Zenith Live is coming to Europe in October. Join us! Learn More
Zenith Live is coming to Europe in October. Join us!
Learn More

Zero trust security

Make it possible

Your Mission
Resources > Webcasts And Demos > Recorded Webcasts

FILTER BY:

Schneider Electric Powers Security Transformation with One Simple App

Rethink your security for a global workforce and a cloud-first world

KEYNOTE SPEAKER: Yohann Royer, Internet Service Line Manager at Schneider Electric

KEYNOTE SPEAKER: David Creedy, Senior Product Manager at Zscaler

When Schneider Electric decided to undergo a digital transformation initiative, they knew their approach to security would also need to transform.  As their apps moved to the cloud and their users left their network, the Schneider team needed a way to deliver consistent security controls across a globally dispersed workforce of 140,000 users. That’s where Zscaler came in.  Join this webcast to hear how Schneider Electric harnessed the power of Zscaler and the Zscaler App to transform their security—enabling the organization and employees like never before.

 

Three Key Steps for Moving Your Branches to the Cloud

KEYNOTE SPEAKER: Alex Teteris, Principal Technology Evangelist, Zscaler, Inc.

The migration of applications from the data center to the cloud calls for a new approach to networking and security. In this webcast, we’ll explore the challenges of establishing secure local breakouts, and address three key steps you’ll need to take to securely move your branch workloads to the cloud and enable a better user experience, manage costs, and reduce risk.

 

How SDPs Make Zero Trust Security a Reality

KEYNOTE SPEAKER: Dhawal Sharma, Senior Director, Product Management, Zscaler

GUEST SPEAKER: Jon Oltsik, Senior Principal Analyst, ESG Research

ESG believes that the challenge of using legacy security methods in the cloud era will be a key catalyst for the adoption of a new user- and application-centric approach known as zero trust security. The zero trust model is enabled by the software-defined perimeter (SDP), delivering secure anywhere access to internal applications without the use of VPN technology. Learn how SDP is enabling organization to make zero trust security a reality.

Zscaler & Splunk | How to Respond Faster to Today's Threats

KEYNOTE SPEAKER: Lidor Pergament, Product Manager, Zscaler

Join Splunk and Zscaler to learn how you can respond more quickly to threats and improve security across all your users, on or off network.

Is the Next-Gen Firewall/IPS Dead?

KEYNOTE SPEAKER: Naresh Kumar, Principal Product Manager, Zscaler, Inc.

With the cloud and mobility changing the concept of perimeter security, the next-generation firewall and access controls must also change. The NGFW—now more than a decade old—is dying. In this webcast we’ll explore the challenges of NGFW in a cloud world, and how to replace it and deliver efficient security and access controls for your branch and remote offices.

Top 5 Mistakes to Avoid when Deploying Office 365

KEYNOTE SPEAKER: Steve House, VP of Product Management, Zscaler, Inc.

Ready to deploy Office 365? Seems like an easy task? Think again. Microsoft Office 365 was designed to be accessed directly via the Internet, and most companies just don’t have the proper network setup. It’s no surprise, then, that deploying Office 365 without proper guidance can lead mistakes.

Moving from Appliances to Cloud Security with Phoenix Children's Hospital

KEYNOTE SPEAKER: Steve Grossenbacher, Sr. Product Marketing Manager, Zscaler

GUEST SPEAKER: Daniel Shuler CISO, Director IT Security, Phoenix Children’s Hospital

Applying consistent security controls across remote workforce is a challenge most companies struggle with. In addition, the demands of inspecting SSL traffic and the performance limitations of security appliances are causing real problems for IT organizations. Join this webcast to hear firsthand how Phoenix Children's Hospital was able to overcome these common IT challenges. You’ll also gain valuable insights from a Zscaler customer on the IT transformation journey, and perspectives on what it takes to make your network and security cloud ready.  

 

Faster, Simpler, More Secure Remote Access to Apps in AWS

Improve user experience and simplify your move to AWS

KEYNOTE SPEAKER: Patrick Foxhoven, CIO and VP Emerging Technologies, Zscaler, Inc.

KEYNOTE SPEAKER: Sam Hennessey, Senior Solutions Architect, Amazon Web Services

Although 60% of enterprises now run apps on AWS, the user experience for remote users is typically slow as most traffic is still tunneled through their data center breaking the cloud experience. A secure direct-to-cloud remote access experience without a VPN enables enterprises to migrate their legacy apps to AWS by delivering fast app access and policy-based security.

Accelerate the Migration to Microsoft Azure with Zscaler Private Access

Your apps are moving to Azure. Don’t let network security get in the way

KEYNOTE SPEAKER: Lisa Lorenzin, Director of Emerging Technology Solutions, Zscaler, Inc.

GUEST SPEAKER: Sean Dastouri Senior Cloud Architect Microsoft Azure,

Many companies still try to rely on the network-centric methods of the old world (i.e remote access VPN), when apps ran only in the datacenter, to provide user-to-app connectivity. They're now recognizing that the complexity of appliances and the need to manage ACLs and FW policies will actually slow the move to Azure dramatically. It's time for a new approach. One built for the new world.

How Zscaler enables simpler Office 365 deployment and a fast user experience

KEYNOTE SPEAKER: Naresh Kumar, Principal Product Manager, Zscaler, Inc.

Most companies don’t realize that Microsoft Office 365 was designed to be accessed directly via the internet. It’s no surprise, then, that deploying Office 365 without proper guidance can lead to delayed deployments and a terrible user experience. Attend this webcast to explore Microsoft’s latest connectivity guidance for deploying Office 365 and find out how Zscaler can make your Office 365 initiative a success.

Don’t let SSL be a security blindspot

Understand the stealthy threats targeting your users

KEYNOTE SPEAKER: Deepan Desai, Vice President, Security Research, Zscaler ThreatLabZ

IT is faced with a major compromise when it comes to inspecting encrypted traffic, because most organizations don’t have the budget to fully inspect it. Yet hackers are getting more creative in how they deliver malware over SSL/TLS, adding to inspection challenges. Attend this webcast to discuss the latest attack trends, and best practices you can employ to bolster your security and protect your users.

Solving the Secure SD-WAN Paradox

KEYNOTE SPEAKER: Dr. Jim Metzler, Principal Analyst at Ashton, Metzler & Associates

KEYNOTE SPEAKER: Dhawal Sharma, Sr. Director of Product Management at Zscaler

KEYNOTE SPEAKER: Tony Banuelos, Product Line Manager at VeloCloud, now part of VMware

Join this webcast as we discuss the ways organizations can improve their security posture while taking advantage of the benefits offered by SD-WAN and embracing the advantages of cloud-enabling technologies. Case studies and deployment best practices of implementing a secure SD-WAN solution will be shared.

 

The secure, direct-to-internet branch

KEYNOTE SPEAKER: Zeus Kerravala, Founder and Principal Analyst, ZK Research

KEYNOTE SPEAKER: Bill Lap, Vice President of Customer Success, Zscaler, Inc.

Digital transformation is driving the evolution of branch IT and security architectures to take advantage of cloud services. In this webcast, we’ll be joined by Zeus Kerravala, Founder and Principal Analyst, ZK Research, to explore the best ways to address the challenges of complexity and security in the branch, and provide a scalable architecture for the adoption of SaaS and cloud services.

Adopting A Zero-Trust Model. Google Did It, Can You?

Change from old-world network-centric, to new-world user- and app-centric

KEYNOTE SPEAKER: Ameet Jani, Product Manager, Google, LLC.

