The
next-generation VPN

As easy as making a video call: XplicitTrust simplifies network access, making VPNs and network security less of a hassle.

Start your 30-day free trial
Laptop showing the XplicitTrust admin dashboard

Modern Network Access

XplicitTrust simplifies network access, making VPNs and network security less of a hassle. It's as easy as making a video call.

Simple Installation

Clients are lightweight, install in a heartbeat, and simply ask for the user's email address, nothing else.

Zero-Configuration Clients

No client configuration necessary. After single sign-on, clients automatically receive their configuration and keys.

Single-Sign On & MFA

Single sign-on and multi-factor authentication. User changes from your identity provider are reflected instantly.

Static IP Addresses

Each device gets a fixed IP address on the overlay network, to avoid collisions with your existing IP addresses.

No Need to Touch Firewalls

We operate independently of your firewalls. No need to make firewall or network configuration changes.

Connect from Anywhere

Works from anywhere. Inside your networks, on the road, from home, in cloud data centers, and more.

Seamless Roaming

No connection loss when you move between locations, WLAN access points, internet providers, and uplinks.

Firewall & NAT Traversal

We automatically traverse firewalls and complex NAT. All while keeping your traffic end-to-end encrypted.

Internal Domain Names

Reach any device using a friendly internal domain name of your choice. Or simply use its IP address.

Highly Secure

Our platform is built around state-of-the art encryption, access control, and security best practices.

Powerful Encryption

We rely on a powerful combination of modern, peer-reviewed cryptographic algorithms.

End-to-End Protection

End-to-end encryption. Private keys exist on your machines only. We cannot see what’s inside your packets.

Automatic Key Rotation

Keys are automatically rotated on all devices every few minutes, for perfect forward secrecy.

Single Packet Authorization

Devices will only respond to authenticated packets, anything else will simply be dropped.

Zero Trust Network Access

Continuous evaluation of location, time, device and security info to check access context according to configured policies.

Precise Access Controls

Precisely control what each user and machine can access, via our policy engine. Enforced at destination.

Book a demo