Fantom Edge®

Zero-touch Deployment Across Multiple Remote Sites

Fantom Edge brings Zeroport’s patented hardware isolation to small and remote sites, ensuring real-time, zero-touch access without exposure or compromise.

The Heart of Fantom Edge: The Fantom Core

Hardware-Enforced Protection:

Every connection is physically isolated, eliminating software-based vulnerabilities.

Scalable by Design:

Fandom can be scaled linearly with various form-factors for different use-cases.

Ultra-Low Latency:

Engineered for real-time performance with no compromise on speed or reliability.

The Edge Appliance: Compact Form, Enterprise Power.

Plug-and-Play Deployment:

Zero-touch deployment with minimal setup and no need for network reconfiguration or maintenance.

Centralized Management:

Configure, monitor, and authorize user sessions through a unified control pane.

Hassle-Free Maintenance

Ultra-low service requirements across single or multiple sites. 

The Management Layer: Control at Your Fingertips

Native Session Recording:

Records all user activities natively.

Intuitive Admin Dashboard:

Manage user sessions, access rights and device through a unified control panel.

Real-Time SOC/NOC Monitoring:

Track all active connections and instantly detect anomalies or unauthorized attempts.

Granular Access Policies:

Define user roles, connection permissions with precision.

Complete Audit Logging:

Every session is recorded and stored securely for compliance and forensic review.

FAQs

What is your licensing model and total cost of ownership compared to software‑only stacks?

Zeroport Fantom is delivered as Product‑as‑a‑Service: your subscription includes the hardware appliances, firmware, cloud orchestration and support, priced primarily by concurrent channels rather than total headcount. Because Fantom consolidates VPN, PAM, VDI gateways and browser isolation into a single governed secure remote access platform, customers typically reduce the number of products they operate and patch, shrink license sprawl, and dramatically cut the manual effort needed to coordinate multi‑hop remote access. The result is a lower and more predictable total cost of ownership than maintaining multiple overlapping software‑only secure remote access solutions.

How does ZeroPort support zero‑trust and regulatory or compliance requirements?

ZeroPort Fantom is natively aligned with zero‑trust principles: verify explicitly, enforce least privilege, and assume breach. Every session is tied to a named user via SSO and MFA, and access is governed by role‑based policies, time windows, and optional approval workflows. Even if an endpoint is compromised, malware cannot pivot through Fantom because there is no IP tunnel or file channel to exploit. Full session capture and immutable administrative logs provide strong evidence for regulators and auditors in sectors such as BFSI, critical infrastructure, semiconductor manufacturing and data centers.

How hard is ZeroPort to deploy? Do we need to change our existing network or applications?

ZeroPort is designed for zero‑touch deployment on the protected side. The Fantom appliance drops into a DMZ or segmentation‑bridge position and connects directly to the network, There is no need to change your internal routing, addressing or application stack. Common patterns include DMZ remote‑access brokers for internet users and vendors, and IT‑to‑OT segmentation bridges that preserve existing VLANs while eliminating VPN tunnels. Site requirements are modest—standard rack power, a DMZ IP and an internal IP per core and commodity bandwidth—so most customers can stand up a pilot in days, not months.

What are ZeroPort’s performance and scalability characteristics?

ZeroPort is engineered for real‑time operations and large‑scale environments. Remote desktop and browser workflows are designed to meet sub‑50‑millisecond latency targets for operators and traders. Fantom Edge appliances support 4–20 concurrent channels for OT clusters and edge rooms, while Fantom Enterprise appliances support up to 200 channels in a single 1U chassis. By clustering appliances, a 48U rack can host 8,000 concurrent secure remote access sessions with N+1 redundancy, making it possible to replace multiple VPN, ZTNA, PAM and VDI stacks with a single, scalable platform.

How does ZeroPort integrate with our existing identity, MFA and SOC/SIEM tools?

ZeroPort is built to plug into your existing identity and monitoring stack. Fantom federates with Azure AD, Okta, LDAP and other SAML‑compliant identity providers, so you can enforce mandatory MFA and role‑based access policies. A built‑in keyboard‑firewall engine can block risky commands or sequences and automatically terminate or flag sessions. The platform records every session - including third‑party and vendor activity - for replay and forensic analysis, and exports events and sessions to your SIEM/SOAR over syslog or APIs, so your SOC can automate response playbooks and maintain a single pane of glass for privileged remote access.