KEYNOTE SPEAKER: Manoj Apte, Chief Stratagy officer, Zscaler, Inc.

Based on 6 years of creating zero trust networks at Google, the BeyondCorp framework has led to the popularization of a new network security model within enterprises, called the software-defined perimeter. It takes a fundamentally different approach to providing secure access to applications, doing away with the need for traditional perimeter-based network security like solutions like VPNs.

So what does this mean for enterprises not named Google, and how can they can adopt a similar security approach within their organization?

 

Top reasons Office 365 deployments fail

Pilots may go well, but rollouts can be a different story

KEYNOTE SPEAKER: Steve House, Vice President, Product Management, Zscaler, Inc.

Microsoft Office 365 is unlike any other SaaS application and, even with careful planning, it’s fair to say that deployments don’t always go as planned. Office 365 was designed to be accessed directly via the internet, and most companies just don’t have the proper network setup. It’s no surprise, then, that deploying Office 365 without the right planning and guidance can lead to network problems and a poor user experience.

In this webcast, we’ll explore Microsoft’s current connectivity guidance for optimizing Office 365 in your network. You’ll hear how to remove common deployment hurdles, what network changes you need to make, and how you can guarantee a fast user experience.

GDPR - are you ready?

Key steps to getting GDPR right

KEYNOTE SPEAKER: Chris Hodson, EMEA CISO, Zscaler, Inc.

KEYNOTE SPEAKER: Shaun Ghafouri, Associate General Counsel, Zscaler, Inc.

In four months, the General Data Protection Regulation (GDPR) will go into effect, but how many organisations will be ready? According to Gartner, not many: “By the end of 2018, over 50% of companies affected by the GDPR will not be in full compliance with its requirements.”

Secure Remote Access to AWS Your Users Will Love

Improve user experience and simplify your move to AWS

KEYNOTE SPEAKER: Patrick Foxhoven, CIO and VP Emerging Technologies, Zscaler, Inc.

59% of enterprises are running applications in AWS and users are accessing them from outside the network. As adoption takes place incumbent technology, like the remote access VPN, provide a poor user experience and introduce additional networking and security complexity. This not only slows cloud initiatives, but frustrates users and makes life difficult for admins.

Enterprise must rethink the way they provide remote access to internal apps.

 

Maximize your cloud app control with Microsoft MCAS and Zscaler

Get complete user app visibility, control shadow it and reduce corporate risk

KEYNOTE SPEAKER: Dhawal Sharma, Director of Product Management, Zscaler, Inc.

Are you using or ready to deploy Microsoft Cloud App Security (MCAS)?  While having CASB visibility and control is key to a good cloud app strategy, it is only as good as the traffic it can see.  Zscaler and Microsoft have partnered to deliver key MCAS integrations that help you confidently embrace cloud apps and minimize the risks associated with unsanctioned apps.

Join this webcast to hear Dhawal Sharma, Director of Product Management discuss how you can leverage Zscaler’s massive cloud platform to can take your Microsoft MCAS deployment to the next level of visibility and control.

DNS Security, is it enough?

How to protect against DNS tunneling and other advanced threats

KEYNOTE SPEAKER: Patrick Foxhoven, Chief Information Officer & Vice President of Emerging Technologies, Zscaler, Inc.

DNS security is important. But, in today’s world of dynamic cloud environments (AWS and Azure), content delivery networks (CDNs) and crowdsourced content and advertisements, looking only at the domain name is not a complete indicator of security. “Grey” domains are no longer the exception, they have become the norm. Join this webcast to explore the risks of relying on DNS-only based solutions and ways to add security to your DNS traffic without sacrificing performance or additional security insights.
 

Overcoming the Challenges of Architecting for the Cloud

5 key requirements for securely routing branch traffic direct to the cloud

KEYNOTE SPEAKER: Steve House, Vice President, Product Management, Zscaler, Inc.

The concept of backhauling traffic to a centralized datacenter worked when both users and applications resided there. But, the migration of applications from the data center to the cloud requires organizations to rethink their branch and network architectures.  What is the best approach to manage costs, reduce risk, and deliver the best user experience for all your users? Join this webcast to uncover the five key requirements to overcome these challenges and securely route your branch traffic direct to the cloud.

Slow Office 365 Deployment? Let Zscaler help you get in the fast lane!

Learn how to deliver a faster deployment and user experience

KEYNOTE SPEAKER: Steve House, Vice President of Product Management, Zscaler, Inc.

Even with careful planning, deploying Microsoft Office 365 quickly and delivering a fast user experience can be a challenge. Many people assume their existing network is up for the task, but in reality Microsoft recommends a far different strategy. By understanding the common pitfalls of deployment and using some proper guidance, you too can put the pedal to the metal on your Office 365 installation. Your network and your users will thank you!

GDPR - are you ready?

Key steps to getting GDPR right

KEYNOTE SPEAKER: Chris Hodson, Senior Director, Office of the CISO, Zscaler

GUEST SPEAKER: Julia Dönch, Lawyer, BDO Legal

In four months, the General Data Protection Regulation (GDPR) will go into effect, but how many organisations will be ready? According to Gartner, not many: “By the end of 2018, over 50% of companies affected by the GDPR will not be in full compliance with its requirements.”

Why SDP Replaces Remote Access VPN

Software-defined perimeter security represents the future for remote access

KEYNOTE SPEAKER: Dan Shelton, Director of Product Management, Zscaler, Inc.

The software defined perimeter (SDP) is a new approach to securing access to internal applications. It relies on software, not VPN hardware appliances, to deliver zero trust access for remote users. This method allows enterprises to use a single solution standardize remote access security for all users (employees of third party) and platforms, scale them more economically while reducing the potential attack surface.

Now users can receive a cloud-like user experience, and admins remain in control of their environment.

How I survived my Office 365 deployment

Hear what it takes to deploy Office 365

KEYNOTE SPEAKER: Dan Shelton, Director, Product Management, Zscaler, Inc.

Deploying Microsoft Office 365 is unlike any other SaaS application you’ve rolled out before. Even with careful planning, things can easily go sideways. That’s why hearing firsthand what it takes to successfully deploy Office 365 in a global organization from someone who has done it is an invaluable opportunity. Join this webcast to hear all the real-life tips and tricks needed to avoid common Office 365 pitfalls within your IT organization.

Zscaler ThreatLabz dissects the latest SSL security attacks

Exposing the threats hiding in your network

KEYNOTE SPEAKER: Deepen Desai, Senior Director, Security Research, Zscaler, ThreatLabz

The occurrence of SSL-based threats are continuing to rise. Hackers are getting more and more creative in how they deliver threats, which creates new inspection challenges. Attend this webcast to discuss the latest attack trends, and best practices you can employ within your Zscaler installation to bolster your security.

Zscaler Private Access for Azure

Simplifying app migration to Azure

KEYNOTE SPEAKER: Patrick Foxhoven, CIO, Zscaler

KEYNOTE SPEAKER: Chris Hines, PMM Lead, ZPA

The majority of enterprises are either already running applications in cloud, or plan to move applications to cloud. Now, providing a secure way for users to access these integrations has become more important than ever. Zscaler Private Access simplifies the migration to Azure, and delivers a faster, more secure way to access Azure applications. The webinar discusses why Zscaler and Azure have partnered together and how ZPA provides a seamless approach to remote access, compared to incumbent technology.

Secure remote access without the pitfalls of VPN's

Delivering the experience users demand with the security IT needs

KEYNOTE SPEAKER: Denzil Wessels, Senior Director, Product Management, Zscaler, Inc.

