Identity Aware Proxy vs Dual Tunnel Architecture

Why Modern Teams Choose Agilicus

Compare capabilities side-by-side.

Feature

Claroty xDome

VPN Tunnels

No
Resources are not exposed to the IP layer, isolating resources, and eliminating lateral traversal.

Required
Data in transit travels through dual tunnels (user>client>resource) to create a connection between user and resource

Session Logs

Granular audit logs for each user and resource. 

Know who accessed what, when, and what they did while they were there.

Audit logs are available at site-level and the secure access client. 

Granular audit trails at application levels are not available

Architectural Approach

Layer 7

Operates at layer 7 – Application layer

Layer 3

Operates at Layer 3 – Network layer

Network Model

Proxy based

Direct connection of user to resource

Operates with outbound-only connection, eliminating the need for publicly accessible IP address

Tunnel based

A tunnel connection is established between the user and the secure access client. 

A secondary tunnel is created between the client and the resource.

Authentication Layer

Authentication Per Device/Resource

Authentication is done at the client level.

Zero-Trust Access

Agilicus is a complete Zero Trust Access platform providing identity aware access at the resource level

Claroty xDome Secure Access provides Zero Trust Access to the secure access client at the network layer

Clientless Universal Access

Access all resources from any device with a web browser.

  • Equal security across all devices accessing resources
  • Enable BYOD while maintaining security
  • Easy Access to  all authorized resources in one tile-based web launcher

Granular Authorization

Granular authorization and permission levels on a per resource level.

  • Enforce read vs write permission levels per user
  • Enable specific users to perform specific tasks on a resource
  • Native resource request workflow for task based permissions

Per-Resource Authentication

User authentication at a per resource level to enable granular authorization.

  • Enables granular audit logs for what user on what device
  • Eliminate shared passwords and team level access
  • Provision / Decommission resources on a per user basis