Unified Policy Management

Zscaler Mobile Security

Zscaler Mobile Security delivers advanced security, corporate compliance and traffic visibility across popular device platforms and ownership models in an enforceable manner. You can even seamlessly separate business and personal usage ensuring that any malicious content downloaded during personal use cannot gain access to sensitive corporate assets.

Mobile Security Is No Longer Optional

As an IT professional, you are well aware of the unique challenges of supporting mobile devices—ranging from platform proliferation, ownership models, and the sheer volume of personal and business apps available for instant download. It estimated that by 2016, there will be over a billion smartphones and over 760 million tablets in use globally. The line between ‘personal’ devices and ‘business’ devices is blurring. While some organizations still issue mobile devices to their employees, “bring your own device” (BYOD) is increasingly becoming the norm in non-regulated industries.

Inspect and secure all mobile traffic in the cloud

Zscaler Mobile Security is purpose-built to address the evolving challenges of mobile data and app security for both employee-owned and corporate-issued mobile devices. Zscaler provides mechanisms to forward all your mobile traffic—browser and app—to the Zscaler security cloud. There we analyze both inbound and outbound traffic in real time to ensure that your users are protected against advanced web browsing threats and your organization is in compliance with corporate security policies. Zscaler protects against browser based threats like phishing and spyware, and app-based threats and security/privacy risks from malicious or rogue apps. All this is achieved with minimal latency—maintaining an optimal user experience.

Zscaler Mobile Architecture

Zscaler has you covered—whether you provide your employees with mobile devices or your users bring their own. Struggling with managing iOS vs Android? We have solutions for both of these platforms. The whole point of mobile security is that it needs to be mobile—not just in where it is used, but how and when it is used, including over 3G/4G connections and hotel Wi-Fi networks.

Gain complete visibility and control

As the IT administrator, you retain complete visibility and control—you can set granular user level policies including compliance mandates across a user’s multiple devices. The analytics and reporting portal provides instant and detailed visibility through a ‘single pane of glass’—identifying mobile browser and app traffic, application usage patterns and security and privacy threats. The intuitive and user friendly interface provides graphical, in-depth views into user transaction logs—you can run reports for reporting or incident analysis and easily identify mobile apps that may be the source of security incidents or privacy leakage.

Real-time Analytics and Reporting

Along with Zscaler’s other capabilities such as URL filtering, anti-virus, and APT protection, mobile traffic can be analyzed in the full context of a user’s Internet usage—across devices and platforms. This enables dynamic forensics and remediation steps to pinpoint attack and risk vectors in your environment. Zscaler can also enforce a cellular quota for Android based mobile devices, where users access to mobile apps is restricted when they are on cellular network.

With pre-integrated MDM offerings from partners like MobileIron and VMware (AirWatch), you can enable Zscaler protection with the click of a button. Complete, holistic security along with a rich technology eco-system ensures you can take your mobile security as wide and deep as your business takes you.

 

 

 

PARTNER SOLUTION BRIEFS
MobilIron Solution Brief
Airwatch Solution Brief
Ad Retargater