Open Source

Zero Trust Access

"Deploy zero trust virtual networks with a few clicks"

"No Trust, No Access"

how zero trust access works

Use Cases

Secure remote access

Zero trust access can be used to secure remote access to corporate resources by verifying user identity and device trustworthiness, regardless of the user's location.

Cloud security

Zero trust access can be used to secure access to cloud resources, including SaaS applications, by ensuring that only authorized users and devices can access them.

Privileged access management

Zero trust access can be used to secure privileged accounts and access to critical systems by implementing strict access controls and monitoring user activity.

Identity and access management

Zero trust access can be used for identity and access management (IAM) to ensure that only authorized users have access to sensitive data and systems.

Endpoint security

Zero trust access can be used to secure endpoints, such as laptops and mobile devices, by verifying device trustworthiness and implementing access controls based on user identity and device posture.

IoT (Internet of Things)

Zero trust access can be used to ensure that only authorized users and devices can access the IoT devices and data. And IOT devices can reach only needed resources.

How It Works

Forget traditional private networks, VLANs, DMZ, firewalls
Be safe with FerrumGate Zero Trust virtual networks on premises, on cloud
how zero trust access works

Features

Open Source

All sources are on github. Please give it a star. All contributions are welcome, please join us. And community is here.

Single Sign-On

Authenticate with any IdP like Local, Active Directory, Google Workspace, Azure AD, Okta, etc..., with MFA, device posture, location, time check etc...

Easy to use

Deploy zero trust virtual networks without any changes to your networks. Deploy on premises or cloud

Access Policies

Always access with least privileged access, always verify every request if it compensates conditions like MFA, file path etc...

Insights

Observe and record every activity, and analyze every suspicious activity at the packet level

Intelligence

Supports IP intelligence providers and Fqdn intelligence providers, Allow or deny according to IP attributes like country, or Fqdn categories

Perfect Solution For Mitigating Attack Surface

Just define [who, when, from, with] can access which resource

Replace your generic vpn with zero trust network access

Discover More

Easy to Use with Awesome Features

  • No change requires at your network
  • Easy Management
  • Multi Location
  • Multi Network
  • High Avaibility
  • Device Posture Check
  • Single Sign-on(SSO)
  • Passwordless Access
  • Any IdP (Identity Provider) support
  • MFA(Multi Factor Authentication) support
  • PKI (Public Key Inftrastructure) support
  • Country based Access
  • Time based Access
  • Block VPN, TOR based Access
  • IOT & Edge Connectivity
  • VPN Alternative
  • DNS Filtering
  • Secure Web Gateway
Learn More

Support and maintenance

Our experienced engineers provide quick responses to unlimited questions and issues relating to all components of the solution. Support includes help with deployment, configuration, bug fixes, and upgrades.

  • Dedicated team of engineers
  • Periodic health checks
  • Upgrades to the latest version
  • Quick bug fix

service@ferrumgate.com

  • 8/5 support coverage
  • 4 hours maximum response time
  • Upgrades to latest version
  • Support for unlimited questions
  • 2 health checks per year
  • Telegram, WhatsApp Connectivity
  • 24/7 support coverage
  • 2 hours maximum response time
  • Upgrades to latest version
  • Support for unlimited questions
  • 4 health checks per year
  • Telegram, WhatsApp Connectivity