11,400 users on managed ZTNA · 24/7/365 · US-based

Business VPN & ZTNA without the legacy appliance and the open-port footgun

Replace your aging VPN concentrator with zero-trust network access. Cloudflare Access, Tailscale, Twingate, Zscaler ZPA. Per-user conditional access, no listening ports on the internet, full audit trail your auditor will actually thank you for.

11,400 users on managed ZTNA Zero VPN-as-attack-vector incidents Sub-4 hr user onboarding 100% MFA + posture enforced

No agent install. No replacement firewall. Migration plan covers your existing concentrator, identity provider, and per-app cutover order. Delivered in 5 business days.

0
Users on managed
ZTNA right now
Zero
VPN-as-attack-vector
incidents on our managed estate
Sub-4 hr
User onboarding
from request to first login
100%
MFA + device posture
enforced on every session
Service tiers

Three lanes for remote access. Pay per user. Cancel any time after the first 12 months.

Same network engineers, same monitoring, same identity-provider integrations. The difference is which broker you sit on and whether branch SD-WAN and SSE bundles are in scope.

VPN Managed
For when you're not ready to rip out the concentrator. We make the legacy stack survivable.
$6/user/mo
Annual agreement · 25-user minimum
  • Manage your existing IPsec or OpenVPN concentrator (SonicWall, Fortinet, Cisco ASA, Palo Alto, OpenVPN AS)
  • MFA enforcement via Duo, Microsoft Authenticator, or Okta Verify
  • Basic session logging shipped to your SIEM or our SOC
  • Monthly account-hygiene report (stale users, orphaned tunnels)
  • 24/7 break-fix on the concentrator with 15-min P1 response
  • Quarterly review on whether you should be on ZTNA yet
Manage my VPN →
ZTNA Enterprise
For multi-site, branch-heavy estates that want SD-WAN and full SSE in one bundle.
Custom
Scoped by user count and site count
  • Everything in ZTNA Standard, on Zscaler ZPA or Netskope
  • Branch SD-WAN overlay: Cato Networks, Palo Alto Prisma SASE, or Versa
  • Full SSE bundle: ZTNA + SWG + CASB + DLP under one console
  • Microsegmentation for east-west traffic inside the data center
  • Named network engineer on your account, monthly architecture review
  • FedRAMP Moderate path for federal-adjacent vendors
Scope Enterprise →
The brokers and concentrators we deploy and manage · no white-label re-skin
Cloudflare Access ZTNA broker Tailscale Mesh ZTNA Twingate ZTNA broker Zscaler ZPA Enterprise ZTNA Netskope ZTNA SSE platform Cato Networks SASE / SD-WAN Palo Alto Prisma Access SSE Cisco AnyConnect Legacy SSL VPN Fortinet FortiClient Legacy IPsec / SSL OpenVPN Access Server Open-source VPN WireGuard Modern VPN protocol Perimeter 81 SMB ZTNA
Use-case matrix · the old way vs the ZTNA way

Seven access patterns. The difference between "VPN tunnel into the LAN" and "per-app, per-user, per-session."

If you read one section on this page, read this one. It's the practical difference between an attacker getting one user's password and an attacker getting your whole network.

Use case Old way (VPN) ZTNA way Why it matters
Remote employee access Full-tunnel VPN with split DNS, drop user onto the LAN Per-app ZTNA broker with identity + device posture No flat-network blast radius if a credential is stolen
Contractor / agency access Shared VPN account, manual offboarding Time-bounded SSO with posture check, auto-expires No shared creds, no orphaned access after the contract ends
Site-to-site IPsec tunnel to a hub, then trust everything SD-WAN overlay or per-app ZTNA between sites No static tunnel sprawl, no implicit trust between branches
BYOD / personal device Full VPN agent on a personal laptop, full corporate access Clientless browser-isolated access, no data on the device No agent footprint, no data exfil to a personal hard drive
M&A IT integration Peered VPN between two networks, weeks of firewall changes Federated identity + ZTNA brokers, per-app access from day one Weeks not months, and no flat-network bridge between two estates
Privileged admin access Jump-host with shared SSH key, manual log review Per-session approval, session recording, RDP / SSH proxied Fully audited, every keystroke logged, no shared keys
Auditor / vendor access Pre-shared link, often emailed in plain text Time-windowed SSO with watermarked session recording Clean evidence trail, expires automatically, no leaked links

Want the per-app cutover playbook we use? Ask for the ZTNA migration packet. Includes a sample 60-day cutover plan and a decom checklist for SonicWall, Fortinet, and Cisco ASA.

