Show rating breakdown
Save to My Lists
Claimed
Claimed

Xiid Zero Knowledge Networking Architecture Reviews & Product Details

MG
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: Organic
What do you like best about Xiid Zero Knowledge Networking Architecture?

A military-grade technology to get a piece of data from point A to point B, using deception against adversaries. A new way of understanding cyber security. Review collected by and hosted on G2.com.

What do you dislike about Xiid Zero Knowledge Networking Architecture?

Everything is improvable in life ... we look forward to the release of smartphone protection. Review collected by and hosted on G2.com.

What problems is Xiid Zero Knowledge Networking Architecture solving and how is that benefiting you?

We use this fantastic technology to protect the data transport of our customers and our resellers' customers.

In fact VPN,VDI, ZTNA are widely used and have had their day, they are perfectly known by attackers.

Xiid's technology uses a completely different approach, which allows behavior unknown to attackers and artifacts, which may possibly be inside compromised machine, this fools the adversary and provides the user with a number of obvious benefits. Review collected by and hosted on G2.com.

Xiid Zero Knowledge Networking Architecture Overview

What is Xiid Zero Knowledge Networking Architecture?

Xiid has introduced an innovative and exclusive Zero Knowledge Network (ZKN) Architecture that is revolutionizing enterprise network security. Xiid's Zero Knowledge Networking (ZKN) is a novel security framework that overlays and safeguards your existing network. It enhances the principles of Zero Trust by incorporating Zero Knowledge Proofs to provide secure data exchange and access to resources without revealing any sensitive information about the data itself to third parties. Xiid’s proprietary software eliminates potential attack surfaces while providing credential-less access to remote machines, data, and applications, ensuring complete data confidentiality and offering unmatched protection and peace of mind.​ ​ Xiid's Zero Knowledge Networking technology proactively reduces the attack surface of your enterprise by exceeding Zero Trust. It harnesses the advantages of Zero Trust, such as least-privilege access, continuous verification and authentication, and continuous monitoring of network traffic, user activity, and device behavior, as well as facilitates network and resource segmentation. Additionally, through the power of Zero Knowledge Networking, Xiid enables credential-less authentication, secures all traffic with multiple layers of encryption, and eliminates the need for 3rd party data replication or open inbound ports, delivering the strongest network security on the market.​ Experience the benefits of fortified security and enhanced functionality while reducing costs and risks for your organization.

Xiid Zero Knowledge Networking Architecture Details
Show LessShow More
Product Description

Xiid has introduced an innovative and exclusive Zero Knowledge Network (ZKN) Architecture that is revolutionizing enterprise network security. Xiid's Zero Knowledge Networking (ZKN) is a novel security framework that overlays and safeguards your existing network. It enhances the principles of Zero Trust by incorporating Zero Knowledge Proofs to provide secure data exchange and access to resources without revealing any sensitive information about the data itself to third parties. Xiid’s proprietary software eliminates potential attack surfaces while providing credential-less access to remote machines, data, and applications, ensuring complete data confidentiality and offering unmatched protection and peace of mind.​ ​ Xiid's Zero Knowledge Networking technology proactively reduces the attack surface of your enterprise by exceeding Zero Trust. It harnesses the advantages of Zero Trust, such as least-privilege access, continuous verification and authentication, and continuous monitoring of network traffic, user activity, and device behavior, as well as facilitates network and resource segmentation. Additionally, through the power of Zero Knowledge Networking, Xiid enables credential-less authentication, secures all traffic with multiple layers of encryption, and eliminates the need for 3rd party data replication or open inbound ports, delivering the strongest network security on the market.​ Experience the benefits of fortified security and enhanced functionality while reducing costs and risks for your organization.


Seller Details
Year Founded
2018
HQ Location
Cupertino, US
LinkedIn® Page
www.linkedin.com
11 employees on LinkedIn®

SV
Overview Provided by:

Recent Xiid Zero Knowledge Networking Architecture Reviews

MG
massimiliano g.Mid-Market (51-1000 emp.)
5.0 out of 5
"The best technology at the best price"
A military-grade technology to get a piece of data from point A to point B, using deception against adversaries. A new way of understanding cyber s...
Verified User
E
Verified UserSmall-Business (50 or fewer emp.)
5.0 out of 5
"Filling the liquid security and encryption gaps in a COTS product world."
The solution fills gaps that all other COTS products to not address. Albiet a compliment to a COTS product or a replacement for your current solut...
Patrick R.
PR
Patrick R.Small-Business (50 or fewer emp.)
5.0 out of 5
"Amazing technology built by an amazing team."
I appreciate the thouroughness of the whole solutions offered by Xiid. It covers the most important part of cybersecurity in a manner that no one e...
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

Xiid Zero Knowledge Networking Architecture Media

Answer a few questions to help the Xiid Zero Knowledge Networking Architecture community
Have you used Xiid Zero Knowledge Networking Architecture before?
Yes

2 out of 3 Total Reviews for Xiid Zero Knowledge Networking Architecture

5.0 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
G2 reviews are authentic and verified.
Verified User in Consulting
EC
Small-Business(50 or fewer emp.)
More Options
Validated Reviewer
Verified Current User
Review source: Organic
What do you like best about Xiid Zero Knowledge Networking Architecture?