Despite its notoriously poor user experience for both users and admins, the remote access VPN has remained the standard for remote access to internally managed applications. The tool, which dates back to the 1990s, extends the corporate network to users and exposes it to malware that may be running on mobile devices.

Pitfalls to avoid when deploying Office 365

Pilots may go well, but rollouts can be a different story

KEYNOTE SPEAKER: Dhawal Sharma, Director Product Management, Zscaler, Inc.

Microsoft Office 365 is unlike any other SaaS applications and, even with careful planning, it’s fair to say that deployments don’t always go as planned. The Zscaler cloud processes over 1.3 billion office requests daily for more than 700 customers. In working with customers and Microsoft, we’ve learned a lot of best practices and common pitfalls companies make when fully deploying Office 365. Join our webcast to learn more. 

Bad Rabbit Ransomware

What you need to know to stay safe

KEYNOTE SPEAKER: Deepen Desai, Sr. Director, Security Research & Operations, Zscaler, Inc.

Almost four months after the last major outbreak, we are seeing a new variant of Petya ransomware dubbed "Bad Rabbit," impacting multiple businesses, primarily in Russia and Ukraine. There have also been reports of businesses impacted in Germany, Turkey, and other countries. While it’s still early, the new strain of ransomware has generated a lot of press, some theories, and plenty of misinformation. Zscaler has been monitoring the outbreak and has all the latest information.

Join our security experts to hear evidence-based information, so you can discern the truth about this evolving threat. They’ll discuss the initial attack vector, what we’re seeing in the Zscaler cloud, and protective actions you can take now. Finally, they’ll discuss how we can more effectively protect against modern threats like Bad Rabbit by rethinking the way we apply security and access controls.

Virtualized Firewall: Is it the panacea to secure distributed enterprises?

KEYNOTE SPEAKER: Dr. Manoj Apte, Chief Strategy Officer, Zscaler, Inc.

GUEST SPEAKER: Gerry Festa, VP of Product Marketing, Zscaler, Inc.

Your applications are moving to the cloud, and your firewall is sure to follow. The concept of only protecting your network no longer makes sense. But, can a virtualized firewall adequately secure organizations as they become more and more distributed? What are your options to determine where your firewalls will reside? How can you evaluate which solution is best for your enterprise? Join our webcast to find out.

Cloud-Delivered SD-WAN and Security: Best Practices for Branch Transformation

KEYNOTE SPEAKER: Dhawal Sharma, Director of Product Management, Zscaler, Inc.

KEYNOTE SPEAKER: Rachna Srivastava, Sr. Director of Product Marketing, VeloCloud

Cloud technology is the key enabler to new business opportunities, improved efficiency, and a sustainable competitive edge. IT requires new ways to rapidly deliver business applications and services in the cloud reliably and securely. This can be achieved by adopting a new approach that allows for agility and security in the cloud-era.

Enabling bandwidth control for cloud apps in the branch - No backhauling, no boxes!

GUEST SPEAKER: Chandan Agarwal, Product Manager, Zscaler, Inc.

How do you prioritize applications for your branch users? What apps and services do you have accessing the Internet? How do you ensure that your network is optimized for business productivity and that your branches aren’t stuck in a traffic bottleneck? Join this webinar as we discuss how Zscaler Bandwidth Control enables you to manage, control, and allocate bandwidth to ensure your branch traffic runs smoothly, and that business-critical applications, like Office 365, take priority over YouTube and other traffic.

Secure access to applications on Microsoft Azure

KEYNOTE SPEAKER: Patrick Foxhoven, CIO and VP, Emerging technologies, Zscaler, Inc.

Today 34% of enterprises are running applications within Azure Cloud. That's up 14% from last year! The problem is that Enterprise Networking and Security teams still rely on the VPN to provide remote access to the network for their mobile users. The VPN, famous for giving users a poor user experience, breaks the cloud experience, exposes the network to employees while driving costs and complexity when migrating apps to Azure.

Cloud vs. On-Premises Security: Can you afford not to switch?

KEYNOTE SPEAKER: Steve House, VP of Product Management, Zscaler, Inc.

As the cloud transforms enterprise IT, it brings a lot more savings than cold hard cash. No question, reducing infrastructure costs is the #1 attraction to cloud. But there are two other cost dimensions with huge impact on security that must not be ignored. The payoffs depend on whether you approach security with a cloud vs. on-premises model. An organization’s choices are crucial – both for enterprise security and for the roles of its stakeholders. Join this webinar as we compare three cloud vs. on-premises cost considerations.

Preview the new integration of Riverbed SD-WAN + Zscaler cloud security solution

KEYNOTE SPEAKER: Javier Rodriguez, Senior Product Manager, Riverbed

KEYNOTE SPEAKER: Dhawal Sharma, Director Product Management, Zscaler, Inc.

Cloud technologies are essential for digital business, but they introduce unique challenges for security and control. At the same time, traditional approaches to both security and networking often compromise business needs for agility and fast access to cloud apps and services.

Ready for Office 365? Talk to your network first.

Most companies networks aren’t ready for the transition

KEYNOTE SPEAKER: Steve House, Vice President Product Management, Zscaler, Inc.

KEYNOTE SPEAKER: Steve Grossenbacher, Sr Product Marketing Manager, Zscaler, Inc.

Ready to deploy Office 365?  Seems like an easy task?  Think again.  Microsoft Office 365 was designed to be accessed directly via the Internet, and most companies just don’t have the proper network setup.   It’s no surprise, then, that deploying Office 365 without proper guidance can lead to common pitfalls. 

In this webcast, we’ll explore Microsoft latest connectivity guidance for optimizing your network for Office 365.   You’ll hear how to remove common deployment hurdles, what changes need to be made to your network, and how you can guarantee a fast user experience.

Transform the way you find and stop Advanced Threats

Why you need an integrated cloud sandbox

KEYNOTE SPEAKER: Jozef Krakora, Principal Product Manager, Zscaler, Inc.

KEYNOTE SPEAKER: Steve Grossenbacher, Sr Product Marketing, Manager Zscaler, Inc.

Today's advanced threats use techniques that often make them invisible to traditional appliance based security approaches. With SSL on the rise, malicious web content, and all around infection creativity, hackers and advanced threats have more than enough places to hide. Stopping these complex attacks takes a completely integrated sandbox that delivers full threat visibility across all users, no matter where they connect from.

How to use bandwidth control to prioritize business-critical apps over YouTube

KEYNOTE SPEAKER: Jen Toscano, Sr. Product Marketing Manager, Zscaler, Inc.

GUEST SPEAKER: Chandan Agarwal, Product Manager, Zscaler, Inc.

What does your bandwidth traffic look like? What apps and services do you have accessing the Internet? How do you ensure that your network is optimized for business productivity? With more traffic bound for the Internet, it is essential that business apps, like Office 365, are prioritized over YouTube, live-streaming sporting events, and even over non-critical business traffic.

Please join Jen Toscano, Sr. Product Marketing Manager, and Chandan Agarwal, Product Manager, as they discuss how Zscaler Bandwidth Control enables you to manage, control, and allocate bandwidth to ensure that business-critical applications take priority over other traffic.

Tick-tock! Using cloud security to accelerate M&A integration

KEYNOTE SPEAKER: Denzil Wessels, Senior Director, Product Management, Zscaler, Inc.

While mergers & acquisitions drive growth for companies, they present a significant challenge for the IT team who must bring two disparate companies' systems together in a rapid, secure and reliable way.

