UPAS ZTA
The next-generation security platform
for the Zero Trust era
Centralized management of all endpoints, users, and applications. Automate visibility, blocking, and control — dramatically reducing the operational burden on IT and CSIRT teams.
Common Customer Challenges
- IT assets lack adequate visibility and centralized management
- We want to implement Zero Trust but don't know where to start
- We need to meet compliance and audit requirements for ISO 27001, ISMS, and GDPR
- Unknown devices are accessing the network
- OS and software updates are being neglected, allowing vulnerability risks to accumulate
- Remote offices and factory sites are left to manage their own security
Key Features of UPAS ZTA
Agentless deployment with flexible configuration that is independent of your existing infrastructure.
Intranet Device Management & Control
Automatically identifies device attributes and collects IP/MAC information. Manages endpoint devices and blocks unauthorized device connections.
IP Address Management Module
Unified management of existing DHCP distribution and domain settings with whitelist-based access control.
Guest Intranet Access Authentication
Adds external visitor devices to the whitelist after system review. Rigorously controls all external connections.
Automated Software & Hardware Inventory
Automatically inspects patches, antivirus status, and OS versions. Disconnects non-compliant endpoints from the network and enforces remediation.
Simplified System Maintenance
Compatible with any network device brand or model. Flexible choice of agent or agentless deployment with easy configuration.
Visual Data Dashboard
Aggregates all LAN data and presents it graphically. Administrators gain real-time situational awareness across the entire network.
Key Tools & Modules
NAC — Network Access Control
Utilizing patented ARP packet resolution technology. Agentless data collection, device identification, and powerful access control achieve 100% asset inventory including IP/MAC management.
ITAM — IT Asset Management
Automatically scans endpoint devices and collects software and system information. Monitors USB and external devices to prevent data leakage. Integrates with vulnerability databases to automatically remediate security risks.
IAM — Identity & Access Management
Binds AD accounts to specific computers, ensuring that a given AD account can only log into a designated PC. Enforces enterprise security policy compliance across all endpoints.
IPAM — IP Address Management
Automatically identifies device attributes and enables multi-binding of IP/MAC/DHCP segments/computer names/UUID. Prevents IP conflicts and MAC address spoofing.
MDM — Mobile Device Management
Performs compliance checks and identity recognition when mobile devices connect to the network. Combined with network access control technology to rigorously protect organizational security.
Why Deploy UPAS ZTA
100% IT Asset Visibility
- Detects and identifies all connected devices — including wired/wireless LAN, BYOD, and non-AD-registered endpoints
- Helps eliminate shadow IT that had previously been a black box
Zero Trust Foundation
- Access controlled at the per-user, per-device, and per-application level
- Continuously verifies trust and maintains least-privilege at all times
Risk Blocking via NAC
- Automatically isolates unknown devices and non-compliant endpoints
- ARP monitoring and IP/MAC binding deter unauthorized intrusions
Operational Efficiency Through Unified Management
- Centralized management of software, OS, and patch status
- Agentless operation available to reduce the burden on on-site teams
Strengthened Compliance & Audit Readiness
- Log collection and reporting aligned with ISO 27001, ISMS, and GDPR
- Traceable privileged ID usage and policy application status
Unified Management of Remote Sites
- Centralized governance of branch offices, factories, and remote workers
- Docker-based architecture enabling small-scale initial deployment
Security Operations Automation
- Automated flow from non-compliant endpoint detection → guided remediation → reconnection approval
- Eliminates manual visual inspection by IT operations staff
Real-Time Visibility Dashboard
- Integrated monitoring provides an at-a-glance view of the health of your entire network
- Visualization and alerts enabling rapid response to emerging risks
Customer Success Stories
Proven deployments across financial institutions, government agencies, manufacturing, healthcare, and education — demonstrating both security and usability in diverse industries.
100% IT Asset Visibility Achieved Across Factory Sites
Centralized management of network-connected devices across multiple factory locations. Simultaneously eliminated shadow IT and achieved compliance audit readiness.
Zero Trust Architecture Deployment
Implemented a Zero Trust architecture combining NAC, ITAM, and IAM at a financial institution with stringent compliance requirements.
Zero Unauthorized Access Incidents
Agentless deployment enabled complete blocking of unauthorized device connections without modifying existing infrastructure. Zero incidents since deployment.