<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel>
        <title>Partner | Blog</title>
        <link>https://www.zscaler.com/blogs/feeds/partner</link>
        <description>Latest news and views from the leading voices in cloud security and secure digital transformation.</description>
        <lastBuildDate>Wed, 29 Apr 2026 20:15:31 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>RSS 2.0, JSON Feed 1.0, and Atom 1.0 generator for Node.js</generator>
        <language>en</language>
        <item>
            <title><![CDATA[The Hidden Risk in RISE with SAP: Why Connectivity Decisions Make or Break Your Migration]]></title>
            <link>https://www.zscaler.com/blogs/partner/hidden-risk-rise-sap-why-connectivity-decisions-make-or-break-your-migration</link>
            <guid>https://www.zscaler.com/blogs/partner/hidden-risk-rise-sap-why-connectivity-decisions-make-or-break-your-migration</guid>
            <pubDate>Tue, 28 Apr 2026 16:15:20 GMT</pubDate>
            <description><![CDATA[As enterprises move SAP ECC to the cloud through RISE with SAP or into S/4HANA environments on hyperscalers, most of the focus goes to the migration journey itself. Infrastructure, timelines, system integrators, and testing plans tend to dominate early conversations.While focusing on these is crucial for a successful go-live, a successful migration must be balanced with early investment in secure connectivity. All too often, secure connectivity is deferred until core migration decisions are finalized. This deferral, however, is precisely where the success of the entire migration program is most likely to falter.By connectivity, I refer to the access plane: how employees, partners, and third parties reach SAP applications across hybrid environments—under what policy, with what verification, and with what visibility. It becomes the control point for who can access SAP systems, under what conditions, and how securely the organization operates through user acceptance testing (UAT), cutover, and go-live. When these decisions are deferred, teams end up relying on temporary VPN-based access paths that quickly become permanent, introducing risk and operational complexity at the exact moment the business is least tolerant of disruption.Getting the access plane right early in the program has an outsized impact on everything that follows downstream: fewer late-stage exceptions, cleaner governance, better troubleshooting, and a smoother transition from ECC to S/4HANA.The Shared Responsibility GapIt is often incorrectly assumed that the adoption of RISE automatically transfers all security responsibilities to SAP. While SAP takes responsibility for the "Security of the Cloud" (infrastructure, OS, database, and hypervisor), the customer retains 100% responsibility for "Security in the Cloud," which includes application-level security, data protection, and user management.This division of responsibility often creates a security gap. Teams frequently assume platform migration inherently improves security, leading them to rely on outdated, legacy access models.Zscaler addresses this gap by assisting customers in implementing their security obligations with consistent Zero Trust access across hybrid environments. Instead of placing users on the network, Zscaler Private Access enables direct user-to-application connectivity with least privilege and continuous verification. This approach protects the SAP modernization effort from inheriting the risks associated with legacy connectivity.Why Migrations Falter When Secure Connectivity is Not Addressed Early OnIn RISE with SAP migrations, many of the most persistent security and audit challenges center on customer-controlled access and connectivity—identity, third-party access, and consistent policy enforcement—rather than the SAP-managed infrastructure itself.Teams often default to familiar network-based fixes like extending VPN access, adding tunnels, or relying heavily on IP allowlists. Over time, this can lead to fragmented policy, limited visibility, exception sprawl, and governance issues, especially for third parties.These temporary access paths often persist post-go-live, expanding privileges and weakening governance when stability is crucial. This introduces long-term issues like performance bottlenecks from backhauling, brittle routing dependencies, and slower troubleshooting.The highest impact solution is to modernize access early. Before UAT, define application-specific, least-privilege access rules with conditional policies for users and partners. A clean access model upfront reduces late-stage surprises and avoids carrying complex VPN/tunnel dependencies into steady state.Why VPNs Should Not Be the Default for Modernizing SAPVPNs are designed to extend network boundaries, not to provide secure access for distributed users to modern applications.&nbsp;Once connected via VPN, users often gain broad network access, which significantly increases the risk of lateral movement across the network.&nbsp;VPN architectures also introduce operational fragility involving difficult-to-manage aspects like tunnels, intricate routing, high availability planning, and capacity management. These are dependencies you do not want to be debugging during a transformation.A Zero Trust, user-to-application approach completely transforms this model.&nbsp;Applications are not exposed to the public internet. Users connect only to the specific services they are authorized for (e.g., specific SAP services), with continuous validation based on identity and context.&nbsp;The Zscaler Private Access (ZPA) and SAP integration exemplifies this approach, delivering natively-deployed zero trust connectivity. This results in a reduced attack surface, the elimination of lateral movement risk, and consistent SLAs.Moving to Zero Trust Controls and Experience Visibility&nbsp;Modern SAP environments are hybrid by default. Remote users, multi-cloud dependencies, and integrations with non-SAP services are the norm. In that world, it is not enough to say you have security. Leaders need controls that work consistently and can be demonstrated during regulatory compliance checks. A practical approach is to focus on fundamentals. Secure how users access SAP, protect SAP data, and ensure that your end-user SAP experience remains strong.The&nbsp;Zscaler Zero Trust Exchange platform supports these needs with application-level access controls, data protection and threat mitigation, and digital experience visibility that helps teams quickly isolate whether issues originate from the endpoint, network path, or application. This becomes especially critical during migration windows where minutes matter.When organizations can reliably answer who accessed what and why it was allowed, security becomes an enabler. It reduces audit friction, builds stakeholder confidence, and allows migration teams to move faster with fewer blockers.The ROI: Risk Reduction, Predictability, Productivity, and Lower Operational CostModernizing SAP access primarily delivers predictability, reducing late-stage connectivity issues and emergency exceptions. This translates to faster migrations and lower change failure rates when moving from ECC to S/4HANA. From a security standpoint, simplifying the architecture—fewer VPNs, tunnels, and exposed services—reduces misconfiguration risk and operational overhead. Over time, organizations also see productivity gains from improved performance and faster troubleshooting, particularly during go-live periods when stability is critical.Closing ThoughtAdopting RISE with SAP doesn't eliminate the customer's obligation for access and security controls; rather, it underscores the need for a well-defined access security strategy early in the program. The toughest moments in your migration journey are predictable. Pre-migration, cutover and go-live, and steady state.A Zero Trust, direct user-to-application model helps teams avoid temporary connectivity sprawl, reduce risk during the migration journey, and maintain a strong user experience throughout.&nbsp;With our SAP-validated integration, Zscaler helps enterprises bake secure connectivity into their RISE programs early so security accelerates modernization instead of slowing it down.Continuing the ConversationWe will be going deeper into this topic in our SAP Insider security webinar “RISE Without Risk: The Zero Trust Blueprint for SAP Transformation” with Zscaler experts Mike Loy and Keith Hontz, where we walk through what is Zero Trust and why are organizations adopting it for RISE with SAP and&nbsp;how teams are sequencing Zero Trust into the RISE program based on real migration scenarios.We will also be continuing the conversation in person at&nbsp;SAP Sapphire from May 11-13 in Orlando, where&nbsp;many of these challenges are coming up in real time as organizations move from planning into execution, so stop by and meet us at Booth 404.]]></description>
            <dc:creator>Prateeksha Nagar (Sr. Product Marketing Manager)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Americas Executive Partner Summit 2026 Recap: Partnering with Impact]]></title>
            <link>https://www.zscaler.com/blogs/partner/americas-executive-partner-summit-2026-recap-partnering-impact</link>
            <guid>https://www.zscaler.com/blogs/partner/americas-executive-partner-summit-2026-recap-partnering-impact</guid>
            <pubDate>Wed, 22 Apr 2026 19:51:05 GMT</pubDate>
            <dc:creator>The Zscaler Partner Team (Zscaler)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Catching Attackers in the Cloud: Zscaler Deception Now Supports Google Cloud]]></title>
            <link>https://www.zscaler.com/blogs/partner/catching-attackers-cloud-zscaler-deception-now-supports-google-cloud</link>
            <guid>https://www.zscaler.com/blogs/partner/catching-attackers-cloud-zscaler-deception-now-supports-google-cloud</guid>
            <pubDate>Mon, 20 Apr 2026 15:21:00 GMT</pubDate>
            <description><![CDATA[The cloud continues to be a pivotal battleground in cybersecurity.&nbsp;Google Cloud’s Threat Horizons H1 2026 report found that identity compromise made up 83% of cloud and SaaS intrusions, and threat actors targeted data in 73% of cloud-related incidents. These aren’t signs of unsophisticated attacks–they’re signs of a threat landscape that has fundamentally reoriented itself around cloud control plane access.At Zscaler, we’ve spent years building&nbsp;deception technology that catches attackers others miss. Today, we’ve extended our cloud detection capabilities to Google Cloud, and the timing couldn’t be more important. The cloud control plane where breaches liveWhen an attacker gains a foothold in a cloud environment, they don’t start breaking things. They start exploring. They enumerate IAM roles, query service account permissions, and probe storage buckets through legitimate cloud APIs that leave little to distinguish malicious calls from routine operations.Cloud environments create a unique challenge for defenders: every administrative action such as provisioning resources, assigning permissions, or accessing secrets, happens through API calls that are largely indistinguishable from normal operations. When attacks gain access to cloud credentials, they don’t need to exploit vulnerabilities or deploy malware. They can simply use the same APIs that legitimate admins use, quietly enumerate permissions, map access paths and identify high-value targets before needing to take an action that might trigger an alert. Traditional security tools weren’t built to catch this. EDR agents monitor endpoint processes, not API calls. Network detection tools watch traffic, but cloud control plane activity happens over encrypted HTTPS requests to management APIs, outside the reach of traditional sensors.The detection gap is real and exists precisely because the cloud control plane–the layer of identities, permissions, and APIs that governs everything beneath it–is where attackers operate, and where most legacy detection tools remain blind. AI is collapsing the time defenders have to respondThe urgency of cloud detection has increased sharply as AI has entered the attacker’s toolkit, and is now being used to orchestrate attacks at a speed and scale that outpaces traditional detection. We wrote about&nbsp;the first reported AI-orchestrated cyber espionage campaign, and AI-driven attacks have increased since. The&nbsp;Zscaler ThreatLabz 2026 VPN Risk Report found that 70% of organizations have limited or no visibility into AI-enabled threats, and only 24% have deployed AI-powered monitoring capable of detecting them.&nbsp;Additionally,&nbsp;Mandiant’s M-Trends 2026 report found that increased threat actor coordination has driven down the attacker “hand-off time”–the interval between initial compromise to secondary threat actor– from over eight hours in 2022 to just 22 seconds in 2025.&nbsp;When attacks move that fast, detection tools that depend on baseline modeling and alert triage are fundamentally overmatched. You need a signal that provides certainty the moment it fires. Why deception works differently in the cloudDeception operates on a key principle: any interaction with a decoy resource is, by definition, malicious. There is no legitimate user who has reason to access a fake service account, enumerate a decoy cloud storage bucket, or query a decoy secret manager entry. That baseline eliminates the false positive problem entirely, and in cloud environments where dynamic scaling, CI/CD pipelines, and ephemeral workloads make behavioral baselines incredibly difficult to maintain, that distinction matters.Cloud environments are also inherently reconnaissance-heavy. Every attacker action, from discovering resources, mapping permissions, and identifying targets–requires API calls. Placing decoy resources in that API response space means attackers encounter them during the early reconnaissance phase, before they can cause more significant damage. The decoy interaction doesn’t just alert your team but tells you exactly what the attacker touched, how they got there, and what they were looking for. Zscaler Deception, now on Google CloudZscaler Deception now supports Google Cloud, enabling security teams to deploy cloud decoys that mimic legitimate Google Cloud resources: service accounts, Cloud Storage buckets, Cloud SQL instances, Secret Manager entries, and Artifact Registries. When an attacker interacts with any of these decoys–whether they’re an external threat actor or a compromised insider–Zscaler collects valuable telemetry and surfaces this activity as a high fidelity alert, ready for immediate response via notification to your security team or orchestrating a response through Zscaler Internet Access, Zscaler Private Access or integrations with EDR, SIEM and SOAR tools.This isn’t about adding another alerting layer. It’s about getting one alert that truly matters and then acting on it immediately. See it in actionIf you’re running workloads on Google Cloud and want to know whether an attacker is already inside your environment exploring resources you can’t afford to lose, Zscaler Deception can tell you–with certainty, and without the noise.&nbsp;Request a demo to see how Google Cloud decoys work in practice.]]></description>
            <dc:creator>Keith Do (Product Marketing Manager)</dc:creator>
        </item>
        <item>
            <title><![CDATA[The AI Governance Trap: Policy Won&#039;t Save You - Fluency Will]]></title>
            <link>https://www.zscaler.com/blogs/partner/ai-governance-trap-policy-won-t-save-you-fluency-will</link>
            <guid>https://www.zscaler.com/blogs/partner/ai-governance-trap-policy-won-t-save-you-fluency-will</guid>
            <pubDate>Thu, 16 Apr 2026 15:00:19 GMT</pubDate>
            <description><![CDATA[The AI Governance Trap: Policy Won't Save You - Fluency WillBy: Robert Kim, CTO, Presidio&nbsp;Why restriction fails and what a “fluency-first” model looks like in practiceI’ve been very fortunate to spend significant time with smart, experienced technology leaders learning and gaining feedback on the practical application of new technology trends to their organizations. However, when the topic of “enterprise AI use” comes up, the mood tends to shift – the previously noted positive air and confidence transitions to pessimism and frustration.It’s emblematic over the past two years, where I've had versions of the same client conversation (across industries and company sizes) with remarkably consistent challenges:“My data* isn't in good enough shape. I gotta fix that first.”“I don't know what tools to standardize on as there are so many choices.”“I don't have a prioritized list of good, feasible use cases.”“I don't have a governance strategy and worried about ongoing cost.”“I don't trust the model's output or&nbsp;trust external APIs with our data.”“I don't know what I'm doing, nor does my team.”*Quick data note: Waiting for perfect data governance before starting AI initiatives is a path to irrelevance. Many high-value use cases need a surprisingly small, targeted corpus of data. More importantly, AI can be used as a tool for getting “your data right” - classifying unstructured content, surfacing inconsistencies, enriching incomplete records. The organizations winning aren't waiting for clean data to use AI. They're using AI to clean their data.But the one dreaded comment that sits underneath all the others is:"I don't want to be the one who says no."This is the challenge that makes every other challenge harder. Technology leaders are caught between two legitimate obligations that feel, in the moment, like they're in direct conflict; move fast on AI because of competitive pressures and do it securely because “getting it wrong” has profound consequences. And nobody has handed them a framework that lets them do both&nbsp;at the same time.That's why I wrote this. Not to add another governance policy to the pile, but instead, to argue that the way most organizations are approaching AI governance is structurally the wrong model. A better option exists, and we've already field-tested it.Thinking back to when I started my IT career, I want to draw a parallel to early enterprise security. Every application lived inside a tightly controlled perimeter. The network had a hard edge. Security strategy was simple: build a wall, guard the gate, assume anything inside was safe – 100% breach prevention.Then the internet happened, which gave way to cloud. With the pandemic, employees started working from anywhere, connected to services IT had never approved, from devices IT had never provisioned. The perimeter dissolved and the security doctrine that had made perfect sense inside a corporate DMZ became, slowly and then all at once, completely inadequate.Our industry's response was one of the most important mindset shifts in enterprise technology history: the acceptance that you cannot prevent every breach.Not as a failure but as a foundational design principle.The question stopped being&nbsp;"How do we keep attackers out?" and became&nbsp;"How do we detect intrusions fast, contain damage, and recover quickly?" That shift gave rise to Managed Detection and Response (MDR) a model built on visibility, behavioral monitoring, and rapid remediation. You still had locks on the doors, but now you also had cameras.AI governance is standing exactly where cybersecurity stood two decades ago. And like history repeating itself, we are potentially making the same mistake.Walk into almost any enterprise and ask about their AI governance strategy. What you'll find is a document - a policy. A list of approved tools and prohibited use cases. Some access controls.The problem is that no policy can fully prevent shadow AI use. The tools are free, accessible from any personal device, and woven into apps employees already use daily. The moment the approved AI tool feels slower or more cumbersome than the one on their phone (or worse if no AI tools are allowed), the policy has lost - not out of defiance, but out of usability.The result is the worst of all possible worlds with the organization bearing the risk of AI use it can't see, govern, or remediate. The compliance dashboard might even reflect “all green” status, yet somewhere on a personal laptop, sensitive data is being pasted into a prompt.Locks on the door. No cameras. No sensors.The cybersecurity parallel acts as a practical blueprint. When the industry accepted that breaches were inevitable, the response wasn't to abandon prevention. It was to build a second layer: real-time visibility, anomaly detection, rapid response. The cameras alongside the locks.AI governance needs the same reboot. Instead of asking&nbsp;"How do we prevent employees from using AI in ways we haven't approved?", the right question is "How do we build a workforce so fluent in AI that they make good decisions with it, regardless of the tool or the context?"Compliance through literacy vs. compliance through restriction. An AI Governance policy that opens access to all, where you earn new privileges through demonstrating competency.A workforce that genuinely understands AI - how models work, where they fail, what they should and shouldn't be trusted with - is your most durable governance layer. They don't need a policy to tell them not to paste PII into a public model. They know why it's a bad idea.This is the shift in mindset: moving from a&nbsp;compliance-first posture to a&nbsp;capability-earned model. Instead of governance that tells you what you&nbsp;can't, governance that unlocks what you&nbsp;can - because you demonstrate you're ready for it.Think about how video games work. You don't start with the best weapons, the highest skills, or access to the most complex levels. You earn them – one boss fight at a time. More importantly, the progression feels fair because the challenges get harder as your capabilities grow. And nobody resents unlocking a new level because they worked for it. The reward could be a new weapon or new skill – a tangible “level up” recognizing you effort.Apply that same psychology to AI tooling and you get governance organized around three tiers of earned access.Gate 1 (AI-Literate):&nbsp;The on-ramp, open to everyone. Pass it by demonstrating foundational understanding: how models work, where hallucination comes from, which categories of data should never enter a prompt. Unlocks access to AI tools with appropriate compute limits, pre-built agent templates, and managed integrations. Think of it as the starter kit; enough to play, enough to learn, enough to discover where you want to go next.Gate 2 (AI-Proficient): Proficiency means applied judgment: architecting multi-step workflows, evaluating outputs critically, understanding basic token economics well enough to impact design decisions. It also means knowing when&nbsp;not to use AI. Unlocks the ability to build agents rather than just deploy them, customize tools (MCP) and integrations (skills), and access higher compute tiers with more model diversity. This is where practitioners start creating leverage - not just for themselves, but for everyone around them.Gate 3 (AI-Fluent): A fluent practitioner builds token-efficient, secure, compliant workloads from the ground up. They understand model security, data handling obligations, and the difference between a system that's performing well and one that's quietly going off the rails. Unlocks unrestricted access to the full AI stack, infrastructure-level changes, and the ability to define the patterns others follow.The progression matters as much as the tiers, where each gate isn't a barrier; instead, a skill check that prepares you for what comes next. Just like a game that would be boring without challenge, an AI governance model without progression produces a workforce that never develops real capability. The levels exist to make the reward worth having.This also solves the&nbsp;"I don't want to say no" problem directly. The answer to every shadow AI conversation becomes:&nbsp;"You don't have to stop. You have to level up." Governance stops being a blocker and becomes an accelerant.Building a fluent workforce is a multi-year investment. In the interim, employees are already using AI tools - some approved, many not. Data is moving through prompts that no DLP policy is even aware of.This is where dual architecture matters. While your literacy program builds, you need visibility into how AI is being used today: which tools employees are reaching for, what data is entering them, where your exposure is concentrated. And you need data loss prevention controls that extend to AI interactions, not just email and file transfers.This is the gap that platforms like Zscaler are closing.&nbsp;Zscaler AI Protect gives organizations the ability to discover and govern AI usage across the enterprise, both sanctioned and unsanctioned. AI Asset Management delivers visibility and posture management across AI apps, models, agents, and MCPs—surfacing the shadow AI footprint no policy document has ever seen. AI Access Security then applies real-time guardrails to AI use with prompt/response visibility, classification, adversarial attack protection, and AI-aware DLP. And because the DLP understands the content and context of what’s entering a prompt—not just static pattern matching—the guardrails your policy promises are enforced at the point of interaction.Locks and cameras. Literacy programs and enforcement infrastructure. Not in tension but get to the same answer at different time horizons.No policy prevents shadow AI use, just as no access control stops a motivated employee with a personal device. The perimeter is already porous, and it will only become more so.But the answer isn't to give up on governance. It's to reimagine governance that works with human behavior instead of against it - literacy as a long-term control, visibility infrastructure as a near-term one, coupling an incentive model that makes the path of least resistance run&nbsp;through the framework instead of around it.Build the cameras. Build the sensors. Build the fluency.The organizations that get all three of these right won't just manage AI risk but will also be the ones setting the pace.]]></description>
            <dc:creator>Robert Kim (CTO at Presidio)</dc:creator>
        </item>
        <item>
            <title><![CDATA[The Evolving Cybersecurity Landscape: Why Continuous Access Evaluation Matters Now]]></title>
            <link>https://www.zscaler.com/blogs/partner/evolving-cybersecurity-landscape-why-continuous-access-evaluation-matters-now</link>
            <guid>https://www.zscaler.com/blogs/partner/evolving-cybersecurity-landscape-why-continuous-access-evaluation-matters-now</guid>
            <pubDate>Wed, 15 Apr 2026 17:30:35 GMT</pubDate>