What Comes After VPN?

Enabling Application Access With Zscaler

KEYNOTE SPEAKER: Lisa Lorenzin, Director Emerging Technology Solutions, Zscaler, Inc.

No More M&Ms: transitioning from legacy VPN to modern SDP with Zscaler Private Access

Many IT teams used an “M&M” approach to design network security: create a hard shell or perimeter around the soft interior. For remote users, traditional L3 VPNs extend that perimeter, placing remote users' endpoints directly onto the enterprise network. This puts the enterprise's network and data at risk from a range of threats - compromised credentials can lead to unintended exposure, as attackers move laterally throughout the network environment.

The evolving CIO|CISO relationship

KEYNOTE SPEAKER: Larry Biagini, Chief Technology Evangelist, Zscaler, Inc.

As businesses mandates more innovation from IT, the role of the CIO and CTO become more critical while, in many cases, the CISO becomes an after-thought or a checkbox on key initiatives.

Join Larry Biagini, former CTO of GE and now Chief Technology Evangelist with Zscaler, for a webcast that digs into relationships and technologies that drive IT innovation and business outcomes.

Breakout with SD-WAN without Compromising Security

KEYNOTE SPEAKER: Dhawal Sharma, Director Product Management, Zscaler, Inc.

Companies are selecting SD-WAN as a way to enhance or replace traditional branch routers in order to support low-latency applications, including VoIP calling, video-conferencing, streaming media, and SaaS or cloud-hosted applications, over greater distances. In fact, Gartner has predicted that, by the end of 2019, 30% of enterprises will deploy SD-WAN technology in their branches.

SD-WAN is a proven and cost-effective approach to establish local Internet breakouts, but they create security challenges, particularly as IT organizations feel they have no other choice than to make additional hardware and software investments to support each branch or remote office.

Please join Dhawal Sharma, Director of Product Management at Zscaler, as he explains why the cloud is the answer when it comes to delivering the the most efficient and secure local Internet breakouts.

Petya ransomware?

What you need to know

KEYNOTE SPEAKER: Bil Harmer, Office of the CISO, Zscaler, Inc.

KEYNOTE SPEAKER: Deepen Desai, Senior Director, Security Research, Zscaler, Inc.

As many companies sought to regain their footing after last month’s devastating WannaCry attack, we saw another ransomware attack yesterday, which impacted businesses in more than 65 countries.

Why your next gen branch firewall should be a cloud firewall

GUEST SPEAKER: Dr. Sri Subramanian, Sr. Director, Product Management, Zscaler, Inc.

You want to create a fast and secure experience for your branch users. Cloud applications, like Office 365, are being rapidly adopted and are designed to be accessed directly via the Internet. To securely embrace cloud apps and services and deliver a fast user experience, Internet traffic needs to be routed locally. But how can you establish secure direct Internet connections without backhauling and without without duplicating stacks of security appliances at each branch?

Please join Dr. Sri Subramanian, Sr. Director of Product Management and Jen Toscano, Sr. Product Marketing Manager as they discuss how Zscaler Cloud Firewall enables fast and secure local Internet breakouts, and delivers next generation firewall capabilities, including security and access controls for Internet traffic on all ports, and security that follows the user to provide identical protection no matter where they connect.

What Comes After VPN?

In the direct-to-Internet world, the old approach to secure access won't work

KEYNOTE SPEAKER: Denzil Wessels, Senior Director Product Management, Zscaler, Inc.

Virtual Private Networks, the de facto standard for employee and third-party access to internal applications, were designed almost twenty years ago to make users feel as if they were on the corporate network.Unfortunately, the VPN process creates a terrible user experience, regardless of whether applications are on a public cloud (Azure, AWS) or in the corporate data center. IT is forced to resort to “unnatural acts of networking” to segment and secure valuable assets, creating a cumbersome solution that no one would choose if they were building it from scratch.The problem is that no one has built a viable alternative to the VPN… Until now. Zscaler Private Access is what comes next in the world of secure access to internal applications.

Private application access in a Post-Trust world

KEYNOTE SPEAKER: Jeff Pollard, Principal Analyst serving Security & Risk Professionals, Forrester Research, Inc.

GUEST SPEAKER: Lisa Lorenzin, Director, Emerging Technology Solutions, Zscaler, Inc.

Forrester's Zero Trust Model requires a simple but profound change in the way we think about information security. In Zero Trust, all network traffic is inherently untrusted. In this webcast our keynote speakers from Forrester and Zscaler will explain how IT teams must evolve their approach to security based on new network models and data flows. We will also share details from Forrester's Security and Risk playbook and the necessary shift in investments to support application access transformation. We will conclude this webcast by discussing recent innovations in the Zscaler cloud security platform which support the Zero Trust Model.

Advanced Threat Hunting

Finding a Needle in a stack of Needles

KEYNOTE SPEAKER: Jozef Krakora, Principal Product Manager, Zscaler, Inc.

KEYNOTE SPEAKER: Steve Grossenbacher, Sr Product Marketing Manager, Zscaler, Inc.

Do you have what it takes to find today’s Advanced Persistent Threats? Current cyberattacks employ a range of techniques that often make them invisible to traditional security controls. With SSL threats on the rise, and hackers getting more and more creative on how they deliver threats, advanced threats can easily hide in plain sight. Finding and stopping these complex attacks takes a complete platform approach. Attend this webcast to discuss the latest attack trends, and best practices you can employ to bolster your security.

Cloud vs. On-Premises Security: Can you afford not to switch?

KEYNOTE SPEAKER: Jason Georgi, Director of the Transformation Office, Zscaler, Inc.

As the cloud transforms enterprise IT, it brings a lot more savings than cold hard cash. No question, reducing infrastructure costs is the #1 attraction to cloud. But there are two other cost dimensions with huge impact on security that must not be ignored. The payoffs depend on whether you approach security with a cloud vs. on-premises model. An organization’s choices are crucial – both for enterprise security and for the roles of its stakeholders. Join this webinar as we compare three cloud vs. on-premises cost considerations.

 

Deconstructing WannaCry

What we can learn from the facts

KEYNOTE SPEAKER: Deepen Desai, Senior Director, Security Research & Operations, Zscaler, Inc.

KEYNOTE SPEAKER: Patrick Foxhoven, Chief Information Officer, VP of Emerging Technologies, Zscaler, Inc.

The WannaCry attack has generated a lot of press, some theories, and plenty of misinformation. Join our security experts to hear evidence-based information, so you can discern the truth about this evolving threat. They’ll discuss the initial attack vector, new strains, what we’re seeing in the Zscaler cloud, and protective actions you can take now. Finally, they’ll discuss how we can more effectively protect against modern threats like WannaCry by rethinking the way we apply security and access controls.

How to Optimize your Office 365 deployment

Accelerate deployment and improve the user experience with Zscaler

KEYNOTE SPEAKER: Dr. Manoj Apte, Chief Strategy Officer, Zscaler Inc.

GUEST SPEAKER: Gerry Festa, Sr Director of Product Marketing, Zscaler Inc.

A proper Microsoft Office 365 deployment needs direct access to the Internet. This requirement was underscored by Microsoft at the 2016 Ignite conference. Attempting to run Office 365 in a traditional hub-and- spoke network environment will quickly lead to delayed deployments, unplanned outages and users frustrated with subpar performance. Check out this webcast to hear how Zscaler can help you accelerate deployment, deliver an improved user experience and simplify day to day management of Office 365.

