Unified Platform
with the Zero Trust
Capabilities You Need

Accelerate your move to zero trust with the industry’s most affordable and comprehensive zero trust security platform designed for midsize enterprises and small businesses. Not sure where to start your Zero Trust journey? ZTEdge makes the move to Zero Trust simple. Take a look at our packages.

See Packages Request a Demo

ZTEdge Capabilities

Access Security

Secure Web Gateway

Secure internet access with web traffic inspection and URL filtering for enforcement of acceptable use policies

Cloud Firewall

Control the traffic flows of every connected device, location and user via flexible firewall policies

Zero Trust
Network Access

Simplified remote access using ZTNA creating secure 1:1 connections between users and apps

Identity & Access

Robust authentication service with MFA used by ZTEdge platform that can also serve as a centralized ID database for your organization

Cloud-Delivered SD-WAN

User-to-site and site-to-site access and connectivity for local secure internet breakouts

DNS Security

Enforce web access policies based on DNS-level information

SaaS App Access Control

Control access to SaaS apps using IP restrictions (dedicated ZTEdge IP address), deny-lists, etc. and limit data sharing functions

Secure Remote Desktop Access

Securely access in-office desktops with Zero Trust
security controls

Threat Prevention & Compliance

Threat Intelligence Network

URL threat intelligence data from multiple industry sources combined with info from global ZTEdge user community

Remote Browser

Isolate risky web content in remote cloud containers to protect endpoints from ransomware and other web threats


Scan web content and downloads for known threats, blocking harmful content before it reaches an endpoint


Blocking of known/suspected phishing websites based on URL, Source IP, signatures, etc.

File Sanitization (CDR)

Web download and email attachment sanitization to remove threats in weaponized documents

Intrusion Prevention/Detection

Traffic monitoring and analysis for known and unknown threats, with alerts/remediation upon detection

Ransomware Prevention

Enhanced threat intelligence for improved ransomware detection

SSL Inspection

Policy-based web SSL traffic inspection identifies and blocks malware hidden in encrypted packets

Network Traffic Analysis

Use dashboards and drill-downs to monitor and analyze all network traffic traversing the ZTEdge Platform


Restrict lateral movement on LAN by microsegmenting apps and resources

Cloud Data Loss Prevention

Prevent sensitive data like SSNs and credit card numbers from being shared on the web or in cloud apps

Data Anonymization
(Coming Soon!)

Anonymize your organization’s personal data to avoid sanctions by complying with PII/GDPR

ZTEdge Packages

ZTEdge services are conveniently packaged in bundles on an annual,
per-user subscription basis. Check with us to see how you can save up to 50% versus the competition…that’s right, 50%

ZTEdge Web Security and ZTEdge Ultra are offered in packages based on the percentage of internet traffic
you need isolated: Intelligent Isolation (5%), Target Isolation (25%), and Full Isolation (100%).

ZTEdge Web Security ZTEdge ZTNA, Apps & Network ZTEdge Ultra ZTEdge Desktop
global cloud ZTEdge Global Cloud check mark check mark check mark check mark
tentant ip address Dedicated Tenant IP Address check mark check mark check mark check mark
Threat Intelligence Network check mark check mark check mark check mark
Identity & Access Management check mark check mark check mark check mark
Secure Web Gateway check mark check mark check mark
Anti-Virus check mark check mark check mark
DNS Security check mark check mark check mark
Remote Browser Isolation check mark check mark check mark
Anti-Phishing check mark check mark check mark
Ransomware Protection check mark check mark check mark
SSL Inspection check mark check mark check mark
SaaS App Access Control check mark check mark check mark
Zero Trust Network Access check mark check mark check mark
microsegmentation Microsegmentation check mark check mark check mark
Cloud Firewall check mark check mark check mark
Intrusion Detection/Prevention check mark check mark check mark
Network Traffic Analysis check mark check mark check mark
Secure Remote Desktop Access check mark

Some organizations have needs that go beyond the core packages, so we offer these optional add-ons.

Cloud Data Loss Prevention

Data Anonymization

Cloud-Delivered SD-WAN

File Sanitization (CDR)

Remote Desktop Access

Midsize Enterprises Need Zero Trust Security


of organizations say improved remote application access is a key priority for 2022



of successful breaches originate on the endpoint and move laterally in the network



of organizations will phase out most of their remote access VPNs in favor or ZTNA


“As a CIO of a midsize business, I need to ensure we have the right solutions in place to protect our distributed workforce.”

– Dale McCarty

Executive Director Cyberlandia

“Quite often, I hear, ‘Zero Trust is only for big organizations – my company is too small.’ But Zero Trust is a framework for any organization that has data and assets to protect from the malicious actors to which all companies, big or small, are exposed via the Internet. Luckily, Zero Trust can work for your small or midsize business, once you find technology and expertise that fit the unique parameters of your organization.”

– John Kindervag

Creator of Zero Trust, Senior Vice President, Cybersecurity Strategy, ON2IT

“ZTEdge has a broad set of affordable, always-on security capabilities, including a Zero Trust Network Access (ZTNA) service that will reduce the complexity of remote application access for our teams, improving user experience and security compared to legacy VPN solutions.”

– Brandon Nokes

Director, Facilities & IT, Devada

“Given the large enterprise orientation of most security solution providers, we wanted a right-sized solution that provided a simple, cost-effective way for MSEs to quickly implement their own SASE strategy. The ZTEdge platform is the solution to do just that and is a valuable addition to the market.”

– Mark Mahovlich

Vice President of Strategy & Execution, ICM Cyber

“Getting the fundamentals right, including Multi-Factor Authentication (MFA), microsegmentation, and following the Zero Trust framework isn’t just good security hygiene; it is the cornerstone of a successful business.”

– Louis Columbus

Cybersecurity Author, VentureBeat

“As the CEO of a 100-person SMB, I can tell you firsthand that if I understood and implemented basic cyber hygiene and best practices, I would not have lost time, money, and valuable IP to criminal hackers.. I STRONGLY recommend that all SMBs realize that they will not understand how valuable their intellectual property is…until they lose it!”

– Gary Berman

Host of The “CyberHero Adventures Show” and Industry Analyst

“ZTEdge is a very high-performance solution that enables browsing to feel native. It makes users’ lives better. If people are looking for a high-performance solution in this space, Ericom ticks the boxes.”

– Jeremy Smith
Jellyfish Pictures Chief Technology Officer