Provides lightweight identity management for enterprises, supporting comprehensive user lifecycle management:
• User Management: Complete user, user group, and organizational structure management
• Multi-Factor Authentication: Support for various authentication methods and adaptive authentication
• Scenario-Based Policies: Flexible configuration for different access scenarios
• Dynamic Balance: Real-time optimization between security and user experience
Establishes comprehensive device inventory and trust management capabilities:
• Device Inventory: Centralized management of endpoint information and status
• Trusted Device Creation: User-identity binding for secure device authentication
• Multi-Dimensional Awareness: Collection of device, system, and application environment data
• Dynamic Risk Detection: Real-time risk assessment and response control
Advanced network protection through application hiding and encrypted communications:
• Application Hiding: Business applications concealed behind proxy gateways
• Single Packet Authorization (SPA): Network invisibility with authenticated access only
• TLS Encryption: Support for one-way and mutual TLS protocols
• Data Protection: Full-traffic encryption preventing data hijacking
Comprehensive application security through least-privilege principles:
• Multiple Authorization Methods: Unified permission control and management
• Automatic Auditing: Application permission status collection and analysis
• Least-Privilege Framework: Fine-grained authorization management system
• Tunnel Isolation: Secure communication channel separation
• Traffic Control: Rate and bandwidth limiting for business continuity protection
Comprehensive data security through workspace isolation and access controls:
• Secure Workspaces: Creation of multiple isolated secure environments
• Security Watermarks: Data attribution and tracking capabilities
• Anti-Screenshot Controls: Prevention of unauthorized data capture
• Print Management: Controlled printing with security restrictions
• Full-Cycle Protection: End-to-end access control across endpoints, networks, services, files, and data
QAX ZTNA implements comprehensive Zero Trust through four core capabilities:
• Identity Authentication: Reliable identity verification with multi-factor authentication
• Least-Privilege Access: Fine-grained authorization and permission management
• Continuous Trust Evaluation: Real-time risk assessment and adaptive controls
• Dynamic Access Control: Intelligent policy optimization and real-time response
Optimized for modern hybrid work environments with:
• Remote Employee Access: Secure, fast access to business applications from any location
• Branch Office Connectivity: Seamless integration of distributed office locations
• Partner Integration: Secure third-party access with controlled permissions
• OT System Protection: Critical operational technology security integration