Concerned about recent PAN-OS and other firewall/VPN CVEs? Take advantage of Zscaler’s special offer today

Zscaler Blog

Get the latest Zscaler blog updates in your inbox

News & Announcements

A Powerful Combination: Active Defense, the Bridge to Zero Trust


The end of May marked a monumental juncture for Zscaler as we continued to extend the company’s cybersecurity reach with our intent to acquire Smokescreen Technologies, a leader in active defense technology.

This week, I am excited to report that the Smokescreen deal has closed, and we are proceeding to integrate its leading-edge active defense capabilities into the Zscaler Zero Trust Exchange. In contrast to traditional network traffic analysis tools, which are noisy and prone to false positives, active defense uses elaborate decoys and honeytraps to block the most sophisticated threats with high accuracy as attackers attempt to traverse corporate networks.

The appeal of active defense is how it turns the tables on would-be attackers. Security teams don’t have to hunt for network threats, rather the bad actors are lured to honeytraps, dramatically slowing their progression in order for security teams to quarantine the threats. While the ultimate answer is to migrate to a zero trust architecture, thus eliminating the risk of network access, active defense is founded on the similar concept of trusting nothing and assumes that the network is already breached. This offers organizations a pragmatic path to zero trust and provides a simple yet effective way for them to identify and remove attackers who may already be expanding laterally and compromising resources on the corporate network.

I invite you to learn more about Smokescreen’s active defense technology at Zenith Live 2021. The Zscaler ThreatLabZ experts will also share in-depth research into emerging attacks, dissect recent attack chains, and provide clear guidance on how to better secure your enterprise from sophisticated threats targeting your software supply chain. You’ll also get an exclusive preview into Zscaler’s protection suite, which unifies our threat intelligence, cybersecurity experts, and innovative technology to help defend your organization against the most advanced attackers.


Forward-Looking Statements
Blog posts on this site may contain forward-looking statements that are based on beliefs, assumptions and on information currently available to our management. These statements, including but not limited to statements relating to our products, customers, business development activities and business results, are subject to the safe harbor provisions created by the Private Securities Litigation Reform Act of 1995. You can identify these forward-looking statements by terminology such as “will,” “expects,” “believes,” “anticipates,” “intends,” “estimates” and similar statements. A significant number of factors could cause actual results to differ materially from statements made in blog posts on this site. Additional risks and uncertainties are set forth in our filings made with the Securities and Exchange Commission (“SEC”), which are available on our website at and on the SEC's website at Any forward-looking statements in these blogs are based on the limited information currently available to Zscaler as of the date thereof, which is subject to change, and Zscaler will not necessarily update the information, even if new information becomes available in the future.
form submtited
Thank you for reading

Was this post useful?

dots pattern

Get the latest Zscaler blog updates in your inbox

By submitting the form, you are agreeing to our privacy policy.