Combating ransomware and advanced threats

A technical deep dive into Zscaler Cloud Sandbox and Next Generation Cloud Firewall

KEYNOTE SPEAKER: Andy Kennedy, Senior Sales Engineering Manager, Zscaler, Inc.

In light of the recent global ransomware attacks, this live webcast will review the threat landscape and take a close look at how the Zscaler Cloud Security Platform can scale protection against zero-day threats across all your offices and users with ease.

Enabling bandwidth control for cloud apps in the branch- No backhauling, no boxes!

GUEST SPEAKER: Chandan Agarwal, Product Manager, Zscaler Inc.

How do you prioritize applications for your branch users? What apps and services do you have accessing the Internet? How do you ensure that your network is optimized for business productivity and that your branches aren’t stuck in a traffic bottleneck?

With more traffic bound for the Internet, it is essential that organizations establish local Internet breakouts, and prioritize business apps, like Office 365, over YouTube and other recreational traffic.

Please join Chandan Agarwal, Product Manager as he discusses how local Internet breakouts and Zscaler Bandwidth Control enables you to ensure your branch traffic runs smoothly, and that you can manage, control, and allocate bandwidth to ensure that business-critical applications take priority over other traffic.

Optimize your Office 365 Experience

How Zscaler can accelerate deployment and deliver a fast user experience

KEYNOTE SPEAKER: Dhawal Sharma, Director Product Management, Zscaler Inc.

GUEST SPEAKER: Lee Dolsen, Technical Director, APJ, Zscaler Inc.

A proper Microsoft Office 365 deployment needs direct access to the Internet. This requirement was underscored by Microsoft at the 2016 Ignite conference. Attempting to run Office 365 in a traditional hub-and- spoke network environment will quickly lead to delayed deployments, unplanned outages and users frustrated with subpar performance. Check out this webcast to hear how Zscaler can help you accelerate deployment, deliver an improved user experience and simplify day to day management of Office 365.

Lessons for thriving - not just surviving - in the cloud

Insights from the Siemens global IT transformation

KEYNOTE SPEAKER: Jay Chaudhry CEO, Chairman & Founder, Zscaler Inc.

GUEST SPEAKER: Frederik Janssen, Global Head of Service Portfolio & Lifecycle Management, IT Infrastructure, Siemens

The old world of IT is struggling to remain relevant. Your applications are in the cloud and your users are mobile, but your security appliances are still sitting at the gateways, protecting the corporate network. That’s where Siemens was in early 2015, when the organization embarked on its global IT transformation. During this webcast, you’ll hear insights from Frederik Janssen, who led the Siemens transformation journey, and Zscaler CEO Jay Chaudhry.

The Hero-Way to beat the Zero-Day

KEYNOTE SPEAKER: Michael Sutton, CISO, Zscaler Inc.

The cloud and mobility are fundamentally changing how we deliver user security. If you’ve ever wondered how to build an airtight security strategy against advanced threats in a cloud-first world, this discussion is for you. Drop in on this compelling discussion with Zscaler’s CISO on how other security companies like yours have solved the challenge of stopping advanced threats and keeping their users safe. Being the company hero and building a cloud-first IT strategy is easier than you think!

The quick and dirty on exposing your blind spots

How to identify your security vulnerabilities in seconds

KEYNOTE SPEAKER: Haggai Polak, Senior Director, Product Management Zscaler, Inc.

GUEST SPEAKER: Steve Grossenbacher, Senior Manager, Product Marketing Zscaler, Inc.

Regardless of how much an organization has invested in security, gaps in your defense can still exist. Malicious websites, malware callbacks, phishing attacks, and SSL traffic all use techniques that are counting on the fact you may be running blind. Your first step in getting visibility into some of those security gaps is easier than you think.

Join Haggai Polak, Sr. Director of Product Management, Zscaler, Inc., and Steve Grossenbacher, Sr. Product Marketing Manager, Zscaler, Inc., for a compleiing webcast discussing how the Security Preview tool can help you understand your security posture and close the gaps in your defenses.

Troubleshooting traffic forwarding and user authentication issues

KEYNOTE SPEAKER: Matt Sidhu, Director of Customer Advocacy, Zscaler Inc.

In this webcast, we’ll explore issues that may be impacting the end-user experience, such as traffic forwarding and user authentication, as well as best practices for troubleshooting these and other issues. This webcast supports preparation for the following Zscaler certifications: ZCSP, ZCSE, ZCCA, and ZCCP.

Optimize your Office 365 Experience

How Zscaler can accelerate deployment and deliver a fast user experience

KEYNOTE SPEAKER: Dhawal Sharma, Director Product Management, Zscaler Inc.

GUEST SPEAKER: Gerard Festa, Senior Director of Product Marketing, Zscaler Inc.

Microsoft Office 365 was designed to be accessed directly via the Internet; Microsoft reiterated this position in its presentation, “Overcoming Network Performance Blockers for Office 365 Deployments,” at the 2016 Ignite conference. It’s no surprise, then, that deploying Office 365 in a traditional hub-and-spoke network environment can quickly lead to frustrated users, unplanned network upgrades, and delayed deployments.Join this webcast to get the first-hand experiences gained from more than 700 Office 365 deployments and how Zscaler can help accelerate deployments, simplify management, and deliver a fast user experience.

Dissecting the Latest Security Threats

Hear Zscaler ThreatLabz discuss current threat trends

KEYNOTE SPEAKER: Jozef Krakora, Principal Product Manager, Zscaler Inc.

GUEST SPEAKER: Steve Grossenbacher, Sr Product Marketing Manager, Zscaler Inc.

Sophisticated, new cyberattacks are employing a range of techniques that often make them invisible to traditional security controls. In addition, the occurrence of SSL-based threats are continuing to rise. Hackers are getting more and more creative in how they deliver threats, which creates new inspection challenges. Attend this webcast to discuss the latest attack trends, and best practices you can employ within your Zscaler installation to bolster your security.

How to use bandwidth control to prioritize business apps over YouTube

KEYNOTE SPEAKER: Dr. Sri Subramanian, Sr. Director of Product Management, Zscaler Inc.

GUEST SPEAKER: Jen Toscano, Sr. Product Marketing Manager, Zscaler Inc.

What does your bandwidth traffic look like? What apps and services do you have accessing the Internet? How do you ensure that your network is optimized for business productivity? With more traffic bound for the Internet, it is essential that business apps, like Office 365, are prioritized over YouTube, Spotify, and other recreational traffic like live-streaming sporting events.

Extortion and Ransomware:  What you need to know

Understand new trends around Extortion based threats and Ransomware

KEYNOTE SPEAKER: Michael Sutton, CISO, Zscaler

GUEST SPEAKER: Joseph Blankenship, Senior Analyst, Forrester

The business of the cyberattack has matured into a billion dollar industry. Forrester even predicts the devastating effects of a cyberbreach will lead to the failure of a Fortune 1000 company in 2017 (Predictions 2017: Cybersecurity Risks Intensify, November 2016, Forrester). Extortion based attacks like Ransomware were rampant in 2016, and in 2017 we’re seeing an explosion of new variations.  These new types of threats are even now delivered as a service and more financial driven than ever before.  Attend this session to understand how companies are being extorted with attacks like ransomware and learn strategies to safeguard your organization.

Five Things You need to Know About IT Transformation to a Cloud Enabled Enterprise

Learn from the experiences of Larry Biagini, former CTO of GE

KEYNOTE SPEAKER: Larry Baigini, Chief Technology Evangelist, Zscaler

The cloud is a powerful business enabler, and transitioning to top SaaS and cloud platforms can bring new agility and productivity to your business. However, such a transition significantly impacts security, network traffic flows, user experience, and cost. Industry veteran and former CTO of GE, Larry Biagini, discusses the five things he learned while leading GE’s global IT organization through a massive cloud transformation, and he’ll share the five things he wished he knew before embarking on the journey.