Migration case file · anonymized

One brute-forced shared VPN account. 380 users moved to ZTNA in a single Saturday.

A 380-employee logistics firm in Memphis ran a 7-year-old SonicWall concentrator with a non-MFA shared account for vendor access. A Russian threat actor brute-forced it, got dropped onto the LAN, and started enumerating shares. We arrived. Names changed, timing real.

VPN compromise · ZTNA cutover · Resolved

"Mid-South Freightline" · 380 employees · Memphis, TN

Trigger: brute-force success on shared vendor account · vector: legacy SonicWall concentrator, no MFA on shared accounts · outcome: Cloudflare Access cutover in 6 days
  1. Day 0, 14:22 SonicWall logs show 9,400 failed logins in 6 hours from a Russian IP block, then a successful login on the shared vendor-share account. SOC isolates the session, kills the tunnel, password rotated.
  2. Day 0, 16:00 Blast-radius check. Attacker had 1 hour 38 minutes on the LAN. CrowdStrike telemetry shows enumeration of 4 file shares, no writes, no exfil over 50MB. Nothing pulled.
  3. Day 1 Joint call with client. Decision: cut over to Cloudflare Access immediately. Existing concentrator stays for 30 days as fallback only. Identity provider: Microsoft Entra (already in place for M365).
  4. Day 2 to 4 App inventory: 14 internal apps in scope (file shares via SMB connector, on-prem ERP, Jira, internal wiki, RDP to 3 Windows hosts, vendor portals). Cloudflare connectors deployed inside the LAN. Posture check: managed device + EDR healthy + OS patched within 30 days.
  5. Day 5, evening User comms sent. Self-serve enrollment guide, 5-minute video, support hotline staffed for the weekend.
  6. Day 6, Saturday Cutover day. 380 users enrolled between 06:00 and 18:00 CDT. Zero outage tickets. The 4 contractors who tried the old VPN were redirected to the new self-serve flow and were online inside 11 minutes.
  7. Day 7, Monday 09:00 Monday morning. Zero help-desk tickets tied to access issues. SonicWall logs go silent for the first time since installation. Old concentrator put in maintenance mode.
  8. Day 30 SonicWall powered down. Decom complete. Auditor signs off on NIST 800-53 AC-17 in one pass. Cyber insurance carrier downgrades the firm's network-access risk score, premium drops 9 percent at renewal.
Outcome: 380 users migrated in 6 days. Zero outage tickets across the cutover weekend. Zero data exfiltration from the original incident. Cyber-insurance premium dropped 9 percent. Total client-side IT time on the migration: 14 hours of one network engineer.
Compliance and framework alignment

The zero-trust framework your auditor and your insurance carrier are already scoring you against.

Every ZTNA deployment ships with a control-mapping packet. Your SOC 2 evidence binder, your HIPAA risk analysis, and your CMMC self-assessment all get a pre-built section on remote access. Below is the short list. The proposal includes the full mapping.

SOC 2 CC6
Logical and physical access controls, including remote-access mapping and MFA evidence.
HIPAA § 164.312
Technical safeguards for ePHI: access control, audit controls, integrity, person authentication, transmission security.
NIST 800-207
The federal zero-trust architecture publication. ZTNA brokers map directly to its policy decision and enforcement points.
CMMC AC-17
Remote-access control for DoD subcontractors. We are a registered RPO. ZTNA satisfies the control by design.
PCI Req 1 + 8
Network segmentation of cardholder data environments and identification + authentication of users.
Zero Trust DoD Pillars
User, device, application, data, network, automation, visibility. ZTNA hits 5 of the 7 pillars on day one.
Microsoft Conditional Access
Native tie-in for Entra ID conditional access policies, sign-in risk, and device-compliance signals.
FedRAMP Moderate
For federal-adjacent vendors. Cloudflare Access, Zscaler ZPA, and Netskope all carry FedRAMP Moderate authorization.
The humans on your migration

Your cutover is run by named, US-based network engineers. No overseas tier-one wall.

