Product
Image for Gradient Technologies - Zero Trust Cloud Segmentation

Gradient Technologies - Zero Trust Cloud Segmentation

... Gradient Technologies - Zero Trust Cloud ...

IoT Armour's Logo

Singapore

1-10 Employees

.. powered by SDP architecture and Blockchain technology. .. with IoT-enabled mgmt. systems for energy, utilities, etc. .. cars, autonomous trucks, unmanned aerial vehicles, etc. .. powered by a host of connected and smart devices. Next-gen Zero Trust Cybersecurity for critical systems, connected devices, and integrated IoT networks.

+

Featured

Core business
Image for Zero Trust Cybersecurity for critical systems, connected devices, & integrated IoT networks

Zero Trust Cybersecurity for critical systems, connected devices, & integrated IoT networks

... Zero Trust Cybersecurity for critical systems, connected devices, & integrated IoT ...

Zero Trust [SAS]'s Logo

Saint-Denis, France

11-50 Employees

2017

Amener les meilleures solutions et processus de sécurité aux ETI à prix étudié et connu d’avance. Dans toute entreprise, qu’elle soit Grand Compte ou PME-ETI, la digitalisation inhérente à son activité est un facteur important de productivité et de compétitivité. C’est aussi une des causes de l’augmentation des risques de sécurité. Zero Trust, société experte en services de cybersécurité, aide les ETI et PME à se préparer aux attaques et à gérer les risques afin de diminuer les impacts possibles. Le but est d’assurer une meilleure protection des données et des actifs, dans le cloud ou on-premise, pour que les métiers puissent évoluer de manière agile et sécurisée.

+

Featured

Core business
Image for Accueil | Zero Trust

Accueil | Zero Trust

... Zero Trust notre enjeu la satisfaction de nos ...

Quest Software Public Sector Inc.'s Logo

1001-5000 Employees

Quest’s market leadership, comprehensive portfolio of solutions and identity-centric approach to cybersecurity enables federal agencies to implement Zero Trust and least-privilege security models. The ubiquity of AD is both a strength and potential weakness for every agency. Reduce the risk, complexity and cost often involved with traditional methods used for Microsoft-platform migration and consolidation projects. Increase visibility before, during and after a cybersecurity incident. Quest is a leading provider of solutions that support the Federal Data Strategy, which is aimed at promoting the use of data as a strategic asset toward enhancing the delivery of public services and improving the customer experience for federal workers and citizens.

+

Featured

Product
Image for Zero Trust

Zero Trust

... Securing the Perimeter: Reconciling Zero Trust and the Expanding Attack ...

ColorTokens's Logo

United States

251-500 Employees

2015

Designed to deliver unparalleled customer value and accelerated mutual growth by harnessing partner expertise and ColorTokens cybersecurity technology. Stop sophisticated cyberattacks and reduce your blast radius with ColorTokens innovative solutions from Zero Trust and microsegmentation to cloud security.​. Gain comprehensive visibility of all traffic, stop attack propagation via lateral movement, and simplify regulatory compliance. Harden endpoints and servers including legacy systems, by enforcing execution of ‘good’ applications and nothing else. Identify risks, vulnerabilities and malware hidden in your AWS, GCP and Azure environments including dependent libraries, OSs and configurations.

+

Featured

Product
Image for Zero Trust Adoption

Zero Trust Adoption

... Adopt a zero trust-based security framework for networks and endpoints with the ColorTokens Xtended ZeroTrust™ Platform, aligning with NIST’s Zero Trust Architecture. ...

Show More

„Zero-Trust“

Zero-Trust is an approach to cybersecurity that assumes that no one is to be trusted by default and that all network traffic should be verified and authenticated. Instead of relying on traditional methods of perimeter-based security, Zero-Trust focuses on verifying each user’s identity, device, and asset before granting access. This approach allows organizations to improve their cybersecurity posture by creating multiple layers of verification and authentication, and by continuously monitoring user and device behavior.