            <description><![CDATA[The Evolving Cybersecurity Landscape: Why Continuous Access Evaluation Matters NowIn today’s hyper-connected enterprise environment, cyberattacks unfold with relentless speed, often escalating mid-session as devices fall out of compliance or risk profiles shift unpredictably. Traditional security architectures, reliant on point-in-time authentication decisions, leave critical vulnerabilities exposed—allowing threats to propagate unchecked.This gap challenges the foundational principles of a unified cybersecurity ecosystem, where identity verification, endpoint detection, device posture assessment, and access enforcement must operate in seamless, real-time harmony at cloud-native scale. The path forward lies in continuous access evaluation, underpinned by interoperable standards that enable dynamic, context-aware decision-making across platforms.The&nbsp;Shared Signals Framework (SSF) and&nbsp;Continuous Access Evaluation Protocol (CAEP) represent this strategic evolution. These open standards facilitate the secure, near-real-time exchange of security signals among identity providers, endpoint detection tools, and Zero Trust access gateways—enhancing Zero Trust architectures without disrupting established integrations. The result is resilient, scalable protection that aligns with the demands of modern digital transformation.Why Point-in-Time Access Leaves Gaps in a Dynamic WorldZero Trust calls for constant verification: never trust, always verify. But in a connected cybersecurity ecosystem spanning identity, endpoints, and threat detection, access decisions can still be influenced by point-in-time context—even as risk continues to change.Common challenges emerge across identity, endpoint, and threat platforms as conditions evolve throughout a session. For example:A device may drift out of compliance as its posture changes.User or entity risk can increase due to unusual behavior or context shifts.EDR or threat detection tools may surface new indicators of compromise after access is already established.When these changes aren’t accounted for in real time, policy decisions can drift out of alignment with actual risk.Building Trust at Scale with Open StandardsShared Signals Framework (SSF) is a foundational, vendor-neutral framework that defines how security signals are securely exchanged at scale across platforms, supporting multiple security profiles—such as CAEP and RISC—that define what those signals represent.&nbsp;Continuous Access Evaluation Profile (CAEP) is a specialized profile built on top of SSF that focuses specifically on access-related signals for active user sessions after authentication. Together, SSF provides the secure signaling infrastructure, while CAEP enables real-time, coordinated access decisions across identity, endpoint, and Zero Trust platforms as risk conditions change.Key elements of SSF include:•&nbsp; Subjects: What the signal targets, like a user ID or device session.•&nbsp; Events: Updates such as revocations or risk changes, secured via signed tokens.•&nbsp; Transmitters and Receivers: Platforms that send or receive signals in a publish-subscribe flow.•&nbsp; Streams: Protected channels controlling data types and delivery.Put simply:SSF is built as an API and event model that standardizes how “Transmitters” publish and “Receivers” consume security events about shared subjects using secure streams.This connects siloed tools into a cohesive intelligence network.The OpenID Shared Signals Working Group (SSWG) is at the center for this evolution—bringing together SSF, CAEP, RISC, and adjacent standards to ensure security signals move safely, consistently, and at global scale.“CAEP was created to enable continuous access decisions based on real-world changes in session risk and context.”&nbsp;— Atul Tulshibagwale, OpenID board member, Co-chair of the Shared Signals Working Group (SSWG). ”It is exciting to see major technology providers like Zscaler adopt and deploy CAEP and SSF at scale”.From Siloed Tools to Unified Zero TrustCustom integrations have historically been “point to point” connections between disparate tools.&nbsp; For instance:&nbsp;Identity providers for session checks.EDR/XDR for threat detection and response.MDM/UEM for device compliance status.Zero Trust platforms for access control.SSF and CAEP standardizes these connections, enabling faster, more unified action: Non-compliant devices alert instantly, risky sessions are re-evaluated, and compromises block access across the ecosystem. This transition marks a fundamental shift:From: Fixed, perimeter-based rules applied only at login / point in time.To: Flexible, risk-based enforcement spanning identity, endpoints, and networks.The benefits are clear: Quicker threat containment, reduced lateral movement, and policies dynamically aligned with real-time risk.How Zscaler Leverages Shared Signals to enforce Zero TrustZscaler leverages Shared Signals Framework (SSF) to ingest CAEP-based signals for real-time, adaptive access enforcement through&nbsp;Zscaler’s Adaptive Access Engine—helping ensure protection stays aligned with evolving risk conditions.Zscaler’s approach is simple in principle yet powerful in execution (i.e adaptive policies stay in step with live security posture, enabling continuous resilience without disrupting productivity).Through Adaptive Access Engine, organizations can:Continuously evaluate user, device, and session contextAdjust access dynamically as risk conditions changeEnforce Zero Trust policies in real time—not just at authentication“Adaptive Access Engine, through the ingestion of security context from Zscaler and 3rd parties, enables policies to respond dynamically as risk or compliance status changes, ensuring Zero Trust access decisions remain aligned with real-time security posture”&nbsp;—&nbsp;Eric Fazendin, Senior Director, Product Management- IdentityAdaptive Access Engine&nbsp; is designed to support:Continuously risk-aware accessContext-driven enforcementFine-grained, continuous policy recalculation based on live security signalsWithin this model, SSF and CAEP play a critical role by enabling Zscaler to receive trusted posture, risk, and session signals from across the ecosystem—so enforcement remains both continuous and coordinated as conditions evolve.Partnering for Impact: The Okta-Zscaler ExampleOkta, one of the leaders in advancing CAEP and Shared Signals adoption across the identity ecosystem, is positioning continuous access evaluation as a foundational requirement for modern Zero Trust architectures.Through CAEP, Okta enables:Real-time identity posture updatesContinuous session risk propagationMid-session access reevaluation based on live contextWhen&nbsp;Okta integrates with Zscaler Adaptive Access Engine, these identity-driven signals help drive dynamic, policy-based access decisions across cloud and private applications through Zscaler."Okta is proud to champion open standards like CAEP and SSF to help build a secure foundation for enterprise security. By sharing risk signals with Zscaler in real-time, we enable continuous access decisions across the customer environment. This approach reflects our belief in building an interoperable ecosystem, upholding Zero Trust principles while eliminating the complexity and inefficiency of siloed security tools."&nbsp;— Stephen Lee, VP of Technical Partnerships &amp; StrategyThis standards-based signal exchange strengthens:Identity-driven Zero Trust enforcementReal-time session governanceCoordinated cyber risk response across platformsTogether, Okta and Zscaler demonstrate how open standards can translate directly into continuous Zero Trust outcomes for customers.Learn more about Okta's commitment to secure, interoperable identity standards and their support for SSF and CAEP&nbsp;here.Next Steps: Put Shared Signals to WorkWhether you’re exploring standards, advancing your ecosystem strategy, or strengthening Zero Trust enforcement, here are three ways to engage:Hear Zscaler experts and industry leaders discuss SSF, CAEP, partner ecosystems, and Adaptive Access Engine on&nbsp;Zscaler Pulse Podcast.Experience Adaptive Access in Action : See how&nbsp;Zscaler Adaptive Access Engine (AAE) powers continuous evaluation and dynamic enforcement for modern Zero Trust.Get involved with the Open Standards Community and explore the&nbsp;OpenID SSF and CAEP specifications, participate in Shared Signals Working Group discussions, and stay at the forefront of real-time signal sharing across the cybersecurity ecosystem.]]></description>
            <dc:creator>Kalyan Vishnubhotla (Sr. Business Development Manager)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler ZPA: Securing GPU-Native AI Workloads on CoreWeave with Zero Trust App Access (ZPA + CKS)]]></title>
            <link>https://www.zscaler.com/blogs/partner/zscaler-zpa-securing-gpu-native-ai-workloads-coreweave-zero-trust-app-access-zpa-cks</link>
            <guid>https://www.zscaler.com/blogs/partner/zscaler-zpa-securing-gpu-native-ai-workloads-coreweave-zero-trust-app-access-zpa-cks</guid>
            <pubDate>Tue, 24 Mar 2026 20:16:49 GMT</pubDate>
            <description><![CDATA[Zscaler ZPA: Securing GPU-Native AI Workloads on CoreWeave with Zero Trust App Access (ZPA + CKS)AI teams are moving fast, spinning up GPU clusters for training, scaling inference fleets for new product launches, and iterating on pipelines that blend data, models, and orchestration into one continuous delivery loop. But as these workloads shift to cloud-native, Kubernetes-based platforms, the traditional security model often cannot scale to the new architecture. Teams still expose “temporary” endpoints to the internet, punch holes in firewalls for admin tools, or rely on legacy VPN patterns that were never designed for high-value AI services distributed across ephemeral infrastructure.At Zscaler, a consistent theme emerges: AI infrastructure is becoming one of the most sensitive environments in the enterprise. It now hosts a business critical environment including proprietary models, customer datasets, vector indexes, internal tooling, and privileged control planes. The question is no longer “how do teams connect?” – it is “how does the organization provide secure access that is least-privileged, continuously verified, and operationally simple for Kubernetes-scale platforms?”That is where the combination of&nbsp;Zscaler Private Access (ZPA) and&nbsp;CoreWeave Kubernetes Service (CKS) becomes compelling: purpose-built AI cloud workloads paired with Zero Trust app access—without reintroducing a conventional network perimeter.Why legacy VPN access breaks down for modern AI platformsTraditional VPNs were built to connect by extending the network to a remote user. In practice, that means exposing gateways to the internet; and connecting users to broad internal address space—creating a large attack surface while also enabling lateral movement if credentials or endpoints are compromised. This “network-first” model also makes segmentation difficult and increases operational overhead as environments scale across clouds and regions.AI environments amplify these risks:More high-value targets per cluster: model artifacts, training data, API keys, control planes, and internal dashboardsMore identities that need access: ML engineers, platform engineers, data scientists, SREs, and partner teams—often globally distributedMore ephemeral services: short-lived jobs, autoscaled inference, dynamic namespaces, and constantly shifting service endpointsThe access layer has to keep up with that dynamism—without turning Kubernetes into a new flat network.ZPA’s model: application access, not network accessZPA was designed to remove the assumption that “being on the network” is a prerequisite for reaching private apps. Instead of inbound connectivity, ZPA uses an inside-out architecture:&nbsp;App Connectors initiate outbound TLS connections to the Zscaler Zero Trust Exchange, and users connect outbound through the&nbsp;Zscaler Client Connector—so private apps do not need to be exposed to the internet.Just as important, ZPA enforces user-to-application segmentation&nbsp;powered by AI. Users are granted access to specific applications and ports based on identity and context rather than receiving broad network reachability. ZPA can also hide real server IPs using a synthetic addressing approach at the client, reducing DNS/IP-based reconnaissance and limiting lateral movement opportunities.&nbsp;For cloud-native AI, this is the shift that matters:from&nbsp;network access → to direct&nbsp;application accessfrom&nbsp;implicit trust → to least privilege with&nbsp;continuous verificationfrom&nbsp;static perimeters → to&nbsp;dynamic segmentationWhy CoreWeave is an ideal target for Zero Trust AI accessCoreWeave’s AI Cloud aligns well with how modern AI teams run: GPU-first infrastructure, Kubernetes-native operations, and performance-sensitive scheduling and data paths.CoreWeave&nbsp;CKS is a managed Kubernetes foundation optimized for AI workloads, providing Kubernetes-native approaches to AI scheduling—such as&nbsp;Kueue for batch AI/ML workloads. CoreWeave also allows hybrid models that unify traditional HPC workflows with Kubernetes through&nbsp;Slurm on Kubernetes (SUNK), supporting batch and burst patterns at scale.On the infrastructure side, CoreWeave highlights high-performance networking fabrics and DPU-based isolation approaches as part of designs intended for large-scale GPU workloads. This combination—Kubernetes-native AI operations plus high-value private services—creates an ideal environment for ZPA’s app-segmented, inside-out access.The joint pattern: containerized ZPA App Connector running inside CKSThe solution pattern is a strong architectural fit:Deploy the containerized ZPA App Connector into the customer’s CKS cluster (often into a dedicated security/egress namespace with appropriate Kubernetes NetworkPolicies).&nbsp;The App Connector establishes&nbsp;outbound TLS connectivity to the Zscaler Zero Trust Exchange—no inbound listener and no public IP exposure required.&nbsp;Users access specific CKS-hosted services via ZPA policies based on identity, device posture, and application segmentation.In practice, ZPA brokers access without putting users “on” the Kubernetes network. Users authenticate through enterprise identity, ZPA evaluates policy, and traffic is carried through outbound TLS sessions to the Zscaler Zero Trust Exchange. Requests are then brokered to the appropriate App Connector running inside CKS, which connects to the intended private service inside the cluster and returns traffic through the same brokered path. This model keeps service IPs non-advertised and prevents broad network reachability, while still delivering user access to precisely defined applications and ports.A key advantage is that ZPA App Connectors are available as containerized deployments (including Helm-based workflows for Kubernetes distributions).What joint customers enable (without changing how AI teams build)This pattern supports least-privileged access to:Inference endpoints (internal model gateways, gRPC services, protected REST APIs)Training orchestration services (job submission portals, internal schedulers, pipeline controllers)Developer tooling (Jupyter, internal UIs, experiment tracking endpoints)Data services adjacent to compute (vector databases, feature stores, internal storage gateways)CoreWeave describes running vector databases and caching layers alongside GPU workloads on CKS to support production RAG and agentic pipelines—examples of services that are often intended to remain private.Operational fit for Kubernetes-scale AIAI platforms are elastic; access should be elastic too.ZPA’s model supports:Horizontal scaling: adding App Connector capacity as demand grows rather than scaling a central VPN chokepointDistributed placement: deploying connectors per region, per cluster, or per environment to align with organizational segmentation modelsAutomation: leveraging API-driven workflows to integrate secure access into cluster lifecycle and provisioning pipelinesCoreWeave emphasizes platform-level visibility and operational controls through Mission Control, aligning with enterprise expectations for governance and auditability around sensitive AI environments.What this enables for joint customersFrom a Zscaler perspective, the outcome is straightforward: AI services remain private by default while collaboration remains fast.This approach supports outcomes such as:Reduced exposure of AI infrastructure: fewer public endpoints, fewer inbound rules, fewer exceptionsCleaner least-privilege access: per-service segmentation mapping naturally to Kubernetes services and portsLower blast radius: limiting broad network reachability reduces lateral movement pathsFaster enablement for new services: new internal endpoints can be onboarded via policy rather than network redesignGetting startedA practical rollout plan typically includes:Identify private services in CKS that should remain non-internet-facing (model endpoints, admin tools, data services).&nbsp;Define application segments aligned to those services (hostname + port) and map them to groups/roles.&nbsp;Deploy the containerized App Connector into CKS with appropriate placement, egress allowances, and operational controls (replicas, upgrades, telemetry).&nbsp;Integrate identity context (IdP groups, device posture, MFA signals) and validate workflows for both human and automation access.&nbsp;Iterate segmentation as AI services evolve, treating access policy as governed configuration aligned to platform change management.The collaboration between Zscaler and CoreWeave is detailed in a&nbsp;deployment guide, offering a simple starting point for implementing our joint solution.Secure access as an AI platform primitiveWhen GPU workloads move to Kubernetes-native platforms like CKS, the access layer benefits from being equally cloud-native: identity-driven, application-segmented, and inside-out by design.With&nbsp;ZPA’s containerized App Connector deployed into CoreWeave CKS, joint customers can enable secure, least-privileged access to GPU-hosted workloads, data services, and operational tooling—without reverting to a VPN-era network perimeter.]]></description>
            <dc:creator>Paul Abbott (Solutions Architect - Technical Alliances)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Agentless Runtime Signals for the AI Factory: Streaming NVIDIA DOCA Argus Telemetry into Zscaler Data Fabric and Unified Vulnerability Management]]></title>
            <link>https://www.zscaler.com/blogs/partner/agentless-runtime-signals-ai-factory-streaming-nvidia-doca-argus-telemetry-zscaler</link>
            <guid>https://www.zscaler.com/blogs/partner/agentless-runtime-signals-ai-factory-streaming-nvidia-doca-argus-telemetry-zscaler</guid>
            <pubDate>Wed, 18 Mar 2026 16:47:56 GMT</pubDate>
            <description><![CDATA[Agentless Runtime Signals for the AI Factory: Streaming NVIDIA DOCA Argus Telemetry into Zscaler Data Fabric and Unified Vulnerability ManagementAI factories and industrial edge deployments are built for throughput, latency, and uptime—and have complex architecture including: containerized workloads, multi-tenant clusters, and fast-changing software stacks. Security teams aren’t short on telemetry. They’re short on answers and time.When vulnerability scanners, cloud posture tools, EDR, identity platforms, CMDBs, and runtime detections all live in separate siloes, you get noisy queues, duplicate tickets, and risk decisions that are hard to defend. If you can unify high-fidelity runtime signals with exposure context and business logic, you can prioritize the work that measurably reduces risk—without slowing down AI performance.That’s where teaming&nbsp;NVIDIA DOCA Argus with the&nbsp;Zscaler Data Fabric for Security and&nbsp;Zscaler Unified Vulnerability Management (UVM) becomes powerful: it turns out-of-band runtime telemetry into contextual risk decisions and action-oriented workflows.Why AI and edge environments need out-of-band visibilityAI clusters and edge platforms need runtime visibility that doesn’t depend on the host. Host agents can be difficult to standardize on performance-sensitive nodes and are vulnerable to tampering if a host is compromised. Perimeter-only views often miss what matters most: process activity, memory-level behavior, and lateral movement.NVIDIA DOCA Argus framework was designed to fill this gap. It runs independently of the host in its own trust domain on NVIDIA BlueField DPUs, uses DMA access to inspect host memory, and decodes it into logical signals such as process and thread data. DOCA Argus produces structured output—events, alerts, and system activity messages in JSON or syslog—and that data can be exported via Fluent Bit to downstream security platforms and data lakes.The differentiator: turning telemetry into risk decisionsTelemetry alone doesn’t reduce risk. In many environments, runtime detections live in siloed source tools without context, requiring security teams to export and attempt to stitch together a holistic view. This manual approach is time consuming and incredibly difficult to assess risk in a way that accounts for asset criticality, ownership, patch status, compensating controls, and business impact. The result is predictable: duplicated findings and remediation driven by severity labels rather than business-relevant risk.The&nbsp;Zscaler Data Fabric for Security is built to solve this. It aggregates and unifies data across security tools and business systems, then harmonizes, deduplicates, correlates, and enriches that data into a single source of truth that powers exposure management. Because the fabric’s data model is flexible, it can incorporate new data sources, like DOCA Argus runtime events, without forcing you to redesign your program around a single tool’s schema.This combined solution addresses key exposure management challenges:Solving the "So What?" Problem: Aggregating Argus runtime telemetry with business and asset context from the Data Fabric and UVM provides immediate answers on asset criticality and business impact, moving beyond simple severity labels.Eliminating Alert Fatigue and Data Silos: The Data Fabric unifies high-volume detections from Argus and other sources, correlating and deduplicating them to present a clear, risk-prioritized view instead of overwhelming security teams with disparate alerts.Driving Business-Relevant Remediation: By unifying detection (Argus) with business context from other relevant sources (Data Fabric) and asset visibility (UVM), the solution focuses remediation efforts on the findings that pose the greatest risk to the organization's critical assets and business processes.A practical architecture: DOCA Argus → FluentBit → Data Fabric → UVMThis deployment pattern aligns directly to the use case of streaming DOCA Argus events into Zscaler Data Fabric and then ingesting them into UVM.1) Generate trusted runtime signals at the infrastructure layerDOCA Argus collects raw activities from host memory and uses a policy engine to filter noise, surfacing meaningful events and alerts. In AI and edge contexts, you gain runtime threat events without adding host CPU agents.2) Stream events with FluentBitFluentBit collects DOCA Argus output and forwards it onward using standard pipelines. Because it can emit JSON or syslog, you can export data in formats downstream systems can parse consistently.3) Ingest into the Zscaler Data Fabric for Security&nbsp;The Data Fabric supports 200+ out-of-the-box connectors, and the AnySource™ connector can ingest data from virtually any system and in a variety of formats. Once ingested, entity resolution ties DOCA Argus records to the correct real-world entities: the specific GPU node, workload, cluster, environment, and owner.4) Correlate and enrich with exposure context&nbsp;This is where “events” become “risk.” The Data Fabric can connect DOCA Argus telemetry to vulnerability findings and exploitability signals, identity and user behavior, asset inventory and ownership, and mitigating controls. For example, DOCA Argus events can automatically elevate the priority of exposure findings, allowing security teams to quickly identify critical exposures before they become active threats. By normalizing and deduplicating data in real time, then correlating it across sources, you can see relationships that are hard to detect when each tool stays in its own silo.5) Operationalize in Zscaler UVM&nbsp;Zscaler UVM is built on the Data Fabric and is designed to help teams prioritize their biggest risks, automate remediation workflows, and report progress with always-up-to-date dashboards. It correlates findings and context spanning identity, assets, user behavior, mitigating controls, business processes, and organizational hierarchy.For AI and edge environments, the key point is that UVM isn’t limited to CVEs. It can ingest any risk factor or mitigating control, and you can customize the factors and weighting that constitute your risk score to match how the business defines risk.That is how DOCA Argus Framework runtime events become decision leverage:A high-severity DOCA Argus alert on a node that also has known exploited exposure can be escalated automatically.&nbsp;The same alert on a lab node with strong mitigating controls can be scored differently to reduce noise.&nbsp;Repeated DOCA Argus activity tied to a workload can drive a workflow that routes the issue to the right owner with supporting evidence already correlated.From insights to actionIn AI factories and industrial edge deployments, “response” is often a blend of security and platform engineering. The goal is to reduce risk quickly with minimal operational friction. With the Data Fabric + UVM approach, actions can include:Consolidated remediation: deduplicate findings so multiple tools and signals roll up into a single remediation task instead of dozens of duplicates.&nbsp;Risk-based prioritization: focus patching, hardening, and configuration work on what is most likely to cause business impact.&nbsp;Workflow automation: drive remediation via ticketing systems, track KPIs/SLAs, and close the loop when work is complete.Why this matters nowAI factories and edge platforms concentrate expensive compute, proprietary models, sensitive data, and business-critical workflows. Approaches that rely on “patch everything” or “alert on everything” don’t scale.By streaming DOCA Argus events via FluentBit into the Zscaler Data Fabric for Security—and operationalizing them in Zscaler UVM—teams can shift from raw telemetry to a unified, contextual view of risk that reduces duplication and focuses engineering effort where it actually lowers exposure.Making DOCA Argus telemetry usable for exposure managementDOCA Argus telemetry records are structured and carry consistent metadata—message type, severity, timestamps, and system context. You can also attach custom metadata as events are exported (for example, to tag a cluster name, environment, or owner). That makes it straightforward to treat Argus output as a first-class risk signal instead of an unstructured log stream.In the Data Fabric, the key is mapping each Argus record into the same entity model you use for exposure management. At minimum, every event should resolve to an asset identity (GPU node or edge appliance) and, where possible, a workload identity (VM/container/service). From there, you can enrich it with environment (prod vs. dev/test), ownership, and organizational hierarchy—so the same event can be prioritized differently depending on business impact.Once those relationships exist, Argus alerts can be incorporated into UVM as an additional risk factor that influences contextual risk scores and workflows. That’s especially valuable for “gray area” decisions where severity alone would drive a patch-everything response, but runtime signals and business context help you decide what must be addressed first.Operational outcomes you can measureBecause Zscaler UVM is designed to deduplicate and correlate findings into consolidated remediation tasks, teams can reduce the “ticket storm” problem and spend more time fixing the exposures that matter. Zscaler has published customer-reported outcomes such as dramatic ticket consolidation and increased triage capacity; outcomes will vary by environment.A simple way to startDeploy DOCA Argus and enable telemetry export (JSON or syslog), forwarded by Fluent Bit.&nbsp;Ingest Argus output into the Data Fabric (often via AnySource) and define entity resolution keys.&nbsp;Configure UVM contextual scoring inputs and remediation workflows (including ticketing).&nbsp;Iterate: refine scoring and grouping rules, and add more signals as your AI/edge footprint grows.For information on Nvidia Bluefield and DOCA Argus see https://www.nvidia.com/en-us/networking/products/data-processing-unit/For information on Zscaler Data Fabric and UVM please find the product information here.&nbsp;]]></description>
            <dc:creator>Paul Abbott (Solutions Architect - Technical Alliances)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Securing GenAI Applications with Zscaler AI Guard and NVIDIA NeMo Guardrails]]></title>
            <link>https://www.zscaler.com/blogs/partner/securing-genai-applications-zscaler-ai-guard-and-nvidia-nemo-guardrails</link>
            <guid>https://www.zscaler.com/blogs/partner/securing-genai-applications-zscaler-ai-guard-and-nvidia-nemo-guardrails</guid>
            <pubDate>Mon, 16 Mar 2026 21:30:08 GMT</pubDate>