Combating ransomware and advanced threats

KEYNOTE SPEAKER: Andy Kennedy, Sales Engineering Manager, Zscaler, Inc.

Join Andy Kennedy, Zscaler Sales Engineering Manager, for a live demonstration of the Zscaler Cloud Sandbox and Next Generation Cloud Firewall capabilities. Andy will demonstrate how the Zscaler Cloud Security Platform examines every byte of traffic that flows between your users and the Internet, combating advanced threats and ransomware, and applying a consistent security policy wherever your users may be.

Enabling the Internet-only Branch with Zscaler Cloud Firewall

KEYNOTE SPEAKER: Dr. Sri Subramanian, Sr. Director of Product Management, Zscaler

TARGET AUDIENCE: Zscaler customers and prospects

As a Zscaler customer, you have already made the transformational decision to move your security to the cloud. To realize the full potential of the Zscaler cloud you can route your branch office traffic locally and securely to the Internet. Local Internet breakouts will drastically improve your user experience for applications like Office 365 while reducing your MPLS costs. Learn how Zscaler Cloud Firewall delivers next generation firewall capabilities including protection for all ports and protocols, user and application awareness while leveraging your existing Zscaler security services.

Cloud Security for SD-WAN: Best Practices for Branch Office Transformation

KEYNOTE SPEAKER: Lee Dolsen, Technical Director, Asia Pacific & Japan, Zscaler, Inc

GUEST SPEAKER: Idris T Vasi, Managing Director, Asia-Pac, Viptela

TARGET AUDIENCE: Zscaler customers and prospects

This webcast will cover common use case scenarios from Viptela and Zscaler of their widely adopted solution. It will touch base on how to rapidly deploy secure, 100% cloud-based and easy-to-manage SD-WAN.

Are You Maximizing your Protection from Ransomware

Ensure that you’re leveraging your Zscaler service for best protection

KEYNOTE SPEAKER: Deepen Desai, Director of Security Research, Zscaler

TARGET AUDIENCE: Zscaler customers and prospects

Ransomware is a constantly evolving threat and the Zscaler research team is uncovering new information about this threat every day. As a Zscaler customer, it is important for you to stay up-to-date on this latest research and ensure that you are optimally using the Zscaler cloud service to protect your entire organization from ransomware.

Security Predictions for 2017

Our top 10 security predictions for 2017

KEYNOTE SPEAKER: Michael Sutton, CISO, Zscaler

TARGET AUDIENCE: Zscaler customers and prospects

The world is undergoing a fundamental change in 2017, much of it driven by fear and uncertainty. Alliances are being reassessed, borders are being redrawn and companies are rethinking their approach to security. What are the new looming threats out there? Who are the biggest perpetrators of cybercrime? And how best should we be protecting our companies? Join Michael Sutton, CISO at Zscaler as he discusses our top 10 security predictions for 2017.

Office 365 deployment from A to Z

KEYNOTE SPEAKER: Chris Hodson, EMEA CISO , Zscaler, Inc

GUEST SPEAKER: Andreas Zengel, EMEA CTO, Skyhigh Networks

TARGET AUDIENCE: Zscaler customers and prospects

Join this webcast to know insights gained from hundreds of Office 365 implementations shared by our panelists from Zscaler and Skyhigh Networks. They will also cover topics like the increase in network complexity, security considerations and the hike in infrastructure upgrade costs.

How secure are you?

KEYNOTE SPEAKER: Dr. Amit Sinha, Executive VP of Engineering and Cloud Operations, Zscaler

TARGET AUDIENCE: Zscaler customers and prospects

Zscaler's security research team regularly ploughs through a treasure trove of transaction data applying machine learning for deeper insights. In this webcast, we'll look at the aggregated data through several lenses to explore topics like traffic patterns in various geographies, types of malware and threats that target specific vertical industries and risks associated with specific applications.

Zscaler Technical Overview Webinar

KEYNOTE SPEAKER: Andy Kennedy, Sales Engineering Manager, Zscaler

TARGET AUDIENCE: Zscaler customers and prospects

This demo will highlight concrete security and business reasons on why moving to a 100% cloud security platform is the only viable option to keep your organization and employees safe in today's social and mobile world.

Dissecting the latest security attacks

KEYNOTE SPEAKER: Deepen Desai, Senior Director Security Research, Zscaler

KEYNOTE SPEAKER: Gerard Festa, Senior Director Product Marketing, Zscaler

TARGET AUDIENCE: Zscaler customers and prospects

This webcast will cover recent attacks and a discussion on what you need to know to mitigate the risk and protect your users. It will highlight the innovative techniques hackers are using in today’s threat landscape along with the best practices and security recommendations to defend against multi-stage attacks.

Secure Digital Business Transformation

KEYNOTE SPEAKER: Michael Sutton, CISO, Zscaler

TARGET AUDIENCE: Zscaler customers and prospects

Join this webcast to find out what every CIO or CISO should know about secure digital business transformation. This will also cover lessons learned and insights gained as a result of leading a number of Global 2000 organizations through a massive cloud transformation.

Office 365 is all the rage - but is your network ready?

GUEST SPEAKER: Manoj Apte, Senior Vice President of Product Management, Zscaler

TARGET AUDIENCE: Zscaler customers and prospects

This webcast discusses key considerations to be aware of before companies deploy Office 365 and best practices for addressing these issues using a cloud based security solution.

Insights from the 2016 Gartner Magic Quadrant for Secure Web Gateways

KEYNOTE SPEAKER: Jim Reavis, Co-Founder and CEO, Cloud Security Alliance

KEYNOTE SPEAKER: Atri Chatterjee, CMO, Zscaler

TARGET AUDIENCE: Zscaler customers and prospects

In this webcast, we will talk about Gartner's findings that are relevant for CISOs and CIOs and also the key considerations to make when making your next web security decision.

7 Deadly sins that get your employees infected

KEYNOTE SPEAKER: Haggai Polak, Senior Director Product Management, Zscaler

TARGET AUDIENCE: Zscaler customers and prospects

Watch this webcast to know what type of employee behavior leads to risky situations and its impact on your organization’s cybersecurity. This will also cover the most effective ways to protect your employees.

Cyber Security is Now a Boardroom Agenda

KEYNOTE SPEAKER: Kevin Peterson, CISSP, Director, Security & Network Transformation, Zscaler

TARGET AUDIENCE: Zscaler customers and prospects

Join this webcast to know the cyber security priorities being discussed at the boardroom level. This will also cover how to effectively engage with your peers in the boardroom, reviewing key metrics and aligning strategy with business priorities.

Stopping Zero-day Threats

KEYNOTE SPEAKER: Haggai Polak, Senior Director Product Management, Zscaler

TARGET AUDIENCE: Zscaler customers and prospects

Zero-day exploit leaves NO opportunity for detection. This webcast doesn't only provide critical insights combating zero-day threats, but will also showcase a comprehensive approach in stopping them.

You’ve Been Hacked – Do You Even Know It?

KEYNOTE SPEAKER: Steve House, Vice President Product Management, Zscaler

TARGET AUDIENCE: Zscaler customers and prospects

This webcast showcases some of the subtle tell-tale signs highlighting that a security breach has occurred. It will also provide insights into the mindset of today’s cyber criminals, and tools and processes needed to identify and mitigate advanced threats.

