Platform Components

CoIP Access Platform provides a complete solution for rapidly onboarding users and endpoints of all kinds into a Zero Trust Security framework.

machine concept
zCenter CoIP Controller
The zCenter CoIP Controller is the centralized orchestration and control point for all access security policies. The zCenter controller features GUI and API-based management and control options, and robust high-availability (HA) and disaster recovery (DR).
zns
ZNS Virtual Switch
The ZNS Virtual Switch bridges CoIP WAN connections, with support for redundancy, scale out and scale up to achieve full control over application availability, bandwidth and latency. The ZNS Switch Node is available as a Linux physical or virtual appliance.
zlink2-1
zLink CoIP Endpoint Proxy
The zLink CoIP Endpoint Proxy deploys as an agent on an endpoint to enforce security and connectivity policies, handling authentication, security filtering, and Application Interlock. The CoIP zLink Endpoint Proxy is available for practically any platform, including Linux, Windows, and Mac OS, making it ideal for onboarding virtual machines or cloud instances.
Learn More
Gateway Proxy
CoIP Gateway Proxy
A CoIP Gateway Proxy is a physical or virtual appliance that provides an agentless on-ramp for Zero Trust access. A single Gateway Proxy can be used to create connections to multiple services through the CoIP Access Platform (for example, on-premises LDAP servers or code repositories), or to provide access to a network.
Learn More
icon-msg
Micro-Segmentation Gatekeeper
The Micro-Segmentation Gatekeeper is a hardware appliance that deploys inline with critical assets and workloads, such as IoT devices, manufacturing, and critical infrastructure, to protect them with instant Zero Trust Access and Application Chambers. The MSG supports high port densities and can be centrally managed by the zCenter CoIP Controller.
Learn More
CoIP Launcher
CoIP Launcher
CoIP Launcher is an agentless access method for CoIP ZTNA services, including secure remote desktop, web app access, as well as TCP and UDP applications. CoIP Launcher supports Windows, Mac, and Linux operating systems.

Key Features

password
CoIP Launcher
Agentless secure user access with strong Zero Trust authentication for remote employees, contractors, and 3rd parties, supporting ZTNA for remote desktops, web apps and standard TCP/IP apps
smart-discovery
CoIP XDRi
Rich analytics augmenting XDR, enabling user information, endpoint and software process fingerprints, and network behavior to be correlated against corporate policies and security threat information, and built-in security controls for response and remediation
end-to-end encryption
CoIP AppLink
End-to-end, application-specific encrypted link that starts and ends in the endpoint OS, and dynamically set up, driven by policy-approved traffic, for a minimal attack surface
product-4
File Transfer Manager
Secure file transfers across distributed network silos with complete audit trails and workflows for approvals that help protect against data leaks

How It Works

CoIP Access Platform authenticates users, endpoints, and applications, using corporate identity providers, certificates, and other device/app fingerprints.

When a user or application requests access, CoIP Access Platform checks policy, sets up a CoIP AppLink tunnel for authorized connections if required, and inserts required security functions  inline, such as firewall and threat detection/prevention.

 CoIP Access Platform supports nearly any cloud environment, bare metal, or IoT device with agent-based, agentless, and gatekeeper deployment options, and deploys in existing environments without requiring network and security infrastructure changes.

CoIP Access Platform provides administrators with complete visibility into user, endpoint, and application end-to-end behavior.  It provides a rich source of data and intelligence for XDR analytics, as well as control over the cyber kill chain for response and remediation.

computer chip security lock

 

sketch

Planning for your CoIP Access Platform deployment


  1. Learn about the Architecture and Components

  2. Review our video and whitepaper resources

  3. Review our additional design support resources and tools

  4. Get CoIP Access Platform:

    Find CoIP Access Platform on AWS >

    Get Zentera Air >

  5. Contact us for questions and support


implementation

Implementation

CoIP Access Platform is simple to deploy. Completely built out of computing elements and with physical and virtual appliance options, CoIP Platform can be spun up in your data center or in the cloud.

onboarding

Onboarding

CoIP Access Platform is non-intrusive and can be deployed to a running application server without requiring a restart. Once deployed, administrators can build and test policies in the running environment before turning on security protections.

operations

Operations

CoIP Access Platform offers a full suite of diagnostic and monitoring APIs that integrate into your operational flow, and rich CoIP XDRi data can be exported to a SIEM, such as Splunk or ELK, for further processing.

training-services

Training and Services

In addition to our library of resources and training videos, Zentera's experienced engineers and architects are available to provide training, architecture guidance, and to advise operational best practices for your projects.

Stay Connected

Sign up for our newsletter and to be notified of product, solution, and company news.