Soliton Systems G/On Logo

Soliton Systems G/On

VPN-alternative SDP providing zero-trust secure remote access via USB key.

HybridSMB · Mid-Market · Enterprise
Visit Website
Compare
0
MCPThe entire cybersecurity market, one prompt awayTry MCP Access

Soliton Systems G/On Description

G/On is a software-defined perimeter (SDP) solution that provides secure remote access as an alternative to traditional VPN connections. It operates on a zero-trust model, allowing only verified users to access corporate network resources while keeping the network isolated from the outside world. The solution runs from a USB key, requiring no installation on the host device. This means it can be used on any unmanaged personal computer or Mac without storing or caching data on the client device, preserving both security and user privacy. Key capabilities include: - Two-factor authentication for user verification - A central management console with full usage logging - Management controls for user access, permissions, and group memberships - Full distribution control for software components - Built-in load balancing and redundancy - Fast onboarding of additional gateways and users G/On is compatible with Windows and macOS and is designed for organisations seeking to reduce remote access complexity and attack surface without the overhead associated with traditional VPN infrastructure. It targets use cases ranging from individual remote workers to large-scale deployments such as government ministries and municipalities.

Soliton Systems G/On FAQ

Common questions about Soliton Systems G/On including features, pricing, alternatives, and user reviews.

Soliton Systems G/On is VPN-alternative SDP providing zero-trust secure remote access via USB key. developed by Soliton Systems. It is a Zero Trust solution designed to help security teams with ZTNA, Remote Access, USB Security.

Have more questions? Browse our categories or search for specific tools.

ALTERNATIVES

Alkira Zero Trust Network Access Logo

Cloud-based ZTNA solution providing identity-based access control for users and apps

0
GoodAccess Zero Trust Architecture Logo

SaaS platform providing zero trust network access for secure remote access

0
Twingate Zero Trust Platform Logo

Zero Trust Network Access platform for remote access and identity-based control

0
Cognitas CrossLink ZTNA Logo

ZTNA platform for secure remote access replacing VPNs with zero-trust controls

0
Pomerium Pomerium Zero Logo

Clientless secure remote access platform with Zero Trust architecture

0

Stay Updated with Mandos Brief

Get strategic cybersecurity insights in your inbox