Thought leadership webcasts and live demos

Zscaler webcasts and demos provide insight into the most topical issues around the threat landscape, cloud‑based security and access, and business transformation. Join a live webcast or a demo to ask questions directly to experts, or watch a previously recorded webcast any time. Either way, it’s free.

Upcoming webcasts

Transform the way you find and stop Advanced Threats

Why you need an integrated cloud sandbox

DATE: Thursday, August 31st, 2017 | Americas - 08:30 am PDT (16:30 pm UK, 17:30 pm CET)

KEYNOTE SPEAKER: Jozef Krakora, Principal Product Manager, Zscaler, Inc.

KEYNOTE SPEAKER: Steve Grossenbacher, Sr Product Marketing, Manager Zscaler, Inc.

Today's advanced threats use techniques that often make them invisible to traditional appliance based security approaches. With SSL on the rise, malicious web content, and all around infection creativity, hackers and advanced threats have more than enough places to hide. Stopping these complex attacks takes a completely integrated sandbox that delivers full threat visibility across all users, no matter where they connect from.

Recently recorded webcasts

How to use bandwidth control to prioritize business-critical apps over YouTube

KEYNOTE SPEAKER: Jen Toscano, Sr. Product Marketing Manager, Zscaler, Inc.

GUEST SPEAKER: Chandan Agarwal, Product Manager, Zscaler, Inc.

What does your bandwidth traffic look like? What apps and services do you have accessing the Internet? How do you ensure that your network is optimized for business productivity? With more traffic bound for the Internet, it is essential that business apps, like Office 365, are prioritized over YouTube, live-streaming sporting events, and even over non-critical business traffic.

Please join Jen Toscano, Sr. Product Marketing Manager, and Chandan Agarwal, Product Manager, as they discuss how Zscaler Bandwidth Control enables you to manage, control, and allocate bandwidth to ensure that business-critical applications take priority over other traffic.


Tick-tock! Using cloud security to accelerate M&A integration

KEYNOTE SPEAKER: Denzil Wessels, Senior Director, Product Management, Zscaler, Inc.

While mergers & acquisitions drive growth for companies, they present a significant challenge for the IT team who must bring two disparate companies' systems together in a rapid, secure and reliable way.


What Comes After VPN?

Enabling Application Access With Zscaler

KEYNOTE SPEAKER: Lisa Lorenzin, Director Emerging Technology Solutions, Zscaler, Inc.

No More M&Ms: transitioning from legacy VPN to modern SDP with Zscaler Private Access

Many IT teams used an “M&M” approach to design network security: create a hard shell or perimeter around the soft interior. For remote users, traditional L3 VPNs extend that perimeter, placing remote users' endpoints directly onto the enterprise network. This puts the enterprise's network and data at risk from a range of threats - compromised credentials can lead to unintended exposure, as attackers move laterally throughout the network environment.


The evolving CIO|CISO relationship

KEYNOTE SPEAKER: Larry Biagini, Chief Technology Evangelist, Zscaler, Inc.

HOST: Jason Georgi, Head of the Value Management Office, Zscaler, Inc.

As businesses mandates more innovation from IT, the role of the CIO and CTO become more critical while, in many cases, the CISO becomes an after-thought or a checkbox on key initiatives.

Join Larry Biagini, former CTO of GE and now Chief Technology Evangelist with Zscaler, for a webcast that digs into relationships and technologies that drive IT innovation and business outcomes.


Breakout with SD-WAN without Compromising Security

KEYNOTE SPEAKER: Dhawal Sharma, Director Product Management, Zscaler, Inc.

Companies are selecting SD-WAN as a way to enhance or replace traditional branch routers in order to support low-latency applications, including VoIP calling, video-conferencing, streaming media, and SaaS or cloud-hosted applications, over greater distances. In fact, Gartner has predicted that, by the end of 2019, 30% of enterprises will deploy SD-WAN technology in their branches.

