Solution Packages to support your Journey to a Zero Trust Architecture
Simple per User Subscription Pricing
Zero Trust Core
Essential Features to Implement Zero Trust Resource Access
Zero Trust Advanced
Zero Trust Core plus Integration and Malware Protection for enterprises at scale
Zero Trust Complete
Zero Trust Advanced plus Complete Data Loss Prevention
-
Unified Zero Trust Service Edge
-
Zero Trust Resource Access Policies
-
Resource Catalog - including Apps, Data and Services
-
User Catalog
-
Asset Catalog
-
Resource Tagging by Type and Location
-
Resource Risk Level Classification
-
User and Group Based Access Policies via Cloud Connectors
-
Zero Trust Reporting - By Resource Type, Resource Location, Security Objective and Security Impact Level
-
Zero Trust NIST 800-207 Criteria-Based Access Policies
-
Connect Cloud Accessible Resources to Zero Trust SSE
-
Encrypted Traffic Inspection and Protection (HTTPS Decrypt)
-
Cloud Security Controls - including Web Filtering
-
Policy Tracing for troubleshooting policies
-
Proxy Combinatorial Rules & Actions - Block, Allow, Redirect
-
Reporting - including Real-Time Dashboards, Drill Down Reports, Reporting Templates
-
Cloud Connector Agents for Windows, Mac, iOS, Chromebooks, Linux and Android
-
DNS Security
-
SAML & OIDC Identity Provider (IdP) Integration
-
Extend Modern Authentication (SAML/OIDC) to Legacy Apps & Resources
-
Zero Trust NIST 800-207 Score-Based Access PoliciesAdd-on
-
Connect Resources on Private Networks (via Tunnels, SD-WAN, WCCP) to Zero Trust SSEAdd-on
-
Asset and Device Posture ChecksAdd-on
-
Zero Trust Scoring AlgorithmsAdd-on
-
Zero Trust Score-Based ReportingAdd-on
-
Threat Dashboards - including preventing malware, phishing, malicious sourcesAdd-on
-
User and Asset Incident Dashboards - including infected devices and users with active incidentsAdd-on
-
Malware PreventionAdd-on
-
Infected Device Detection and Isolation (CnC Callback Prevention)Add-on
-
Phishing PreventionAdd-on
-
Prevent Malicious SourcesAdd-on
-
Malware SandboxingAdd-on
-
Microsoft Cloud App Security Integration (MCAS)Add-on
-
Microsoft Authentication Context (Conditional Access) IntegrationAdd-on
-
Microsoft Sentinel Log Forwarding IntegrationAdd-on
-
Splunk Log Forwarding IntegrationAdd-on
-
Log Forwarding to SIEM - Syslog, SCP, SFTPAdd-on
-
Realtime Inline CASBAdd-on
-
Simplified Tunnel Management (Network Connector)
-
Inline Data Loss Prevention (PII, CCN)Add-onAdd-on
-
Out-of-Band API CASBAdd-onAdd-on
-
Intrusion Prevention (IPS)Add-onAdd-on
-
ChatGPT Risk ModuleAdd-onAdd-onAdd-on
-
Azure Cloud Security GatewaysAdd-onAdd-onAdd-on
-
Reverse ProxyAdd-onAdd-onAdd-on
-
Digital Experience ManagementAdd-onAdd-onAdd-on
-
Exact Data Match DLPAdd-onAdd-onAdd-on
-
Browser IsolationAdd-onAdd-onAdd-on
-
Zero Trust SD-WANAdd-onAdd-on
-
Enhanced Protective DNSAdd-onAdd-on
-
Endpoint EDR IntegrationsAdd-onAdd-on
-
Splunk Enterprise SecurityAdd-onAdd-on
-
Image Text Recognition (OCR)Add-on