            <description><![CDATA[As enterprises accelerate their adoption of generative AI and large language models, security teams face an unprecedented challenge: protecting these powerful systems from a rapidly evolving threat landscape. From prompt injection attacks and data exfiltration to malicious content generation and jailbreak attempts, the security risks surrounding AI deployments are both diverse and complex. Organizations need robust, enterprise-grade security controls that can operate at the speed of AI without compromising innovation or user experience.Zscaler and NVIDIA are collaborating to address these security controls concerns by integration between Zscaler AI Guard and NVIDIA NeMo Guardrails, delivering a powerful defense-in-depth approach to securing generative AI applications. This integration enables security teams and AI application developers to deploy comprehensive, layered protection for LLM-powered systems with minimal configuration overhead and maximum operational efficiency.The Growing Challenge of Securing Generative AIThe proliferation of AI is creating an entirely new category of operational, security, and compliance challenges for enterprises. Prompt injection attacks can manipulate AI systems into performing unintended actions or revealing sensitive information. Data leakage through AI interactions can expose proprietary information, customer data, and trade secrets. Jailbreak attempts seek to bypass safety controls, while toxic or off-topic responses can damage brand reputation and erode customer trust.&nbsp;Traditional security approaches were not designed for the unique characteristics of AI workloads. The dynamic, conversational nature of LLM interactions requires real-time inspection and policy enforcement that can adapt to context while maintaining low latency. Organizations need purpose-built solutions that understand the nuances of AI communication patterns, can inspect prompts and responses in real-time, and enforce security policies without introducing unacceptable latency or degrading user experience.&nbsp;NVIDIA NeMo Guardrails: The Foundation for Programmable AI SafetyNVIDIA NeMo Guardrails is an open-source toolkit that enables developers to add programmable guardrails to LLM-based applications. The framework provides a flexible, extensible architecture for defining, orchestrating, and enforcing AI guardrails between application code and language models. Using NeMo Guardrails, developers can control conversation flows, enforce topic boundaries, prevent unwanted digressions, and integrate external security services directly into the AI application pipeline.NeMo Guardrails supports both input rails, which process user prompts before they reach the LLM, and output rails, which analyze model responses before they are returned to users. This bidirectional control enables comprehensive protection across the entire AI interaction lifecycle. The framework's extensible action system allows seamless integration with external security services through custom Python actions, creating opportunities for enterprise-grade protection that goes beyond what any single tool can provide alone.Zscaler AI Guard: Enterprise-Grade AI Runtime ProtectionZscaler AI Guard provides comprehensive runtime protection for AI users and applications by enforcing enterprise AI policies on prompts and responses between end entities and LLMs. Built on the industry's most proven inline inspection platform, AI Guard delivers real-time threat detection, data loss prevention, and content moderation capabilities purpose-built for generative AI workloads.AI Guard features more than 18 specialized detectors with multilingual support, covering prompt injection, jailbreak attempts, malicious URLs, secrets exposure, PII detection, toxicity, brand reputation risks, competition mentions, and more. The platform leverages AI-powered engines to achieve high accuracy with low false positive rates, ensuring legitimate AI interactions proceed without unnecessary friction while blocking genuine threats. Severity settings allow organizations to fine-tune detection thresholds to match their specific risk tolerance and use case requirements.Bringing It Together: Defense-in-Depth for LLM ApplicationsThe integration between Zscaler AI Guard and NVIDIA NeMo Guardrails creates a powerful layered defense strategy. NeMo Guardrails provides the orchestration framework and pattern-based defenses, while AI Guard adds dynamic, real-time threat analysis powered by Zscaler's cloud-delivered security services. Together, these solutions enable AI application builders to easily add protection against a comprehensive list of attacks and misuse scenarios.The integration works by implementing a custom action within NeMo Guardrails that calls the Zscaler AI Guard API. When a user submits a prompt, NeMo Guardrails first evaluates the input against its configured guardrails. If the prompt passes initial checks, the AI Guard action inspects the content for threats, policy violations, and sensitive data. The same process applies to LLM responses, creating a comprehensive inspection pipeline that covers both sides of every AI interaction.Key Use Cases and BenefitsDefense-in-Depth Security: By combining semantic guardrails with an independent threat detection service, developers gain a critical second line of defense against prompt injection, data leakage, and malicious inputs. This layered approach ensures that even if one control is bypassed, additional protections remain in place to catch threats.Simplified Deployment: Inserting AI Guard as a custom action within NeMo Guardrails enables application and security teams to centralize enforcement of AI security policies. This approach eliminates the need to implement controls across every instance of application code, reducing complexity and ensuring consistent protection across all AI applications.Preventing Prompt Injections: AI Guard's detection capabilities identify multiple types of prompt injection attacks across eight languages, working in tandem with NeMo Guardrails' configurable guardrail definitions to block malicious manipulation attempts before they reach the LLM.Enforcing Data Privacy: Organizations can leverage AI Guard's powerful data loss prevention capabilities to block sensitive data leaks during AI interactions. With over 100 predefined dictionaries for identifying PII, secrets, API keys, and confidential information, enterprises can maintain compliance with regulations like GDPR and CCPA while enabling productive AI use.Content Moderation and Brand Protection: AI Guard monitors and prevents toxic, off-topic, or harmful content that could damage brand reputation. Purpose-built detectors identify inappropriate responses, competitive mentions, and content that violates organizational policies, enabling safe deployment of customer-facing AI applications.Getting StartedThe integration requires NVIDIA NeMo Guardrails 0.18.0 or higher and a Zscaler AI Guard subscription with API access enabled. The implementation involves configuring a custom action that bridges NeMo Guardrails with the AI Guard API, enabling seamless inspection of both prompts and responses within your existing guardrails configuration. The setup can be completed in minutes using the provided documentation and sample configurations.The integration is available now on GitHub at github.com/zscaler/aiguard-nemo-guardrails. The repository includes source code, configuration examples, and detailed setup instructions to help you deploy AI Guard protection within your NeMo Guardrails environment.Building Confidence in AI DeploymentsAs organizations find new and innovative ways to harness the power of large language models, AI applications, and agentic workflows to increase efficiencies, the need for robust security controls becomes paramount. The integration of Zscaler AI Guard with NVIDIA NeMo Guardrails provides developers and security teams with the layered defense mechanisms needed to confidently deploy LLMs in production environments.Zscaler is committed to making AI security accessible, flexible, and easy for developers to consume regardless of how they build applications. AI Guard and NeMo Guardrails together represent a highly customizable and robust security solution for protecting LLMs, agentic workflows, and a variety of other AI-powered use cases. The combination of proactive, pattern-based defenses with dynamic, real-time analysis establishes an enhanced security strategy that blocks known attacks while mitigating emerging threats targeting AI runtime behavior.We look forward to our continued collaboration with NVIDIA to solve the AI security challenges organizations face as they embrace generative AI transformation. To learn more about Zscaler AI Guard and explore the integration, visit our product page or check out the GitHub repository to get started today.Resources:Zscaler AI GuardGitHub IntegrationNVIDIA NeMo Guardrails]]></description>
            <dc:creator>Jason Smith (Zscaler)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler Delivers Zero Trust for AWS Security Hub Customers]]></title>
            <link>https://www.zscaler.com/blogs/partner/zscaler-delivers-zero-trust-aws-security-hub-customers</link>
            <guid>https://www.zscaler.com/blogs/partner/zscaler-delivers-zero-trust-aws-security-hub-customers</guid>
            <pubDate>Wed, 11 Mar 2026 20:13:33 GMT</pubDate>
            <description><![CDATA[Zscaler Selected as Sole SSE Provider for AWS Security Hub ExtendedAWS has selected Zscaler as the sole Security Service Edge (SSE) partner to deliver Zero Trust protection through AWS Security Hub Extended, a plan of Security Hub that simplifies how customers procure, deploy, and integrate full-stack enterprise security. As a result, AWS customers can expand their security portfolio beyond AWS through a curated selection of AWS Partner solutions and obtain Zscaler through the Extended plan.Organizations benefit from a simplified purchasing experience that includes pre-negotiated pay-as-you-go pricing and a single bill. They also obtain a unified security operations experience within Security Hub, along with unified Level 1 support for AWS Enterprise Support customers. Zscaler Zero Trust for AWSZscaler, an AWS Advanced Technology Partner, has been a leader in zero trust1 for over a decade and has six AWS Competencies, including the AWS AI Competency (Agentic AI Applications category). Zscaler protects thousands of AWS customers worldwide by securing users, devices, apps, and workloads at any location.The Zscaler Zero Trust Exchange™ is a cloud-native platform with over 160 points of presence globally, including most AWS regions and AWS GovCloud. It utilizes advanced AI to combat billions of cyber threats and policy violations every day and unlocks productivity gains for modern enterprises by reducing costs and complexity. In addition, Zscaler solutions enable AWS customers to:Discover and secure AI apps, while protecting sensitive dataAccelerate the migration of on-premises apps to AWSProvide zero trust access to private apps (SAP and more)Secure workload traffic and segment workloadsReduce the attack surface and prevent lateral threat movementMitigate the poor security and high cost / complexity of legacy VPNs“AWS customers are looking for full-stack enterprise security solutions, not point products,” said Raj Judge, EVP of Corporate Strategy and Board Member, Zscaler. “Zscaler’s partnership with AWS is built on a shared commitment to making our customers secure, and Zscaler, a leader in Zero Trust, is thrilled to be selected as a launch partner for Security Hub Extended”. Get StartedLog in to the AWS Security Hub console and select "Extended plan" under the Management menu. From there, select Zscaler.Once subscribed, you will be guided through an automated onboarding experience from Zscaler.After onboarding is complete, you will be billed monthly as part of your AWS Security Hub bill.&nbsp; Learn About Zscaler Solutions for AWSLearn more about Zscaler solutions for AWS, read real-world Zscaler customer success stories, and obtain Zscaler solutions on AWS Marketplace today.1Gartner: Magic Quadrant for Security Service Edge (SSE), May 20, 2025]]></description>
            <dc:creator>David Garcia (Principal Product Marketing Manager)</dc:creator>
        </item>
        <item>
            <title><![CDATA[EMEA Executive Partner Summit 2026 Recap: Partnering with Impact]]></title>
            <link>https://www.zscaler.com/blogs/partner/emea-executive-partner-summit-2026-recap-partnering-impact</link>
            <guid>https://www.zscaler.com/blogs/partner/emea-executive-partner-summit-2026-recap-partnering-impact</guid>
            <pubDate>Wed, 04 Mar 2026 16:57:32 GMT</pubDate>
            <dc:creator>The Zscaler Partner Team (Zscaler)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Operational Resilience in the Age of IT/OT Convergence: Why Leadership Must Act Now]]></title>
            <link>https://www.zscaler.com/blogs/partner/operational-resilience-age-it-ot-convergence-why-leadership-must-act-now</link>
            <guid>https://www.zscaler.com/blogs/partner/operational-resilience-age-it-ot-convergence-why-leadership-must-act-now</guid>
            <pubDate>Wed, 21 Jan 2026 16:27:08 GMT</pubDate>
            <description><![CDATA[Operational Resilience in the Age of IT/OT Convergence: Why Leadership Must Act NowAuthor:&nbsp;Patrick Gillespie, OT Practice Director,&nbsp;GuidePoint SecurityThe convergence of information technology (IT) and operational technology (OT) is transforming the industrial landscape. What were once isolated systems controlling physical processes (i.e., power plants, transportation networks, production lines) are now connected to IT networks, cloud services, and third-party ecosystems. This digital integration brings unprecedented efficiency and visibility, but it also exposes OT environments to cyber threats that were never part of their original design.For manufacturing, energy, utilities, mining, and transportation sectors, OT security is no longer a “nice to have”; it has become a strategic imperative. As a veteran OT practitioner who has spent two decades securing critical infrastructure, I’ve seen firsthand that industrial operations can’t afford to wait for tomorrow’s “maybe attack.” The threat is already here, and the consequences reach far beyond data loss.In this blog, we’ll explore why OT security demands immediate attention from industrial leadership and discuss why organizations must build resilience in the face of converging digital and physical risk.The OT Security Imperative Operational resilience in today’s OT environments goes beyond uptime, requiring resilience to withstand and recover from disruptions that span both cyber and physical domains. Unlike traditional IT environments, OT systems govern the machinery, sensors, and control processes that keep the physical world running. Securing them requires specialized knowledge of industrial protocols, safety systems, and production-critical environments where downtime isn’t an option.Leadership must understand that&nbsp;OT security is fundamentally different from IT security. In IT, the security model prioritizes Confidentiality, Integrity, and Availability (the “CIA” triad) protecting data above all else. In OT, that order is reversed to Availability, Integrity, and Confidentiality (“AIC”). What matters most in OT is that physical systems continue operating safely and predictably. A delay in production or an unsafe shutdown can carry consequences far more severe than a data breach, including real impacts to lives, livelihood, and the continuity of essential services.The Growing Risk of OT DisruptionCyber-attacks targeting OT systems can cause far more damage than data loss. They can halt production lines, damage equipment, compromise safety, cause physical harm, and incur regulatory and reputational damage. Industrial operators increasingly report that threats once confined to IT are migrating into softer OT perimeters. For example, many OT breach paths begin in IT and then move into OT systems.&nbsp;IoT/IIoT and OT ExpansionThe industrial world is embracing Industry 4.0: smart sensors, remote monitoring, cloud-connected control systems, and vendor access from anywhere. These lead to increased exposure and more complex risk. For instance, OT device connectivity to the internet or cloud transforms what was once isolated into a potential entry point.&nbsp;Inadequate Legacy Defenses&nbsp;Traditional perimeter-only or air-gap thinking is increasingly irrelevant. Attackers are adept at exploiting OT-IT convergence, lateral movement, vendor remote access, and targeted ransomware in industrial control systems. That’s why leading frameworks now call for “defensible architecture” and Zero Trust in OT environments.&nbsp;Business Continuity and Safety ConcernsCyber-physical risk demands that OT security get the same strategic attention as IT security. The business impact of OT security failures extends beyond digital concerns to physical consequences: halted production lines, equipment malfunctions, environmental damage, and worker safety incidents.&nbsp;Evolving Regulatory and Standard ExpectationsRisk executives and executive boards must treat OT cyber-risk as enterprise risk. The introduction of frameworks like NERC CIP, TSA Security Directives, and industry-specific mandates has established increasingly rigorous requirements. Organizations face mandatory security assessments, prescribed control implementations, and strict incident reporting timelines. Regulatory bodies are moving beyond voluntary guidelines to enforcement actions with substantial penalties.&nbsp;How GuidePoint and Zscaler Enable a Defensible OT ArchitectureGuidePoint Security and&nbsp;Zscaler&nbsp;collaborate to help industrial enterprises strengthen resilience through Zero Trust principles tailored to OT. The joint approach combines Zscaler’s cloud-native Zero Trust Exchange with GuidePoint’s OT domain expertise to meet organizations where they are and accelerate outcomes.Secure OT Remote Access: We use Zscaler’s&nbsp;Privileged Remote Access&nbsp;to help secure, agent-free, browser-based privileged remote access to contractors and vendors. From an administrative standpoint, you can grant role-based, just-in-time, fully audited access to internal OT systems.Segmentation of IT and OT: We help design and architect industrial DMZs and network topologies that isolate the OT environment from IT to create a defensible architecture that mitigates lateral movement risk.Proactive OT Security: We perform OT architecture reviews, penetration testing, OT Incident Response, vulnerability assessments, and GRC-aligned assessments; ensuring assets are identified, visibility is established, and risk-based vulnerability programs are put in place. Furthermore,&nbsp;organizations can use&nbsp;Zscaler deception to set up decoys that can mimic their OT systems. This enables OT teams to detect threats before they become incidents.Zero Trust Applied to OT: Security teams can leverage Zscaler’s&nbsp;Zero Trust Branch to microsegment their OT devices into a “network of one” achieving device segmentation that goes beyond current zone or subnet-based segmentation minimizing lateral movement&nbsp; and improving operational continuity.Vendor Partnership and Optimization: GuidePoint provides deep security consulting, vendor-neutral stance, and decades of shared OT domain expertise. As a long-standing Zscaler partner, GuidePoint delivers configuration, migration, and optimization services to make the technology work in the complex OT context.Why Action Can’t WaitThe line between digital compromise and physical consequence has never been thinner. Legacy architectures, fragmented teams, and disconnected risk frameworks can’t keep pace with adversaries who understand how to exploit them. The longer organizations wait to integrate IT and OT security strategies, the more difficult and costly that integration becomes.Zscaler and GuidePoint are helping organizations globally adopt Zero Trust for OT, secure remote operations, and build defensible architectures without sacrificing availability and safety. If you’re ready to assess your OT readiness and accelerate resilience, connect with your Zscaler and&nbsp;GuidePoint Security&nbsp;teams to discuss next steps.]]></description>
            <dc:creator>Patrick Gillespie (Zscaler)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler Celebrates 2025 with CRN&#039;s Top Honors for Data Security]]></title>
            <link>https://www.zscaler.com/blogs/partner/crn-top-honors-for-data-security</link>
            <guid>https://www.zscaler.com/blogs/partner/crn-top-honors-for-data-security</guid>
            <pubDate>Mon, 01 Dec 2025 15:00:03 GMT</pubDate>
            <description><![CDATA[In 2025, Zscaler continued its mission of redefining data security and earned major industry recognition from CRN. We’re thrilled to share that Zscaler landed on CRN’s Hottest Cybersecurity Products of 2025 list and was honored with the prestigious CRN Product of the Year for data security Technology award. These accomplishments reflect how Zscaler’s relentless focus on creating innovative solutions that help businesses tackle today’s most pressing cybersecurity challenges.Rethinking data security for a Cloud-Driven WorldThe surge in data-driven innovation and digital transformation has brought both opportunities and challenges. As organizations rapidly embrace cloud-first strategies, the need for&nbsp;smarter, scalable, and intuitive data security has never been more urgent. Businesses are not only grappling with increasingly sophisticated cyber threats, but they’re also racing to align with evolving global regulations around data privacy.“At Zscaler, we’re committed to delivering more than just solutions—we’re simplifying data security,” says Jay Chaudhry, Zscaler’s founder and CEO. “Our approach enables customers to apply uniform policies that protect data wherever it resides—we make security seamless.” This mindset has powered rapid growth in Zscaler’s data security business, outpacing other areas of the company and confirming the demand among customers for unified solutions.Setting the Standard for InnovationCRN’s inclusion of Zscaler in its Hottest Cybersecurity Products of 2025 list highlights the company’s ability to design solutions that are effective, practical, and deeply aligned with today’s security needs. On top of this, being named CRN Product of the Year for data security Technology solidifies Zscaler’s place as an industry leader.These accolades weren’t achieved by accident—they stem from innovation rooted in real-world application. Some of this year’s milestone advancements included:AI-Driven LLM Classification: Using the&nbsp;power of LLM’s, Zscaler enables businesses to detect and categorize sensitive data across 200+ categories with unmatched accuracy. This empowers organizations to maintain strong security postures and stay compliant with regional and industry-specific data privacy rules.Enhanced Security for Generative AI: As tools like&nbsp;Microsoft 365 Copilot gain popularity, new risks emerge. Zscaler’s solutions provide visibility into how these generative AI platforms are utilized, coupled with fine-grained controls to secure data without stifling productivity.These updates ensure organizations can stay ahead of cybersecurity threats while adapting to the evolving ways data is created, stored, and accessed.Driving Real ResultsAt the heart of Zscaler’s security innovations are clear, tangible benefits for customers. Zscaler doesn’t believe in patchwork fixes—it invests in solutions designed to simplify security while boosting efficiency:Complete data security: With&nbsp;Zscaler’s unified platform, customers can eliminate fragmented tools and enjoy an all-in-one solution that secures data across devices, applications, and networks.Confidence in Compliance: Keeping pace with changing regulations takes time, but Zscaler’s AI-powered LLM classification tools help businesses stay compliant without the complexity or manual labor.Smarter Security: Through&nbsp;workflow automation and powerful analytics, Zscaler makes managing security faster, less labor-intensive, and far less prone to error.Built for the Future: Technologies and threats are constantly evolving, but Zscaler’s platform is designed to adapt so customers never fall behind.&nbsp;Partner Success: Unlocking New Opportunities TogetherThese innovations don’t just benefit companies directly—they also create exciting possibilities for Zscaler’s partners. Whether you’re embedding Zscaler technologies within your offerings or using our resources to drive growth in your own solutions, partnering with Zscaler opens doors to:Offering leading-edge technology that solves one of the most critical concerns today: data security.Enhancing your reputation and relevance in a market where credibility is key.Tapping into Zscaler’s expertise, resources, and sales support to strengthen relationships and grow your customer base.Together, we can deliver solutions that aren't just effective—they’re transformational.For Zscaler partners, the path to success is supported by powerful enablement tools and resources designed to drive differentiation and foster growth. These include:Data Security Specialization: Elevate your expertise and credibility by earning the Zscaler data security specialization, allowing you to provide advanced, high-demand solutions for critical customer challenges.Enablement and Certifications to Strengthen Expertise: Develop the knowledge and skills needed to deliver exceptional customer value while standing out as a trusted advisor.Demand Generation Campaigns: Access turnkey marketing assets through the Partner Demand Center to drive customer engagement, generate pipeline, and accelerate results around data security.Together, these partner-focused offerings ensure you have the technology, training, and tools to achieve success and meet the needs of your customers—while firmly establishing your organization as a trusted cybersecurity leader.What Comes Next2025 marked a pivotal year for Zscaler—not just for our recognition in the industry, but for the strides we’ve made in reimagining data protection for the modern enterprise. Our CRN awards are more than milestones; they’re proof that Zscaler is leading the charge to make security simpler, smarter, and more powerful for businesses everywhere.But we’re not stopping here. Together with our customers and partners, we’re driving a new era of innovation where data protection doesn’t just adapt to the fast-changing digital landscape—it shapes it. Partners who align with Zscaler are leading the way, delivering cutting-edge solutions, fostering stronger customer relationships, and differentiating themselves in a marketplace that demands excellence.Now is the time to take action. With Zscaler, you have the technology, innovation, and support you need to transform challenges into opportunities, elevate your business, and create a safer, more secure future for your customers. 2025 was a standout year—but the next chapter is ours to define, together. Let’s build it.]]></description>
            <dc:creator>Steve Grossenbacher (Senior Director, Product Marketing)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler Delivers Same-Day Support for macOS Tahoe and iOS 26]]></title>
            <link>https://www.zscaler.com/blogs/partner/zscaler-delivers-same-day-support-macos-tahoe-and-ios-26</link>
            <guid>https://www.zscaler.com/blogs/partner/zscaler-delivers-same-day-support-macos-tahoe-and-ios-26</guid>
            <pubDate>Mon, 10 Nov 2025 16:00:02 GMT</pubDate>
