Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
FerrumGate is an Open Source Zero Trust Network Access project (ZTNA). It uses advanced identity management and access management technologies to provide secure access to your network. Multi-factor authentication, continuous monitoring and granular access controls.
It can be used for secure remote access, cloud security, Privileged Access Management, Identity and Access Management, Endpoint security, and IOT connectivity.
Description
The RevBits Zero Trust Network, (ZTN), helps you isolate and protect your internal assets by moving the network perimeter to the endpoint. RevBits Zero Trust Network, (ZTN), moves the network perimeter to the user. This helps protect and isolate internal network assets without the need for complex network segmentation. RevBits ZTN is focused on protecting network resources, such as applications, services, accounts, and assets. It trusts no one by default, regardless of whether they are inside or outside the network. Implementing a zero-trust architecture is now easier than ever.
API Access
Has API
API Access
Has API
Integrations
Censornet MFA
Yubico YubiKey
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
FerrumGate
Founded
2022
Country
United Kingdom
Website
ferrumgate.com
Vendor Details
Company Name
RevBits
Founded
2016
Country
United States
Website
www.revbits.com
Product Features
Product Features
Network Security
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning