We’re thrilled to announce our 2021 website, and we wanted to take the opportunity to explain our design choices and some of the decision making that is leading us forward.
Zero Trust Security
Build Zero Trust networks for any threat model. VNS3 supports your companies zero trust requirements: plug in your Identity Provider of choice, provision temporary admin access, segment application networks and more.

Zero Trust Architecture with VNS3
An architecture enforcing both network, identity and traffic constraints, providing a lattice of security.

Users connect to the corporate network via VNS3, authenticating via Gsuite and using their phones for MFA. After connecting to the network they are blocked from accessing Application D. The network is also segmented by application preventing unwarranted access between applications. We also have a network intrusion system running on our network edge. You can plug in your NIDs of choice such as Snort or Suricata.
Get Started with VNS3
Build a Security Lattice with VNS3
The VNS3 Console provides a simple interface for managing your connectivity and security requirements. Create policies for specific workloads, monitor for downtime or plug in any function directly into your edge VNS3 controllers.