            <description><![CDATA[Zscaler is thrilled to offer full support for iOS 26 and macOS Tahoe. As of September 15th, Zscaler Client Connector (ZCC), Digital Experience (ZDX), and Data Loss Prevention (ZDLP) were validated for seamless compatibility, ensuring uninterrupted security performance and productivity for enterprises.Zscaler delivers reliable, instant support for every Apple release by testing beta versions, resolving issues early, and engaging with customers via its Community. With this readiness, we empower businesses to stay secure and productive with every innovation Apple brings.What Same Day Support Means — And Why Does It Matter?Same Day support gives IT teams confidence to enable Apple OS upgrades immediately, with Zscaler components (ZCC, ZDX, and ZDLP) fully supported and tested for smooth, disruption-free performance.&nbsp;An enterprise customer with 75000+ MacBook computers shared: “Over the past few years, we’ve seen a tremendous improvement in new macOS support from Zscaler. The consistent support and transparent communication has been fantastic, and we look forward to a strong partnership moving forward.”&nbsp;How Zscaler Achieved Same-Day ReadinessZscaler Product and Engineering performed months of rigorous beta testing through Apple’s AppleSeed for IT program. This included validating enterprise scenarios, reporting issues directly to Apple, and aligning with new OS functionality. Customer feedback through Customer Success teams and internal QA ensured reliability across hybrid and remote deployments. Our pillars for success included:&nbsp;Continuous beta testing for each OS update, including release candidate, and GA builds.Early identification and reporting of OS-level and compatibility issues directly to Apple—proactively identifying issues and staying ahead of the curve.Thorough validation across diverse enterprise use cases including remote and hybrid deployments.Driving strong alignment with Apple and embracing new OS capabilities where relevant.What Same-Day Support means for Zscaler CustomersFor our customers, this achievement delivers peace of mind on several fronts.&nbsp;With immediate compatibility for ZCC (including ZDX &amp; ZDLP) on both macOS Tahoe (ZCC v4.5.2, v4.5.1, v4.5, v4.3.1 LTS) and iOS 26 (ZCC v4.4, v4.3.5) enterprises gain:&nbsp;Same-Day readiness: Upgrade seamlessly with confidence and no downtimeContinuous protection: Security posture holds firm during OS transitionsAgility for IT: Eliminate vendor wait times, emergency troubleshooting, and risky workarounds.Reliable experience: Consistent, high-performance access everywhereOngoing testing and support for subsequent Apple releasesGet Involved: How Customers Can Partner in the Same-Day JourneyCustomer involvement is vital to making Same-Day support robust and meaningful. Zscaler encourages all enterprise customers to:Join the&nbsp;"Apple ZDS" Group in Zenith Community to follow updates, best practices, and participate in Apple's AppleSeed program with your company’s managed Apple Business Manager accounts.Provide feedback of&nbsp;ZCC + Apple beta&nbsp;release testing or compatibility issues by posting on Apple ZDS community. You can also share your enterprise scenarios and engage with the large community on a host of topics relating to ZCC and Apple betas.Note - Please do not share any log snippets or PII data on community posts. Always open a support ticket and engage via TSM/CSM.Nominate pilot groups to test pre-release builds and contribute to future readiness enhancements.For a more detailed view of the journey and what it means for your team, tune into our&nbsp;Zscaler Pulse podcast.By sharing experiences and feedback, customers help shape Zscaler’s roadmap and strengthen the Same-Day Support program – ensuring that every Apple OS release is an opportunity for your business.]]></description>
            <dc:creator>Kalyan Vishnubhotla (Sr. Business Development Manager)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler Surpasses $1B in AWS Marketplace Sales, Fuels Zero Trust Adoption]]></title>
            <link>https://www.zscaler.com/blogs/partner/zscaler-surpasses-1b-aws-marketplace-sales-fuels-zero-trust-adoption</link>
            <guid>https://www.zscaler.com/blogs/partner/zscaler-surpasses-1b-aws-marketplace-sales-fuels-zero-trust-adoption</guid>
            <pubDate>Thu, 06 Nov 2025 16:00:03 GMT</pubDate>
            <description><![CDATA[Zscaler surpasses $1B in AWS Marketplace salesZscaler, a leader in zero trust for over a decade and AWS Advanced Technology Partner, has officially surpassed $1 billion of software sales through AWS Marketplace. Our successful collaboration with AWS enables our customers to quickly purchase and deploy proven Zscaler zero trust solutions via AWS Marketplace, which helps organizations easily discover, test, buy, deploy, and manage thousands of software solutions, including ready to integrate AI agents and tools, all in one convenient destination. AWS Competencies and continued growthZscaler has six AWS Competencies, including the AI Security specialty. As a testament to our success, several additional important milestones have been achieved:Zscaler is the first Independent Software Vendor (ISV) to hold AWS competencies across the Healthcare ISV Competency, Education ISV Competency, and all three subcategories of the newly relaunched Amazon Web Services (AWS) Government Competency - National Security &amp; Defense, Public Safety, and Citizen Services.In FY25 Zscaler achieved 68% YoY growth in Public Sector sales through AWS Marketplace, reflecting strong momentum. Zscaler Zero Trust Exchange for AWS CustomersThe Zscaler Zero Trust Exchange provides a comprehensive zero trust platform to secure, simplify, and transform organizations. Distributed across more than 160 points of presence globally, including most AWS regions and AWS GovCloud, it adds an additional layer to protect thousands of customer workloads running on AWS from cyberattacks and data loss by securely connecting users, devices, applications, and workloads in any location. In addition, Zscaler solutions enable AWS customers to:Discover and secure GenAI apps, while protecting sensitive dataAccelerate the migration of on-premises apps to AWSObtain zero trust access to private apps (SAP and more)Secure workload traffic and segment workloadsReduce the attack surface and prevent lateral threat movementMitigate the poor security and high cost / complexity of legacy VPNs Benefits of using AWS MarketplaceA recent&nbsp;Forrester Total Economic Impact™ Study1 reveals that purchasing cloud software solutions and services via AWS Marketplace provides organizations with significant benefits, including:377% return on investment (ROI) and a payback of less than 6 months70% time reduction for solution discovery60% procurement process efficiency savings30% acceleration in time-to-market with deployment efficienciesPrivate offer and standard contract negotiation options Learn about Zscaler solutions for AWSLearn more about&nbsp;Zscaler solutions for AWS, read real-world Zscaler customer&nbsp;success stories, and obtain Zscaler solutions in&nbsp;AWS Marketplace today.Connect with us at&nbsp;AWS re:Invent 2025: December 1-5, 2025, Booth #1375 at The Venetian, Las Vegas, NV&nbsp;1Forrester: The Total Economic Impact™ Of AWS Marketplace, May 2025 (a commissioned study conducted by Forrester Consulting on behalf of AWS)]]></description>
            <dc:creator>David Garcia (Principal Product Marketing Manager)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Celebrating 300+ Validated Solutions : A New Milestone in Zscaler&#039;s Ecosystem Innovation Journey]]></title>
            <link>https://www.zscaler.com/blogs/partner/celebrating-300-validated-solutions-new-milestone-zscaler-s-ecosystem-innovation</link>
            <guid>https://www.zscaler.com/blogs/partner/celebrating-300-validated-solutions-new-milestone-zscaler-s-ecosystem-innovation</guid>
            <pubDate>Wed, 15 Oct 2025 15:58:28 GMT</pubDate>
            <description><![CDATA[Zscaler is proud to announce a significant achievement in the growth of our technology ecosystem: we have surpassed 300 validated solutions across more than 150&nbsp; partners. This milestone underscores the strength of our platform approach, the strategic importance of deep, trusted partnerships, and robust solutions in advancing zero trust security for the modern enterprise.Building the Industry’s Most Comprehensive Security EcosystemAs organizations accelerate their cloud transformation and adopt AI at scale, the need for interoperable, best-of-breed security has never been greater. Our partner-centric strategy ensures that customers of all sizes can seamlessly extend the value of the Zscaler Zero Trust Exchange™ into the tools and workflows they rely on every day.By deeply collaborating with global leaders in identity, endpoint protection, threat intelligence, security operations, and cloud infrastructure, we are cultivating an ecosystem that delivers unified visibility, faster incident response, and stronger data protection - without adding complexity.This partner-centric and integration-focused approach was rated 5/5 by Forrester in their&nbsp;2024 Security Service Edge Solutions Wave.Ensuring Trusted, High-Quality Integrations To Address Customer NeedsEvery integration built on the Zscaler Platform is reviewed to uphold high standards of quality and reliability that our customers expect. Partners are integral in this process and actively collaborate with Zscaler teams to address bugs, ensure compatibility, and create robust documentation.&nbsp;Upon approval, these integrations are “Zscaler validated solutions” and listed on the&nbsp;Zscaler Technology Partner directory.&nbsp;&nbsp;Delivering Value Through CollaborationThe expansion of our integration ecosystem demonstrates clear value to our customers and partners alike:Identity and Access Management&nbsp;– Integrations with leading identity providers enable adaptive, risk-based access decisions that respond to real-time context.Security Operations and Analytics – Partnerships with SIEM, SOAR, ITSM, and analytics providers deliver consolidated visibility and automated incident response.Cloud&nbsp;– Deep integrations with the leading hyperscalers including AWS, Google Cloud, Microsoft Azure provides protection for cloud workloads and applicationsDevOps - Partnerships with DevOps toolchains provides consistent policy enforcement at code-level&nbsp;These integrations are not point solutions—they represent a coordinated ecosystem designed to help enterprises secure users, applications, and data across every environment.Customer-Driven Partnerships &amp; InnovationsIn the past year, in deep collaboration with our partners, Zscaler launched new solutions across the product portfolio including:Zscaler Private Access (ZPA) for RISE with SAPZscaler is first in the industry to now offer natively integrated&nbsp;Zero Trust access to RISE with SAP. As a part of the managed service offered by SAP to its Private Cloud Edition (PCE) customers, Zscaler App connectors are provisioned within SAP-managed Kubernetes clusters, establishing an outbound TLS connection to the Zscaler Zero Trust Exchange (ZTE) to ensure that no inbound ports or public IPs are exposed. With this newest integration, SAP customers can benefit from:&nbsp;Enhanced Security: Zero Trust protection is now built natively into the RISE with SAP architecture, safeguarding organizations' most critical systems and data.Simplified Access: Teams can securely connect to SAP applications from anywhere, ensuring productivity without compromise.Cloud-First Agility: Supporting hybrid and multi-cloud environments, this integration makes it easier than ever to streamline user access during migration from on-prem to RISE with SAP cloud.Turning Risk Insights into Actions with Adaptive Access EngineZscaler’s Adaptive Access Engine (AAE) evaluates real-time risk signals from partners such as CrowdStrike, Microsoft Defender, Okta, and more combining them with Zscaler’s own risk assessment to deliver dynamic, context-aware access control. With AAE, organizations can enforce dynamic conditional access policies&nbsp; based on user behavior, device trust, and other contextual signals. These signals can drive a wide range of enforcement actions across the Zscaler platform including but not limited to, step-up authentication, browser isolation, DLP policy changes etc. - based on the latest context. AAE transforms fragmented risk signals into unified, actionable policies for adaptive, real-time enforcement.Accelerate threat hunting with Microsoft SentinelMicrosoft Sentinel customers can already tap into Zscaler’s rich cloud security telemetry to accelerate hunting and investigations. With prebuilt ingestion pipelines, workbooks and turnkey analytics rules, teams get immediate visibility into web threats, data exfiltration, and malware communications with no custom development required. Zscaler playbooks for Microsoft Sentinel further streamline response by automating actions such as blocking a destination, whitelisting a URL or looking up a Sandbox report so security operations can move from detection to containment in fewer clicks.We’re now extending this foundation to take advantage of Microsoft Sentinel’s new data lake and graph capabilities. Lake backed storage and graph based analytics allows customers to analyze large volumes of Zscaler and related security data at scale adding richer context by connecting users, devices, apps, and destinations for deeper visibility and advanced analytics.&nbsp;Streamline security operations with SentinelOne Purple AI and HyperAutomationSentinelOne Purple AI&nbsp;seamlessly integrates with Zscaler Internet Access (ZIA) and Zscaler Private Access (ZPA). Security teams can accelerate triage and response times by using natural language queries with Purple AI to investigate and analyze ZIA and ZPA telemetry and receive contextual, actionable insights. In addition, Singularity Hyperautomation can orchestrate a wide range of automatic Zscaler responses - from adjusting access policies, browser isolating risky sessions to cross platform threat intelligence sharing.&nbsp;Enhance defences with Deception event triangulationZscaler Deception deploys realistic decoys to lure attackers and expose their tactics. When integrated with SIEM, SOAR, and TIP platforms such as Splunk, Swimlane, and Cyware, these events are correlated with other tools from the security stack including endpoints, firewalls, and identity etc. to give security teams a unified view of malicious activity. This streamlines tracing lateral movement to uncover APTs, targeted ransomware campaigns, and strengthens incident investigations. Deception signals also enrich threat intelligence and security controls, reducing false positives and cuts through alert noise.Enhanced email security with MimecastCustomers utilize&nbsp;Zscaler Data Security to define uniform policies for both, data-at-rest and data-in-motion, across and between collaboration platforms, public cloud, cloud applications, and web services. Email is the primary vector for the initiation of the persistent attacks, Mimecast Email Security has the prime visibility to these threat indicators. Mimecast shares the malicious sending domains and URLs with Zscaler for the multi-layered protection against these attack vectors. The integration with Mimecast Email Security enforces native email security and protection actions at the source, based on the risk intelligence provided by Zscaler Data Protection.Accelerating Growth Through PartnershipsSurpassing 300 integrations with more than 150 partners is more than a numerical achievement. It is evidence of the accelerating demand for zero trust solutions that interoperate seamlessly within a broader technology landscape. This rapid pace of innovation across our partner ecosystem reflects the strategic investments we have made in platform extensibility to unlock additional use cases through open and easy to use APIs, technical enablement, and integration frameworks.Looking AheadReaching 300 integrations is foremost about driving strong customer outcomes. Every integration is designed to solve real world challenges, reduce complexity, and create secure, seamless, and intelligent digital experiences. This milestone reflects the trust our customers place in us to simplify their journeys and the deep collaboration with our partners who share our vision. Together with our partners, we are shaping the future of enterprise security - one that is open, collaborative, and built on zero trust principles.To our partners and customers, thank you for your trust and collaboration. We look forward to partnering even more deeply with our ever-growing ecosystem to empower technology partners to craft top-tier integrations and help organizations around the world accelerate transformation with confidence.]]></description>
            <dc:creator>Justin Lau (Zscaler)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Celebrating Partnership Excellence: Zenith Live APJ 2025 Award Winners]]></title>
            <link>https://www.zscaler.com/blogs/partner/celebrating-partnership-excellence-zenith-live-apj-2025-award-winners</link>
            <guid>https://www.zscaler.com/blogs/partner/celebrating-partnership-excellence-zenith-live-apj-2025-award-winners</guid>
            <pubDate>Thu, 02 Oct 2025 15:03:05 GMT</pubDate>
            <dc:creator>The Zscaler Partner Team (Zscaler)</dc:creator>
        </item>
        <item>
            <title><![CDATA[The Year of Acceleration: Partnering for Impact in FY26]]></title>
            <link>https://www.zscaler.com/blogs/partner/year-acceleration-partnering-impact-fy26</link>
            <guid>https://www.zscaler.com/blogs/partner/year-acceleration-partnering-impact-fy26</guid>
            <pubDate>Tue, 23 Sep 2025 20:20:08 GMT</pubDate>
            <description><![CDATA[AI is transforming the way we work, digital transformation is breaking barriers, and zero trust continues to prove it’s essential. Enterprises everywhere are rethinking how they operate, and the pressure is on for organizations to keep pace. In this environment, customers aren’t just looking for solutions; they’re looking for partners they can trust to simplify their challenges and deliver real business outcomes.In the middle of this shift,&nbsp;Zscaler delivered another record-breaking year, surpassing $3B in ARR with 22% growth in FY25, while AI Security, Zero Trust Everywhere, and Data Security Everywhere each crossed the $1B ARR milestone.&nbsp; These results highlight the pace of innovation across our platform, but just as important, they reflect the impact our partners are driving every day with our customers, and the trust customers place in our ecosystem. Together, we helped organizations accelerate adoption, embrace innovation, and unlock value faster than ever. This winning formula set the stage for FY25, and it’s what positions us for an incredible FY26 together.What FY26 Holds for Zscaler PartnersMarket shifts are opening massive opportunity for Zscaler partners. Businesses are simplifying their vendor landscapes and seeking advisors who can connect the dots for them - someone who can guide them to solutions with measurable, tangible outcomes. Zscaler’s Zero Trust Exchange helps partners move beyond individual problems to create broad, transformative solutions across secure access, network performance, and data security.The partners who seize this moment - who align with customer roadmaps, bundle services, and grow new capabilities - are the ones poised for the biggest wins. By helping customers genuinely transform the way they operate, these partners drive deeper adoption of Zscaler solutions, accelerate tangible results, and boost profitability.&nbsp;And when collaboration stretches across the ecosystem with multiple partners teaming up to tackle larger, more strategic projects, the possibilities grow exponentially.The Roadmap for Partner Success in FY26Zscaler’s global partner ecosystem focus for FY26 is simple: making it easier, faster, and more rewarding for partners to deliver meaningful impact. This year, we’re rallying around three key priorities:Improved Partner Programs and Incentives: Redesigned to drive consistent predictability, accelerate partner profitability, and maximize rewards for engagement across every stage of the customer lifecycle.Differentiated GTM Sales Plays:&nbsp;Built to provide partners multi-solution strategies and enable embedded offerings to meet customer needs and drive differentation in the zero trust market.Expanded Partner Services Opportunities:&nbsp;Delivering new specialized training, certifications, and guided learning paths to help partners grow faster, deliver stronger outcomes, and achieve greater profitability within their Zscaler practices.These priorities are all about empowering our partners, delivering&nbsp; tools and support to stand out, secure net new logos, scale impact, and make the most of every opportunity. Technology may be the foundation, but partnerships turn potential into outcomes. Together, we can transform momentum into acceleration and redefine success.The New Partner Program: Built With You in MindOne of FY26’s biggest highlights to date is the launch of our revamped Partner Program. Shaped by direct partner feedback, this program is designed to align with the way our partners engage, deliver, and grow.Partners will be recognized earlier in the deal cycle, rewarded for renewal registrations, and supported with enhanced teaming incentives. For partners focused on services, the program brings new ways to boost profitability and help customers see results faster. This isn’t just an update—it’s a reflection of Zscaler’s belief that our success is built on our partner ecosystem. Everything Zscaler partners need to start strong is now available in the Zscaler Partner Portal.Let’s Make FY26 UnforgettableFY25 was proof that when innovation and collaboration come together, incredible things happen. We hit milestones with bringing new customers on the platform together, delivered real value, and grew stronger as a team. Now, as we begin FY26, it’s time to build on that success.This year is about Partnering with Impact, deepening customer adoption, strengthening partnerships, and unlocking bigger opportunities across the ecosystem. With the strongest technology platform in the industry, a thoughtfully designed partner program, and a shared mission to deliver outcomes that matter, we’re in an ideal position to lead the way.But this isn’t just about hitting new goals. It’s about becoming part of something bigger. By putting innovation and collaboration at the center of everything we do, working as ONEteam and ONEecosystem, and focusing on creating impact, we’ll turn FY26 into a year that redefines what's possible.]]></description>
            <dc:creator>The Zscaler Partner Team (Zscaler)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler Private Access Wins CRN Tech Innovator Award for Delivering Truly Comprehensive Zero Trust]]></title>
            <link>https://www.zscaler.com/blogs/partner/zscaler-private-access-wins-crn-tech-innovator-award-delivering-truly-comprehensive</link>
            <guid>https://www.zscaler.com/blogs/partner/zscaler-private-access-wins-crn-tech-innovator-award-delivering-truly-comprehensive</guid>
            <pubDate>Wed, 06 Aug 2025 14:12:52 GMT</pubDate>
            <description><![CDATA[Each year, CRN's prestigious Tech Innovator Awards celebrate the forefront of technological advancement, honoring products and services that redefine possibilities for solution providers in the tech channel.&nbsp;&nbsp;We are thrilled to announce that&nbsp;Zscaler Private Access (ZPA) has been named a winner in the CRN® 2025 Tech Innovator Awards.&nbsp;This prestigious award is powerful recognition of our vision to deliver ‘Zero Trust Everywhere’. It affirms ZPA as the industry's most comprehensive Zero Trust Network Access (ZTNA) solution, capable of securing any user, on any device, to any private application.Customer Obsession: The Engine of Our Innovation&nbsp;The CRN Tech Innovator Award specifically recognized ZPA's unique ability to handle one of the most difficult challenges our customers face when adopting zero trust: securing network connected resources. Systems such as VoIP, server-to-client (S2C) applications, and active FTP are often incompatible with standard proxy-based ZTNA architectures, as they require direct IP-to-IP communication.This forced organizations to rely on traditional VPNs for these specific use cases. The result was a disjointed and risky environment, burdened by increased cyber risk and the operational overhead of managing multiple remote access solutions.Zscaler’s award-winning approach solves this problem elegantly while adhering strictly to zero trust principles. ZPA establishes a dynamic, alternate path from the Zscaler Client Connector to the Zero Trust Exchange, ensuring secure, policy-based connectivity for these specific network segments.Supporting VoIP and S2C Apps Without Compromising SecurityInstead of providing broad network access, our solution enforces least-privileged access through policies based on user identity, device health, and contextual factors. Using a cloud-based overlay, it ensures continuous verification for both legacy and modern applications. Key components like gateways and application connectors create encrypted, outbound-only tunnels, eliminating open inbound ports for enhanced security. These tunnels securely transfer traffic while preventing lateral movement or unauthorized visibility.&nbsp;By combining network-level connectivity for services like VoIP with ZTNA’s granular access controls, it reduces attack surfaces, streamlines management, and meets the demands of distributed environments.Now, customers can adopt zero trust and completely retire VPNs, thereby improving security, reducing costs, and enhancing productivity with seamless access experience. This CRN award reinforces what our customers already know: Zscaler Private Access provides the completeness, scale, and security needed to power the modern, work-from-anywhere enterprise.The Zscaler Advantage for PartnersFor partners, this represents a powerful opportunity to differentiate Zscaler offerings with proven, award-winning zero trust capabilities across our portfolio. By helping customers overcome long-standing network security and remote access challenges without firewalls or exposed IPs, they can drive holistic transformation, and grow recurring revenue with a secure, modern zero trust platform.&nbsp;To understand further how ZPA secures applications like VoIP, we invite you to read our&nbsp;Solution Brief on ZPA for VoIP &amp; Server-to-Client Applications.&nbsp;&nbsp;Learn more about the recent innovations in the ZPA platform.]]></description>
            <dc:creator>Harsha Nagaraju (Sr. Director, Product Marketing)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Accenture Achieves New Managed Security Services Authorization]]></title>
            <link>https://www.zscaler.com/blogs/partner/accenture-achieves-new-managed-security-services-authorization</link>
            <guid>https://www.zscaler.com/blogs/partner/accenture-achieves-new-managed-security-services-authorization</guid>
            <pubDate>Wed, 25 Jun 2025 14:56:46 GMT</pubDate>
            <description><![CDATA[Today, I’m happy to share that Accenture has achieved Zscaler Managed Security Services Partner (MSSP) partner status. Accenture’s MSSP authorization signals their elevated capability to implement, optimize, and manage Zscaler solutions, ensuring organizations can embrace a secure, seamless digital transformation. This milestone is just the latest demonstration of our shared commitment to delivering and managing cutting-edge zero trust solutions for our customers.Accenture and Zscaler are dedicated to protecting their clients’ applications and infrastructures through a zero trust model. This approach ensures comprehensive security by mitigating risks through intelligent and continuous access control, further enhanced by Zscaler’s MSSP authorization.Today’s threat landscape is increasingly complex and constantly shifting. It’s no wonder so many organizations are struggling with the in-house best practices and properly trained staff they need to effectively deploy and operate cybersecurity technologies. Accenture is addressing these challenges for our mutual clients, while reducing the cost of meeting risk and compliance requirements.&nbsp;Customer Success Story: Indorama VenturesFor Indorama Ventures, a large petrochemical company, the need for secure, reliable access to data and applications wasn’t just about protecting information—it was about enabling teams to work seamlessly across borders. Indorama chose Accenture to implement and provide initial support to their Zscaler solution for their Zscaler technical expertise and cybersecurity experience, avoiding the costs associated with hiring and training in-house staff.&nbsp;Accenture’s Expertise Meets Zscaler’s Innovation for Faster, Safer DeploymentsAchieving MSSP status required Accenture to invest deeply in Zscaler training and certification, with over 650 practitioners globally now certified. Accenture’s rigorous training included real-world labs, shadowing exercises, and comprehensive certifications, culminating in a formalized Zscaler implementation methodology. This framework accelerates time-to-value for customers by integrating best practices, proven processes, and global delivery capabilities.Completing the Managed Services Authorization journey shows Accenture’s commitment to provide their customers with the best possible experience around Zscaler’s Zero Trust Exchange™. The Managed Security Services Authorized program includes a thorough training track to ensure partners are prepared to provide their customers with the very best in services.]]></description>
