Researchers at Zscaler have conducted an analysis of some of the most prevalent IRC-based botnets and determined that these types of threats remain effective as the features incorporated into them continue to improve.
Talkin' Cloud at the end of each day pulls out five must-read cloud computing stories from the news cycle for its readers to review in the morning. Today's column features Zscaler, Ericsson (ERIC) and Intel Security.
Enter Zscaler, a provider of IT security services delivered via the cloud, which just added a next-generation firewall service that can protect both network infrastructure and applications.
Zscaler introduced the Winter 2015 release of the Zscaler security platform. Zscaler Winter 2015 is a cloud-based firewall providing network security and application control requiring no on-premises hardware or software.
The firewall also fully integrates with Zscalers platform which offers sandboxing, web security, DLP, content filtering, SSL inspection, malware protection and correlation, reporting and analytics.
Zscaler today announced a cloud-based firewall into a market that is finally ready for a clean pipes offering. Not in the press release is the fact that they hired iPolicy founder Pankaj Parekh to take the project forward.
The new AWS Marketplace for Desktop Apps makes available such desktop software as security and data storage applications, including Zscaler Security Cloud from Zscaler Inc. and IDM Ultra Security from IDM Computer Solutions;
Zscaler is mentioned in this round up story that looks at venture funding and acquisitions dollars have been flying fast and furious over the past two months as investors try to cash in on cloud security.
As companies increasingly move sensitive data into the cloud, a number of security implications arise, as well as concerns about investments in these services and technologies. While many organizations are attracted to the benefits of cloud storage, breaches persist, meaning enterprises must create effective plans for migrating their data and monitoring risks, despite the hand-off to third parties. Zscaler’s CEO, Jay Chaudhry, talks to SC Magazine about trends in security spending.
Zscaler’s research team weighs in on the browser-based attack tool Angler Exploit Kit (EK) for an article on Softpedia that outlines how the the EK attack tool works. The story also linked back to the Zscaler blog post on the topic for more information.
Zscaler have joined the Cyber Threat Alliance (CTA) in its efforts to make united progress in the fight against sophisticated cyber enemies through deep collaboration on threat intelligence and sharing indicators of compromise.
Google Code may have been especially attractive to no-goodniks given that people trust anything downloaded from the Google.com domain without knowing or caring that it's from a third-party developer, security firm Zscaler pointed out in 2013. People would download a game or app and unknowingly hand the keys to the kingdom to a bad actor.
CRN published The Cybersecurity 500 List, which ranked Zscaler 108 out of 500 cybersecurity companies. The list ranked companies based on innovation, rather than size or revenue. Zscaler was on the list alongside many well-known players in cybersecurity, including FireEye and Palo Alto Networks.
Seven-year-old Zscaler has accepted relatively little outside money compared to other security startups, but big companies like Dollar General, Hormel Foods, La-Z-Boy, Nestle and United Airlines rely on its cloud services to fight cyberthreats.
Cloud security is a focus of many of the startups coming to market. When Zscaler arrived in 2008, it aimed to take on secure Web gateway vendors with its cloud security platform. Today the company does SaaS-based Web filtering, cloud-based anti-malware, data loss prevention and secure Wi-Fi services.
Vendors included in the research include CA Technologies, McAfee, Symantec, Trend Micro, CipherCloud, CloudLock, CloudPassage, Commtouch Software, CREDANT Technologies, CYREN, HyTrust, IBM, Okta, Panda Security, SafeNet, Skyhigh Networks, ThreatMetrix and Zscaler.
endors included in the research include CA Technologies, McAfee, Symantec, Trend Micro, CipherCloud, CloudLock, CloudPassage, Commtouch Software, CREDANT Technologies, CYREN, HyTrust, IBM, Okta, Panda Security, SafeNet, Skyhigh Networks, ThreatMetrix and Zscaler.
During the summit, the Cyber Threat Alliance, founded by Palo Alto, Symantec, Fortinet and McAfee, announced four new members: Barracuda Networks, Reversing Labs, Telefonica and ZScaler. The goal of the group is for members to share threat information so they can build stronger defenses against advanced adversaries.
