Whether working from home or on the go, make sure your organization’s most precious resources are secure.
Buy Now Schedule Demo Take Tour Play VideoSay goodbye to the legacy hardware of the past and discover the benefits of our leading Secure Access Service Edge (SASE).
7 Days Free Trial Schedule Demo Take Tour DatasheetEssentials
All the basics you need to secure |
Premium
Advanced management network security |
|
---|---|---|
₹699 INR
per user/mo billed annually
|
₹999 INR
per user/mo billed annually |
|
*Minimum of 5 users | *Minimum of 10 users | |
Core | ||
Cloud management platform | ||
Fast and easy network deployment | ||
Dedicated global gateways | ||
Agentless application access | 1 Application | 20 Applications |
Policy-based segmentation | ||
Activity audits & reports | 14 Days | 30 Days |
Easy-to-use apps | ||
Automatic Wi-Fi security | ||
Shared gateways in 35 locations | ||
Advanced | ||
Two-factor authentication | ||
Single sign-on capabilities | ||
Always-on VPN | ||
Dedicated solution architect | ||
SIEM integration | ||
Network | ||
Site-to-Site Interconnectivity | ||
Split tunneling | ||
Custom DNS | ||
DNS Filtering | ||
Support | ||
Self-service knowledge base | ||
In-app chat support | 24/7 | 24/7 |
Email support | Office Hours | Prioritized Response |
Phone Support | ||
Customer Success Engineer | ||
Essentials
All the basics you need to secure |
Premium
Advanced management network security |
|
₹699 INR
per user/mo billed annually
|
₹999 INR
per user/mo billed annually |
|
*Minimum of 5 users | *Minimum of 10 users | |
No more manual configuration. No more hours of setup. Fully build, manage
and secure your network from our multi-tenant cloud.
Ensure user-centric and adaptive, policy-based network access to on-premise resources, SaaS applications and cloud environments.
Reduce the attack surface. Implement zero-trust, fully audited access to web applications, SSH, RDP, VNC or Telnet - without an agent.
Transcend the traditional VPN. Defend and modernize your network with the latest architecture and seamless least privilege access.
Bridge the gap with fully customizable networking. Interconnect your cloud environments and different network branches.
Enjoy best-in-class of Web Security Services and the highest levels of always-on encryption, over any network.
Transform your organization’s remote corporate access with our seamless, secure and highly-scalable Cloud VPN.
Step1
Install Your Agents On
Laptop Or Mobile
Step2
Install Secure
Gateway
Step3
Publish Your
App
Step4
Greet Users
Go Live
Reduce total cost of ownership (TCO) for IT security by replacing disconnected point products with a single, consolidated security platform.
Easily expand your network with a scalable software framework and convenient cloud or on-premise deployments.
IT personnel can manage their team, network and permissions, and monitor network activity all in one platform.
Unlike traditional legacy VPN services, we provide in-depth, granular insights with monitoring, detection, auditing and activity logs, made available through full API integration.
No more network based excessive trust and access for your remote workforces. Use our 3D security model to provide granular access control using user, device and application context.
Existing security models are based on too much trust, which is a major concern as the attack surface is very high. With our zero trust continuous verification model, your attack surface reduces to minimal.
We are friendly. We provide access to our APIs and we too integrate with APIs from all major security vendors.
Every action in our system can be audited with our extensive logging mechanisms.
Coordinate with your team and push projects forward with the tools you use every day—all within share file.
Instantly deploy secure cloud gateways, create multi-regional networks and install client applications with our single-click interface.
There are no boundaries in the cloud. Our service eliminates the need for costly external hardware so you can scale your network with ease.
If there’s any unusual activity, we’ll help you identify it. Easily manage team settings and view employee network access all in one place.
Secure application-level access by fully auditing, recording and monitoring each session. This reduces the attack surface and provides a distributed security solution which operates as a holistic threat protection framework.
Comprehensive protection against both known and unknown threats, including threats on mobile devices, is necessary to support a closed-loop, highly integrated defense stature that consistently and cost-effectively enables trust boundaries.
Accurately monitor the network by identifying and classifying all traffic, regardless of ports and protocols, encryption or hopping. This eliminates methods that malware may use to hide from detection and provides complete context into applications, associated content and threats.
XcellHost Zero Trust Application Access minimizes latency and surpasses processing requirements, providing high availability, avoiding loss of service, reducing redundant loads on servers and increasing the uptime of your network.
With a least-privileged strategy and strictly enforced access control, organizations can control interactions with resources based on relevant attributes, including application access, user and group identity and the sensitivity of the data being accessed.