Our network and identity team is in-house across Tampa, Orlando, Chicago, Atlanta, and Detroit. The lead engineer on your migration is named in the scoping call and runs the cutover end to end.

MS
Miguel Santos
Lead Network Engineer · Orlando
CCNP CISSP JNCIS-SP
MC
Marcus Chen
ZTNA Architect · Atlanta
CCSP CISSP Zscaler CCNP-ZIA
PV
Priya Venkatesh
Identity & Access Lead · Tampa
Okta Pro Entra ID Expert CISSP
DW
Deandre Williams
Compliance Mapping · Chicago
CISA CISM ISO 27001 LA
AK
Aisha Khan
Migration Engineer · Orlando
CCNA Cloudflare Pro Tailscale Cert
JR
Jordan Reyes
Migration Project Lead · Tampa
PMP CISA ITIL v4
FAQ · the ones that actually block the sale

Five questions. Honest answers.

Do we have to rip out our existing VPN today?

No. Most of our migrations run the legacy VPN and the new ZTNA broker side by side for 30 to 60 days. Critical apps go on ZTNA first, the long tail of intranet apps follows on a per-app schedule, and the old concentrator is decommissioned only when the last app moves over.

We have done this with SonicWall, Fortinet FortiGate, Cisco ASA, Palo Alto GlobalProtect, and OpenVPN concentrators. The longest cutover we have run was 11 weeks for a 900-user firm with 60-plus internal apps. The shortest was a Saturday.

What's the actual difference between a VPN and ZTNA?

A VPN drops a remote user onto the corporate network. Once they are in, they can route to anything the firewall allows, which is usually too much. A compromised laptop or stolen credential gets the attacker the same blast radius as a person sitting in your office.

ZTNA flips that. The user authenticates against an identity provider (Okta, Microsoft Entra, Google), the broker checks device posture (managed, patched, EDR running), and only then does it proxy a connection to the one specific app the user is allowed to reach. Nothing is exposed on the public internet. Every connection is logged with user, device, app, and time. NIST 800-207 calls this the zero-trust architecture, and CISA recommends it as the default for federal-adjacent work.

Will this work for our M365, Salesforce, and on-prem ERP all at once?

Yes. ZTNA brokers handle three patterns natively. Cloud SaaS like Microsoft 365 and Salesforce route through the IdP with conditional access policies (geo, device posture, risk score). Public web apps go through the broker as identity-aware proxies. On-prem and private-cloud apps (legacy ERP, internal Jira, file shares, RDP) get a lightweight connector inside the network and the broker proxies traffic to it.

The user experience is one login, one consistent posture check, and one audit trail across all three categories. Your auditor reviews one logging system, not three.

Can users get on without an agent?

Yes for browser-based apps. Cloudflare Access, Twingate, and Zscaler ZPA all offer agentless, browser-isolated access for web apps, which is how we handle BYOD and contractor laptops. The user goes to a branded URL, signs in with their corporate identity, and gets an isolated browser session that streams pixels back. No data lands on the device.

For native apps (RDP, SSH, thick-client ERP) the agent is required, and we deploy it via Intune, Jamf, or Kandji on managed devices. The agent is roughly 25MB and updates itself.

What does an attacker see if they get a user's password?

Without device posture and conditional access: nothing. Every ZTNA broker we deploy ships with phishing-resistant MFA (FIDO2 or hardware keys for executives, push with number-matching for everyone else), device-posture enforcement (managed device, EDR healthy, OS patched within 30 days), and risk-based step-up.

A stolen password from a phishing kit fails the posture check, gets flagged by the IdP risk engine, and the session is denied before any app sees it. Compare to a legacy VPN with username + password + a passive token: the same stolen credential walks right in and gets the attacker on your LAN.

Stop running a perimeter-shaped attack surface.

Every brute-forced VPN credential, every shared contractor account, every unpatched concentrator is a path to your LAN. ZTNA closes the listening port and puts identity and device posture in front of every app. Free 5-day migration plan, no commitment.

Get my free VPN-to-ZTNA migration plan Or call (888) 574-5120