zetAccess - Zero Trust Service Access
General Overview
zetAccess is a browser-based, agentless Zero Trust Service Access (ZTSA) platform developed as an alternative to traditional VPNs. It provides high-security, low-risk connections by transmitting only screen data and user interactions — without giving direct access to services like RDP, SSH, VNC, Telnet, and Web.
What is Zero Trust Service Access (ZTSA)?
ZTSA (Zero Trust Service Access) is an access security model based on the “Zero Trust” approach. In this model, no user or device on the network is trusted by default. Each access request is evaluated through authentication and authorization before access is granted. In short, the principle is “Never trust, always verify.”
Meet zetAccess: Secure and Simple Remote Access
The New Standard in Security: Zero Trust
zetAccess provides remote access to internal systems with a completely new approach. Unlike traditional VPNs, users are not allowed to connect directly to servers. This eliminates security vulnerabilities. How?
- No direct server connection
- Only screen data and input events are transmitted
- Attack surface is minimized
Access Anywhere From Your Browser
Access the following systems securely via your web browser — no installation required:
- Remote Desktop (RDP)
- SSH Terminal
- VNC
- Telnet
- Kubernetes Console (kubectl)
- Remote Web Browsing
- SafeBrowsing (Isolated browser for secure exploration)
One-Click Secure Login: Single Sign-On (SSO)
Seamlessly integrates with your corporate identity systems. Users log in with their existing accounts:
- SAML 2.0
- OAuth 2.0
- OpenID Connect
Resource-Based Access Control
Not everyone can access everything. You decide which users can access which systems. Users only see the systems they are authorized for and can connect with a single click.
Why zetAccess?
- No agent — no installation hassle
- No VPN — no complexity
- Advanced security and visibility
- Fully browser-based experience
- Compatible with modern identity providers
Key Advantages
High Security — Zero Trust Architecture
Users never directly access systems. Only screen and input data are transmitted, minimizing the attack surface.
Browser-Based Access — Zero Installation
Access RDP, SSH, VNC, Telnet, and more instantly with only a web browser.
Secure VPN-Free Alternative
Unlike VPNs, zetAccess requires no tunnels, port openings, or direct network access.
Advanced Authentication — SSO Support
Secure and single-click login using SAML 2.0, OAuth 2.0, and OpenID Connect.
Resource-Based Authorization
Each user can only access the systems they’re authorized for. Centralized management interface.
Logging and Auditing
All sessions are logged and auditable. Access events and behaviors are available for retrospective analysis.
Quick Setup, Easy Management
Get up and running in minutes. Manage all access centrally. Streamlines IT operations.
Flexible Integration
Integrates easily with your existing data centers, identity providers, and security tools — no infrastructure changes needed.
Ideal for Remote Work
Provides secure, limited, and auditable access for remote staff. Ensures safe, location-independent access.
Product Architecture
- Delivered as a Virtual Appliance.
Supported Access Services:
- Web Applications (Private or Public Network)
- Safe Browsing
- RDP – MS Remote Desktop
- SSH – Secure Shell
- VNC
- Telnet
- Kubernetes Console (kubectl)
- Fully compatible with all firewalls
Scalability
zetAccess is designed to work with modern container orchestration platforms like Kubernetes and Docker Swarm. It can automatically scale horizontally under heavy user load.
- Handles thousands of concurrent users without disruption
- Integrates with existing virtualization or container infrastructure
- High availability ensured via load balancing and failover mechanisms
Example Use Case
Secure, Agentless, Auditable Access from Outside Campus
Scenario: In universities or affiliated hospitals, applications such as academic databases (Web of Science, Scopus, YÖK Thesis, TRDizin), automation systems, or document management platforms (EBYS) are often restricted to internal networks. However, academic and administrative activities often require off-campus access.
For Academics — Secure and Installation-Free Access
Academics can securely access platforms like Web of Science, Scopus, and TRDizin from home or abroad.
- One-click login with institutional SSO
- No extra passwords or accounts
- No complicated connection settings
- Reduces IT support load and improves user experience
RDP Access for External Vendors (e.g. Hospital Automation, EBYS Support)
Enable controlled remote support access to internal systems without VPN:
- RDP access limited to specific systems
- Browser-based
- Secure and auditable
SSH and Web Access to Network Devices (Switches, APs, Firewalls)
When IT staff or external vendors need to access network equipment:
- Access only to authorized devices via zetAccess
- Browser-based SSH and Web UI
- Secure, auditable, and restricted access
- No direct connection to devices — attack surface is eliminated