In which environments and industries is ZeroPort typically deployed?

ZeroPort Fantom is designed as a horizontal secure remote access layer that works across both IT and OT. It is used in mobility and automotive (engineering labs, EV charging networks, depots and connected‑vehicle backends), in banking and financial services (core banking, payments, trading and investigation browsing), in power and utilities (control centers, substations, SCADA and DCS systems), in data centers and colocation (OOB, BMS/EPMS, DCIM and tenant management networks), and in semiconductor manufacturing (tool controllers, MES and facilities networks). In each of these sectors, ZeroPort enables governed remote work on critical systems without collapsing network segmentation.

How does ZeroPort maintain an air‑gap and stop ransomware and data exfiltration via remote access?

ZeroPort’s core security value is that it makes protocol‑borne and file‑borne attacks physically impossible on the remote access path. The hardware buffer only accepts keyboard and mouse signals in, and only sends video pixels out. There is no IP tunnel that malware can use to reach OT or core IT systems. Because there are no file, clipboard or print channels at all, ransomware cannot deliver payloads into plants, substations, fabs, data centers or banking systems via remote access, and sensitive IP, recipes, or configs cannot be exfiltrated out through the session. This is why customers use Fantom as a control to neutralize ransomware and data‑leak paths between IT and OT and between internet users and crown‑jewel applications.

How are you different than data‑diodes?

Traditional data‑diodes, are designed to move data one way between networks but still depend on conventional Ethernet links and standard IP networking on both sides of the diode pair. They are primarily sized for narrow OT export use cases and usually require separate tools for identity, policy, and audit. ZeroPort Fantom is built for secure remote access and works differently: • No IP at all across the gap – Fantom uses a proprietary non‑IP remote‑access transport, so routable IP packets never cross the physical partition. • On‑demand, air‑gapped sessions – Fantom creates interactive desktop sessions only when a user is approved; there are no always‑on inbound or outbound flows. • High user density – A single 1U Fantom Enterprise appliance supports up to 200 concurrent channels, and a 48U rack can support 8,000 concurrent sessions, delivering far lower cost per session than per‑site diode pairs. • Identity‑first operations – Fantom integrates with your IdP and MFA, applies keyboard‑firewall policies and records full sessions end‑to‑end instead of bolting these capabilities on with separate systems. In short, Fantom delivers stronger isolation than IP‑based diodes while also providing the scale, usability, and governance required for modern secure remote access.

How is ZeroPort different from VPN, ZTNA, PAM, VDI and other software‑only secure remote access tools?

Most secure remote access solutions are 100% software. VPNs, ZTNA agents, PAM jump servers, and browser‑isolation stacks all still expose routable IP services at your perimeter and then try to protect those services with more software, rules, and patches. ZeroPort takes a different approach: it removes IP entirely at the trust boundary. The Fantom appliance uses a non‑IP, unidirectional hardware buffer between the external network and the protected network, so there is nothing to port‑scan or exploit. Because files, clipboard, and print are physically absent, not just blocked by policy, common ransomware and data‑exfiltration techniques simply have no path. At the same time, Fantom gives you a single governed console for access approvals, MFA, policies, recording and analytics instead of multi‑hop VPN → PAM → VDI chains.

What is ZeroPort Fantom secure remote access and how does it work?

ZeroPort Fantom is a hardware‑enforced, non‑IP secure remote access platform that revolutionizes remote access for air-gapped environments and replaces traditional VPN, ZTNA and PAM gateways where remote access exists. On the protected side, a Fantom appliance is dropped into the network with no downtime or changes to topology. On the user side, a lightweight desktop app connects over an encrypted tunnel. Only keyboard and mouse events are sent into the protected environment, and only compressed video pixels are streamed out - no files, clipboard, or print channels exist at all. This “inputs‑in / pixels‑out” model keeps your core systems air‑gapped while still enabling normal RDP, VDI, SSH and browser‑based workflows for administrators, engineers, and vendors.
Hardware-Level Protection Wherever Your Workforce Operates

Book a live demo to see how Fantom Edge secures remote workers, field engineers, and distributed sites through portable, zero-exposure hardware that eliminates IP-based risk.

Book a Demo