Open Source

Zero Trust Access

"Apply zero trust principles with a few clicks, without no change at your network"

"Forget traditional VLANs, firewalls, meet the future of cyber security"

how zero trust access works

Use Cases

Secure remote access

Zero trust access can be used to secure remote access to corporate resources by verifying user identity and device trustworthiness, regardless of the user's location.

Cloud security

Zero trust access can be used to secure access to cloud resources, including SaaS applications, by ensuring that only authorized users and devices can access them.

Privileged access management

Zero trust access can be used to secure privileged accounts and access to critical systems by implementing strict access controls and monitoring user activity.

Identity and access management

Zero trust access can be used for identity and access management (IAM) to ensure that only authorized users have access to sensitive data and systems.

Endpoint security

Zero trust access can be used to secure endpoints, such as laptops and mobile devices, by verifying device trustworthiness and implementing access controls based on user identity and device posture.

IoT (Internet of Things)

Zero trust access can be used to ensure that only authorized users and devices can access the IoT devices and data. And IOT devices can reach only needed resources.

How It Works

Forget traditional private networks, VLANs, DMZ, firewalls
Be safe with FerrumGate Zero Trust virtual networks on premises, on cloud
how zero trust access works

Features

Open Source

All sources are on github. Please give it a star. All contributions are welcome, please join us. And community is here.

Single Sign-On

Authenticate with any IdP like Local, Active Directory, Google Workspace, Azure AD, Okta, etc..., with MFA, device posture, location, time check etc...

Easy to use

Deploy zero trust virtual networks without any changes to your networks. Deploy on premises or cloud

Access Policies

Always access with least privileged access, always verify every request if it compensates conditions like MFA, file path etc...

Insights

Observe and record every activity, and analyze every suspicious activity at the packet level

Intelligence

Supports IP intelligence providers and Fqdn intelligence providers, Allow or deny according to IP attributes like country, or Fqdn categories

Perfect Solution For Mitigating Attack Surface

Just define [who, when, from, with] can access which resource

Replace your generic vpn with zero trust network access

Discover More

Easy to Use with Awesome Features

  • No change requires at your network
  • Easy Management
  • Multi Location
  • Multi Network
  • High Avaibility
  • Device Posture Check
  • Single Sign-on(SSO)
  • Passwordless Access
  • Any IdP (Identity Provider) support
  • MFA(Multi Factor Authentication) support
  • PKI (Public Key Inftrastructure) support
  • Country based Access
  • Time based Access
  • Block VPN, TOR based Access
  • IOT & Edge Connectivity
  • VPN Alternative
  • DNS Filtering
Learn More