Cybercriminals adept at social engineering take aim at corporate users luring them with fake emails purporting to be from Microsoft Volume Licensing Service Center and informing the recipient that they received administration permissions for handling volume licenses. Zscaler researchers named it Chanitor, and it has been seen in January to deliver the Vawtrak banking Trojan, but it can also be employed to funnel in other types of malware, too.
One of Talkin’ Cloud’s “must-read” stories of the week, VeloCloud announced its support for a policy engine on its namesake service and the signing of a new alliance with Zscaler. These new relationships are making it possible to extend data protection and security policies across the WAN.
VeloCloud Networks, a start-up offering a subscription-based, virtualized WAN service for enterprises that aggregates multiple access lines (cable modem, DSL, LTE) into a single secure connection, announced interoperability with leading cloud security platform, Zscaler, spurring growth of its SD-WAN ecosystem.
VeloCloud today announced its support for a policy engine on its namesake service and the signing of a new alliance with Zscaler, making it possible to extend data protection and security policies across the WAN.
According to a list compiled by Forbes based on Glassdoor.com data, there are several CEOs of cloud companies with more than 90-percent employee approval. Zscaler’s Jay Chaudhry, is among the highest rated CEOs.
A relatively new Android Trojan that specializes in stealing banking information by intercepting SMS messages has been making the rounds. Researchers at zScaler spotted the as yet unnamed Trojan circulating as 888.apk. Like many types of malware that came before it, at least for the moment, the Trojan appears to be targeting Chinese Android users.
Zscaler is an IPO candidate for 2015. The Security-as-a-Service provides secure Web gateway capabilities, Web filtering, intrusion prevention and deep packet inspection capabilities. Its data loss prevention can decrypt and inspect content encrypted with SSL.
Using the 2015 CRN list as a baseline to compare the Glassdoor.com scores of the (%) of employees who would recommend this company to a friend and (%) of employees who approve of the CEO, the following series of tables were constructed.
Z-Scaler (www.zscaler.com), another cloud based solution, takes the OpenDNS model a step further by integrating additional security features into its offering such as malware sandboxing. Z-Scaler's approach is to address complex security issues by engineering the capability into their solution.
The San Jose Internet Security Provider named William Welch global vice president of sales and chief revenue officer. Recently he was vice president and general manager at HP Software Americas.
Researchers at Zscaler provide more details on the use of the vulnerability in the Angler exploit kit. They say that two legitimate ad networks are being used to serve malicious ads, which redirect users to the exploit kit. This is then used to push the 'Bedep' trojan onto the victim's system.
Bill Welch, veteran software industry executive, joins Zscaler as Vice President of Global Sales and Chief Revenue Officer to scale the company’s sales and channel organizations and accelerate growth worldwide.
"I know a number of people who are concerned that we don't have definitive proof to give proper attribution to the attack, but in cases like this we rarely have all the evidence we need to provide attribution," noted Michael Sutton, vice president of security search for Zscaler. "I do think that while we don't have conclusive proof -- the FBI hasn't been that transparent with us -- I do think North Korea remains the most viable suspect in this attack," Sutton said.
One of the biggest security problems when it comes to mobile technology is that of the retail store and the branch office. To that end, Cradlepoint and Zscaler got together to introduce a new breed of hybrid solution that takes the best of a cloud-based solution and matches it with parts of an on-premise solution to deliver powerful, yet useful, protection.
Yesterday at the 2015 NRF Conference (National Retail Federation), Cradlepoint has announced the availability of the long awaited Zscaler Internet Security integration. Developed as a joint program between Cradlepoint and Zscaler, this advanced protection monitors data breaches, ensures PCI compliance, and helps remote offices by running a single threat management solution. Built into enterprise routers like the MBR1200, MBR1400, AER 2100, and COR IBR, this is both a rapidly deployed, and easily managed, threat protection solution.
In late November, Sony Pictures Entertainment was hacked by a group calling itself Guardians of the Peace (GOP). What initially appeared to be another hacktivist attack, later turned out to be a sophisticated operation possibly orchestrated by a state actor. Zscaler’s Michael Sutton weighs in.