Outsmarting Hackers: Why you need a full spectrum defense

KEYNOTE SPEAKER: Patrick Foxhoven, CIO and VP of Emerging Technologies, Zscaler

TARGET AUDIENCE: Zscaler customers and prospects

Traditional threat detection and defense strategies aren't enough to protect you from advanced threats. This webcast will highlight the Innovative techniques hackers are using in today's threat landscape, and the best practices approach to defending against multi-stage attacks

RANSOMWARE: your money or your data

KEYNOTE SPEAKER: Bil Harmer, Strategist, Office of the CISO, Zscaler

TARGET AUDIENCE: Zscaler customers and prospects

Listen to this webcast to know how ransomware can impact your business and the reason of legacy security solutions’ inadequacy against such threats.

How secure are you?

Insights from 30 billion Internet transactions a day

KEYNOTE SPEAKER: Dr. Amit Sinha, Executive VP of Engineering and Cloud Operations, Zscaler

GUEST SPEAKER: Andy Kennedy, Sales Engineering Manager, Zscaler

TARGET AUDIENCE: Zscaler customers and prospects

Zscaler's security research team regularly ploughs through a treasure trove of transaction data applying machine learning for deeper insights. In this webcast, we'll look at the aggregated data through several lenses to explore topics like traffic patterns in various geographies, types of malware and threats that target specific vertical industries and risks associated with specific applications.

RANSOMWARE: your money or your life data

KEYNOTE SPEAKER: Bil Harmer, Strategist, Office of the CISO, Zscaler

TARGET AUDIENCE: Zscaler customers and prospects

Listen to this webcast to know how ransomware can impact your business and the reason of legacy security solutions’ inadequacy against such threats.

2017 Asia Pacific Security Trends: What every CIO or CISO should know

KEYNOTE SPEAKER: Charles Lim, Industry Principal, Cyber Security, Frost and Sullivan

GUEST SPEAKER: Michael Sutton, CISO , Zscaler, Inc

TARGET AUDIENCE: Zscaler customers and prospects

Join this webcast to find out what every CIO or CISO should know about the Security trends in 2017. This will also cover Insights from recent report by Frost & Sullivan and impact of digital transformation on your organization.

Are you Prepared for the Cloud Tsunami?

KEYNOTE SPEAKER: Punit Minocha, Vice President Business Development and Mobile Solutions, Zscaler

GUEST SPEAKER: Kamal Shah, Senior Vice President Products and Marketing, Skyhigh Networks

TARGET AUDIENCE: Zscaler customers and prospects

This webcast will cover how to transition from costly traditional appliances to rapidly deploying cloud-based solutions and eliminate risky shadow cloud services. It will also touch base on how to re-architect network infrastructure to ensure optimal user experience for Office 365.

Cloud Security for SD-WAN: Best Practices for Branch Office Transformation

KEYNOTE SPEAKER: Steve House, Vice President Product Management, Zscaler

GUEST SPEAKER: Ramesh Prabagaran, Vice President Product Management & Partnerships, Viptela, Inc.

TARGET AUDIENCE: Zscaler customers and prospects

This webcast will cover common use case scenarios from Viptela and Zscaler of their widely adopted solution. It will touch base on how to rapidly deploy secure, 100% cloud-based and easy-to-manage SD-WAN.

Ransomware – Protect or Pay

KEYNOTE SPEAKER: Patrick Foxhoven, CIO and VP of Emerging Technologies, Zscaler

TARGET AUDIENCE: Zscaler customers and prospects

Listen to this webcast to know how ransomware has evolved and how it can be mitigated. The webcast will also cover lessons learnt from the recent ransomware attacks.

Breach Prevention: Hunting for Signs of Compromise(2015)

KEYNOTE SPEAKER: Dr. Amit Sinha, Executive VP of Engineering and Cloud Operations, Zscaler

TARGET AUDIENCE: Zscaler customers and prospects

Join this webcast to know the best practices for hunting and detecting signs of a compromise, also get Insights into the mindset of today’s cyber criminal.

Zscaler vs FireEye - Insights from the experts at Miercom Labs

GUEST SPEAKER: Robert Smithers, CEO, Miercom

GUEST SPEAKER: Alan Shimel, Managing Partner, The CISO Group

TARGET AUDIENCE: Zscaler customers and prospects

This very interesting webcast that will discuss the detailed results of head to head testing between Zscaler and FireEye, including a review of the current APT protection landscape and best practices for combating APTs.

Best practices securing Internet access in a global hybrid network

GUEST SPEAKER: Eliot Leibowitz, Head of Security Practice, Orange Business Services

GUEST SPEAKER: John Isch, Director of Network & Voice Practice, Orange Business Services

TARGET AUDIENCE: Zscaler customers and prospects

In this webcast, we will discuss topics such as why enterprises are moving to a cloud first security strategy, and how you can minimize backhauling Internet traffic and reduce latency.

Olympics left a trail of massive cyber attacks

KEYNOTE SPEAKER: Dr. Amit Sinha, Executive Vice President, Engineering and Cloud Operations, Zscaler

GUEST SPEAKER: Michael Spotts, General Manager, Cyber Development & Operations, BT Americas

TARGET AUDIENCE: Zscaler customers and prospects

This webcast will discuss gold, silver and bronze attack methodologies — targeting unsuspecting employees of organisations & what they need to know to stay safe.

The next generation CISO - combatting the new security landscape

KEYNOTE SPEAKER: Michael Sutton, CISO, Zscaler

TARGET AUDIENCE: Zscaler customers and prospects

The next generation CISO is expected to provide meaningful and actionable security intelligence to board members. This webcast highlights emerging trends in cyber-security that CISO’s need to be aware of and key qualities they need to succeed in today's cyber-threat environment.

Myths of Cloud Security Debunked!

KEYNOTE SPEAKER: Patrick Foxhoven, VP & CTO of Emerging Technologies, Zscaler

TARGET AUDIENCE: Zscaler customers and prospects

This webcast will address the myths of cloud security like difficulty in management ,the perceived loss of control over the security architecture etc

Internet security best practices from the Global 1000

KEYNOTE SPEAKER: Craig Hicks-Frazer, Worldwide Vice President Service Providers, Zscaler

GUEST SPEAKER: Jason Cook, Vice President of Security and CISO, BT Americas

TARGET AUDIENCE: Zscaler customers and prospects

In this webcast security experts from Zscaler and BT Americas come together to discuss topics like the latest strategies and techniques cyber-criminals are using today and the concrete steps an organisation can take to keep itself safe.

What Forrester Analyst has to say about shifting to SaaS Web Content Security

KEYNOTE SPEAKER: Daniel Druker, Zscaler

GUEST SPEAKER: Rick Holland, Senior Analyst, Forrester Research, Inc

TARGET AUDIENCE: Zscaler customers and prospects

Join this webcast that discusses how to address the disruption of your digital business by cloud and key recommendations when selecting SaaS Web Security partners

Cyber Security is now a Boardroom Agenda (2015)

KEYNOTE SPEAKER: Kevin Peterson, CISSP, Director, Security & Network Transformation, Zscaler

GUEST SPEAKER: Mark Stafford, Senior Cyber Consultant, BT Security

TARGET AUDIENCE: Zscaler customers and prospects

With the high stakes involved in Cyber security lapses, it has now become a corporate risk issue. In this webcast we will address the cyber security priorities being discussed at the boardroom level including topics like securely leveraging key technologies such as cloud, mobile and analytics.

