UPAS ZTA

The next-generation security platform
for the Zero Trust era

Centralized management of all endpoints, users, and applications. Automate visibility, blocking, and control — dramatically reducing the operational burden on IT and CSIRT teams.

UPAS ZTA Platform Overview

Common Customer Challenges

  • IT assets lack adequate visibility and centralized management
  • We want to implement Zero Trust but don't know where to start
  • We need to meet compliance and audit requirements for ISO 27001, ISMS, and GDPR
  • Unknown devices are accessing the network
  • OS and software updates are being neglected, allowing vulnerability risks to accumulate
  • Remote offices and factory sites are left to manage their own security

Key Features of UPAS ZTA

Agentless deployment with flexible configuration that is independent of your existing infrastructure.

Intranet Device Management & Control

Automatically identifies device attributes and collects IP/MAC information. Manages endpoint devices and blocks unauthorized device connections.

IP Address Management Module

Unified management of existing DHCP distribution and domain settings with whitelist-based access control.

Guest Intranet Access Authentication

Adds external visitor devices to the whitelist after system review. Rigorously controls all external connections.

Automated Software & Hardware Inventory

Automatically inspects patches, antivirus status, and OS versions. Disconnects non-compliant endpoints from the network and enforces remediation.

Simplified System Maintenance

Compatible with any network device brand or model. Flexible choice of agent or agentless deployment with easy configuration.

Visual Data Dashboard

Aggregates all LAN data and presents it graphically. Administrators gain real-time situational awareness across the entire network.

Key Tools & Modules

NAC — Network Access Control

Utilizing patented ARP packet resolution technology. Agentless data collection, device identification, and powerful access control achieve 100% asset inventory including IP/MAC management.

NAC Network Access Control

ITAM — IT Asset Management

Automatically scans endpoint devices and collects software and system information. Monitors USB and external devices to prevent data leakage. Integrates with vulnerability databases to automatically remediate security risks.

ITAM IT Asset Management

IAM — Identity & Access Management

Binds AD accounts to specific computers, ensuring that a given AD account can only log into a designated PC. Enforces enterprise security policy compliance across all endpoints.

IAM Identity Management

IPAM — IP Address Management

Automatically identifies device attributes and enables multi-binding of IP/MAC/DHCP segments/computer names/UUID. Prevents IP conflicts and MAC address spoofing.

IPAM IP Address Management

MDM — Mobile Device Management

Performs compliance checks and identity recognition when mobile devices connect to the network. Combined with network access control technology to rigorously protect organizational security.

MDM Mobile Device Management

Why Deploy UPAS ZTA

100% IT Asset Visibility

  • Detects and identifies all connected devices — including wired/wireless LAN, BYOD, and non-AD-registered endpoints
  • Helps eliminate shadow IT that had previously been a black box

Zero Trust Foundation

  • Access controlled at the per-user, per-device, and per-application level
  • Continuously verifies trust and maintains least-privilege at all times

Risk Blocking via NAC

  • Automatically isolates unknown devices and non-compliant endpoints
  • ARP monitoring and IP/MAC binding deter unauthorized intrusions

Operational Efficiency Through Unified Management

  • Centralized management of software, OS, and patch status
  • Agentless operation available to reduce the burden on on-site teams

Strengthened Compliance & Audit Readiness

  • Log collection and reporting aligned with ISO 27001, ISMS, and GDPR
  • Traceable privileged ID usage and policy application status

Unified Management of Remote Sites

  • Centralized governance of branch offices, factories, and remote workers
  • Docker-based architecture enabling small-scale initial deployment

Security Operations Automation

  • Automated flow from non-compliant endpoint detection → guided remediation → reconnection approval
  • Eliminates manual visual inspection by IT operations staff

Real-Time Visibility Dashboard

  • Integrated monitoring provides an at-a-glance view of the health of your entire network
  • Visualization and alerts enabling rapid response to emerging risks

Customer Success Stories

Proven deployments across financial institutions, government agencies, manufacturing, healthcare, and education — demonstrating both security and usability in diverse industries.

Manufacturing

100% IT Asset Visibility Achieved Across Factory Sites

Centralized management of network-connected devices across multiple factory locations. Simultaneously eliminated shadow IT and achieved compliance audit readiness.

Financial Institution

Zero Trust Architecture Deployment

Implemented a Zero Trust architecture combining NAC, ITAM, and IAM at a financial institution with stringent compliance requirements.

Government Agency

Zero Unauthorized Access Incidents

Agentless deployment enabled complete blocking of unauthorized device connections without modifying existing infrastructure. Zero incidents since deployment.

Experience UPAS ZTA in Action

A 30-minute online demo lets you experience Zero Trust-ready IT asset management firsthand.