            <dc:creator>Craig Milner (Zscaler)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Two Magic Quadrant™ Leaders Become Partners: Zscaler and Vectra AI Combine Forces]]></title>
            <link>https://www.zscaler.com/blogs/partner/two-magic-quadrant-tm-leaders-become-partners-zscaler-and-vectra-ai-combine-forces</link>
            <guid>https://www.zscaler.com/blogs/partner/two-magic-quadrant-tm-leaders-become-partners-zscaler-and-vectra-ai-combine-forces</guid>
            <pubDate>Mon, 23 Jun 2025 12:55:59 GMT</pubDate>
            <description><![CDATA[The complexity and sophistication of today’s cyber threats demand a unified defense that doesn’t just detect threats but enables detailed investigation, rapid mitigation, and proactive prevention before damage occurs. This is why we believe the collaboration between Zscaler, recognized as a Leader in the&nbsp;Gartner® Magic Quadrant™ for Security Service Edge (SSE), and Vectra AI, recognized as a Leader in the&nbsp;Gartner® Magic Quadrant™ for Network Detection and Response (NDR), is groundbreaking.The integration of Zscaler Zero Trust Exchange (ZTE) with the Vectra AI Platform enables a seamless partnership that empowers network operations (NetOps) and security operations (SecOps) teams to streamline workflows, drive efficiency, and gain actionable insights across hybrid, cloud, and on-premises environments. From leveraging AI-driven detection and forensic analysis to enabling real-time threat mitigation, the integration of Zscaler and Vectra AI helps security teams stay ahead of evolving threats without complicated deployments or fragmented tools.In this blog, we start by exploring HanesBrands Inc’s customer perspective – a prime example of how this integration revolutionizes security for a global enterprise with a complex and interconnected footprint. Then, we explore real-world themes and use cases that highlight the unique benefits of this integration – including amplifying threat detection and response, simplifying security operations, and enforcing Zero Trust security for all traffic. Customer Perspective: HanesBrandsHanesBrands Inc., a global leader in manufacturing everyday apparel, has set a new standard for cybersecurity in its industry by combining Zscaler Zero Trust Exchange (ZTE) and the Vectra AI Platform. Employing 48,000 associates distributed globally and with 70% of its supply chain owned and operated across 30 countries, HanesBrands is at the forefront of cloud-enabled operations. The Zscaler-Vectra AI integration gives HanesBrands real-time threat visibility, AI-driven threat detection, investigation and response along with cross-environment traffic analysis so security is embedded in its digital DNA. By enforcing Zero Trust across hybrid and multi-cloud environments and using AI to create threat intelligence, HanesBrands can respond faster to incidents and streamline security operations. These capabilities let the company stay ahead of cyber attackers while driving innovation and operational resilience at scale."Our business and digital transformation depends on smarter, more proactive security. The Zscaler and Vectra AI integration gives us the ability to analyze, detect and respond to threats with precision – whether it’s identifying east-west movement within our environment or mitigating encrypted network anomalies in real time. This integration doesn’t just enhance our security posture, it lets us expand globally while being agile and sustainable. By aligning security to business goals we’re building a resilient company that leads by example."John Opala, VP and CISO at HanesBrands Inc Amplifying Detection, Investigation, and MitigationModern enterprises face the challenge of securing their data, users, and applications across an increasingly complex IT environment that spans public and private clouds, SaaS applications, encrypted traffic, and hybrid networks. As organizations adopt distributed architectures and enable remote work at scale, traditional perimeter-based security models struggle to keep pace. Threat actors exploit unmanaged applications, north-south and east-west traffic within environments, or encrypted communication channels to gain unauthorized access, move laterally, and exfiltrate sensitive information – all while avoiding detection. Addressing these challenges requires comprehensive visibility, consistent policy enforcement, and advanced threat detection across all traffic and environments, regardless of location or access method.Accelerated InvestigationLet’s say a financial services organization experiences suspicious east-west traffic originating from an employee workstation and targeting internal database servers. Zscaler immediately detects encrypted traffic anomalies, helping identify the threat’s starting point. Meanwhile, Vectra AI enables NetOps teams to create custom indicators of compromise (IoCs) from the attacker’s behavior, gaining insights into lateral movement patterns.The integration enables the incident response team to quickly isolate the compromised device and mitigate the attack with precision, avoiding downtime and ensuring customer data remains secure.This collaboration highlights how combining deep forensic capabilities with AI-driven Network Detection and Response (NDR) empowers security teams to investigate attacks on their own terms while automating critical steps in the mitigation process. Simplify Security Operations with Integrated WorkflowsIn distributed environments with hybrid workforces, detecting threats is only half the battle – efficiently investigating and mitigating them is what truly protects an organization from harm. However, security teams often face operational challenges, such as juggling disconnected tools, managing overwhelming alert volumes, and relying on manual workflows that slow response times. This fragmented approach not only increases risk but also burdens SecOps teams with inefficiencies. By leveraging the Zscaler and Vectra AI integration, organizations gain a streamlined solution that unifies threat detection and response, harnessing AI-driven insights to prioritize actions, automate workflows, and empower security teams to mitigate threats swiftly and effectively.Streamlining SecOpsImagine a scenario where a healthcare organization identifies unusual data transfer activity involving patient records, raising concerns about potential misuse or unauthorized access. To thoroughly investigate this activity, the integration of Zscaler and Vectra AI enables SecOps teams to capture, study, and replay traffic related to the incident for deeper analysis. Zscaler ensures secure, controlled collection of cross-environment traffic, while Vectra AI’s detailed forensic tools analyze behavioral patterns and connections over time, revealing key indicators of compromise (IoCs).Using the traffic data provided, SecOps teams can create custom IoCs and signatures tailored specifically to the threat actor’s techniques. These signatures are then incorporated into existing protection mechanisms to improve proactive defenses against similar threats in the future. This workflow ensures the organization not only resolves the immediate incident but also enhances its detection and protection capabilities.This use case highlights how the Zscaler-Vectra AI integration empowers SecOps teams to move beyond reactive response, enabling deeper analysis of threats and the creation of tailored countermeasures to strengthen their overall security posture. Complying with Regulatory RequirementsIn tightly regulated industries such as financial services, healthcare, and public sector services, ensuring compliance with stringent data privacy and security regulations is critical. Certain regulatory requirements mandate comprehensive monitoring and protection of sensitive data, detailed reporting of network activity, and often direct visibility into traffic content to ensure adherence to legal standards. Failing to comply can result in severe penalties, reputational damage, and lost customer trust. The integration of Zscaler and Vectra AI provides an effective solution for organizations looking to navigate these regulatory challenges, combining traffic inspection with AI-driven insights to capture, analyze, and protect data while simplifying compliance workflows.Ensuring ComplianceLet’s say a global investment bank is required to comply with strict regulatory frameworks, which mandate protections against data breaches and insider threats, along with comprehensive monitoring of sensitive transactions and communications. For the organization, capturing traffic content – including encrypted communications of the bank’s employees – is essential to satisfy audit requirements and detect potentially malicious insider actions.By leveraging the Zscaler and Vectra AI integration, the bank ensures compliance while maintaining robust security controls. Zscaler can perform TLS/SSL inspection at scale, inspecting traffic leaving and entering the network. Simultaneously, Vectra AI tracks and analyzes internal network activity to detect behavioral anomalies consistent with insider threats, such as unauthorized database queries.If an anomaly is detected, the integration enables real-time responses, such as restricting access or alerting the bank’s compliance and security teams for investigation. By capturing, archiving, and analyzing traffic content, the bank not only fulfills its regulatory requirements but also strengthens its defenses against insider threats while preserving a complete audit trail for regulatory submissions.This use case demonstrates how Zscaler and Vectra AI simplify compliance while safeguarding sensitive financial data. Zero Trust with AI-enabled Threat DetectionIn an evolving threat landscape, Zscaler and Vectra AI – leaders in Security Service Edge (SSE) and Network Detection and Response (NDR), respectively – transform how enterprises implement Zero Trust security and AI-enabled Threat Detection.With this joint offering, NetOps and SecOps teams benefit from:Accelerated Threat Investigation and Mitigation: Enables teams to rapidly identify &amp; mitigate threats, create own IoC from forensic analysis with in-depth investigationStreamlined Security Operations: Integrating workflows and automating responses to operate seamlessly across distributed environments, reducing alert fatigue and manual interventions.Enforcing Zero Trust Security for all traffic: Ensure seamless protection with secure access across cloud, network, and hybrid environments with industry leading AI-driven insightsMeeting Compliance Requirements: Capturing traffic content to comply with regulatory compliance requirements.If you are a Zscaler customer interested in this integration, please reach out to your account team today!&nbsp;We also have an upcoming blog detailing how to configure Zscaler packet capture (PCAP) and how Vectra AI consumes the data with their sensors.Gartner, Magic Quadrant for Security Service Edge, Charlie Winckless, Thomas Lintemuth, Dale Koeppen, Charanpal Bhogal, 20 March 2025Gartner, Magic Quadrant for Network Detection and Response, Thomas Lintemuth, Esraa El Tahawy, John Collins, Charanpal Bhogal, 29 May 2025.Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and MAGIC QUADRANT is a registered trademark of Gartner, Inc. and/or its affiliates and are used herein with permission. All rights reserved.]]></description>
            <dc:creator>Satish Madiraju (Sr. Director, Product Management)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler Secures Record Number of Sponsors for This Year&#039;s Zenith Live]]></title>
            <link>https://www.zscaler.com/blogs/partner/zscaler-secures-record-number-sponsors</link>
            <guid>https://www.zscaler.com/blogs/partner/zscaler-secures-record-number-sponsors</guid>
            <pubDate>Tue, 27 May 2025 14:33:56 GMT</pubDate>
            <description><![CDATA[This year at&nbsp;Zenith Live, the future of security is taking center stage and it wouldn’t be possible without our record breaking number of ecosystem partner sponsors. As Zscaler’s premier user conference returns to Las Vegas and brings Zenith Live EMEA to Prague, we’re proud to welcome our esteemed partner sponsors to help us spotlight the power of bringing Zero Trust Everywhere and the growing role of AI in today’s cybersecurity landscape.These partners represent the most innovative companies in cloud, identity, endpoint and infrastructure security. Their presence reinforces the industry's shared commitment to helping enterprises reduce risk, embrace AI responsibly, and build resilient, future-ready infrastructures.The Partners Powering Record Breaking Sponsorship at Zenith Live 2025This year, more than 50 technology, GSI and channel partners will join Zscaler to drive forward-thinking conversations, showcase integrations, and engage with thousands of attendees across keynotes, hands-on labs and the Next Level Transformation Theater.What Attendees Can Expect at Zenith Live 2025Zenith Live 2025 will bring together global cybersecurity leaders, architects, and innovators for a dynamic exchange of ideas focused on securing the digital future. Attendees will gain access to over&nbsp;60 curated breakout sessions, technical certifications, and hands-on labs led by Zscaler experts and partner organizations.&nbsp;From 1:1 meetings to in-depth training labs, participants will explore practical use classes and discover how Zscaler and its partners are delivering integrated solutions that protect data, users, and applications across complex, distributed environments.&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;A Shared Commitment to Zero TrustThis year’s program reflects our continued investment in strategic partnerships that drive meaningful outcomes for customers. Attendees can look forward to keynotes from Zscaler executives, including CEO Jay Chaudhry, next level transformation theater sessions, customer presentations and three dedicated networking receptions.&nbsp;We look forward to furthering our shared vision of driving Zero Trust + AI as we continue to innovate, accelerate transformation, and grow stronger together alongside our customers and partners.&nbsp;]]></description>
            <dc:creator>The Zscaler Partner Team (Zscaler)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Beyond the Perimeter 2025 Unifying Security to Enhance Cyber Resilience in the AI Era]]></title>
            <link>https://www.zscaler.com/blogs/partner/beyond-perimeter-2025-unifying-security-enhance-cyber-resilience-ai-era</link>
            <guid>https://www.zscaler.com/blogs/partner/beyond-perimeter-2025-unifying-security-enhance-cyber-resilience-ai-era</guid>
            <pubDate>Fri, 16 May 2025 14:29:50 GMT</pubDate>
            <description><![CDATA["Beyond the Perimeter 2025", an annual virtual event co-hosted by Zscaler, Okta, and CrowdStrike, was an insightful event that brought together the brightest minds in cybersecurity to discuss emerging trends, shared challenges, and collaborative strategies to tackle the ever-evolving cyber threat landscape.Navigating the Changing Cybersecurity LandscapeThe event focused on the rising trend of deep fake and phishing attacks, and the increasing use of AI-powered tools by cyber attackers.&nbsp;"Our latest findings from the&nbsp;2025 CrowdStrike Threat Report&nbsp;reveal a significant surge in the use of cloud based tradecraft," noted CrowdStrike, underscoring the escalation in the threat landscape. This was echoed by Okta, "AI enables entirely new types of identity attacks, such as deepfakes.&nbsp;Deepfake incidents in the financial services sector&nbsp;have surged 700% over the past year."Zscaler highlighted the increasing sophistication of attacks, noting that "Enterprises have to contend with more sophisticated, more multi-vector attacks." It was also observed that many security strategies fall short due to a lack of integration: "Unified often boils down to consolidated billing from multiple acquisitions to a shared dashboard, while the underlying systems lack true integration. Bundling or stitching together solutions for marketing convenience is not the same as building a solution unified by design."Echoing the sentiment, CrowdStrike highlighted the need to match the attackers' arsenal with equally innovative tools: "It's very important for us to counter AI with AI because unless you have real-time contextualized intelligence, it's going to be much, much harder for you to defend your organization."A Blueprint for Cyber Resiliency through CollaborationThe event speakers also extended the conversation to cover foundational shifts necessary for tackling these challenges and building cyber resiliency. They emphasized the importance of partnerships in cybersecurity, the benefits of standardization and integration, and the imperative of creating a Zero Trust architecture.Amplifying the importance of these strategic integrations, specific references were made to the shared signals framework, an effective methodology to maximize current security investments. The collaboration of Zscaler, Okta, and CrowdStrike forms a formidable front against cyber threats by sharing their insights and improving security outcomes for customers.On-the-Ground: Implementing Integrated Security—a Real-world Cyber Attack ScenarioTo illustrate this, the speakers walked through a real-world cyber attack simulation. From a phishing attack staging a credential compromise to immediate detection and response by integrated solutions from&nbsp;Zscaler, Okta, and CrowdStrike. The simulation emphasized the critical edge that seamless integrations provide in responding effectively to multi-vector threats.]]></description>
            <dc:creator>The Zscaler Partner Team (Zscaler)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Securing Connected Assets in Government and Education with Zscaler and Armis]]></title>
            <link>https://www.zscaler.com/blogs/partner/securing-connected-assets-government-and-education-zscaler-and-armis</link>
            <guid>https://www.zscaler.com/blogs/partner/securing-connected-assets-government-and-education-zscaler-and-armis</guid>
            <pubDate>Thu, 15 May 2025 15:59:09 GMT</pubDate>
            <description><![CDATA[In an era where digital transformation is redefining the way government and educational institutions operate, the need for robust cybersecurity solutions has never been more pressing. From smart city infrastructure and IoT-enabled classrooms to hybrid cloud networks and explosion in connected devices, the proliferation of connected assets brings tremendous productivity—but also significant risks.&nbsp;Cyber threats targeting devices, networks, and sensitive data in these environments have made security a top priority. Malicious actors have exploited outdated security models and architectures that are no longer adequate to&nbsp;compromise assets and move laterally. Enter the integration between Zscaler and Armis, an alliance designed to empower Governments as well as educational organizations to achieve secure digital transformation while driving agentless discovery and micro-segmentation. The Challenge of Securing Connected AssetsPublic sector organizations face unique challenges when it comes to cybersecurity. Limited budgets, sprawling IT ecosystems, and diverse stakeholders make it difficult to maintain visibility over all connected devices, let alone protect them effectively. Modern environments rely extensively on IoT (Internet of Things) and OT (Operational Technology) assets—from surveillance cameras and smart lighting systems to HVAC controls and learning tools—all of which are frequently targeted by cyberattacks.Additionally, traditional networking and security solutions often lead to security gaps due to inherent trust principles around which these systems were designed, allowing malicious actors to infiltrate systems and move laterally to compromise sensitive devices and assets. Technology such as network access control (NAC) and software defined access attempted to address this but ultimately fell short due to the excessive amount of overhead these technologies placed on operations teams often leaving these technologies underdeployed or sitting on shelves. The question then becomes: How can organizations embrace agility while adhering to the principles of ZeroTrust? Zscaler + Armis: A Seamless SolutionThe Zscaler-Armis solution was forged with a shared vision: to simplify and enable secure connected environments. This integration combines the best of both worlds—Zscaler’s industry-leading secure access service edge (SASE) platform and Armis’ advanced visibility and intelligence.&nbsp;Here's how the joint solution addresses the pressing needs of government and education organizations:Comprehensive Visibility: Zscaler and Armis provide visibility into IoT, OT, and hybrid networks, uncovering connected devices and its behavior in real time. This capability ensures that no device goes unnoticed or unsecured.Continuous Device Protection:&nbsp;The solution actively protects against vulnerabilities and cyber threats by enabling real-time monitoring of connected devices, safeguarding sensitive devices and connected systems.&nbsp;Dynamic Agent-less Micro-Segmentation: Ability to isolate devices and apply granular security policies tailored to specific use cases such as IOT/OT segmentation. This uses Zscaler’s ability to natively deploy micro-segmentation between connected devices.Explore the joint Zscaler+Armis solution in more detail.See&nbsp;here for a full list of integrations with Zscaler Internet Access, Zscaler Private Access and&nbsp;Zero Trust Branch. Why This Matters and the Path ForwardFor Government Agencies, critical infrastructure protection is vital. Smart cities rely on IoT devices to monitor traffic, manage utilities, and deliver citizen services. Traditional securities solutions have not been adequate in protecting against breach and preventing lateral movement; one compromised device could lead to compromise in the entire system, disrupting critical infrastructure, causing both public and economic harm. Similarly, educational institutions face the challenge of segmenting large campus environments and ensuring building control systems and sensitive systems are isolated from User and BYOD devices.Governments and educational institutions face significant opportunities to enhance services, but these opportunities come with the critical challenge of managing cyber risks. Especially in today’s macro environment of tight budgets and constrained resources. Organizations need solutions that deliver strong security while remaining cost-effective and easy to deploy and easy to operationalize.Zscaler and Armis together offer an agentless, scalable solution which avoids overly complex systems that are difficult to implement; this approach also ensures organizations can strengthen security without adding unnecessary operational strain.&nbsp;By leveraging the unique architecture of Zscaler Zero Trust platform and Armis device intelligence, organizations can rapidly implement micro-segmentation at scale and create a safer, smarter future. ConclusionFor leaders and IT teams in government and education: securing connected devices requires a proactive, forward-thinking strategy. By leveraging the cutting-edge capabilities offered by Zscaler and Armis, organizations can achieve unparalleled device visibility, agent-less microsegmentation, and seamless operational efficiency while replacing technologies&nbsp; that are often hard to implement and operationalize such as NAC and SDA.Interested in learning more about how this partnership can work for your organization? Explore the Zscaler-Armis solution today and take the first step toward protecting what matters most.]]></description>
            <dc:creator>Hersh Patel (Zscaler)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Celebrating our 2025 CRN Women of the Channel Honorees]]></title>
            <link>https://www.zscaler.com/blogs/partner/celebrating-our-2025-crn-women-of-the-channel</link>
            <guid>https://www.zscaler.com/blogs/partner/celebrating-our-2025-crn-women-of-the-channel</guid>
            <pubDate>Mon, 12 May 2025 14:07:04 GMT</pubDate>
            <description><![CDATA[Each year, CRN’s&nbsp;Women of the Channel list honors female executives whose strategic vision, dedication and leadership are transforming the technology channel. At Zscaler, we are so proud to see so many of our leaders recognized for their influence in shaping the future of cybersecurity and partner success.&nbsp;In 2025, we’re thrilled to celebrate the recognition of eight outstanding Zscaler women whose leadership is helping our partners thrive, scale and innovate.&nbsp;A special mention goes to our Vice President of Global Partner Marketing Melissa Nacerino, who once again has been named to CRN’s&nbsp;Power 100, a prestigious list that spotlights the most influential women driving the channel agenda forward.&nbsp;These leaders are instrumental to Zscaler’s success. From accelerating zero trust adoption and scaling global routes to market, to driving marketing innovation and building deep partner engagement across a variety of sectors, they embody what it means to lead with impact.Leading with Purpose, Driving Partner SuccessWe believe exceptional leadership is the foundation of partner success. The women recognized in this year’s&nbsp;Women of the Channel list are not only experts in their fields, they are strategic thinkers, trusted advisors, and growth catalysts for our entire partner ecosystem.&nbsp;They lead marketing strategy, forge high-impact alliances, expand distribution, and more. Their influence is felt across every region, every team, and every partner and customer we serve.We’re proud to recognize these professionals not only for what they’ve accomplished, but for how they continue to raise the bar for the entire industry.&nbsp;]]></description>
            <dc:creator>The Zscaler Partner Team (Zscaler)</dc:creator>
        </item>
        <item>
            <title><![CDATA[A New Chapter with Zscaler: Securing the Agentic-Ready Enterprise]]></title>
            <link>https://www.zscaler.com/blogs/partner/new-chapter-zscaler-securing-agentic-ready-enterprise</link>
            <guid>https://www.zscaler.com/blogs/partner/new-chapter-zscaler-securing-agentic-ready-enterprise</guid>
            <pubDate>Mon, 05 May 2025 17:48:21 GMT</pubDate>
