Cloud-Native Proxy vs DMZ Appliance

Agilicus AnyX is a complete Zero Trust Network Access platform, comprising authentication, authorization, audit, access. One of AnyX’ core features is the ability to remotely use a remote graphical environment, via both Remote Desktop Protocol, and VNC. These are available via a browser, or via a native client, and incorporate Agilicus’ trademark simple, seamless, single-sign-on via your existing identity providers, for your staff, your partners, with optional multi-factor authentication.

Why Modern Teams Choose Agilicus

Compare capabilities side-by-side.

Feature

Xona

Firewall Exposure

Zero Inbound Ports. Connectors dial out to the cloud edge. Your perimeter drops all unsolicited public traffic.

Requires IT Inbound Ports. The appliance must be exposed to the public internet for clientless access (or hidden behind a legacy VPN).

Network Visibility

“Dark” Infrastructure. The attack surface is hidden; the local network routing table is completely unaware of the target asset.

Publicly Addressable. The appliance gateway can be pinged, scanned by Shodan, and targeted by botnets.

Delivery Mechanism

Native Protocol Proxying (HTML5). Translates RDP/SSH/Web locally. Feels snappy, native, and uses ultra-low bandwidth.

Pixel / Video Streaming. Streams an interactive video (MP4/H.264) of the screen. High bandwidth, high latency, and “clunky” UX.

Edge Threat Protection

Built-in WAF & DDoS. The Agilicus cloud absorbs DDoS floods and OWASP attacks globally before they reach your ISP.

Bring-Your-Own Security. Relies on your physical firewall to survive DDoS attacks. Requires licensing a 3rd-party WAF for web protection.

Asset Protection (Granularity)

Application-Layer (L7) Control. Understands the traffic. Can restrict specific actions (e.g., allow “View”, block “Save/Post”).

Visual Airgap Only. You either have access to the video stream or you don’t. Cannot natively filter specific clicks or API commands inside the stream.

Auditability & Forensics

Text-based, searchable logs. Exact records of what a verified identity did (e.g., “User executed HTTP POST at 10:02 AM”).

Video playback. Security teams must manually watch hours of recorded MP4 video files to figure out what a contractor clicked.

Clientless Universal Access

Access all resources from any device with a web browser.

  • Equal security across all devices accessing resources
  • Enable BYOD while maintaining security
  • Easy Access to  all authorized resources in one tile-based web launcher

Granular Authorization

Granular authorization and permission levels on a per resource level.

  • Enforce read vs write permission levels per user
  • Enable specific users to perform specific tasks on a resource
  • Native resource request workflow for task based permissions

Per-Resource Authentication

User authentication at a per resource level to enable granular authorization.

  • Enables granular audit logs for what user on what device
  • Eliminate shared passwords and team level access
  • Provision / Decommission resources on a per user basis