AVA enabled secure access to applications without requiring a traditional VPN. That means fewer client-install headaches and less user friction.
It supports integration with identity providers and device posture/trust provides, which means you don't always need to build everything from scratch.
Since access policies apply every time a user tries to connect AVA becomes a daily operational tool rather than something set and forget.
AVA offers fine grained access policies, you can define access based on user identity. device posture, location etc. Review collected by and hosted on G2.com.
While AWS verified access simplifies user access compared to VPNs, the initial setup can be quite complex.
Much of the configuration still depends on AWS CLI orJSON policy editing, with limiting graphical management tools. Review collected by and hosted on G2.com.
The reviewer uploaded a screenshot or submitted the review in-app verifying them as current user.
Validated through a business email account
This reviewer was offered a nominal gift card as thank you for completing this review.
Invitation from G2. This reviewer was offered a nominal gift card as thank you for completing this review.


