Leostream AWS Security:

Enabling the Benefits of ZTNA

Leostream’s Zero Trust Network Access (ZTNA) within the AWS environment delivers enhanced data protection, simplified IT management, streamlined user access, improved performance, and more.

Leostream AWS Security: Enabling the Benefits of ZTNA

Leostream’s Zero Trust Network Access (ZTNA) within the AWS environment delivers enhanced data protection, simplified IT management, streamlined user access, improved performance, and more.

Protecting Data

Data security is paramount, and Leostream excels at safeguarding sensitive information. With Leostream, organizations can control access to data stored in their private environments while utilizing a gateway to tunnel display pixels only.


This approach ensures that the data never resides on the user’s local device, remaining securely stored in the cloud or on-premises. Additionally, Leostream supports HTML5 viewer options, enabling the blocking of USB device access within the remote computing environment, further preventing data extraction from the cloud.

Simplifying IT

Leostream simplifies IT management by providing a Connection Broker that allows IT teams to define access policies, plans, and permissions. By leveraging the connection broker, organizations can ensure that users have access only to the appropriate computing resources and data.

Furthermore, the Leostream Agent running on the compute resources continuously monitors user sessions, automatically enforcing idle session disconnections, subsequent logouts, and machine power-downs to optimize resource usage and minimize costs. This automation alleviates IT burdens, allowing them to focus on more critical tasks.

Streamlining User Access

Ensuring seamless user access while enforcing continuous authentication is vital for an effective end-user computing environment. Leostream supports multi-factor authentication (MFA) and integrates with various single sign-on solutions to authenticate users transparently and securely. In addition, Leostream passes credentials securely to the display protocols, eliminating the need for users to retype them, and authenticates users at the operating system level, enabling a smooth single sign-on experience.

Improving Performance

Leostream addresses the need for a VPN replacement, particularly for graphics-intensive workloads. By acting as an automated enterprise NAT, Leostream’s gateway eliminates performance bottlenecks and latency issues associated with passing graphics data through a VPN.

The gateway ensures optimal performance and productivity by leveraging kernel-level redirection and firewall manipulation, even with large-scale enterprise deployments. Scaling the system by clustering gateways is straightforward, maintaining performance as the workforce grows.

Removing the Requirement for a VPN

While VPNs have traditionally been used for remote access, they often struggle to handle graphics-intensive workloads efficiently. Leostream’s gateway provides a viable alternative to VPNs, offering a more seamless and high-performing solution, especially for organizations working with CAD models, 3D renderings, financial data analysis, government and defense applications, or video editing. By eliminating the reliance on VPNs, organizations can enhance performance and productivity for their end users.

Increasing Visibility

Leostream enhances visibility into resource usage, providing IT teams with valuable insights. The Leostream agent, deployed on remote resources, collects and transmits information to the connection broker, including user login details, accessed resources, connection times, client information, and IP addresses.

This data enables IT to monitor and analyze user behavior, identify potential security concerns, and ensure network integrity. Notably, Leostream’s software-based solution allows organizations to maintain control of personally identifiable information (PII), ensuring data privacy and compliance.

By leveraging Leostream within the AWS environment, organizations can fully embrace the benefits of ZTNA, strengthening their remote computing capabilities, enhancing security, and improving overall