https://store-images.s-microsoft.com/image/apps.18214.36bf2ddb-196a-4875-86d8-4f25cbef99b8.3f3f5337-5974-448a-bbf1-9db02ad898a2.151641db-4c84-4edc-92d7-a92efb4de68f
Zscaler Private Access Network Connector
על-ידי Zscaler, Inc.
Just a moment, logging you in...
Build a secure a tunnel to the VPN (for Legacy Apps) gateway for secure access via Zscaler App
Zscaler (NASDAQ: ZS) enables the world’s leading organizations to securely transform their networks and applications for a mobile and cloud-first world. Its flagship services, Zscaler Internet Access™ and Zscaler Private Access™, create fast, secure connections between users and applications, regardless of device, location, or network. Zscaler services are 100 percent cloud-delivered and offer the simplicity, enhanced security, and improved user experience that traditional appliances are unable to match.
Zscaler Private Access™ (ZPA) support VoIP and server-client applications using a network tunnel. The solution leverages the Zscaler Zero Trust Exchange™, operating on a zero trust model that verifies identity, device posture, and access permissions for every user and device before granting access to these network applications. It uses a separate, dedicated tunnel that is available for applications that are not compatible with ZPA’s ZTNA service.
אפליקציות נוספות מ- Zscaler, Inc.
Zscaler Private Access ConnectorZscaler, Inc.Connects private cloud apps to Zscaler Enforcement Nodes (ZENs) for secure access via Zscaler App
+1
Applicable to:
Virtual Machines
NaN out of 4
Zscaler Private Access Service EdgeZscaler, Inc.Connects private cloud apps to Zscaler Enforcement Nodes (ZENs) for secure access via Zscaler App
+1
Applicable to:
Virtual Machines
NaN out of 4
Zscaler Private Cloud ControllerZscaler, Inc.Private Cloud Controllers allow users to continue to access applications during ZPA-related cloud outages or internet service provider (ISP) outages.
+1
Applicable to:
Virtual Machines
NaN out of 4
Zscaler Incident ReceiverZscaler, Inc.The Zscaler Incident Receiver is a tool to securely receive DLP policy violation details via ICAP.
+1
Applicable to:
Virtual Machines
NaN out of 4