The solution fills gaps that all other COTS products to not address. Albiet a compliment to a COTS product or a replacement for your current solution, XIID address and enhances the security postures with a unique new age approach using simplicity and the highest level of security on the market. Review collected by and hosted on G2.com.

What do you dislike about Xiid Zero Knowledge Networking Architecture?

CISO's have to decide to add this to their existing security stack of COTS products. It compliments and / or can replace parts of your existing tech stack and that causes management decision delays. Review collected by and hosted on G2.com.

What problems is Xiid Zero Knowledge Networking Architecture solving and how is that benefiting you?

We have enhanced our security by leveraging the dual encryption tunnel and simplified secuirty by removing complex, high maintainance integrations that require a lot of attention. We have also successfully improved connection performance. All this is accomplished by a "smart" solution that requires drastcially reduced complexity and is quick and easy to setup for any administrator. Review collected by and hosted on G2.com.

Patrick R.
PR
Small-Business(50 or fewer emp.)
More Options
Validated Reviewer
Verified Current User
Review source: Organic
What do you like best about Xiid Zero Knowledge Networking Architecture?

I appreciate the thouroughness of the whole solutions offered by Xiid. It covers the most important part of cybersecurity in a manner that no one else can offer. Review collected by and hosted on G2.com.

What do you dislike about Xiid Zero Knowledge Networking Architecture?

I would love to see a mobile version of their solution. Review collected by and hosted on G2.com.

What problems is Xiid Zero Knowledge Networking Architecture solving and how is that benefiting you?

It helping secure our customers systems in a way that they have never experience before. Review collected by and hosted on G2.com.

There are not enough reviews of Xiid Zero Knowledge Networking Architecture for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Okta Logo
Okta
4.5
(891)
Okta is The World’s Identity Company™. As the leading independent Identity partner, we free everyone to safely use any technology — anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.
2
BetterCloud Logo
BetterCloud
4.4
(457)
BetterCloud provides critical insights, automated management, and intelligent data security for cloud office platforms.
3
Cisco Duo Logo
Cisco Duo
4.5
(394)
Duo is a cloud-based access security platform built to protect access to any application, from any device. Duo’s passwordless authentication, single sign-on (SSO) and user-friendly multi-factor authentication make secure logins easy for users, reducing friction to their workflow.
4
Absolute Secure Access Logo
Absolute Secure Access
4.7
(213)
Absolute Secure Access delivers modern remote access for highly mobile workforces without sacrificing productivity. It provides reliable network connectivity for users to securely access critical resources in the public cloud, private data centers, or on-premises -- even in challenging environments. It is the only solution that proactively optimizes and improves the employee experience while offering deep visibility, control, and analytics to IT administrators.
5
FortiClient Logo
FortiClient
4.4
(204)
FortiClient Fabric Agent integrates endpoints into the Security Fabric and provides endpoint telemetry, including user identity, protection status, risk scores, unpatched vulnerabilities, security events, and more.
6
Trend Vision One Logo
Trend Vision One
4.7
(187)
Trend Micro Vision One (XDR) collects and correlates deep activity data across multiple vectors - email, endpoints, servers, cloud workloads, and networks - enabling a level of detection and investigation that is difficult or impossible to achieve with SIEM or individual point solutions.
7
GoodAccess Logo
GoodAccess
4.7
(149)
Secure your online business systems against hackers. Control access to your online business systems easily. Let your team work from home office and remote locations. Securely!
8
Check Point CloudGuard Network Security Logo
Check Point CloudGuard Network Security
4.5
(122)
Check Point CloudGuard Network Security for private and public cloud platforms is designed to protect assets in the cloud against the most sophisticated threats.
9
NordLayer Logo
NordLayer
4.3
(117)
A stress-free way to secure your network.
10
Check Point Harmony SASE Logo
Check Point Harmony SASE
4.7
(116)
Check Point Harmony SASE is a converged networking and network security platform which connects all users, in the office or remote, to all resources, located on-prem, cloud, SaaS or web. It delivers secure Zerto Trust Network Access (ZTNA) connectivity along web protection capabilities including Internet access control, malware protection, data loss prevention(DLP), and sandboxing, as well as a firewall as a service. The solution employs a hybrid architecture, combining on-device and cloud-based protections, which delivers market leading security and performance.
Show More