            <description><![CDATA[Throughout my career advising Fortune 100 companies and leading large-scale transformations at EY, I’ve seen firsthand how organizations evolve in waves. First comes the adopting of new technologies, then embracing new operating models, and adjusting to new threats. But the moment we’re in now feels different. AI is not just another tool. It’s a seismic shift in how business gets done.That’s why I joined Zscaler as a Strategic Advisor for Partners and Alliances.Zscaler is playing a pivotal role in helping enterprises prepare for what I call the “agentic-ready estate.” This is the next phase of transformation, one where AI agents are embedded across the enterprise, driving decisions, accelerating outcomes, and engaging autonomously. But enabling that kind of speed and intelligence requires something fundamental: trust. And trust starts with security.&nbsp; Why Zscaler and Why NowZscaler is more than a cybersecurity company. It is a strategic enabler of transformation. As enterprises race to adopt cloud and AI technologies, the risks are scaling just as fast. Traditional architectures cannot keep up. Zscalers’s cloud-native Zero Trust platform is designed for this exact moment, delivering real-time protection, data privacy, and secure access without compromise.&nbsp; The Role of Advanced Cybersecurity in the Agentic-Ready EstateEnterprises are moving quickly to deploy AI agents across core business functions. These agents make decisions, interface with systems,and generate insights. But with great capability comes great exposure. If these agents are not operating within a secure environment, they can introduce vulnerabilities that are difficult to detect and even harder to contain.&nbsp;Zscaler provides the security foundation for these intelligent systems. The Zero Trust Exchange platform secures connections between users, applications and devices, regardless of location. Zscaler inspects traffic inline. Zscaler enforces policy in real-time. And they do it all without slowing down the business. That is what enables the agentic-ready estate, where intelligent automation can scale safely and responsibly.&nbsp; Various Verticals, Common GoalsOver the years, I’ve worked closely with leaders across healthcare, financial services, energy, consumer products, and public sector organizations. While every industry faces unique challenges, they share common goals: reduce risk, improve agility, and contain costs.That is where Zscaler shines.Their platform helps organizations consolidate infrastructure, reduce technical debt, and simplify complex environments. This drives measurable cost savings while also enhancing security. In today’s economic climate, that combination is not just valuable, it’s essential. Zscaler Partners play a key role in delivering that value at scale. Partners at the Core of Transformation&nbsp;The partner ecosystem has always been a strategic lever in driving transformation. At Zscaler, we are doubling down on this. Whether you are a consulting firm, a cloud platform provider, or a technology innovator, we want to work with you to bring integrated solutions to market.My role is to ensure that our alliances are set up to succeed, not just by collaborating on go-to-market strategies, but shaping long-term value for our shared customers. That means listening closely, sharing insights and helping our partners navigate the evolving landscape of digital and AI-driven transformation.&nbsp; Looking AheadBoards and executive teams are asking one critical question: how can we accelerate digital innovation without increasing risk? The answer is not a patchwork of legacy tools. It is a unified, cloud-native Zero Trust platform that scales with the business.Zscaler is that platform.I am honored to join this mission and help expand its reach. With our partners, we will continue to secure the agentic-ready enterprise, deliver cost efficiency, and unlock innovation across every vertical.&nbsp;]]></description>
            <dc:creator>Hank Prybylski (Zscaler)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Enhanced Threat Detection Using Zscaler and Amazon GuardDuty]]></title>
            <link>https://www.zscaler.com/blogs/partner/enhanced-threat-detection-using-zscaler-and-amazon-guardduty</link>
            <guid>https://www.zscaler.com/blogs/partner/enhanced-threat-detection-using-zscaler-and-amazon-guardduty</guid>
            <pubDate>Mon, 21 Apr 2025 21:04:14 GMT</pubDate>
            <description><![CDATA[As cloud environments grow more complex, security teams need enhanced threat detection capabilities to protect their organizations. Sophisticated attackers are using compromised credentials to move laterally through cloud environments while evading detection. According to&nbsp;IBM’s 2024 Cost of a Data Breach Report, breaches from stolen or compromised credentials are taking the longest to identify and contain, at an average of 292 days, and resulting in the highest costs, at an average of $4.99M.The Value of AI and Automation in SecurityOrganizations using AI for security reduced breach costs by $2.2M and shortened their breach lifecycle by 100 days compared to those without these capabilities. In fact, a key finding of the analysis is that the more organizations use security AI and automation,&nbsp;the lower their average breach cost.Building on these insights about the value of automated, intelligent security approaches, this post demonstrates how to strengthen cloud security by integrating&nbsp;Amazon GuardDuty with Zscaler's security solutions.Integrating Zscaler and GuardDuty enhances threat detection and response through automated intelligence sharing. Let's examine the key components of this integration: Zscaler DeceptionZscaler Deception detects threats by placing AI-powered decoys throughout environments. As part of the Zscaler Zero Trust Exchange platform, this technology spots lateral movement and privilege escalation attempts that traditional security tools often miss. The decoys mirror authentic resources to identify credential misuse and attack activity. Machine learning models analyze decoy interactions to detect attack patterns, while the system restricts access to sensitive resources when threats are detected, stopping attackers before they reach critical assets.Zscaler Internet Access (ZIA)Zscaler Internet Access (ZIA) is a cloud-delivered secure internet gateway that provides consistent protection regardless of location. Organizations can direct AWS traffic to Zscaler using GRE or IPSec tunnels or Cloud Connector appliances. Positioned between workloads and the internet, ZIA inspects all traffic inline, including SSL, and offers comprehensive security services such as&nbsp;Cloud Firewall,&nbsp;Intrusion Protection Service (IPS),&nbsp;Sandboxing,&nbsp;Data Loss Prevention (DLP), and&nbsp;Isolation.Amazon GuardDutyAmazon GuardDuty is a native AWS security service that continuously monitors cloud workloads for malicious activity. Using machine learning and threat intelligence, GuardDuty analyzes multiple AWS resources and generates prioritized security findings. Teams can review these findings in the console or automate responses through&nbsp;AWS Lambda functions and workflow integrations.This post shows how to detect and block threats in AWS environments by integrating Zscaler's security solutions with GuardDuty. We'll explore two integrations: Zscaler Deception alerts enhancing GuardDuty's threat monitoring, and GuardDuty intelligence powering ZIA's automated blocking capabilities. Through architecture diagrams and step-by-step implementation guidance, we'll show how these integrations work together to strengthen your security operations. Integration #1: Enhancing GuardDuty with Zscaler Deception IntelligenceBy integrating Zscaler's AI-powered Deception technology with GuardDuty's monitoring, organizations can detect lateral movement and privilege escalation attempts across their infrastructure. Zscaler deploys multiple types of decoys that appear identical to authentic resources, identifying when attackers misuse authorized credentials to move through the environment. When Zscaler's decoys detect this attack activity, they generate threat alerts that are ultimately sent to GuardDuty, which processes this data alongside data it has gathered from the AWS infrastructure. An AWS Lambda function fetches the Deception threatfeed from a web endpoint and stores this information as a flat text file in an S3 bucket. GuardDuty retrieves these findings at user-specified intervals, incorporating them with data from the AWS infrastructure. GuardDuty's machine learning models then analyze this combined data to identify threat patterns and potential attack paths. Teams can review GuardDuty's prioritized security findings in the AWS console or trigger automated responses through AWS Lambda functions and workflow integrations to contain threats before they reach critical assets.Scenario: Catching Attackers Using Compromised CredentialsAn attacker phishes an employee's credentials and begins exploring the network for high-value targets - admin accounts and sensitive data. Their activity looks legitimate to traditional detection methods because they're using real credentials. But when they access one of Zscaler's decoys, they reveal their presence. The integration of Zscaler Deception and GuardDuty turns these deceptive resources into an early warning system, catching attackers during reconnaissance before they reach their targets.How It WorksDeceptive Assets: To lure attackers into revealing themselves, Zscaler Deception deploys decoy EC2 instances that mimic high-value database servers and plants fake AWS credentials with apparent elevated permissions. These deception elements serve as traps designed to detect unauthorized access attempts.Attack Detection: When attackers interact with these decoys - whether accessing fake servers or attempting to use planted credentials - Zscaler generates an alert.&nbsp;Alert Processing: This alert is published to a web endpoint where a Lambda function scrapes it and places it in an S3 bucket for retrieval by GuardDuty.Response: Security teams then receive a consolidated alert in the GuardDuty console, showing where attacks originated, what actions were attempted, and which resources were targeted. Teams can then trace the intrusion path and trigger automated response playbooks to contain the threat.&nbsp;Next Steps: Implementing the SolutionDeploy this integration using the CloudFormation template and detailed instructions available in the&nbsp;Zscaler and Amazon GuardDuty deployment guide.Integration #2: Automated Zscaler Firewall Updates from GuardDuty IntelligenceBy integrating GuardDuty's threat intelligence with Zscaler's Zero Trust Exchange, organizations can automatically block traffic to malicious destinations across their infrastructure. GuardDuty continuously monitors AWS environments using machine learning models to identify suspicious activities and potential threats, generating detailed findings that include malicious domains and IP addresses. In this integration, a Lambda function automatically extracts the suspicious FQDNs and IP addresses from the GuardDuty findings every five minutes, forwarding them to Zscaler Internet Access (ZIA). ZIA then creates or updates its IP and FQDN Destination Groups with this threat intelligence, applying these updates to firewall policies that block and log access to flagged destinations. Each Lambda execution refreshes the Destination Groups with current threat data, while GuardDuty's age-out mechanism ensures that expired threats are automatically removed from the security policies. This automated synchronization between GuardDuty and ZIA creates a self-maintaining security perimeter that continuously adapts to emerging threats without manual intervention.Scenario: Protecting Cloud Resources from Unauthorized CryptominingCloud resources are frequently targeted by attackers who hijack computing power for cryptocurrency mining operations. Their typical approach involves compromising EC2 instances to secretly install mining software, which results in excessive resource consumption, unexpected cost increases, and potential security breaches. The GuardDuty-ZIA integration addresses this threat by automatically detecting and blocking connections to known mining pools and command-and-control servers. This immediate response prevents attackers from establishing mining operations, protecting both cloud resources and business operations from compromise.How It WorksGuardDuty Continuous Monitoring: GuardDuty tracks cloud activity patterns using machine learning models to detect anomalies. It analyzes API calls, resource usage, and communication with known mining pools to identify potential cryptomining operations.Threat Detection: When GuardDuty spots suspicious activity - like abnormal CPU spikes or connections to mining infrastructure - it generates detailed findings containing malicious domains and IP addresses associated with the mining operation.Automated Processing:&nbsp;An AWS Lambda function retrieves these GuardDuty findings and extracts the threat indicators. The function processes this data and prepares it for immediate enforcement action through Zscaler's platform.Threat Blocking: The processed threat data is automatically pushed to ZIA, which updates its firewall policies to block all communication with identified mining infrastructure. This prevents compromised resources from connecting to mining pools and command-and-control servers across the organization.&nbsp;Next Steps: Implementing the SolutionDeploy this integration using the CloudFormation template and detailed instructions available in the&nbsp;Zscaler and Amazon GuardDuty deployment guide. Combining GuardDuty and Zscaler creates a powerful, automated security solution for cloud environments. This integration combines AI-powered threat detection with automated response - a highly effective approach that, according to IBM's 2024 Cost of a Data Breach Report, reduces compared to organizations without AI security capabilities.The integration requires minimal setup - just configure the Lambda functions and integration endpoints once, and the system handles threat detection and response automatically. GuardDuty findings trigger immediate Zscaler policy updates, while Zscaler's Deception technology enhances GuardDuty's threat detection capabilities.Ready to strengthen your cloud security? Enable Amazon GuardDuty in your AWS Console and get started with Zscaler solutions on the&nbsp;AWS Marketplace, or contact your AWS and Zscaler representatives to learn more. For implementation details, refer to the&nbsp;Zscaler and Amazon GuardDuty Deployment Guide, or experience it first-hand with our&nbsp;ZIA demo and&nbsp;Deception demo.This blog post was co-authored by Aaron Rohyans, Sr. Principal Solutions Architect at Zscaler, Gina McFarland, Partner Solutions Architect at AWS, and Travis Niedens, Sr. Partner Solutions Architect at AWS.]]></description>
            <dc:creator>Aaron Rohyans (Sr. Principal Solutions Architect - Business Development)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Americas Executive Partner Summit Recap: Partnering for Tomorrow&#039;s Success]]></title>
            <link>https://www.zscaler.com/blogs/partner/americas-executive-partner-summit-recap-2025</link>
            <guid>https://www.zscaler.com/blogs/partner/americas-executive-partner-summit-recap-2025</guid>
            <pubDate>Wed, 26 Mar 2025 14:08:13 GMT</pubDate>
            <dc:creator>The Zscaler Partner Team (Zscaler)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler and IBM Expand Partnership to Drive Zero Trust Adoption with New Delivery Services Authorization]]></title>
            <link>https://www.zscaler.com/blogs/partner/zscaler-and-ibm-expand-partnership-drive-zero-trust-adoption-new-delivery-services</link>
            <guid>https://www.zscaler.com/blogs/partner/zscaler-and-ibm-expand-partnership-drive-zero-trust-adoption-new-delivery-services</guid>
            <pubDate>Thu, 06 Mar 2025 00:01:12 GMT</pubDate>
            <description><![CDATA[Zscaler and IBM Expand Partnership to Drive Zero Trust Adoption with New Delivery Services AuthorizationZscaler and IBM have a long history of empowering organizations to securely access and protect their workloads across any network and environment—whether on-premises, in data centers, or in the cloud. Today,&nbsp;Zscaler is excited to announce the expansion of our partnership with IBM, which recently achieved Zscaler Delivery Services Authorized (DSA) partner status. This milestone&nbsp;demonstrates our shared commitment to delivering cutting-edge zero trust solutions around the Zscaler Zero Trust Exchange that drive digital transformation and business resilience.“The Zscaler DSA achievement is a testament to IBM's commitment and confidence in Zscaler's ability to complement and deepen our portfolio of Zero Trust solutions and services,” said Yogesh Padharia, Platform &amp; Cloud Cybersecurity Practice Leader for the NCEE Market, IBM Consulting, Cybersecurity Services.Redefining Zero Trust ImplementationToday, organizations are up against a constantly shifting and increasingly complex threat landscape.&nbsp;However, many organizations struggle with deploying and operating these technologies with best practices and properly trained staff. IBM aims to address this challenge through their new DSA status by offering the below as a business capability:• Accelerated Deployment: With a refined Zscaler implementation methodology, IBM ensures faster, more efficient zero Trust deployments.• Comprehensive Security: By integrating Zscaler’s Zero Trust Exchange with IBM’s broader security solutions—such as Vulnerability Management, EDR, and SIEM—customers gain enhanced visibility and robust protection across all users, workloads, and devices.• End-to-End Lifecycle Support: From advisory services and design to deployment and ongoing managed services, IBM delivers holistic zero trust solutions tailored to customer needs.IBM’s DSA status signals their elevated capability to implement, optimize, and manage Zscaler solutions, ensuring organizations can embrace a secure, seamless digital transformation.IBM’s Expertise Meets Zscaler’s Innovation for Faster, Safer DeploymentsAchieving DSA status required IBM to invest deeply in Zscaler training and certification, with over 400 practitioners globally now certified. IBM’s rigorous training included real-world labs, shadowing exercises, and comprehensive certifications, culminating in a formalized Zscaler implementation methodology. This framework accelerates time-to-value for customers by integrating best practices, proven processes, and global delivery capabilities.“Completing the Delivery Services Authorization journey shows IBM’s commitment to provide their customers with the best possible experience around Zscaler’s Zero Trust exchange” said Anthony Torsiello, SVP, WW Partners and Alliances, at Zscaler.&nbsp; “The Services Authorized program includes a thorough training track to ensure partners are prepared to provide their customers with the very best in services.”Accelerated, Secure, and Scalable: The Zscaler &amp; IBM AdvantageWith IBM as a DSA authorized GSI partner, Zscaler customers can now benefit from an unparalleled combination of expertise, innovation, and comprehensive support on their Zero Trust journey. This strengthened alliance offers the confidence organizations need to achieve their digital transformation goals while staying secure in an ever-evolving threat landscape.For more information, view our joint solution brief.]]></description>
            <dc:creator>Nitin Gulati (Vice President, Global System Integrators)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler and the Accenture Cloud Innovation Center in Rome: Pioneering Cloud Innovation and Security]]></title>
            <link>https://www.zscaler.com/blogs/partner/zscaler-and-accenture-cloud-innovation-center-rome</link>
            <guid>https://www.zscaler.com/blogs/partner/zscaler-and-accenture-cloud-innovation-center-rome</guid>
            <pubDate>Thu, 27 Feb 2025 17:06:41 GMT</pubDate>
            <description><![CDATA[Since its inception in 2018, the Accenture Cloud Innovation Center (ACIC) Rome has been at the forefront of developing advanced cloud-first solutions.At Zscaler, we are proud to collaborate with Accenture at this cutting-edge hub, working together to create innovative, highly secure, and customized cloud solutions that enable seamless digital transformation. By leveraging a robust ecosystem of leading technology partners, ACIC Rome accelerates the adoption of emerging cloud technologies that are critical to our clients' business success.Our partnership with ACIC Rome is a testament to Zscaler's commitment to digital security. Together, we develop advanced solutions that protect applications and infrastructures through a zero-trust model. This approach ensures comprehensive security by mitigating risks through intelligent and continuous access control. Our joint efforts have already resulted in successful projects that enhance the digital security of businesses across various sectors.Secure Workforce: Empowering Remote Work with Robust SecurityThrough our collaboration, we provide cloud-based access and identity solutions to secure users and devices, enabling work from anywhere. Zscaler Internet Access (ZIA) is a cornerstone of this effort, safeguarding users from web-based threats by delivering security as a cloud-native service. This ensures that employees can browse the internet securely while protecting their critical data.Secure Workplace: Simplifying Network Connectivity and SecurityWe simplify branch and remote office technology by offering cloud-delivered network connectivity and security. Zscaler Private Access (ZPA) plays a pivotal role in this, providing secure and fast access to private applications—whether they are in the cloud or on-premises—from any location. By applying the principles of "least privilege" and "never trust, always verify," ZPA can replace legacy VPNs and remote access tools in just a few hours, reducing operating costs and accelerating the deployment of new offices and acquisitions.Secure Workload: Protecting Applications and DataOur deep defense approach secures connections for APIs, virtual machines, and container-based microservices, providing seamless access across on-premises, edge, and cloud environments. ZPA ensures secure access to applications without exposing the network, eliminating the need for traditional VPNs. Administrators can control access to applications on a need-to-know basis, safeguarding corporate resources and preventing internal and external threats. Additionally, Zscaler’s centralized dashboard enhances operational efficiency by providing real-time insights into network and security activities. Administrators can monitor configurations, set security policies, analyze traffic, detect threats, and generate detailed reports.Fostering Innovation and SecurityACIC Rome continues to establish itself as a premier hub for cloud innovation, providing businesses with flexible, cutting-edge solutions that drive seamless digital transformation. Our synergy with Accenture enables us to foster stronger collaboration and deliver enhanced, innovative solutions by integrating advanced technologies. This ensures that companies can operate within secure and resilient cloud environments.The solutions co-designed and rigorously tested with Zscaler offer tailored, robust protection, safeguarding the integrity of critical infrastructures and applications. This collaborative approach empowers organizations to excel in a secure digital ecosystem, unlocking new levels of innovation, agility, and long-term sustainability.At Zscaler, we are excited to be at the forefront of this journey with Accenture's Cloud Innovation Center Rome, driving the future of cloud innovation and security.&nbsp;For more information on this partnership, please visit: accenture.com/content/dam/accenture/final/accenture-com/document-3/ACIC-Rome-Zscaler.pdf#zoom=50]]></description>
            <dc:creator>Craig Milner (Zscaler)</dc:creator>
        </item>
        <item>
            <title><![CDATA[EMEA Partner Summit Recap: Partnering with Purpose]]></title>
            <link>https://www.zscaler.com/blogs/partner/emea-partner-summit-recap</link>
            <guid>https://www.zscaler.com/blogs/partner/emea-partner-summit-recap</guid>
            <pubDate>Tue, 18 Feb 2025 16:01:17 GMT</pubDate>
            <dc:creator>The Zscaler Partner Team (Zscaler)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing Zscaler Partner Specializations: Data Security and Digital Experience]]></title>
            <link>https://www.zscaler.com/blogs/partner/introducing-zscaler-partner-specializations-data-security-and-digital-experience</link>
            <guid>https://www.zscaler.com/blogs/partner/introducing-zscaler-partner-specializations-data-security-and-digital-experience</guid>
            <pubDate>Thu, 06 Feb 2025 15:36:15 GMT</pubDate>
            <description><![CDATA[Introducing Zscaler Partner Specializations: Data Security and Digital ExperienceThis week at the EMEA Partner Summit, we proudly unveiled the next phase of our Partner Program: the launch of Zscaler Partner Specializations. These new specializations exemplify our unwavering commitment to partners and their success, enabling them to differentiate themselves and capitalize on emerging growth opportunities.&nbsp;Zscaler now offers new specializations in two key solution areas that align with emerging technologies and customer needs:• Data Security Specialization: Focused on data loss prevention, compliance, tool consolidation, and securing cloud environments—vital to protecting sensitive customer data in today’s digital world.• Digital Experience Specialization:&nbsp;Focused on improving workforce performance and optimizing SaaS application SLAs with Zscaler Digital Experience, helping customers achieve seamless digital workflows.&nbsp;The Rising Demand for Differentiation Through ExpertiseZscaler Specializations were developed in response to customers, partners, and our own internal teams asking how we can identify those partners who, in addition to knowing our Zscaler Zero Trust Exchange, have particularly deep experience in these high growth solution areas. While specialization is not a new concept in the industry, we’ve seen a substantial amount of growth in these emerging technologies.Our Specializations program will allow for both sales and delivery specializations. The Sales Specialization is focused on opportunity identification, qualification, all the way through technical demonstration of key use cases. The Delivery Specialization builds on our existing delivery services authorizations to provide greater depth and best practices.Though we go deep into these topics, we also want to keep this program simple and outcome based, so we’ve kept the requirements pretty straight forward in what I’ll call 3x3x3: To be sales specialized in a given topic, you need 3 account executives and 3 sales engineers to complete their role based training path in that topic. To be delivery specialized you need 3 of your Zscaler delivery authorized consultants to complete training in the specialization.&nbsp;&nbsp;What Are the Benefits of Becoming Specialized?Becoming specialized unlocks a few different benefits:Targeted sales campaigns with specialized partnersIncreased professional services revenuesInternal and external awareness of their experience in our partner locator tool&nbsp;Custom badgesEnablement supportExclusive go-to-market and marketing resources&nbsp;Looking AheadThis launch marks just the beginning of an expanded roadmap for the evolution of our Summit Partner program and Partner Specializations at Zscaler. We remain dedicated to empowering our partners to drive innovation, deliver results, and stand out in a competitive market.&nbsp;As the journey continues, we’re excited to see how partners will leverage these specializations to meet the needs of their customers, and grow their businesses. For more details on how to get Zscaler Specialized, contact your Zscaler Partner Business Manager.To learn more about Zscaler Specializations and how to get started:Read the&nbsp;Zscaler Specializations Guide&nbsp;Access all Specializations learning paths on the Partner Academy]]></description>
            <dc:creator>John Bullitt (Zscaler)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler Achieves AWS Security Competency Status for AI Security]]></title>
            <link>https://www.zscaler.com/blogs/partner/zscaler-achieves-aws-security-competency-status-ai-security</link>
