Sign up to stay in touch

Join the 18,000 companies following the next release

VPN Replacement

Replacing VPN solutions with application networking

Transform device centric networks into Zero Trust Application Networks instantly

Application networking technology approach solves issues associated with VPNs

For decades, Virtual Private Networks (VPNs) have been the most common tool for an enterprise to enable remote access. At the time, they helped employees to connect to corporate resources without having to copy their work such as files between home and office or any other location.

However, as number of remotely connecting users increased, it has become apparent that bringing remote devices to corporate networks significantly increased risk of breach and lateral movement.

VPN Replacement

For decades, Virtual Private Networks (VPNs) have been the most common tool for an enterprise to enable remote access. At the time, they helped employees to connect to corporate resources without having to copy their work such as files between home and office or any other location.

However, as number of remotely connecting users increased, it has become apparent that bringing remote devices to corporate networks significantly increased risk of breach and lateral movement

VPN challenges solved

VPN challenges solved

Unlike implicit trust model inherent in VPNs, with TransientAccess, users are pre-authorized before connecting to any resource and transient application networks are built on demand among authorized apps only. Authorized users are connected with authorized apps on a need to know basis.

Devices are not part of the network

Unlike VPNs, remote devices are not brought to the corporate networks but enterprise applications are brought to authorized users using a temporary application networks. This way, the risk of lateral movement is reduced significantly.

VPN challenges solved

Unlike implicit trust model inherent in VPNs, with TransientAccess, users are pre-authorized before connecting to any resource and transient application networks are built on demand among authorized apps only. Authorized users are connected with authorized apps on a need to know basis.

Devices are not part of the network

Unlike VPNs, remote devices are not brought to the corporate networks but enterprise applications are brought to authorized users using a temporary application networks. This way, the risk of lateral movement is reduced significantly.

Resources

TransientAccess Cyflare MSP

Secure access to critical sytems with
TransientAccess

TransientAccess Cyflare MSP

Secure access to critical sytems with TransientAccess

arrow-down

Download

arrow-up

Share link

01.27.2021 | PDF, 467Kb

TransientAccess Data Sheet

Product Data Sheet TransientAccess 2.x

TransientAccess Caglayanlar

secured remote access with McAfee® UCE and TransientAccess

arrow-down

Download

arrow-up

Share link

13.03.2021 | PDF, 960Kb

TransientX

A False Sense of Security:
RDP & VPN & MFA STACK

TransientAccess Data Sheet

A false sense of security: RDP & VPN & MFA STACK

arrow-down

Download

arrow-up

Share link

12.11.2020 | PDF, 1.29Mb

TransientX

Protecting On-Premises Microsoft Exchange Servers

TransientAccess Data Sheet

Protecting on-premises Microsoft exchange servers

arrow-down

Download

arrow-up

Share link

16.10.2020 | PDF, 118Kb

Egemen Tas


22+ Years of Experience​

As President and Chief Executive Officer of TransientX, Inc., a pioneer in network of applications technology, he is responsible for strategy and day to day operations.​

Before TransientX, he served as Chief Technology Officer at COMODO Cybersecurity, and during his tenure created some of the world’s most disruptive cybersecurity products, including COMODO Endpoint Security, lauded by NSA and Wikileaks as impenetrable.

Egemen is also a noted “white hat” who has been cited in a number of ethical hacking publications and whose tools are still used today in related subject courses around the world, including those offered by the reputable SANS Institute.

He has been recently recognized in the industry as one of the 40 Most Influential Turkish Americans.

Egemen holds a degree in Computer Science from Bogazici University in Istanbul, Turkey.

This will close in 0 seconds

Jeffrey S. Harrell


20+ Years of Experience​

Jeffrey has served as the Company’s Chief Financial Officer and VP of Business Strategy since June 2020.

Previously, he co-founded several technology companies which were subsequently acquired in the semiconductor and software industries. Jeffrey practiced corporate law for more than 20 years.

Jeffrey has a J.D. from the University of Virginia School of Law and a B.S. in accounting and finance from Virginia Tech.

He is also a certified public accountant (Virginia).

This will close in 0 seconds

Selhan Bilsay


20+ Years of Experience​

Selhan is responsible for engineering activities and product development ​

Before joining TransientX, he was the general manager of COMODO’s R&D operations in Turkey. ​

Being one of the leaders who worked in NATO cybersecurity doctrine, he is a seasoned expert in millitary defense industry with more than 15 years experience in the sector.

Selhan holds MBA degree from The Hague University, The Netherlands and BSc degree in Electronics Engineering from Hacettepe University, Ankara-Turkey

This will close in 0 seconds

Chad Loeven


As VP Marketing, Chad Loeven is responsible for all things digital and messaging. Chad has been involved in enterprise security for over 20 years and brings a thorough vision of our industry to the table, making sure our alignment within the industry is perfect.

After having successfully guided Vircom, Sunbelt (acquired by GFI) and Silicium (acquired by RSA), he directed RSA’s strategic partnerships. He most recently headed up VMRay’s U.S. operation, building out the sales, marketing and customer success teams.

This will close in 0 seconds

John Sarina


John is responsible for driving enterprise sales through our channel partners at Transientx.

Prior to Transientx, John has held sales leadership roles for notable startups NetScreen/Juniper, Riverbed, PaloAlto Networks. Johns experience bringing new disruptive technologies to market has yielded over $500 Million in revenue contribution.

This will close in 0 seconds