zetAccess - Zero Trust Service Access

General Overview

zetAccess is a browser-based, agentless Zero Trust Service Access (ZTSA) platform developed as an alternative to traditional VPNs. It provides high-security, low-risk connections by transmitting only screen data and user interactions — without giving direct access to services like RDP, SSH, VNC, Telnet, and Web.

What is Zero Trust Service Access (ZTSA)?

ZTSA (Zero Trust Service Access) is an access security model based on the “Zero Trust” approach. In this model, no user or device on the network is trusted by default. Each access request is evaluated through authentication and authorization before access is granted. In short, the principle is “Never trust, always verify.”

ztsa

Meet zetAccess: Secure and Simple Remote Access

The New Standard in Security: Zero Trust

zetAccess provides remote access to internal systems with a completely new approach. Unlike traditional VPNs, users are not allowed to connect directly to servers. This eliminates security vulnerabilities. How?

  • No direct server connection
  • Only screen data and input events are transmitted
  • Attack surface is minimized

Access Anywhere From Your Browser

Access the following systems securely via your web browser — no installation required:

  • Remote Desktop (RDP)
  • SSH Terminal
  • VNC
  • Telnet
  • Kubernetes Console (kubectl)
  • Remote Web Browsing
  • SafeBrowsing (Isolated browser for secure exploration)

One-Click Secure Login: Single Sign-On (SSO)

Seamlessly integrates with your corporate identity systems. Users log in with their existing accounts:

  • SAML 2.0
  • OAuth 2.0
  • OpenID Connect

Resource-Based Access Control

Not everyone can access everything. You decide which users can access which systems. Users only see the systems they are authorized for and can connect with a single click.

Why zetAccess?

  • No agent — no installation hassle
  • No VPN — no complexity
  • Advanced security and visibility
  • Fully browser-based experience
  • Compatible with modern identity providers

Key Advantages

High Security — Zero Trust Architecture

Users never directly access systems. Only screen and input data are transmitted, minimizing the attack surface.

Browser-Based Access — Zero Installation

Access RDP, SSH, VNC, Telnet, and more instantly with only a web browser.

Secure VPN-Free Alternative

Unlike VPNs, zetAccess requires no tunnels, port openings, or direct network access.

Advanced Authentication — SSO Support

Secure and single-click login using SAML 2.0, OAuth 2.0, and OpenID Connect.

Resource-Based Authorization

Each user can only access the systems they’re authorized for. Centralized management interface.

Logging and Auditing

All sessions are logged and auditable. Access events and behaviors are available for retrospective analysis.

Quick Setup, Easy Management

Get up and running in minutes. Manage all access centrally. Streamlines IT operations.

Flexible Integration

Integrates easily with your existing data centers, identity providers, and security tools — no infrastructure changes needed.

Ideal for Remote Work

Provides secure, limited, and auditable access for remote staff. Ensures safe, location-independent access.


Product Architecture

  • Delivered as a Virtual Appliance.

Supported Access Services:

  • Web Applications (Private or Public Network)
  • Safe Browsing
  • RDP – MS Remote Desktop
  • SSH – Secure Shell
  • VNC
  • Telnet
  • Kubernetes Console (kubectl)
  • Fully compatible with all firewalls

Scalability

zetAccess is designed to work with modern container orchestration platforms like Kubernetes and Docker Swarm. It can automatically scale horizontally under heavy user load.

  • Handles thousands of concurrent users without disruption
  • Integrates with existing virtualization or container infrastructure
  • High availability ensured via load balancing and failover mechanisms

Example Use Case

Secure, Agentless, Auditable Access from Outside Campus

Scenario: In universities or affiliated hospitals, applications such as academic databases (Web of Science, Scopus, YÖK Thesis, TRDizin), automation systems, or document management platforms (EBYS) are often restricted to internal networks. However, academic and administrative activities often require off-campus access.

For Academics — Secure and Installation-Free Access

Academics can securely access platforms like Web of Science, Scopus, and TRDizin from home or abroad.

  • One-click login with institutional SSO
  • No extra passwords or accounts
  • No complicated connection settings
  • Reduces IT support load and improves user experience

RDP Access for External Vendors (e.g. Hospital Automation, EBYS Support)

Enable controlled remote support access to internal systems without VPN:

  • RDP access limited to specific systems
  • Browser-based
  • Secure and auditable

SSH and Web Access to Network Devices (Switches, APs, Firewalls)

When IT staff or external vendors need to access network equipment:

  • Access only to authorized devices via zetAccess
  • Browser-based SSH and Web UI
  • Secure, auditable, and restricted access
  • No direct connection to devices — attack surface is eliminated