Thought leadership webcasts and live demos
Zscaler webcasts and demos provide insight into the most topical issues around the threat landscape, cloud‑based security and access, and business transformation. Join a live webcast or a demo to ask questions directly to experts, or watch a previously recorded webcast any time. Either way, it’s free.
Is the Next-Gen Firewall/IPS Dead?
DATE: Tuesday, July 24th, 2018 | Americas - 10:00 am PDT (18:00 pm UK, 19:00 pm CET)
KEYNOTE SPEAKER: Naresh Kumar, Principal Product Manager, Zscaler, Inc.
With the cloud and mobility changing the concept of perimeter security, the next-generation firewall and access controls must also change. The NGFW—now more than a decade old—is dying. In this webcast we’ll explore the challenges of NGFW in a cloud world, and how to replace it and deliver efficient security and access controls for your branch and remote offices.
Recently recorded webcasts
Top 5 Mistakes to Avoid when Deploying Office 365
KEYNOTE SPEAKER: Steve House, VP of Product Management, Zscaler, Inc.
Ready to deploy Office 365? Seems like an easy task? Think again. Microsoft Office 365 was designed to be accessed directly via the Internet, and most companies just don’t have the proper network setup. It’s no surprise, then, that deploying Office 365 without proper guidance can lead mistakes.
Moving from Appliances to Cloud Security with Phoenix Children's Hospital
KEYNOTE SPEAKER: Steve Grossenbacher, Sr. Product Marketing Manager, Zscaler
GUEST SPEAKER: Daniel Shuler CISO, Director IT Security, Phoenix Children’s Hospital
Applying consistent security controls across remote workforce is a challenge most companies struggle with. In addition, the demands of inspecting SSL traffic and the performance limitations of security appliances are causing real problems for IT organizations. Join this webcast to hear firsthand how Phoenix Children's Hospital was able to overcome these common IT challenges. You’ll also gain valuable insights from a Zscaler customer on the IT transformation journey, and perspectives on what it takes to make your network and security cloud ready.
Faster, Simpler, More Secure Remote Access to Apps in AWS
Improve user experience and simplify your move to AWS
KEYNOTE SPEAKER: Patrick Foxhoven, CIO and VP Emerging Technologies, Zscaler, Inc.
KEYNOTE SPEAKER: Sam Hennessey, Senior Solutions Architect, Amazon Web Services
Although 60% of enterprises now run apps on AWS, the user experience for remote users is typically slow as most traffic is still tunneled through their data center breaking the cloud experience. A secure direct-to-cloud remote access experience without a VPN enables enterprises to migrate their legacy apps to AWS by delivering fast app access and policy-based security.
Accelerate the Migration to Microsoft Azure with Zscaler Private Access
Your apps are moving to Azure. Don’t let network security get in the way
KEYNOTE SPEAKER: Lisa Lorenzin, Director of Emerging Technology Solutions, Zscaler, Inc.
GUEST SPEAKER: Sean Dastouri Senior Cloud Architect Microsoft Azure,
Many companies still try to rely on the network-centric methods of the old world (i.e remote access VPN), when apps ran only in the datacenter, to provide user-to-app connectivity. They're now recognizing that the complexity of appliances and the need to manage ACLs and FW policies will actually slow the move to Azure dramatically. It's time for a new approach. One built for the new world.
How Zscaler enables simpler Office 365 deployment and a fast user experience
KEYNOTE SPEAKER: Naresh Kumar, Principal Product Manager, Zscaler, Inc.
Most companies don’t realize that Microsoft Office 365 was designed to be accessed directly via the internet. It’s no surprise, then, that deploying Office 365 without proper guidance can lead to delayed deployments and a terrible user experience. Attend this webcast to explore Microsoft’s latest connectivity guidance for deploying Office 365 and find out how Zscaler can make your Office 365 initiative a success.
Don’t let SSL be a security blindspot
Understand the stealthy threats targeting your users
KEYNOTE SPEAKER: Deepan Desai, Vice President, Security Research, Zscaler ThreatLabZ
IT is faced with a major compromise when it comes to inspecting encrypted traffic, because most organizations don’t have the budget to fully inspect it. Yet hackers are getting more creative in how they deliver malware over SSL/TLS, adding to inspection challenges. Attend this webcast to discuss the latest attack trends, and best practices you can employ to bolster your security and protect your users.
Solving the Secure SD-WAN Paradox
KEYNOTE SPEAKER: Dr. Jim Metzler, Principal Analyst at Ashton, Metzler & Associates
KEYNOTE SPEAKER: Dhawal Sharma, Sr. Director of Product Management at Zscaler
KEYNOTE SPEAKER: Tony Banuelos, Product Line Manager at VeloCloud, now part of VMware
Join this webcast as we discuss the ways organizations can improve their security posture while taking advantage of the benefits offered by SD-WAN and embracing the advantages of cloud-enabling technologies. Case studies and deployment best practices of implementing a secure SD-WAN solution will be shared.
The secure, direct-to-internet branch
KEYNOTE SPEAKER: Zeus Kerravala, Founder and Principal Analyst, ZK Research
KEYNOTE SPEAKER: Bill Lap, Vice President of Customer Success, Zscaler, Inc.
Digital transformation is driving the evolution of branch IT and security architectures to take advantage of cloud services. In this webcast, we’ll be joined by Zeus Kerravala, Founder and Principal Analyst, ZK Research, to explore the best ways to address the challenges of complexity and security in the branch, and provide a scalable architecture for the adoption of SaaS and cloud services.
Adopting A Zero-Trust Model. Google Did It, Can You?
Change from old-world network-centric, to new-world user- and app-centric
KEYNOTE SPEAKER: Ameet Jani, Product Manager, Google, LLC.
KEYNOTE SPEAKER: Manoj Apte, Chief Stratagy officer, Zscaler, Inc.
Based on 6 years of creating zero trust networks at Google, the BeyondCorp framework has led to the popularization of a new network security model within enterprises, called the software-defined perimeter. It takes a fundamentally different approach to providing secure access to applications, doing away with the need for traditional perimeter-based network security like solutions like VPNs.
So what does this mean for enterprises not named Google, and how can they can adopt a similar security approach within their organization?
Top reasons Office 365 deployments fail
Pilots may go well, but rollouts can be a different story
KEYNOTE SPEAKER: Steve House, Vice President, Product Management, Zscaler, Inc.
Microsoft Office 365 is unlike any other SaaS application and, even with careful planning, it’s fair to say that deployments don’t always go as planned. Office 365 was designed to be accessed directly via the internet, and most companies just don’t have the proper network setup. It’s no surprise, then, that deploying Office 365 without the right planning and guidance can lead to network problems and a poor user experience.
In this webcast, we’ll explore Microsoft’s current connectivity guidance for optimizing Office 365 in your network. You’ll hear how to remove common deployment hurdles, what network changes you need to make, and how you can guarantee a fast user experience.