VPN Hasn't Kept Up With Changing Business Needs

There is a growing need to migrate applications to different environments and connect them securely. However, the VPN, which has been the traditional workhorse for connecting IP networks, dates back to 1995!  It was designed for a different time with different needs - a time when enterprise networks were reasonably static. It hasn't kept up with requirements for increasingly dynamic computing.

Enterprise application teams are increasingly turning to new tools like Zentera Cloud Access (ZCA) to get projects done quickly, more securely, and future-proofed against new business requirements.

sean-pollock-PhYq704ffdA-unsplash

Connect Applications, Not Networks

ZCA works as an application connector — it connects applications in any environment, without requiring support from the underlying network infrastructure.

Built on the principles of Zero Trust, ZCA authenticates users, endpoints, applications, and services using policy-based connectivity and strong trust factors. It can deploy as a SaaS or as a virtual appliance, without touching existing corporate VPNs, routers, or firewalls. Application teams can set up and manage their own application-centric connectivity using ZCA, without having to file tickets to the corporate IT infrastructure team for support.

application connector-1

Simple to Deploy and Configure

For the application team looking to connect applications across any cloud, Zentera’s ZCA deployment could not be easier. Just install the application connector along into the endpoint (server or VM), and applications will then connect via Zentera’s CoIP overlay.

It's easy to connect cloud VMs to an existing on-premises service, such as a directory service or code repository.  Just deploy a Gateway Proxy close to the service; remote application endpoints will then be able to access the service through the CoIP overlay proxy.

The application connector is installed as a user space agent, so there is no need to modify applications or install kernel modules.

All of this is done…

  • Without configuring a VPN or MPLS transport
  • Without opening firewalls
  • Without connecting networks – no BGP
console console

DEPLOYS AS SOFTWARE

More Infrastructure? Nope.

Customers can deploy ZCA either via Linux-based virtual appliances or via a hosted SaaS from Zentera's global datacenters (see Zentera Air).

No VPN, router, or firewall changes are needed; ZCA's application connector quickly supports a variety of different secure access scenarios.

Zentera Air Diagram

DECOUPLED FROM FIREWALLS

Authenticate with a Zero Trust Overlay

Today, many applications for backend services and support are not connected across the cloud, and any effort to do so will trigger security concerns. With no global cloud network or available VPN to provision, the backend service and operations team is in a predicament. How do you connect client-server applications without worrying about opening firewalls?

ZCA shifts the attention from the traditional network over to the application. All endpoints and applications used in ZCA are authenticated through a centralized policy database that supports both whitelist and blacklist rules.

zca

Stay Connected

Sign up for our newsletter and to be notified of product, solution, and company news.