            <guid>https://www.zscaler.com/blogs/partner/zscaler-achieves-aws-security-competency-status-ai-security</guid>
            <pubDate>Thu, 05 Dec 2024 00:00:01 GMT</pubDate>
            <description><![CDATA[Zscaler, a leader in cloud security, announced today that it has achieved Amazon Web Services (AWS) Security Competency status in the AI Security category. This designation recognizes that Zscaler has successfully met AWS’s requirements for providing cybersecurity capabilities to AWS customers. The AWS Security Competency directly aligns common customer use cases to AWS Partner capabilities, accelerating positive security outcomes.&nbsp;In addition, Zscaler recently achieved AWS Migration and Modernization Competency status in the Application Monitoring and Orchestration category. This validates that Zscaler delivers tools that provide deep insights into applications by capturing and analyzing performance data, usage, and monitoring dependencies before and after migration. This ensures that applications are performing well and or better after migrating to AWS. GenAI Tool Usage Continues to SkyrocketWhile generative AI (GenAI) tools promise to transform business, they also present new challenges for IT and security teams. A recent Zscaler ThreatLabz report reveals that enterprise use of AI/ML tools skyrocketed nearly 600% over the past year, putting enterprises at risk. Organizations need granular visibility across their environment and controls to prevent the exfiltration of sensitive data, while also mitigating “shadow AI” sprawl and ensuring the quality of AI data. And they also need proven security solutions that deliver zero trust to protect against a new landscape of AI driven cyberthreats. Zscaler Enables Secure Use of GenAIThe best AI is powered by the best data, and the Zscaler Zero Trust Exchange processes over 500 billion transactions daily (and over 500 trillion signals daily). By training LLMs with complete logs, full URL, and anonymized data, Zscaler continually improves its AI models with high-volume, high-quality data that empowers IT and security teams.Zscaler's proven zero trust architecture provides deep visibility and control over user interactions with generative AI tools to help organizations optimize usage and avoid data loss. For example, the Zscaler Generative AI Security Report provides administrators with a dashboard view, along with deep visibility to assess the organization’s overall risk regarding GenAI tools and data. Insights include a breakdown of the applications used, the number of sensitive transactions, the type of sensitive data, usage by department and individuals, trends, and more.&nbsp;The Zscaler Zero Trust Exchange enforces policies for the GenAI tools and sites that users can visit and controls how they can interact - directly, via cloud browser isolation, or not at all - to protect sensitive data. Zscaler’s integrated data security ensures sensitive data never leaks through an AI prompt or query and full logs are provided, which include detailed usage activity and the prompts associated with GenAI tools.Figure 1. Zscaler Generative AI Security Provides In-Depth Visibility of User Input PromptsAs a result, organizations can secure the use of tools for building generative AI applications (e.g. Amazon Bedrock, Amazon SageMaker, and others) and also secure GenAI-powered applications (e.g. Amazon Q and others). Achieving the AWS Security Competency for AI Security differentiates Zscaler as a cybersecurity provider and AWS Partner. AWS Validated SolutionsAWS security experts annually validate the tools used and operational processes of each AWS Security Competency partner to address specific cloud security challenges aligned to the categories and use cases that they have applied for. The AWS Security Competency provides a faster and easier experience for customers to select the right AWS Partner to help them achieve their goals for business risk and cloud strategy confidence. Additional ResourcesLearn how the industry leading Zscaler zero trust architecture secures users, data, applications and workloads on AWS today.]]></description>
            <dc:creator>David Garcia (Principal Product Marketing Manager)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Meet with Zscaler at AWS re:Invent 2024]]></title>
            <link>https://www.zscaler.com/blogs/partner/meet-zscaler-aws-re-invent-2024</link>
            <guid>https://www.zscaler.com/blogs/partner/meet-zscaler-aws-re-invent-2024</guid>
            <pubDate>Fri, 22 Nov 2024 22:18:18 GMT</pubDate>
            <description><![CDATA[Organizations face new security challenges as applications move to the cloud and employees work from anywhere using any device. Top priorities include securing applications, workloads, and data on AWS while keeping users productive. As a result, organizations are moving away from legacy security products (VPNs, firewalls) that were never designed for these environments. The recent&nbsp;Zscaler ThreatLabz 2024 VPN Risk Report sheds light on critical security challenges and explores why organizations are moving towards a zero trust architecture instead. Key findings include:&nbsp;91% of respondents expressed concerns about VPNs compromising their IT security environment62% of enterprises agree that VPNs are anti-zero trust78% of organizations plan to implement zero trust strategies in the next 12 monthsIn addition, recent trends show that ransomware attacks continue to increase despite numerous law enforcement operations, criminal indictments, and sanctions. Findings from the&nbsp;Zscaler ThreatLabz 2024 Ransomware Report include that the number of extorted companies on data leak sites grew by 57.8% year-over-year. It also found that vulnerabilities remain an all-too common ransomware attack vector, emphasizing the importance of timely patching and unified vulnerability management, underpinned by a zero trust architecture to provide protection even when patches are not available. Secure Your Workloads and Protect Your Data in AWS and MulticloudZscaler has been a leader in zero trust for over a decade, helping thousands of AWS customers:Reduce the attack surface and stop threats from moving laterallyDeliver fast, direct access to private apps&nbsp;Secure workload-to-internet and workload-to-workload trafficProtect cloud data and stop breaches with Data Security Posture Management (DSPM)Secure multicloud environmentsGain visibility and control over Gen AI tools to prevent data loss Zscaler at AWS re:InventJoin us at AWS re:Invent to meet with Zscaler experts, obtain a quick demo, and learn more about the industry leading Zscaler zero trust architecture. To meet with us, you can:Visit us at&nbsp;booth #2057 from December 2-5, 2024&nbsp;Schedule an&nbsp;onsite meeting&nbsp;with Zscaler expertsAttend our&nbsp;speaking session “Secure Cloud Workloads and Data Against Ransomware and Cyberthreats” on Tuesday, December 3 at 1:30 PT In the meantime, learn more about Zscaler solutions for AWS, read real-world customer success stories, and check out the latest research from Zscaler ThreatLabz&nbsp;online today.]]></description>
            <dc:creator>David Garcia (Principal Product Marketing Manager)</dc:creator>
        </item>
        <item>
            <title><![CDATA[KPMG in India Forges Zero Trust Offering with Zscaler to Enhance Cloud Security for Indian Businesses]]></title>
            <link>https://www.zscaler.com/blogs/partner/kpmg-india-forges-zero-trust-offering</link>
            <guid>https://www.zscaler.com/blogs/partner/kpmg-india-forges-zero-trust-offering</guid>
            <pubDate>Tue, 20 Aug 2024 15:59:05 GMT</pubDate>
            <description><![CDATA[This week, KPMG India announced the launch of their new strategic alliance with Zscaler. By combining KPMG in India’s business knowledge and Zscaler’s technological expertise, KPMG in India will offer a unified security solution designed to streamline and simplify cloud security operations for clients. This alliance will enable organizations to transition from outdated security models to a modern zero trust approach, essential for today's cloud centric environments.&nbsp;India’s cybersecurity landscape is evolving rapidly, with organizations facing the challenge of establishing strong defenses against increasing threats. According to KPMG in&nbsp;India’s 2023 CEO Outlook, 77% of Indian CEOs recognize the dual nature of generative AI which can enhance cybersecurity efforts but also introduce new vulnerabilities.&nbsp;&nbsp;As cyber threats become more sophisticated, particularly with the rise of AI-powered phishing attacks, the need for comprehensive security measures is more critical than ever. KPMG’s partnership with Zscaler aims to address these challenges by providing advanced cloud delivered security solutions.&nbsp;The Zscaler-KPMG alliance will leverage the capabilities of the Zscaler Zero Trust Exchange platform, including:&nbsp;Zscaler Internet Access (ZIA):&nbsp;Delivers cloud native, AI-powered cyber threat protection and zero trust access to the internet and SaaS applications through a secure web gateway.&nbsp;Zscaler Private Access (ZPA):&nbsp;Provides the fastest, most secure access to private applications and OT devices enabling zero trust connectivity for workloads.Zscaler Data Protection:&nbsp;Offers a comprehensive, cloud-delivered platform designed to safeguard sensitive data across all environments.&nbsp;Zscaler Workload Communications:&nbsp;Secures workload-to-internet and workload-to-workload connectivity across hybrid cloud environments for mission-critical workloads and servers.&nbsp;These solutions will enhance management and visibility allowing customers to better defend against emerging threats and technologies.&nbsp;Insights from India LeadershipAnanth Nag, Area Vice President, India at Zscaler, emphasized the strategic importance of this alliance, stating,&nbsp;“India is at the forefront of driving digital transformation globally. It is crucial for organizations to innovate with cybersecurity principles ingrained in their foundation. Our alliance with KPMG in India will help organizations navigate compliance, particularly with the Digital Personal Data Protection Act, and deploy customized cybersecurity solutions to combat the fast-changing threat landscape.”Atul Gupta, Partner and Head of Digital Trust and Cyber Security Services at KPMG in India, shared his perspective: “Our partnership with Zscaler reflects our commitment to delivering robust cyber transformation capabilities guided by simplicity, agility and efficacy. By combining our consulting expertise with Zscaler’s integrated solutions, we aim to provide proactive defense and support digital transformation for our clients.”&nbsp;Foad Farrokhnia, Vice President, Channels &amp; Alliances, APJ at Zscaler,&nbsp;remarked,&nbsp;“The synergy between Zscaler’s Zero Trust Exchange platform and KPMG in India’s advisory capabilities empowers organizations to embrace cloud technologies while managing cyber risks efficiently. This partnership represents a significant step in fortifying cybersecurity defenses for Indian businesses.”]]></description>
            <dc:creator>Akshay Grover (MD &amp;amp; GM, Global Private Equity Practice &amp;amp; Advisory Alliances)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler Named a Top CRN Tech Innovator for Zero Trust SASE &amp; SD-WAN]]></title>
            <link>https://www.zscaler.com/blogs/partner/zscaler-named-top-crn-tech-innovator-zero-trust-sase</link>
            <guid>https://www.zscaler.com/blogs/partner/zscaler-named-top-crn-tech-innovator-zero-trust-sase</guid>
            <pubDate>Wed, 07 Aug 2024 13:55:01 GMT</pubDate>
            <description><![CDATA[Each year, CRN's prestigious Tech Innovator Awards celebrate the forefront of technological advancement, honoring products and services that redefine possibilities for solution providers in the tech channel. These awards recognize cutting-edge solutions that offer groundbreaking capabilities, setting a new standard for innovation and excellence in the industry.Today, we’re excited to announce that Zscaler, a trailblazer in the realm of cybersecurity and networking, proudly emerged as a winner in CRN's 2024 Tech Innovator Awards in both the Security Service Edge (SSE) and SD-WAN categories: the two elements that together make up SASE (Secure Access Service Edge). This recognition underscores Zscaler's commitment to pushing boundaries and delivering top-notch solutions that cater to the evolving needs of the IT landscape. We are extremely excited to bring our new take on SASE to the market, and so we couldn’t be happier to have been recognized for our innovation.The history of SASESASE was first coined as a term by Gartner back in 2019, but with the arrival of the pandemic the focus shifted to overlaying cloud security on top of existing physical infrastructure to power the explosion in remote work, so all the attention went to SSE, the security component of SASE.As an early pioneer and ongoing innovator in SSE, Zscaler has dominated as the market leader, to this day. Now that the pandemic is in the rear view mirror, attention is returning to the infrastructure that underpins SSE, and therefore to SASE which adds a WAN edge component to SSE, for connectivity.The problem is that the SD-WAN of the 2010s is unfit for the 2020s because it extends networks with VPNs, enabling lateral movement. If a network is compromised there is greater risk due to the implicitly trusting nature of IP networking. Overcoming this weakness leads to a proliferation of expensive and complex security point solutions that continue to suffer security vulnerabilities, as&nbsp;we have seen in 2024.Zscaler Zero Trust SASEEarlier this year Zscaler announced Zero Trust SASE, built with a reimagined SD-WAN solution that avoids putting anything on the network. Zero Trust SD-WAN is a transformative approach to connecting users, workloads, devices across disparate locations to their peer servers and applications, whether on the internet, in a private cloud, or a physical data center, without putting them on a routable network. Zero Trust SD-WAN instead builds all connections directly via the Zscaler Zero Trust Exchange, for unparalleled cloud security.CRN's Tech Innovator Awards, with their stringent criteria focusing on product functionality, importance to channel partners, and solution provider endorsements, serve as a testament to Zscaler's commitment to excellence and innovation. By winning in categories like SSE and SD-WAN (with Zscaler Zero Trust SD-WAN), Zscaler has once again proven its prowess in delivering cutting-edge solutions that redefine the tech landscape.To explore more about Zscaler's award-winning Zero Trust SASE/SD-WAN solutions, watch our announcement and technical breakout videos, both available on our SASE resources page, and embark on a path towards a more secure and connected future.]]></description>
            <dc:creator>Simon Tompson (Director, Product Marketing)</dc:creator>
        </item>
        <item>
            <title><![CDATA[MSSP: The easy way to get started with Zero Trust]]></title>
            <link>https://www.zscaler.com/blogs/partner/mssp-easy-way-get-started-zero-trust</link>
            <guid>https://www.zscaler.com/blogs/partner/mssp-easy-way-get-started-zero-trust</guid>
            <pubDate>Wed, 31 Jul 2024 14:50:53 GMT</pubDate>
            <description><![CDATA[Mid-sized companies in particular struggle with IT security due to a lack of skilled workers. They often lack the knowledge and time for modern, zero-trust cybersecurity. A managed security service can help.In addition to helping organizations adopt a cloud strategy, software-as-a-service is also a natural fit for cybersecurity. A cloud-based approach not only eliminates the administrative and system complexity of in-house operations, but it also provides security as a service. Especially when there is a lack of in-house IT security specialists, SMBs rarely dare to update to a new security paradigm such as Zero Trust. Replacing traditional network security and converting connectivity to the least privileged access model is too extensive. The Managed Security Service Provider (MSSP) helps to build and operate modern security based on Zero Trust.With Zero Trust, users or applications are not classified as trustworthy at the outset. Access to data and applications is only permitted after identity and context have been verified by a cloud-based security platform acting as a broker, and a secure connection to an application has been established based on policies. Application-level access authorization ensures that unauthorized access to applications and network leakage are prevented. At the heart of such a security model are policies for granular access authorizations based on user roles and functions in the organization. In addition, databases must be categorized and it must be determined which role can access what. A partner can not only advise on the implementation of these principles, but also monitor ongoing operations against them.Zero Trust assistance from the MSSPThe certified Managed Security Service Provider has experience from a wide range of customer projects and can quickly develop the right approach for each specific requirement. Depending on how much help the customer needs, the MSSP's service can range from a fully integrated service model that includes telecommunications services to managed service packages that include consulting, installation and support. In this case, the security service is completely outsourced to the MSSP. If a customer wants to handle the day-to-day operations, they can choose a package that includes only the deployment of Zero Trust Security. In this case, the partner assists in setting policies and categorizing data and applications, and provides only start-up support. The customer is responsible for monitoring the data streams and is also involved in evaluating alerts.The ultimate discipline for the MSSP is a service model that is fully customized to the customer's needs. After consulting and installation, the partner takes over ongoing operations. This type of model is easiest for SMBs because they do not have to manage the complexity of the transformation internally, nor do they have to deal with ongoing monitoring or ongoing adjustments and support tickets. Such a customized service provides an entry point into infrastructure-free IT security operations. Customers can focus on their core competencies and are no longer burdened with managing the hardware in their IT environment.Practical example: proALPHA obtains Zero Trust from the MSSPAs part of its cloud-first strategy, proALPHA GmbH chose a security-as-a-service model with Zscaler's Zero Trust Exchange platform. Due to its globally distributed locations, the company wanted to reduce the complexity of its infrastructure and eliminate security hardware. Initially, the IT department approached the project implementation internally and only found its way to the managed security service model due to a lack of specialists. Today, the software developer benefits from the support of a certified security partner that can temporarily cover all facets of operations.&nbsp;As part of its IT security modernization, the software development company wanted to become less dependent on its own hardware infrastructure. The introduction of a zero trust approach was expected to reduce the company's attack surface and thus increase the level of security. By replacing traditional security with a cloud-based security platform, the software developer can now offer its employees a new working model. A high home-office ratio is now possible, as users have secure, high-performance access to all the work environments they need. "However, after the first deployment of the security service, we had to deal with dissatisfied users. The danger is that users will look for alternative ways to access the system if the performance is not there," says Michael Hoffmann, Head of IT Infrastructure at proALPHA GmbH. "Today, all data traffic to the cloud runs over the Internet and is no longer routed through the data center, so that employees can work properly from home."Growing tasks for the MSSPAs the IT department wanted to concentrate on its core tasks, the company brought AVANTEC on board as a certified security partner. After a health check of the security platform installation, consulting and implementation services were provided in order to fully exploit the potential of the cloud security service and to create the necessary satisfaction for the acceptance of the security service. As a result, proALPHA was able to route all data streams through the Zero Trust Exchange platform and seamlessly scan them for malicious code. "We were amazed at the amount of malware the security platform showed us. However, we didn't have the internal resources to investigate all of the alerts for criticality." Due to a lack of experts in the team, proALPHA decided to use additional services from its partner AVANTEC to assess the security situation."We decided to outsource more and more areas to the service provider because we were unable to cover this workload internally," explains Michael Hoffmann. "AVANTEC now provides us with expert knowledge for analyzing security incidents and was also flexible enough to support us in operations in the event of a temporary resource bottleneck. This allows us to absorb peak loads within the team. It was an advantage for proALPHA that the partner was already familiar with the IT environment thanks to the previous analysis. Today, the MSSP is also entrusted with the continuous improvement and activation of new features, ultimately providing full support for the Zero Trust platform.&nbsp;For proALPHA, increasing IT security was the decisive requirement for switching to a security service. Due to a lack of resources, the switch to a Managed Security Service only proved advantageous in hindsight, as the partner provides the technical expertise for continuous evaluation of ongoing operations and can also keep pace with the company's inorganic growth.]]></description>
            <dc:creator>Sven Kutzer (Partner Solutions Architect EMEA, MSSP)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Recovering Safely and Swiftly: The Path to Enterprise Network Recovery with Zscaler and Deloitte]]></title>
            <link>https://www.zscaler.com/blogs/partner/recovering-safely-and-swiftly-path-enterprise-network-recovery-zscaler-and-deloitte</link>
            <guid>https://www.zscaler.com/blogs/partner/recovering-safely-and-swiftly-path-enterprise-network-recovery-zscaler-and-deloitte</guid>
            <pubDate>Thu, 27 Jun 2024 17:32:15 GMT</pubDate>
            <description><![CDATA[In today's digital landscape, enterprises face the constant threat of cyberattacks that can compromise their networks and disrupt business operations. When a major breach occurs, the challenge becomes finding the fastest path to recovering safely.&nbsp; Deloitte and Zscaler, renowned for their expertise in cybersecurity, offer a robust solution for recovery and prevention, utilizing advanced technology and providing expert guidance.Understanding Enterprise Recovery:​Enterprise Recovery refers to the process of regaining control and trust in an organization's digital systems and core infrastructure after a major breach. When trust and control are lost, business-critical services are disrupted, revenue generation is halted, and the entire organization comes to a standstill.The goal of Enterprise Recovery is to identify the minimum viable services required to ensure the survival of the enterprise and focus on recovering those services within a specific timeframe.Key Challenges in Network Recovery:Traditional network security methods, such as firewalls, Virtual Private Networks (VPNs), and segmentation, often fall short in providing the necessary level of cyber resilience to an enterprise.These controls have operational difficulties and conceptual flaws that make them ineffective in preventing unauthorized access attempts.​ Some of the challenges associated with these traditional methods include:Segmentation: While network segmentation aims to enhance security by dividing the network into smaller segments, it often fails to prevent adversaries from traversing segments due to overly permissive gaps in access control.&nbsp;Firewalls: Firewalls, although fundamental to network security, can be complex to manage and may inadvertently allow undesirable traffic, facilitating lateral movement within networks.​VPNs: VPNs, commonly used for remote access, can become a common entry point for adversaries. Once authenticated, users are granted access to the trusted network, exposing sensitive applications and data. Recent zero-day attacks targeting major VPN vendors have highlighted the vulnerability of this access point.​Innovative Approaches to Network Recovery:To overcome the deficiencies of traditional network security methods, organizations are adopting innovative approaches like Zero Trust with a Secure Service Edge (SSE) architecture.This modern architectural approach focuses on Zero Trust Network Access, delivered through SSE, to establish and maintain trust and control in the network.By replacing VPNs, firewalls, and network segments with an SSE solution, organizations can recover their networks faster and enhance overall security.Long-term Resilience and MonitoringZero Trust Architecture:Implementing a Zero Trust architecture is a key strategy for long-term resilience against ransomware. Deloitte utilizes Zscaler's Zero Trust Exchange(™), a security framework that operates on the principle of 'never trust, always verify '. This ensures that trust is never assumed, and access is continually verified based on user identity, device posture, and contextual factors. This approach significantly reduces the attack surface.Continuous Monitoring:Ongoing monitoring is critical to detecting and responding to threats in real-time. Deloitte, in partnership with Zscaler, takes a proactive approach, utilizing Zscaler's advanced threat intelligence and analytics to monitor network traffic and user behavior continuously. This proactive approach helps to identify suspicious activity before it can escalate into a full-blown attack, ensuring your business is secure and protected.Incident Response Plan:It is crucial to have a robust incident response plan in place for rapid recovery from future attacks. Deloitte assists organizations in developing and regularly updating their incident response plans. This involves conducting a thorough risk assessment, identifying potential threats and vulnerabilities, and outlining the steps to be taken in the event of an attack. Zscaler's security capabilities are integrated into these plans, ensuring all stakeholders are ready to respond quickly and effectively during another ransomware attack.Cyber Insurance Advisory:Deloitte offers guidance on cyber insurance to help organizations minimize the financial impact of ransomware attacks. They ensure that policies cover various scenarios and include provisions for working with cybersecurity firms like Zscaler.Conclusion:Enterprise Recovery is a critical process for organizations to regain trust and control in their networks after a major breach. Traditional network security methods often fall short in providing the necessary resilience and speed required for recovery. By adopting innovative approaches like Zero Trust with SSE architecture, organizations can expedite the recovery process, enhance network security, and ensure a safer and more resilient future.Integrating Zscaler's advanced security capabilities with Deloitte's deep cybersecurity knowledge, organizations can recover from ransomware attacks and build a robust defense against future threats, leaving you with a sense of relief.To learn more about Zscaler and Deloitte Enterprise Recovery Solutions, read the whitepaper here.&nbsp;]]></description>
            <dc:creator>Tatai Krishnan (Partner Solution)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Managing SASE Momentum with NTT DATA and Zscaler]]></title>
            <link>https://www.zscaler.com/blogs/partner/managing-sase-momentum-ntt-data-and-zscaler</link>
