Manage Zero Trust Policies

Timus Zero Trust Policies provides a user/ behavior-based access control as an alternative to traditional IP-based access control and makes it easier for an organization to manage network access.

  • You can view the default sign-in policies for both Users and Admins by visiting the Zero Trust Policies pages.

  • You can create custom user/admin sign-in policies.

  • Edit, copy, deactivate, and delete your Custom and Copied policies.

The policies within Timus' Zero Trust Network Access (ZTNA) security framework are organized and prioritized by its place in the policy table. A policy, which is placed higher in the table, is more prioritized than the other policies.

It means that you are able to prioritize the Timus ZTNA rules by yourself.

It allows for more granular control over access rights, ensuring the right people have the right access at the right time.

The security model of this zero trust approach protects your organization against potential threats by increasing network security.

Last updated