Our comprehensive REST-based API enables quick-and-easy integration with third-party management, automation and orchestration tools, ensuring protection for newly provisioned or relocated virtualized applications.
Internal networks are comprised of different levels of “trust boundaries” which
should be segmented according to sensitivity.
Network segmentation allows organizations to define internal trust boundaries to granularly control traffic flow, enable secure network access and implement network monitoring
Trust zones are comprised of distinct pockets of infrastructure where resources operate at the same trust level and similar functionality, minimizing pathways and limiting malicious threats.
Efficiently monitor the network via centralized management capabilities, allowing data to be processed by tools that may further enhance network visibility, detect unknown threats, or support compliance reporting.
-galab smit
-akbar shaik
-rohan kulkarni
VPNs, or Virtual Private Networks, are vastly different from networks built with Zero Trust architecture. VPNs are a site-centric solution that enables organizations to create secure, encrypted tunnels between remote employees and crucial network resources. Access via a VPN signifies that the user is automatically trusted with these resources, while Zero Trust networking is a security model that removes the idea of trust. This means privileged network access and policy-based segmentation but also constant monitoring of all individuals on the network, regardless of their status or role.
Once you have created a Network, you can easily edit the name, tags, and icon of your Network to help you identify the different purposes and/or teams your network will support.
1. To edit your Network, select the Networks tab in the Management Portal. Select the three-dotted menu (...) to the right of your Network.
2. Make the changes and click Save.
Follow the steps to create a network.
1. Select Create Network on the Networks tab.
2. Fill in the following:
- Network Name: An indicative name for the Network you are building. For example, HQ, Finance, or Staging.
- Icon: Use the default or select an icon of your choice.
- Region: Region is the physical location where the gateway will be deployed. Choose one or more regions from the available regions listed (Europe, North America, East Asia, Australia, and Israel).
- Gateways: The number of gateways you want to deploy in a particular region. Having multiple gateways enables high availability and a better load balance. The number of gateways should not exceed the number of available licenses.
- Network Tags: Use tags to help identify the different purposes and/or teams your Network will support.
- Subnet: Optional. If the subnet is not specified, it will receive a default value of 10.255.0.0/16.
After defining your Network specifications, you can see your Network being created.
After the Network is successfully created, it will appear in the Networks tab.
Your new Network allows you to edit or delete customized networks that are multi-regional and interconnected to your cloud and on-premise environments.
1. To delete your Network, select the Networks tab in the Management Portal. Select the three-dotted menu (...) to the right of your Network.
2. Select the Delete Network option to delete the Network.
Remote users need easy access to web applications, but relying on traditional VPNs solutions can create significant security risks. If bad actors can gain access through the SSL VPN, they have free reign over your entire network. You need a contextual security solution to meet zero trust requirements while enabling BYOD and access to apps deployed in a cloud. Citrix Workspace provides a secure space to work by enabling users to remotely access web applications deployed on premises using any device—without needing to access the entire network.
Secure Access for Remote Workers Whether working from home or on the go, make sure your organization’s most precious resources are secure.
Learn MoreEnables organizations to monitor exactly who accessed what from where and when.Simplified One-Time-Password & Multi-Factor Authentication. One Time Password, Digital Certificates, & Biometrics-based authentication.
User Activity Monitoring + Data Loss Prevention +User Behavior Analytics Monitor & control user activity to ensure compliance with internal security policies and regulatory requirements.
High-performance Simplified Enterprise Mobility Anywhere, Anytime, Any device.Application access gateway that enables enterprise mobility and secure access to corporate applications, desktops, and network.
Keep up with the latest blog posts, product updates & offers by signing up to our newsletter.
Top Services
Blog Feeds
Security
XcellHost Cloud Services – a leading Managed Cloud Service Provider since 1999 based out of Mumbai, INDIA. which provides Managed Cloud Services across the globe helping customers manage Public Clouds (AWS, Azure, GCP, Alibaba) + Private clouds to manage the entire Cloud Management Lifecycle i.e Cloud Assessment, Cloud Migration, Cloud Deployment, Cloud Management, Cloud Monitoring, Cloud Security, Cloud DevOps delivered through Cloud-based ServiceDesk + Cloud-based Management Platform. Our SaaS-based Cloud Marketplace Platform helps enterprises consume over 80+ Cloud Services & help them overcome the complexities of Cloud Billing + Provisioning + Reseller Management combined with our 24 x 7 NOC + SOC Services.