            <guid>https://www.zscaler.com/blogs/partner/managing-sase-momentum-ntt-data-and-zscaler</guid>
            <pubDate>Tue, 18 Jun 2024 04:52:53 GMT</pubDate>
            <description><![CDATA[(Pictured: Steve Williams, CISO, NTT DATA &nbsp;and Jay Chaudhry, CEO, Zscaler)The momentum around SASE and its critical role in an organization's future has shown no signs of slowing down.&nbsp;Over the next five years, the market for secure access service edge has been&nbsp;forecasted by Gartner to grow at a compound annual growth rate of 29%, reaching over $25 billion by 2027.&nbsp;This underscores the growing importance of SASE solutions in addressing modern security challenges.&nbsp;In a strategic move to enhance their Managed Network Services portfolio and enable the modern enterprise, NTT DATA has expanded their partnership with Zscaler to deliver best in class managed services with&nbsp;&nbsp;Zscaler Zero Trust SASE™. This next step in adding Zscaler to NTT DATA’s Managed Network Services portfolio, powered by SPEKTRA, marks a significant advancement in providing clients with a fully managed, cloud delivered security solution designed to improve efficiency, performance and protection across global operations.&nbsp;Industry-first SASE platform built on zero trustZscaler Zero Trust SASE&nbsp;builds on the industry’s leading AI-powered security service edge (SSE) platform with a fresh approach to SD-WAN that securely and reliably connects users, locations, and cloud services via the Zscaler Zero Trust Exchange™ and enables:&nbsp;Zero trust security: A zero trust network overlay connects users, devices, workloads, and business partners in managed offices. This eliminates the risk of lateral movement on the network, or via VPN, reducing business risk.An improved user experience:&nbsp;The Zero Trust Exchange brings security enforcement as close as possible to users across 150+ points of presence worldwide, eliminating unnecessary backhauling while optimizing latency and bandwidth usage.Reduced cost and complexity:&nbsp;The Zero Trust Exchange eliminates the need for multiple security point products and their capex and opex costs. A more unified security cloud with zero trust connectivity reduces the risks associated with complex legacy architectures.Proven credibility in SSE:&nbsp;Zscaler is a pioneer and leader in SSE, securing access to SaaS and IaaS/PaaS apps with least-privileged access. Building on this strength, Zscaler SASE brings the benefits of zero trust to managed locations.&nbsp;Managing SASE Momentum with NTT DATA’s Managed Network Services and Zscaler SASEThis collaboration combines Zscaler’s robust zero trust architecture, which ensures secure, direct access to applications and data by continuously verifying user and device identities, with NTT DATA’s comprehensive network management and monitoring capabilities powered by their AI-enabled platform SPEKTRA, which was&nbsp;first launched in April 2022. SPEKTRA encapsulates the company’s vision for a fully autonomous network operations center leveraging AIOps, predictive analytics, and automation techniques to strengthen network performance and reliability, enhance monitoring capabilities, and improve operational efficiency. By integrating these technologies, customers benefit from a seamless, scalable and secure network that protects against evolving cyber threats while enhancing performance and user experience. NTT DATA’s Zscaler managed service provides clients with:Best in-class, end-to-end managed SASE: A best-in-class converged SSE solution and managed servicesSeamless integration:&nbsp;Pre-validated and standardized integration between Zscaler’s AI-driven Zero Trust SASE platform, underpinned by NTT DATA’s SPEKTRA platformReduced complexity and cost:&nbsp;Consolidation of security point products and policies into a single solutionA simple and comprehensive model: Full lifecycle services and simple subscription models matching unique client journeys&nbsp;Securing Digital Transformation with New Capabilities, Less Complication&nbsp;Organizations’ attack surfaces are expanding, cloud adoption is growing, and legacy security approaches are becoming increasingly ineffective. Implementation of a SASE solution helps organizations strengthen their online security, reduce risk, and improve agility in today’s world, where users and applications are everywhere.&nbsp;NTT DATA and Zscaler are together enabling customers to leverage a single, cloud-delivered solution for their network and security services that simplifies management, enhances efficiency, and boosts performance throughout the entire lifecycle. Customers can manage their entire security ecosystem from one interface, achieve faster threat detection and response, and ensure consistent security across all global operations.By combining their strengths, NTT DATA and Zscaler are set to deliver a unique scalable solution that meets the evolving needs of large enterprises, ensuring comprehensive security, enhanced performance and operational efficiency.]]></description>
            <dc:creator>Nitin Gulati (Vice President, Global System Integrators)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Accelerating CXO Business Agility: Wipro launches Cyber X-Ray, powered by Zscaler]]></title>
            <link>https://www.zscaler.com/blogs/partner/accelerating-cxo-business-agility-wipro-launches-cyber-x-ray-powered-zscaler</link>
            <guid>https://www.zscaler.com/blogs/partner/accelerating-cxo-business-agility-wipro-launches-cyber-x-ray-powered-zscaler</guid>
            <pubDate>Wed, 05 Jun 2024 19:18:38 GMT</pubDate>
            <description><![CDATA[In today's age of continuous disruption, enterprise CXOs face the challenge of accessing comprehensive cybersecurity risk visibility across their various projects. This lack of visibility makes it difficult to justify cybersecurity spending and maintain cyber resilience. To address this challenge, Wipro, a leading technology services and consulting company and&nbsp;Zscaler customer, has partnered with Zscaler to launch Wipro Cyber X-Ray, powered by Zscaler, an AI-assisted security and risk platform. This innovative solution takes the long-time partnership between Wipro and Zscaler to the next level, providing the risk visibility CXOs require to optimize their cybersecurity investments and get the buy-in they need from board and executive management.Wipro Cyber X-Ray, powered by Zscaler, empowers security leaders to make informed cybersecurity decisions based on internal and external factors. Having rich data at its disposal and by leveraging Zscaler API and Nanolog Streaming Service (NSS) to ingest Zscaler security telemetry into the platform, Cyber X-Ray, Wipro's proprietary orchestration solution, provides quantifiable risk impacts and actionable remediation insights. This breakthrough solution offers business intelligence that allows security leaders to confidently communicate the value of their current cyber investments to the board. By conducting a cost vs. impact analysis, security leaders can be more agile in allocating cyber budgets to business and corporate functions.Key Benefits:Quick View of Security Risk Posture:&nbsp;Wipro Cyber X-Ray provides a comprehensive view of the enterprise's security risk posture, enabling security leaders to identify vulnerabilities and prioritize remediation efforts.Cost-Optimized Security Investment Decisions: With the help of the solution's insights, security leaders can make informed decisions about cybersecurity investments, ensuring optimal allocation of resources.Confident Communication of Cyber Values: The solution equips security leaders with the necessary data and analysis to effectively communicate the value of their cyber investments to the board, fostering a better understanding of the organization's cyber posture.Comprehensive Cyber Services:&nbsp;Wipro, leveraging the rich data provided by Cyber X-Ray, offers clients a full suite of cyber services. These services range from threat identification to remediation and operational recovery, allowing clients to benchmark their cyber posture against industry peers. The solution enables enterprise CXOs to gain a deeper understanding of the value of their current cyber investments and do more with less.The partnership between Wipro and Zscaler has reached new heights with the launch of Wipro Cyber X-Ray. This cybersecurity risk insights and decision support solution empowers security leaders to make informed decisions, optimize investments, and effectively communicate cyber values to the board. With Wipro's comprehensive suite of cyber services and Zscaler's expertise in cybersecurity, organizations can enhance their cyber resilience and accelerate business agility in the face of evolving cyber threats and compliance requirements.We are proud to also recognize Wipro as a&nbsp;Zenith Live 2024 sponsor. Connect with the Zscaler and Wipro team at the event for more details on Cyber X-Ray for more information. To learn more, watch the&nbsp;launch webinar on-demand here.]]></description>
            <dc:creator>The Zscaler Partner Team (Zscaler)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Transforming the Partnership Landscape: Welcoming Nitin Gulati and Craig Milner to Zscaler]]></title>
            <link>https://www.zscaler.com/blogs/partner/transforming-partnership-landscape-welcoming-nitin-gulati-and-craig-milner</link>
            <guid>https://www.zscaler.com/blogs/partner/transforming-partnership-landscape-welcoming-nitin-gulati-and-craig-milner</guid>
            <pubDate>Wed, 22 May 2024 21:34:11 GMT</pubDate>
            <description><![CDATA[In today's rapidly evolving business landscape, transformation is key to staying ahead of the curve. At Zscaler, our commitment to transformation extends beyond our technology solutions; it encompasses our entire ecosystem—including our partnerships. Over the past few quarters, we have been making substantial investments in our partner community. We continue to recognize the value that Global System Integrators (GSIs) bring as part of our larger go to market strategy, possessing the expertise to understand our customers' challenges and develop strategic plans to ensure their long-term success. This is why we are excited to introduce Nitin Gulati and Craig Milner as catalysts for our partner transformation journey and who will play pivotal roles in expanding our relationship with GSIs and strategic partners.&nbsp;Introducing Nitin Gulati, Vice President of Global System Integrators. Nitin brings a wealth of experience in both partners and sales leadership roles at ServiceNow. With a decade of success working closely with GSIs, Nitin has gained deep insights into their operations and understands the critical role they play in delivering end-to-end solutions. Nitin's appointment underscores our commitment to strengthening our partnership with GSIs and leveraging their expertise to better serve joint customer success.&nbsp;Introducing Craig Milner, Senior Vice President of Strategic Growth.&nbsp;Craig joins from Microsoft where he was a VP in their Customer &amp; Partner Solutions business. Craig brings a proven history of driving growth at scale and will lead long term, sustainable business development initiatives with our largest global partners and premier strategic clients. His vision and values align well with ours, and we are confident he will help Zscaler continue to be the leading Zero Trust + AI Platform.&nbsp;&nbsp;By introducing Nitin and Craig to our Zscaler team, we are paving the way for enhanced collaboration with GSIs and strategic partners and reinforcing our commitment to mutual success. Their leadership and industry knowledge will enable us to develop tailored solutions that address the evolving needs of our customers. Through closer collaboration with our partners, we can leverage their deep understanding of market trends and challenges to co-create innovative solutions that drive business growth.&nbsp;Our partner transformation journey at Zscaler is well underway, and we are excited about the opportunities that lie ahead. By investing heavily in our expanded routes to market, including our GSIs, we are paving the way for success. We look forward to the positive impact Nitin, Craig, and their supporting teams will make as we continue to invest in our partner community. Together, we will navigate the ever-changing landscape of cybersecurity and deliver exceptional solutions that meet the evolving needs of our customers.]]></description>
            <dc:creator>Elorie Widmer (Director, Partner Campaigns and Strategy)</dc:creator>
        </item>
        <item>
            <title><![CDATA[10 Zscaler Leaders Recognized as CRN 2024 Women of the Channel]]></title>
            <link>https://www.zscaler.com/blogs/partner/10-zscaler-leaders-recognized-crn-2024-women-channel</link>
            <guid>https://www.zscaler.com/blogs/partner/10-zscaler-leaders-recognized-crn-2024-women-channel</guid>
            <pubDate>Tue, 14 May 2024 14:49:48 GMT</pubDate>
            <description><![CDATA[10 Zscaler Leaders Recognized as CRN 2024 Women of the Channel&nbsp;Each year,&nbsp;CRN publishes its Women of the Channel project, recognizing female executives for their accomplishments over the past year and the far-reaching impact they are having on the technology industry going forward.&nbsp;This year, we are proud to announce that 10 Zscaler leaders have been recognized as CRN Women of the Channel, with Vice President Christine McElduff and Vice President Melissa Nacerino being featured on the Power 100 - the most powerful women of the channel. Please join us in congratulating these phenomenal women of Zscaler:&nbsp;&nbsp;Each of these professionals are integral to the Zscaler mission as we work to drive strategic value for our partners, help them embrace zero trust security, and become even more deeply ingrained in their initiatives that drive business transformation.&nbsp;Our Commitment to Diversity in the Zscaler and the Channel&nbsp;Notably, 60% of our AMS Partner team comprises talented and accomplished women, and we should all take pride in that.&nbsp;&nbsp;As our employee base grows, our Zscaler channel organization remains committed to promoting inclusion and belonging. We will continue to invest in programs like CRN Women of the Channel to recognize our leaders and educate on the importance of diversity in building high-performing teams. We are also working with Zscaler’s recruiting teams and Head of DEI, to involve our team in her initiatives to nurture underrepresented talent.&nbsp;By investing in these types of opportunities, we not only empower and engage our teams but also establish ourselves as a DEI leader in the industry. This positions us to attract top talent and further strengthen our team. Our team is dedicated to finding new ways to empower our teams and working closely with our leaders to provide more opportunities for success. Together, we can make a significant impact and create a workplace where everyone feels valued and thrives.&nbsp;&nbsp;Congratulations again to our 2024 Zscaler CRN Women of the Channel. Your dedication and commitment to diversity and inclusion are truly unmatched.]]></description>
            <dc:creator>Karl Soderlund (SVP, WW Partner and Alliances)</dc:creator>
        </item>
        <item>
            <title><![CDATA[How Zscaler is taking our partner marketing commitment to the next level]]></title>
            <link>https://www.zscaler.com/blogs/partner/how-zscaler-taking-our-partner-marketing-commitment-next-level</link>
            <guid>https://www.zscaler.com/blogs/partner/how-zscaler-taking-our-partner-marketing-commitment-next-level</guid>
            <pubDate>Wed, 01 May 2024 12:28:32 GMT</pubDate>
            <description><![CDATA[Introducing the All-New Partner Demand Center, your launchpad for marketing with ZscalerFor the past 12 months, Zscaler has transformed our partner program, empowering our partners to thrive in the cloud security market and establish themselves as trusted advisors. As our partners continue to select and invest in Zscaler as the leading Zero Trust and AI vendor in their portfolio, we too continue to invest in better tools and resources for our partners.&nbsp;Today, May 1st, that investment continues as Zscaler goes live with an upgraded&nbsp;Partner Demand Center (PDC), our marketing platform exclusively for Zscaler partners. The new PDC will make it easier than ever to build awareness, attract prospects, and generate sales pipeline with Zscaler.&nbsp;Accelerate your marketing impact with turnkey Zscaler campaigns that drive outcomes for your business&nbsp;We continuously collect feedback from partners on what you need to better improve your marketing with Zscaler. With the launch of the new PDC, we’re excited to bring you:&nbsp;An all-new platform experience, tailored to your needs, with multi-language support and AI capabilities to help you execute fasterNew campaigns aligned to customer use cases that are relevant and important for your customers, so you can uncover more opportunitiesChoose your own tools – You can execute campaigns in the platform using the built in automation tools, download the campaign materials to use on your own, or leverage our Concierge team to run campaigns for youLaunch from your own platform – Integrate the PDC with your tech stack, including Zoom, Webex, Eloqua, and Salesforce/PardotMore personalized collateral – Instantly add your brand and contact info to Zscaler collateral, including images and video!Assign leads for sales follow-up – Got a hot lead from a marketing campaign? Assign it to your sales rep right from the platformEnhanced social reach – Post social to both your corporate and personal social accounts for more impressions and brand reachCreate your own events – Stand up a registration page and email invitations in minutesMarketing tactic execution guidance – Executing activities is easier than ever with wizards that guide you through each stepAnd more!&nbsp;White Glove Support from our Concierge Team&nbsp;Although the platform is easy to use, we recognize that your time and resources are often in short supply. Our Concierge team is available to give you additional support navigating the platform and executing marketing activities and tracking. It’s like having an extra headcount, at no cost to you!&nbsp;Located in North America, Latin America, EMEA and APJ, our Concierge team offers multi-language support in English, Spanish, Italian, and Portuguese.&nbsp;Contact your Concierge for a guided tour of the new platform, personalized to your needs, and even help executing your first activity or campaign.&nbsp;Get Prizes for Marketing on the PDC – Including a Chance to Win $2,500 in Marketing Funds!&nbsp;To help you get started, we are offering prizes to all partners who onboard and execute marketing activities on the PDC in Zscaler’s fiscal Q4 (May 1-July 31, 2024).&nbsp;&nbsp;Do each of the following items to win a prize pack of premium Zscaler swag and be entered to win $2,500 towards a marketing program with Zscaler!Post a social postCustomize a Zscaler showcase pageExecute an email campaign to at least 250 recipients&nbsp;Find out more about this incentive&nbsp;Join our Upcoming Webinar for PDC Best Practices&nbsp;Whether you are a value-added reseller or a global service provider, we have tools that can make your job easier. Join our webinar on May 23, 11:00 AM — 12:00 PM EDT to get tips and tricks on how to get the most out of the new platform.&nbsp;&nbsp;Register for this webinar:Register for AMER/EMEARegister for APACStart Using the New PDC!To log in, visit&nbsp;https://pdc.zscaler.com/ and click “Login via SSO” to use your Zscaler Okta credentials. If you do not already have Okta credentials, you can apply for them on the partner portal here:&nbsp;https://partners.zscaler.com/s/partneronboarding.&nbsp;It’s a new era of partnership and growth at Zscaler, and we continue to invest in bringing you the best tools and resources in the market. With the new Partner Demand Center, we are furthering our efforts to help our partners reach their maximum potential with Zscaler.]]></description>
            <dc:creator>Sarah Peters (Manager, Global Partner Marketing Campaigns)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Americas Executive Partner Summit Recap]]></title>
            <link>https://www.zscaler.com/blogs/partner/ams-executive-partner-summit-recap</link>
            <guid>https://www.zscaler.com/blogs/partner/ams-executive-partner-summit-recap</guid>
            <pubDate>Thu, 25 Apr 2024 17:35:51 GMT</pubDate>
            <dc:creator>Karl Soderlund (SVP, WW Partner and Alliances)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Congratulations to our 2024 Zscaler Partners of the Year]]></title>
            <link>https://www.zscaler.com/blogs/partner/2024-zscaler-partners-of-the-year</link>
            <guid>https://www.zscaler.com/blogs/partner/2024-zscaler-partners-of-the-year</guid>
            <pubDate>Fri, 19 Apr 2024 17:49:53 GMT</pubDate>
            <description><![CDATA[Last week at the Zscaler Americas Executive Partner Summit we announced our 2024 Americas Partners of the Year. The Zscaler Partner Ecosystem is a key differentiator and force multiplier for us in the market; from deep technology integrations, key consultancy partnerships, solutions and services partners. We have the best partners in the business. Our thriving partner ecosystem continues to grow and excel as we secure and serve the world’s largest and most renowned organizations. And our partners continue to select and invest in Zscaler as the leading Zero Trust and AI vendor in their portfolio.While each partner is unique, this year’s cohort of winners have all demonstrated significant business growth, innovation, and investments with Zscaler. We are winning together.To each of our award winners, THANK YOU for your hard work and dedication, and for consistently investing in our partnership. The co-development, innovation, and customer obsession we share enables us to better serve and secure organizations all over the world. We are stronger together; delivering superior business outcomes in the ever evolving digital transformation landscape.Congratulations to our esteemed 2024 Americas Partner of the Year Award Winners:Partner of the Year: World Wide Technology&nbsp;GSI Partner of the Year: AccentureGo-to-Market Alliance Partner of the Year: CrowdStrikeCloud Alliance Partner of the Year: AWSZero Trust Solution Partners of the Year: CrowdStrike &amp; OktaEmerging Tech Partner of the Year: RubrikGSI Managed Zero Trust Security Partner of the Year: WiproGSI Growth Partner of the Year: InfosysServices Partner of the Year: OptivGrowth Partner of the Year: SHIPubSec Partner of the Year: Red RiverNew Logo Partner of the Year: CDWThese awards recognize our partners who have gone above and beyond, and excelled in our ecosystem. We are proud and grateful for these partnerships as we jointly deliver unparalleled customer experiences and innovation.Thank you to each of our award winners for your partnership. We cannot wait to see all of the great achievements in the years to come.]]></description>
            <dc:creator>Karl Soderlund (SVP, WW Partner and Alliances)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Now and Next: How Zscaler is Transforming to Fuel Channel Success]]></title>
            <link>https://www.zscaler.com/blogs/partner/now-and-next-how-zscaler-transforming-fuel-channel-success</link>
            <guid>https://www.zscaler.com/blogs/partner/now-and-next-how-zscaler-transforming-fuel-channel-success</guid>
            <pubDate>Thu, 08 Feb 2024 13:00:02 GMT</pubDate>
            <description><![CDATA[Looking back at 2023, it was impossible to escape the constant buzz surrounding cybersecurity incidents in the market. But amid the chaos, one thing became clear: the cybersecurity market was booming and the role of leaders and partners in ensuring customer safety was crucial. The same still rings true in 2024. As the cyber security market continues to evolve, Zscaler is proud to be at the forefront of innovation, and now, we’ve put the programs in place to allow our partners thrive in this digital era alongside us. Both for what’s now… and what’s next.&nbsp;

As we step into the second half of Zscaler’s fiscal year, we’re proud to showcase to partners the army of new opportunities we’ve designed to grow their business, maximize earnings, and elevate their skills. This includes a revamped incentive structure and new selling motions that empower partners with more collaborative selling opportunities throughout the sales cycle to deliver the greatest customer experience in their journey to digital transformation.&nbsp;

We have transformed our partnering foundation to provide comprehensive support throughout the customer lifecycle.&nbsp;

You’ve probably heard me say it before, zero trust is a team sport. In the 1H half of the year, we took on both an internal and external transformation to ensure that we have purposeful alignment, process, and engagement with our partners throughout the customer lifecycle. This means, from the earliest stages of our world-class sales process to the final delivery, our partners are integrated every step of the way, embedding their services and support to help our customers transition from legacy appliances to a true zero trust model.

We’re leading the charge with the market-leading platform, and now the most lucrative incentive framework, in the market today.&nbsp;

With the most comprehensive platform in the market today, Zscaler leads the charge. And now, we have introduced the most lucrative incentive framework to match. Over the past six months, my team and I hit the road to listen to our partners and understand what they truly desire in a partnership. One thing stood out loud and clear: they want to work with vendors who offer the most comprehensive security platform and drive profitability. That's why we have enhanced our incentives framework and channel-led selling motion, offering larger payouts, increased discount advantages, and performance bonuses. We want our partners to earn more and thrive in the cloud security market, establishing themselves as trusted advisors. As the digital landscape continues to evolve, Zscaler remains dedicated to supporting partners in driving customer success and achieving mutual growth.

We’re empowering our partners to thrive in the cloud security market and establish themselves as trusted advisors.

We know that for Zscaler and our partners alike, our number one commitment is driving customer success in the ever-evolving digital era. That’s why Zscaler not only continues to innovate its cloud security offerings to address emerging threats and challenges, but in the first half of our year, we simplified our certifications to help our partners become experts and build practices around zero trust. We also launched targeted enablement around Zscaler-powered customer outcomes to help our partners lead the way as trusted advisors to our customers.

But our journey is far from over. As we enter the second half of our fiscal year, we have more exciting announcements lined up to fuel partner success. We will introduce new offerings and specializations to help partners seamlessly integrate Zscaler into their practices. We will optimize our collaborative partnering approach and launch industry-leading tools to make Zscaler the easiest to do business with in the industry. We’ll also continue to be in the field with you each and every day, to make sure our valued partners have the support to deliver transformational outcomes to our customers.

We have achieved a lot in the first half of the year with your feedback and support throughout this transformative journey. We are fully dedicated to supporting our partners in reaching their maximum potential with Zscaler, both with what’s now and what’s next. Together, we are changing the channel and revolutionizing the cybersecurity market.]]></description>
            <dc:creator>Karl Soderlund (SVP, WW Partner and Alliances)</dc:creator>
        </item>
    </channel>
</rss>