cyberelements ZTNA solution
Zero Trust remote access to all your IT /OT systems
cyberelements ZTNA solution | Zero Trust remote access to all your IT /OT systems
cyberelements ZTNA solution is a multi-tenant, multi-site Zero Trust private network access product. It implements the principle of least privilege to secure users’ network access to their desktops (real or virtualized) and applications (real or virtualized), wherever they are and whatever device they are using (managed or unmanaged device / BYOD).
The solution controls the integrity of the endpoint and grant access only to applications required to perform the users’ tasks. It offers a single access portal to applications, even if they are deployed in several datacenters. It provides users with similar experience to the one they would have in the office or locally. Furthermore, it ensures that companies comply with their security policies, thanks to a double barrier and a confidential tunnel between endpoints and applications’ connection. Our unique architecture allows outbound-only flows with no opening of network ports and integrating protocol break and user interaction filtering technologies.
cyberelements ZTNA solution is the only European ZTNA product in the 2023 edition of the Gartner Market Guide for Zero Trust Network Access.
Customer story

Zero Trust Lines of Defenses
Mapping NIST Zero Trust Architecture Report
This webinar will explore how cyberelements aligns with the 7 foundational tenets outlined by NIST.
What You’ll Learn
- The 7 Core Tenets of NIST’s Zero Trust Architecture (ZTA)
We’ll break down each of the NIST Zero Trust principles that underpin a resilient Zero Trust model. - cyberelements’ Approach to Zero Trust Compliance
Discover how cyberelements, as a Zero Trust PAM backbone, contributes to realizing these seven tenets natively, by design.
Use Cases

VPN replacement and security for working from home
VPN technology is not suitable for interconnecting untrusted networks, nor for remote connections to different datacenters. VPN also requires the deployment of a client on the user’s device. It does not provide seamless user experience, requiring re-authentication to applications.
cyberelements is a Zero Trust solution, avoiding any deployment on the user’s device, based on the principles of “least privilege”, “JIT privilege” and “zero standing privilege”, applied at the application connection level. It provides unified application access experience, even when applications are distributed across different networks.
Passwordless Behavioral two-factor authentication without additional devices
Secure remote access requires two-factor authentication. Employees do not always have additional devices such as a mobile phone or FIDO2 key. Cyberelements innovates with behavioral biometrics: the users are authenticated by the way they type on their keyboards. When it comes to security, it’s best to take action as early as possible: instead of analyzing user behavior in terms of what they do, we prefer to analyze user behavior in terms of what they are, well before they’ve done anything.


Intuitive and seamless access
Users’ access is centralized via a single portal, whether they’re working from home or remotely, and whether their applications are in one or more datacenters or in the cloud. Users never lose a minute of productivity. Users can also continue to have direct access to their resources: cyberelements fits seamlessly between a tool like MobaXterm and your resources.
Working from home and business continuity
To face unexpected operational events and sustain your business while working from home, you need a solution that guarantees continuity. Employees access their resources in a secure environment after strong authentication, without having to install an agent on their desktop. Workers from home must be able to access their work environment in complete security, whether they use a device managed by their organization or their own personal device (BYOD). cyberelements makes employees and service providers devices, unknown to the organization, trustworthy.


Traceability and regulations
Organizations need to comply to various regulations (GDPR, NIS2, DORA, TISAX…) or different certifications (ISO/IEC, NIST, HIPAA..). cyberelements facilitates audits by providing you with all the necessary information.
You can integrate logs directly into your SOC’s SIEM via SYSLOG.
Third-party access
You need to deliver secure access to your service providers when they connect to your IT systems. The range of security tools is provided by cyberelements: multi-factor authentication (MFA), Zero Trust remote access (granular with protocol break), user device posture check. In addition, cyberelements traceability goes beyond knowing which machine has connected to your network, you know exactly which resources each service provider has connected to.

Main Features
- Double-barrier architecture and connection tunnel to the resource is established only at the time and during its use
- Agentless web access with protocol break
- Multi-factor authentication (OTP, TOTP, certificate, Radius, FIDO2) & Neomia Pulse
- Contextual access management (device posture and user context check)
- Volatile and random network ports, URL rewriting (invisibility of web resources)
- Implementation of the organization’s Zero Trust security policy
- Self-service password change and compliance with password policy
- Assistance with remote control of the user’s device
- Seamless authentication on applications
- Granularity of access rules
- Web portal access to resources, with or without client
- Support a wide range of protocols (Web, RDP, SSH, VNC, Citrix, VPN, SMB…)
- Generic multi-protocol tunnel
- Authentication on AD, on a directory local to the solution, on a third-party IDP through identity federation
- On-premises or SaaS hybrid deployment architecture (cyberelements.io)
- Multi-tenant, multisites, multi-VLAN architecture