Founded in 2019, Zero Networks is a unified platform for network segmentation, identity segmentation, and remote access. Zero Networks’ microsegmentation offering is automated, agentless and segments all network assets to stop lateral movement and block ransomware with a firewall and just-in-time MFA. The advanced ZTNA solution allows an enterprise to securely connect employees and vendors to its network, without compromising speed or performance. And the Identity Segmentation solution provides for unprecedented control of admin and service accounts to enable the principle of least privilege. Offered on a single platform and UI, Zero Networks is making true Zero Trust architecture a reality for enterprises of any size.
Do You Manage Peer Insights at Zero Networks?
Access Vendor Portal to update and manage your profile.
Micro-segmentation is HARD. Other vendor projects we reviewed seemed to drag on way beyond the anticipated timeline and didnt always deliver on the basic requirements, but our experience with Zero Networks was completely different. Zero Networks does not attempt to reinvent host-based firewalls by placing itself in the network stack - instead it leverages the OS's existing features and provides a single, consistent platform to manage the policy. Policies can be managed at different levels - from the individual node, through groups, networks, to enterprise wide - and are then seamlessly translated and deployed as individual rules on each host. Despite the ease of using the management platform, the automation features mean it is possible to avoid spending much time there. After initial deployment, hosts are profiled to understand their role and applications, then the solution monitors traffic patterns and proposes additional rules to allow existing traffic to continue uninterrupted while blocking traffic to unused ports and processes. The network traffic visibility that drives the learning process continues to be exceptionally valuable after nodes are moved into enforcing (segmented) mode, providing a powerful dataset to monitor and analyze traffic at a port and process level.
Automation and Orchestration! Any critical pillar of Zero Trust functional area should be standing on the strong base stone, which includes Visibility & Analytics, Automation & Orchestration, and Governance. Zero's outstanding automation & orchestration made super complex workload level of true micro segmentation task to actually achievable, manageable and scalable task per our need.
Ease of deployment - roll out was straightforward, simple and quick even in our brown-field environment Ease of ongoing management - maintenance is minimal, and provisioning new rules is simple and fast Effectiveness - multiple pen-testers have been unable to circumvent it Pricing - Highly competitive pricing Fulfills its promises - in a segment full of products that promise automation and low maintenance but fail to deliver, Zero shines with its simplicity and effectiveness Integrates seamlessly with our IdP and network infrastructure Zero's design provides not just a micro-segmentation solution, but an identity aware zero-trust solution that can bring zero-trust to legacy systems
Linux integration can be fragile if you have other products utilising iptables / nftables on the same host. Identity-based MFA processes can't reliably identify end-users on non-Windows platforms, so some MFA factors do not always work (although fallback to the browser popup factor is reliable). Some inconsistencies in the interface are gradually being ironed out; for example, on some pages it is possible to search by a partial match on hostname but on others each host must be individually specified.
Customized alerting options for Threat Detection would be nice to have. I understand that Zero's main mission is segmentation not NDR (Network Detection and Response). But the visibility gained from Zero Networks can contribute to NDR in many different ways if the customized alerting option is available.
At this stage, 18 months in from our initial deployment, I don't have any dislikes