• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Subscribe
  • Project of the Week
  • About Us
    SEARCH
Compliance, IT Infrastructure, Network Security, News

AWS Launches Verified Access for VPN-less Secure Remote Access

AWS Verified Access is built using Zero Trust Security principles and leverages multiple security inputs to grant access to applications.

December 1, 2022 Zachary Comeau Leave a Comment

AWS Verified Access
stock.adobe.com/gguy

Amazon Web Services (AWS) is launching the preview of AWS Verified Access, a new secure connectivity service designed to allow employees to enable local or remote secure access for corporate applications without a VPN.

The company says Verified Access is built using the AWS Zero Trust Security principles and leverages multiple security inputs to grant access to applications, but only when users and their devices meet specified security requirements.

According to AWS, security inputs include things such as user identity, role or the device’s security posture. The security control validates each application request, regardless of user or network, before granting access. This allows Verified Access to adapt the security posture based on changing conditions, and the service will disable access to applications if devices fall out of compliance.

In a blog, the company says AWS Verified Access can help provide secure access while eliminating some management roadblocks and making it easier to diagnose issues. AWS lists three key benefits: ease of use for IT administrators via a single configuration point, an open ecosystem that allows organizations to retain existing identity providers and device management tools, and ease of user for end users.

AWS Verified Access is available in preview in 10 AWS Regions: US East (Ohio, N. Virginia), US West (N. California, Oregon), Asia Pacific (Sydney), Canada (Central), Europe (Frankfurt, Ireland, London), and South America (São Paulo).

Pricing is based on usage, with no upfront or fixed price. The company will charge per application per hour, with tiers depending on the number of applications. Prices start in US East (N. Virginia) Region at $0.27 per verified Access endpoint and per hour. This price goes down to $0.20 per endpoint per hour when there are more than 200 applications.

There is a charge of $0.02 per GB for data processed by Verified Access, and organizations can also incur standard AWS data transfer charges for all data transferred using Verified Access.

Tagged With: AWS, Cybersecurity, VPN, Zero Trust

Related Content:

  • Sony SRG A PTZ Cameras Sony Introduces Two New AI-Enabled PTZ Cameras
  • Microsoft Office 365 Government Secret cloud, MIcrosoft Microsoft Makes Office 365 Secret Cloud Available for…
  • Concept of File management. Searching files in database., 3d vector illustration. Gen Z vs. Baby Boomers: Which Generation Has…
  • Wesco Conference Room as a Service, hybrid work, Fintech Company Standardizes on Wesco’s Conference Room as…

Free downloadable guide you may like:

  • Harnessing the Power of Digital SignageHarnessing the Power of Digital Signage

    Choosing the best solutions for messaging, branding, and communicating in today’s content-everywhere landscape

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Latest Downloads

Harnessing the Power of Digital Signage
Harnessing the Power of Digital Signage

Choosing the best solutions for messaging, branding, and communicating in today’s content-everywhere landscape

Blueprint Series Cover: What works for hybrid work
Blueprint Series: What Works for Hybrid Work

Download this free resource to learn about how IT leaders can effectively manage and implement a hybrid work model.

Guide to creating a ransomware response plan download
Blueprint Series: Creating a Ransomware Response Plan

Chances are ransomware hackers are researching your company right now. They’re investing time and money to choose the most profitable targets and a...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!
Sharp Microsoft Collaboration HQ Logo

Learn More About the
Windows Collaboration Display

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Media Solutions & Advertising
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSTERMS OF USEPRIVACY POLICY

© 2023 Emerald X, LLC. All rights reserved.