Lessons learned from the biggest security breaches

GUEST SPEAKER: John Kindervag, VP and Principal Analyst, Forrester Research, Inc.

GUEST SPEAKER: Heidi Shey, Analyst, Security Research, Forrester Research, Inc.

TARGET AUDIENCE: Zscaler customers and prospects

With the risk of a security breach higher than ever, now no organization is immune to a breach and human error continues to play a primary role. In this webcast we highlight the key trends common to high profile security breaches and best practices to reduce them.

Early warning signs for advanced persistent threats

KEYNOTE SPEAKER: Michael Sutton, VP, Security Research, Zscaler

TARGET AUDIENCE: Zscaler customers and prospects

This webcast addresses issues like why most of the targeted attacks aren't uncovered by the victim enterprise and the tools and processes needed to identify and mitigate such threats before any real damage is done.

State-of-the-Hack: The Top 10 Security Predictions for 2016

KEYNOTE SPEAKER: Michael Sutton, CISO, Zscaler

TARGET AUDIENCE: Zscaler customers and prospects

Join this webcast to know the top 10 security predictions for 20166 and how these key trends will impact your organization.

Do you know where your next cyber security threat is likely to come from?

KEYNOTE SPEAKER: Patrick Foxhoven, VP and CTO of Emerging Technologies, Zscaler

TARGET AUDIENCE: Zscaler customers and prospects

The biggest threat to an organization's cyber security isn't malware, phishing scams or even hackers - but its employees. This webcast will address how to protect your employees against your next cyber security threat and will also showcase how to tackle key causes for major security attacks.

Are there gaps in your next generation firewall?

KEYNOTE SPEAKER: Michael Osterman, Principal, Osterman Research

KEYNOTE SPEAKER: Dan Maier, Senior Director, Product Marketing, Zscaler

TARGET AUDIENCE: Zscaler customers and prospects

This webcast discusses some of the key findings and best practices for adopting and migrating to cloud-based next generation firewalls.

The Internet of Things (IoT): Critical risks for all enterprises

KEYNOTE SPEAKER: Patrick Foxhoven, VP and CTO of Emerging Technologies, Zscaler

GUEST SPEAKER: Frank Gillett, Vice President, Principal Analyst, Forrester Research, Inc.

TARGET AUDIENCE: Zscaler customers and prospects

In this webcast security experts from Zscaler and Forrester come together to talk about the latest security insights for combating IoT risks. They will also cover key trends driving IoT and the vulnerabilities that organisations need to be aware of.

Why Cyber Monday attacks cost up to $3.4M per hour in losses

KEYNOTE SPEAKER: Patrick Foxhoven, VP and CTO of Emerging Technologies, Zscaler

TARGET AUDIENCE: Zscaler customers and prospects

Join this webcast to know 5 key ways cyber criminals will target your employees and infiltrate your organization this holiday season and also understand the guidelines and best practices to stay safe.

Listen to the drip, drip, drip of data leakage

KEYNOTE SPEAKER: Denzil Wessels, Director of Product Management, Zscaler

TARGET AUDIENCE: Zscaler customers and prospects

Join this webcast that will highlight critical insights protecting data leakage and intellectual property. It will also cover how a data leak can affect your business.

Insights from the 2015 Gartner Magic Quadrant for Secure Web Gateways

KEYNOTE SPEAKER: Michael Sutton, Chief Information Security Officer, Zscaler

TARGET AUDIENCE: Zscaler customers and prospects

Join this compelling webcast that provides deep insights into Gartner's predictions relevant for CISOs and CIO's, it also addresses topics like the new competitive landscape and success criteria for the highest ranking companies in the Magic Quadrant.

Preparing for 2015: Internet security best practices from the Global 1000

KEYNOTE SPEAKER: Daniel Druker, Zscaler

TARGET AUDIENCE: Zscaler customers and prospects

In this webcast we will share actionable best practices gleaned from more than 5,000 leading global organizations and the latest security insights we have mined from more than one trillion Internet transactions.

Adopting Cloud Apps via a Secure Hybrid Network

KEYNOTE SPEAKER: Dan Maier, Senior Director Product Marketing, Zscaler

GUEST SPEAKER: Joe Tomasello, Director of Product Management, Riverbed

TARGET AUDIENCE: Zscaler customers and prospects

In this webcast Zscaler and River bed product experts come together to discuss how a hybrid network approach works and the best practices in adopting a “direct-to-cloud” approach.

Even The Big Guys Get Hacked

KEYNOTE SPEAKER: Michael Sutton, VP Security Research, Zscaler

TARGET AUDIENCE: Zscaler customers and prospects

The key to combating advanced persistent threats is having real-time visibility and intelligent insight into your corporate infrastructure. This webcast will discuss the latest challenges, trends and critical requirements to combat advanced cyber threats.

Your cloud-based applications can be a million dollar liability waiting to happen

KEYNOTE SPEAKER: Patrick Foxhoven, VP and CTO of Emerging Technologies, Zscaler

TARGET AUDIENCE: Zscaler customers and prospects

Join this compelling webcast that will provide a deep dive into the key trends impacting enterprise cloud application security and will also offer concrete steps to keep your business safe.

Lessons learned from the biggest security breaches in 2014

GUEST SPEAKER: John Kindervag, VP and Principal Analyst, Forrester Research, Inc.

GUEST SPEAKER: Michael Sutton, VP Security Research, Zscaler

TARGET AUDIENCE: Zscaler customers and prospects

This webcast addresses topics like key trends common to security breaches and best practices of 'Protect, Detect & Remediate' to reduce the risk of a security breach.

Are your corporate secrets in Dropbox or other cloud-based applications?

KEYNOTE SPEAKER: Roberto Paschetta, Sr. Director, Sales Engineering & Technical Training, Zscaler

TARGET AUDIENCE: Zscaler customers and prospects

This webcast will throw light on noteworthy points like how to determine if your corporate secrets are in any cloud-based applications and how to ensure your IT department has complete visibility and control over these applications.

Is your security infrastructure ready for the 2014 FIFA World Cup?

KEYNOTE SPEAKER: Patrick Foxhoven, VP and CTO of Emerging Technologies, Zscaler

TARGET AUDIENCE: Zscaler customers and prospects

High profile events always attract security attacks and is an opportune time for cyber criminals to pursue unassuming employees. This webcast will highlight the priorities needed to address cyber security attacks and breaches from risky employee behaviour during major events and how to ensure your network bandwidth copes well with the increased internet traffic.

Real Clouds, Fake Clouds And Appliances

KEYNOTE SPEAKER: Patrick Foxhoven, VP and CTO of Emerging Technologies, Zscaler

TARGET AUDIENCE: Zscaler customers and prospects

This webinar will bust the myths, expose the facts and fiction, comparing authentic 100% cloud security solution, with "fake" security clouds and hardware appliances.It will focus on key pain points like security, cloud design ,user experience etc

Are Your Appliance-Based Security Solutions Ready for 2048-bit SSL Certificates?

GUEST SPEAKER: Dr. Amit Sinha, Executive VP of Engineering and Cloud Operations, Zscaler

TARGET AUDIENCE: Zscaler customers and prospects

This webcast will discuss the topics like implications of upgrading to SSL certificates with 2048-bit keys with appliance-based security , how Zscaler seamlessly upgraded its entire cloud SSL infrastructure with ease etc.

Recorded Webcasts

No matches found.
Please adjust your filters and try again.

< PREVIOUS

1

2

3

4

5

1

NEXT >