SD-WAN is a proven and cost-effective approach to establish local Internet breakouts, but they create security challenges, particularly as IT organizations feel they have no other choice than to make additional hardware and software investments to support each branch or remote office.

Please join Dhawal Sharma, Director of Product Management at Zscaler, as he explains why the cloud is the answer when it comes to delivering the the most efficient and secure local Internet breakouts.


Petya ransomware?

What you need to know

KEYNOTE SPEAKER: Bil Harmer, Office of the CISO, Zscaler, Inc.

KEYNOTE SPEAKER: Deepen Desai, Senior Director, Security Research, Zscaler, Inc.

As many companies sought to regain their footing after last month’s devastating WannaCry attack, we saw another ransomware attack yesterday, which impacted businesses in more than 65 countries.


Why your next gen branch firewall should be a cloud firewall

GUEST SPEAKER: Dr. Sri Subramanian, Sr. Director, Product Management, Zscaler, Inc.

HOST: Jen Toscano, Sr. Product Marketing Manager, Zscaler, Inc.

You want to create a fast and secure experience for your branch users. Cloud applications, like Office 365, are being rapidly adopted and are designed to be accessed directly via the Internet. To securely embrace cloud apps and services and deliver a fast user experience, Internet traffic needs to be routed locally. But how can you establish secure direct Internet connections without backhauling and without without duplicating stacks of security appliances at each branch?

Please join Dr. Sri Subramanian, Sr. Director of Product Management and Jen Toscano, Sr. Product Marketing Manager as they discuss how Zscaler Cloud Firewall enables fast and secure local Internet breakouts, and delivers next generation firewall capabilities, including security and access controls for Internet traffic on all ports, and security that follows the user to provide identical protection no matter where they connect.


What Comes After VPN?

In the direct-to-Internet world, the old approach to secure access won't work

KEYNOTE SPEAKER: Denzil Wessels, Senior Director Product Management, Zscaler, Inc.

Virtual Private Networks, the de facto standard for employee and third-party access to internal applications, were designed almost twenty years ago to make users feel as if they were on the corporate network.Unfortunately, the VPN process creates a terrible user experience, regardless of whether applications are on a public cloud (Azure, AWS) or in the corporate data center. IT is forced to resort to “unnatural acts of networking” to segment and secure valuable assets, creating a cumbersome solution that no one would choose if they were building it from scratch.The problem is that no one has built a viable alternative to the VPN… Until now. Zscaler Private Access is what comes next in the world of secure access to internal applications.


Private application access in a Post-Trust world

KEYNOTE SPEAKER: Jeff Pollard, Principal Analyst serving Security & Risk Professionals, Forrester Research, Inc.

GUEST SPEAKER: Lisa Lorenzin, Director, Emerging Technology Solutions, Zscaler, Inc.

Forrester's Zero Trust Model requires a simple but profound change in the way we think about information security. In Zero Trust, all network traffic is inherently untrusted. In this webcast our keynote speakers from Forrester and Zscaler will explain how IT teams must evolve their approach to security based on new network models and data flows. We will also share details from Forrester's Security and Risk playbook and the necessary shift in investments to support application access transformation. We will conclude this webcast by discussing recent innovations in the Zscaler cloud security platform which support the Zero Trust Model.


Advanced Threat Hunting

Finding a Needle in a stack of Needles

KEYNOTE SPEAKER: Jozef Krakora, Principal Product Manager, Zscaler, Inc.

KEYNOTE SPEAKER: Steve Grossenbacher, Sr Product Marketing Manager, Zscaler, Inc.

Do you have what it takes to find today’s Advanced Persistent Threats? Current cyberattacks employ a range of techniques that often make them invisible to traditional security controls. With SSL threats on the rise, and hackers getting more and more creative on how they deliver threats, advanced threats can easily hide in plain sight. Finding and stopping these complex attacks takes a complete platform approach. Attend this webcast to discuss the latest attack trends, and best practices you can employ to bolster your security.