Zscaler to Expand Zero Trust Exchange Platform's AI Cloud with Data Fabric Purpose-built for Security

Zscaler Zero Trust Architecture for Private 5G

0
OVERVIEW

Powering the next wave of digital transformation

Fifth Generation Wireless (5G) and edge computing are accelerating innovation across industries, ushering in a new meta in connectivity. 

powering-the-next-wave-of-digital-transformation

DETAILS

5G and edge workloads are attractive targets for cyberattacks

Once a threat actor gains access to the network, they can disrupt operations as well as steal and encrypt sensitive data.

Every internet-facing firewall, on-premises or in the cloud, can be discovered and attacked

a-diagram-showing-large-attack-surface

Devices (UE) lack sufficient security and can easily be compromised, serving as beachheads for finding high-value targets

a-diagram-showing-risk-of-compromise.png (29.86 KB)

A single infected device on a routable network can infect everything on the network

a-diagram-showing-risk-of-lateral-movement

Architectural diagram

  1. Risk of compromise: An open system architecture that enables massive device connectivity 

     

    RISK: IoT/OT systems can be easily exploited, and firewalls are not designed to inspect TLS/SSL traffic at scale 
     

  2. A large, routable network: Connects branches, factories, data centers, and public clouds to enable communications 



     

    RISK: A single infected device can infect everything on the network 
     

  3. Castle-and-moat security: Establishes a security perimeter between the corporate network and internet 

     

    RISK: Every internet-facing firewall can be discovered and exploited

5G Architectural Diagram
HOW IT WORKS

Zscaler zero trust architecture for private 5G

Secures and simplifies private 5G deployments for centralized 5G Core

a-diagram-of-zscaler-zero-trust-architecture-for-private-5g
Enable zero trust connectivity
  • Secure site-to-site connectivity over the internet without a routable network (5G UPF to Core)
  • Ensure users and devices (UE) are not on the same routable network as apps in the MEC, DC, and cloud

Secure apps and data
  • Minimize the egress and ingress attack surface
  • Identify workload vulnerabilities, misconfigurations, and excessive permissions

Secure communications
  • Prevent compromise and data loss with inline content inspection

Manage digital experiences
  • Quickly resolve performance issues with visibility into device, network, and app performance

Together, we're empowering customers to securely embrace private 5G

Azure
AWS
Nokia
Ericcson
dots pattern
zscaler-customer-sandvik
CUSTOMER SUCCESS STORIES
sandvik-logo

“With Zscaler zero trust, we can protect [mission-critical] workloads by securing all internet, device, and workload communications.”

—Sebastian Kemi, Chief Information Security Officer, Sandvik AB

CUSTOMER SUCCESS STORIES
klas-logo

“[With Klas and Zscaler], the warfighter now has unprecedented secure, granular access to warfighting applications at the tactical edge.”

—Carl Couch, Director of Engineering, Klas Government

zscaler-customer-sandvik
zscaler-customer-klas-goverment
nathan-howe-vp-5g-zscaler

Nathan Howe

VP, Emerging Technology & 5G, Zscaler
"Customers deploy Zscaler to ensure secure and seamless access to workloads, regardless of the location or network where the application exists."
dots pattern

Engage the Zscaler 5G team

Let our experts show you how Zscaler helps you maximize your 5G connectivity deployment.