Call a Specialist Today! 855-958-0754
Free Shipping! Free Shipping!


Array Networks

ZTAG Series Zero Trust Access Gateway

Secure Access Built on Zero Trust Principles

  • Secure access to on-prem, cloud, and hybrid applications
  • Granular, least-privilege access controls
  • Strong authentication (MFA, SSO integration)
  • Encrypted connections with no direct network exposure
  • Centralized policy management and monitoring

 Download the datasheet

A New Perimeter Emerges

Array’s Zero Trust Access Gateway (ZTAG) creates a new security perimeter that gives users access to productivity-enhancing applications while adhering to zero trust principles. Next-gen zero trust goes beyond traditional VPNs to provide identity-based, per-app access, multi-factor authentication, continuous device posture assessment, adaptive access policies, and the ability to make internet-facing applications invisible to unauthorized users.

Available on-prem and in the cloud, Array’s ZTAG is ideal for creating connected, multi-site architectures that combine connectivity with advanced cybersecurity to provide defense-in-depth for employee and partner access. Key use cases include secure remote access, zero trust access for all users local and remote, and the creation of a hybrid cloud security services edge that spans geographically disbursed operations.

Secure Access Built on Zero Trust Principles

Array’s ZTAG is built on the "never trust, always verify" principle, providing workers with the resources needed to do their job, while continuously verifying every session to prevent unauthorized access and data breaches.


Advanced ZTAG Features

Single Packet Authorization (SPA)

SPA makes Array’s ZTAG invisible to network scans and unauthorized users, preventing brute force hacking and DDoS attacks.

User Identity & Device Validation

MFA, SSO and HW ID support a range of AAA protocols, IdP providers, as well as device certificates and fingerprinting.

Continuous Adaptive Access Control

ZTAG’s built-in policy engine continuously recalculates user access rights based on changing risk factors.

Advanced Client Security

Restricts clipboard access, blocks screen sharing, and disables file uploads and downloads in sensitive sessions.




Granular Authentication Parameters

Validate OS and patch version, antivirus, port use, IP reputation, and connection type as prerequisites for authentication.

Least Privilege Application Publishing

Layer-7, Layer-4, and Layer-3 app publishing shrinks the attack surface by providing access on a per user, per resource basis.

End-to-End Encryption

User and gateway connections use the latest TLS and IPSec encryption protocols and ciphers, including WireGuard VPN.

Reporting & Monitoring

Records all access activities, and allows logs to be queried by date, user, application, IP address, and other parameters.

Key Use Cases

Secure Remote Access

Remote workers cannot directly access internal resources. For these employees, ZTAG securely proxies internal services in a simple, scalable manner.



Zero Trust Secure Access

Front-ending business-critical apps with ZTAG, enterprises can enforce zero trust access control policies for all users, whether local or remote.



Security Services Edge

ZTAG can be deployed on-prem and in the cloud to create a security services edge to which additional security can be layered to protect sensitive data.