Zscaler to Expand Zero Trust Exchange Platform's AI Cloud with Data Fabric Purpose-built for Security

Zscaler Blog

Get the latest Zscaler blog updates in your inbox

Subscribe
Security Research

Insight from the Front Lines: Zscaler ThreatLabZ to Give Keynote at Zenith Live

image
THREATLABZ
April 28, 2021 - 4 min read

We’re excited to announce that Zscaler ThreatLabZ will be a part of our keynote lineup at this year’s Zenith Live on June 15 and 16. Backed by the world’s largest security cloud, Zscaler ThreatLabZ is our internal research team dedicated to uncovering and investigating emerging threats, while educating the cybersecurity world about how to protect against them. A global team of security experts, researchers, networking experts, and computer scientists, ThreatLabZ is responsible for analyzing and eliminating threats across the Zscaler security cloud, as well as keeping a finger on the pulse of the world’s threat landscape—with the intent of making the internet safer for all.

What you can expect from ThreatLabZ at Zenith Live

Our renowned ThreatLabZ experts will present in-depth research into emerging threats discovered with the Zscaler cloud, which processes nearly 2 million transactions per second. During the keynote, Deepen Desai, CISO and VP of Security Research and Operations at Zscaler, will dissect recent attack chains, including what types of attacks are trending, why these attacks are becoming more prominent, and what you can do to protect your organization from them. This presentation includes a close look at threats targeting supply chains, Microsoft exchange servers, ransomware, and more. 

You’ll also get an exclusive preview into Zscaler’s disruptive protection suite that unifies our industry-leading threat intelligence, world-class experts, and innovative technology to give you peace of mind from the most advanced attackers.

Check out these ThreatLabZ resources prior to Zenith Live

Because Zscaler security is cloud-delivered, we have the unique ability to analyze every byte of traffic routed to our cloud before it’s sent back to the user. This ability to handle massive amounts of traffic without latency enables us to automatically and accurately track attack trends by threat type, location, threat actor type, among other criteria. Because of this, ThreatLabZ has put together a series of dashboards that can be found publicly on our site

These dashboards provide a real-time view into the number of transactions processed by the Zscaler Cloud, policies enforced, and threats blocked. At any moment, hundreds of thousands of concurrent events are being managed by Zscaler cloud security, with billions of activities collected and processed daily.

Let’s take a closer look at some of the aspects that comprise the global threat landscape we are tracking. 

Cloud Activity Dashboard

This dashboard shows how hard our security cloud is working – processing more than 50 billion transactions daily, including applying almost 3 billion policies across all customers, and blocking more than 70 million threats per day. 

Global Threat Map Dashboard

This interactive map illustrates the threats that Zscaler has blocked during the past 24 hours using antivirus, advanced threat protection, and sandbox technology.

Global Internet Threat Insights

A graphical representation that displays the movement of global threats, showing countries of origin, target destinations, and threat types.

Cloud Application Dashboard

An interactive view of cloud application trends on the Zscaler platform. Data can be filtered by application, date range, and industry verticals. 

Encrypted Traffic Dashboard

This dashboard shows the volume of encrypted traffic as a percentage of total traffic moving across the cloud.

Global Enforcement Dashboard

A depiction of the hourly transactions, threats blocked, and policies enforced worldwide in the Zscaler cloud.

Internet of Things Dashboard

How much traffic is generated by things? More than you think.

Work From Anywhere Trends Dashboard

The latest dashboard from ThreatLabZ shows how enterprise traffic has changed since the beginning of the pandemic.

ThreatLabZ also publishes research reports, blogs, and papers about their findings and how organizations can adapt to the ever-evolving threat landscape. 

What to expect at Zenith Live 21

Zenith Live is a virtual conference focused on secure digital transformation, showcasing what’s possible with the flexibility of true zero trust. With more than fifty breakout sessions across six tracks, hands-on training, executive forums, and architecture workshops, Zenith Live is designed to show IT leaders across all disciplines how to lead an organization securely into the modern era, where you can innovate faster, reduce risk, and work smarter—all at the speed of cloud.

Here’s what else you can expect at this year’s event:

Expert Speakers

Hear visionary predictions for the future of the digital world and how CIO, CTO, and CISO pioneers from Fortune 500 companies successfully enacted their secure digital transformation initiatives.

In-Depth Breakout Sessions

Select from more than 50 sessions in six tracks:

  • Foundations
  • Zscaler Expert
  • CloudOps/DevSecOps
  • Network Professional
  • Security Professional
  • Public Sector

Architecture Workshops

Zscaler experts teach an interactive session on how a zero trust architecture can free you from past constraints so you can move securely to the digital future—at cloud speed.

Women in IT Exchange

Tune into a fireside chat with IT leaders on professional direction and practical approaches to breaking down the barriers to individual success.

Live Q&A/Demos

Zscaler professionals will lead hands-on interactive training sessions on Zscaler’s Zero Trust Exchange Technology.

Training

Zscaler cloud operations and cybersecurity experts will lead detailed hands-on technical training and certification programs.

Register now for this one-of-a-kind, two-day immersive experience.

form submtited
Thank you for reading

Was this post useful?

dots pattern

Get the latest Zscaler blog updates in your inbox

By submitting the form, you are agreeing to our privacy policy.