Zero Trust Network Architecture

What is Zero Trust Network Architecture?

TransientX is a zero-trust network access (ZTNA) solution using the application network. Remote users' devices are never connected to corporate networks, instead applications on the user's device and on the corporate network are interconnected independently of any physical network.

How Does TransientX Work?

1. Control Unit: It is the component that verifies, allows and regulates connections. The Control Unit is provided as a service in the TransientX cloud (SaaS).
2. Connector: Connectors are located in front of applications to be accessed, usually in a private cloud or on-premises data center.
3. Clients: Users upload to their devices to access corporate resources. When an authenticated user requests access to a remote institution resource, a temporary application network is created between the user's device and the institution resource (enterprise application, server, etc.). The connectors are never exposed to the internet, and there is no external connection request to these connectors. Thus, they are located behind the firewall and other security elements. A peer-to-peer tunnel is established between the application on the user device and the connector, which does not allow data traffic to pass through cloud gateways. Traffic is done end-to-end over DTLS protocol with 2048 bit switches. TransientAccess combines a zero-trust network architecture with granular access control policies, application segmentation and full visible audit logs.