challenges

Deploying a zero trust architecture and positioning the organization for future success while providing a great user experience

results

Enables deployment of effective zero trust architecture in phases

Delivers stable, secure, scalable connectivity for users anywhere

Provides a cost-effective replacement for legacy VPN

Streamlines and accelerates M&A IT processes

Cox Automotive snapshot

Cox Automotive makes buying, selling, owning, and using vehicles easier for everyone. The global company’s 30,000+ team members are passionate about helping millions of car shoppers, 40,000 auto dealer clients across five continents, and many others throughout the automotive industry.

Industry:

Retail and Wholesale

HQ:

Atlanta, Georgia, USA

Size:

30,000 employees in United States

Once the agents are installed on everyone’s devices, it will be easy to integrate other Zscaler capabilities into our architecture. It will be just a matter of flipping the “on” switch.

Jon Mahes

, Sr. Manager, Cybersecurity, Cox Automotive

Customer Case Study

Saving time and delighting users when deploying zero trust

Adapted from a blog post by Jon Mahes, Sr. Manager of Cybersecurity at Cox Automotive.

As a former site reliability engineer, it’s really important to me to provide a great user experience when deploying new technology. In my opinion, you have only one shot to get it right with a user, and if you blow it, that will reflect poorly on technical teams when leadership asks them how they like the new changes. That’s not a good look for those of us who manage change, and honestly, it’s something that can be avoided if done properly. I’d like to share some insights I’ve gleaned during our deployment of Zscaler at Cox Automotive.

Realize that zero trust is not turnkey

The first thing to realize is that getting to zero trust is a journey—it’s not a turnkey solution. You need to have all the right pieces in place before you start. Think about it as a sequence of operations. You want to have the right building blocks in place. First off, an identity management platform such as Azure ID or Okta is a must. A device management platform such as Microsoft Intune or Apple Jamf is also required.

Once you have these building blocks, you can embark on your zero trust journey. I recommend starting small to get your feet wet. Begin with multiple pilots of each technology before you dive into a full-scale deployment.

Once you have enough users on your zero trust platform, then you can start getting the security operations center (SOC) team involved. They will start to see how they can start triaging and looking at events that can be operationalized within cybersecurity. Get the events flowing into a security information and event management (SIEM) tool and have the security incident response team do some testing in a sandbox environment.

At Cox Automotive, we are deploying in phases. We plan to get a Zscaler Internet Access (ZIA) client installed on everyone’s machines and then move on to a VPN migration project to deploy Zscaler Private Access (ZPA). From there, once the agents are installed on everyone’s devices, it will be easy to integrate other Zscaler capabilities into our architecture. It will be just a matter of flipping the “on” switch.

Prioritize communication

The last thing you want is to start breaking things or giving users a poor experience. Make sure you continuously monitor to verify that the technology is working optimally. Survey users to ensure the right settings are turned on for everyone.

It’s also important to communicate why you’re doing what you’re doing with all the new solutions and integrations. Develop communication plans and roadshows to introduce the technology to users, and explain the value they’ll get. We say to our users: “You’ll get improved connectivity and stability with your connection, plus greater security.”

Keep in mind the end goal, which, here at Cox Automotive, is to reach a point where we can say that any user is allowed to connect to our network and we don’t have to worry about what’s on their device or who they are. We’ll figure out what they need based on identity.

Quote

We plan to get a [ZIA] client installed on everyone’s machines and then move on to a VPN migration project to deploy [ZPA].

Jon Mahes, Sr. Manager, Cybersecurity, Cox Automotive

Create profiles to save yourself time

Our organization is actively involved in mergers and acquisitions (M&As), and as a result, we have many different types of users. Going into an M&A, a lot of upfront discovery and conversations need to happen before we can deploy successfully to new users.

When starting a new deployment, it’s important to really know your team members. Analyze their profiles. Figure out what they’re accessing, and narrow down their access to only what is required. Otherwise, you’ll be over-provisioning blanket access and creating a lot of work that will have to be cleaned up later on—not to mention unnecessarily expanding the potential attack surface.

For example, we’ve created a special profile for mobile hotspot users. It’s important to ensure you’re deploying a tunnel profile for them to avoid problems. If you have developers, create separate Secure Sockets Layer (SSL) inspection policies for them, because SSL inspection is not for everyone. Come up with a corporate standard that all developers and users have to adhere to around SSL certificates. This will save a lot of time.

Quote

[The end goal is] that any user is allowed to connect to our network and we don’t have to worry about what’s on their device or who they are.

Jon Mahes, Sr. Manager, Cybersecurity, Cox Automotive

Document issues and empower people to help themselves

Another big time saver is creating an internal wiki to document issues that arise during the rollout. This will cut down on repeated service tickets, because often a user can read the wiki and solve the problem on their own. Along these same lines, I recommend creating a chat channel in Microsoft Teams or Slack where team members can quickly find support from each other if they get stuck.

For our development teams, we created a package of do-it-yourself instructions and let them deploy the technology themselves. We also created processes in ServiceNow where users can request applications.

Fine-tuning multiple technology integrations is always a work in progress. But, with the right processes in place, it can go a lot smoother. You want to put Zscaler first on the integration timeline because that opens the doors for a lot of access that can move things a lot quicker. Our goal for [2023] is to get ZIA out to 30,000 US employees. With that many people to onboard, the total number of hours saved by having great documentation and user profiles, two-way communication will be truly significant. I hope these processes help you too!

Quote

Put Zscaler first on the integration timeline because that opens the doors for a lot of access that can move things a lot quicker.

Jon Mahes, Sr. Manager, Cybersecurity, Cox Automotive

More from this customer

Cox Automotive drives zero trust transformation with Zscaler
Read the Blog

Solutions

Zero Trust App Access
Zero Trust Cloud Connectivity
Optimize Digital Experiences
Accelerate M&A Integration
VPN Alternative