Improve security posture by evaluating each access request in real time against predefined requirements.
Seamless user experience
Deliver a seamless user experience through virtual access to corporate applications without a VPN.
Unique access policy
Define a unique access policy for each application, with conditions based on identity data and device posture.
How it works
Built on Zero Trust guiding principles, AWS Verified Access validates every application request before granting access. Verified Access removes the need for a VPN, which simplifies the remote connectivity experience for end users and reduces the management complexity for IT administrators.
The diagram shows the process for setting up a secure application access system without VPN through Verified Access.
To the left of the diagram is the following text: “Users can securely access applications from anywhere.”
The first item in the diagram is titled “AWS Verified Access” and says, "Access to corporate applications without a VPN.” This item includes two instructions.
The first instruction is titled, “Connect to trusted providers." Below it reads, “Use your existing corporate identity and device management service.”
The second instruction is titled “Express access policies” and says, “Create per application granular policies.”
To the right of these instructions are two options. The first says, “Protect your applications using granular access policies." The second option says, “Analyze and audit security events using Verified Access logs."
Use cases
Secure distributed users
Verified Access evaluates each request in real time against predefined security requirements to facilitate secure access to applications.
Manage corporate application access
IT administrators can build a set of fine-grained access policies using security signal input like user identity and device security status.
Use centralized access logs
Verified Access evaluates access requests and logs request data, accelerating analysis of and response to security and connectivity incidents.