Kemp’s Zero Trust Gateway fortifies sensitive applications’ security
The new architecture enables granular conditional access for organizations’ proxied applications

Kemp has launched a low-friction Zero Trust Access Gateway (ZTAG) architecture to help organizations implement zero trust policies across their application ecosystems.
“The increase in work-from-home, hybrid cloud, BYOD, and IoT blurs the border between what is on premises and what is beyond the perimeter. This raises new challenges around maintaining compliance and a consistent security posture without detriment to the easy access to services for users,” said Kemp.
Kemp’s zero trust architecture enables secure remote access to load-balanced web applications through a suite of policy-based access control services, including active traffic steering, intelligent content-based routing, and contextual identity validation.
ZTAG also allows for Identity Provider (iDP) integration, so businesses can validate clients’ credentials before granting access to sensitive applications.
Kemp LoadMaster actively directs traffic based on the geographical location of customers and security zone levels of backend services, adding an extra layer of security. Several factors influence service access, including security group membership, source network, and information embedded in HTTP communication.
An embedded web application firewall (WAF) and intrusion prevention system (IPS) on Kemp identifies violations in authenticated client traffic and prevents exploits from taking place.
Organizations can also apply granular restrictions to application and user access depending on clients’ security zones and identities. For instance, a client in security zone A can only read, while those in security zone B may be trusted to execute read and write operations.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
RELATED RESOURCE
Kemp’s other interesting features include multi-factor authentication (MFA), automated configuration and deployment via REST-based policy builder, application reverse proxying, and multi-network service publishing.
"Zero trust is the future of application access and continues to gain traction for customers," said Jason Dover, VP of product strategy at Kemp.
"Kemp is leveraging the privileged position of the load balancer combined with our extensible automation framework to help customers simplify the introduction of a zero trust model into their application ecosystem."
-
Should AI PCs be part of your next hardware refresh?
AI PCs are fast becoming a business staple and a surefire way to future-proof your business
By Bobby Hellard
-
Westcon-Comstor and Vectra AI launch brace of new channel initiatives
News Westcon-Comstor and Vectra AI have announced the launch of two new channel growth initiatives focused on the managed security service provider (MSSP) space and AWS Marketplace.
By Daniel Todd
-
Zero trust gains momentum amid growing network visibility challenges
News Organizations are looking to automation, orchestration, and risk mitigation as key security priorities
By Emma Woollacott
-
Billions of IoT devices will need to be secured in the next four years – zero trust could be the key to success
News Researchers have warned more than 28 billion IoT devices will need to be secured by 2028 as attacks on connected devices surge.
By Emma Woollacott
-
Cognizant and Zscaler expand partnership to launch new AI-powered zero trust security tools
News The pair’s expanded partnership aims to help customers simplify their security setups while tackling evolving cyber threats
By Daniel Todd
-
The evolution of SASE and its importance in zero trust
Supported Content SASE has been an increasingly important security framework for five years – but integrating zero trust is crucial to its success
By Keumars Afifi-Sabet
-
Why siloed thinking could be undermining your zero trust strategy
Advertisement Feature Despite the majority of businesses now moving towards a zero trust strategy, a siloed view of security means many are unable to fully embrace everything the technology has to offer
By ITPro
-
The state of zero trust transformation, 2023
whitepaper From prevention to enablement: Leveraging the full potential of zero trust for the highly mobile and cloud-centric enterprise
By ITPro
-
A brief history of zero trust
whitepaper The cybersecurity game changer, from concept to cornerstone
By ITPro
-
Why IT leaders should consider a zero trust network access (ZTNA) strategy
whitepaper Bridge the gap between business needs and IT capabilities
By ITPro