Product

Team Member

AWS Vertrified Access

Security Software
Identity and Access Management

Secure access to corporate applications without a VPN. / Implement a work-from-anywhere model with added security and scalability.

☆☆☆☆☆ 0.0 Based on 0 Reviews

AWS Vertrified Access

Learn More

About the AWS Vertrified Access

AWS Verified Access is a cloud-native service built on Zero Trust principles, designed to provide secure, VPN-less access to corporate applications. It continuously evaluates each access request in real-time based on a user's identity and device security posture before granting access. This eliminates the need for traditional VPNs, simplifying connectivity and enhancing security. Key features include fine-grained access policies written in Cedar (AWS's policy language), integration with AWS IAM Identity Center and third-party identity providers (IdPs) like Okta and JumpCloud, and device trust providers (e.g., Jamf, CrowdStrike, JumpCloud). It supports both HTTP(S) and non-HTTP(S) applications (like TCP, SSH, RDP) and offers comprehensive logging for simplified troubleshooting and audits.

Supported Platforms

Supported Languages

Pricing Of AWS Vertrified Access

Features Of AWS Vertrified Access

AWS Vertrified Access Media