In the News

Read what the experts are saying about Zscaler

Attackers using Neutrino exploit kit to exploit WordPress, warns vendor

The warning comes from security vendor Zscaler, which noted on Thursday that in the past few days it has seen a “massive uptick” in the use of the Neutrino Exploit Kit, which last month reportedly included a zero day exploit discovered by the Hacking Team breach. “The cause for this uptick appears due to widespread WordPress site compromises,” Zscaler researchers have concluded.
August 21, 2015

WordPress Compromises Behind Spike in Neutrino EK Traffic

In a report published yesterday, Zscaler said it spotted attacks against sites running older versions of the content management system, 4.2 and earlier. Those sites are backdoored and redirect a victim’s browser through iframes to a landing page hosting the exploit kit where a Flash exploit awaits.
August 21, 2015

WordPress sites redirect to Neutrino EK, CryptoWall pushed via Flash exploit

Zscaler has identified a campaign involving compromised WordPress websites redirecting visitors to the Neutrino Exploit Kit, which then serves up CryptoWall 3.0 ransomware by means of a recently patched Adobe Flash Player vulnerability.
August 21, 2015

Thousands of Hacked WordPress Sites Abused in Neutrino EK Attacks

According to Zscaler, cybercriminals have compromised more than 2,600 WordPress websites over the past month. The hackers planted malicious iframes on 4,200 distinct pages of websites running vulnerable versions of WordPress 4.2 and prior. These iframes redirect users to Neutrino exploit kit landing pages.
August 21, 2015

What Ashley Madison tells us about corporate security

In a business as dependent as Ashley Madison was on unimpeachable security for its continued commercial viability, a technology such ZScaler’s is also needed to monitor the data being accessed by trusted users and prevent unauthorized downloads of sensitive material.
August 20, 2015

The 17 best startups to work for in America

To compile this list, we looked at Glassdoor's ranking of the best small and medium companies to work for in 2015. The Glassdoor ranking is based on the input of employees who provided feedback about their satisfaction with the overall company via Glassdoor's company review survey.
August 20, 2015

Cyber security top CIO concern as Coats re-lists on London Stock Exchange

Cammish says Zscaler has helped the firm manage the growing malware threat witnessed by the company. Last month 250,000,000 interactions with the internet were recorded. Of these, around 600,000 activities or transactions involved malware.
August 19, 2015

Ashley Madison data breach: Security industry responds

“Whether conducting transactions online or at a brick-and-mortar stores, consumers have little choice but to rely on retailers to properly secure their information… There are no bulletproof countermeasures for consumers when it comes to protecting financial data or Personally Identifiable Information (PII).
August 19, 2015

Enterprises are increasingly looking to boost their security posture by tapping cloud-based security services.

Zscaler is the latest "unicorn" to be created out of the cloud-security surge. Unicorns are private, venture-backed companies that reach $1 billion in valuation. Zscaler recently announced it had received $100 million in Series B funding The company has raised a total of $138 million.
August 19, 2015

Panda APT group using Hacking Team flaws

Emissary Panda has also leveraged another Hacking Team Flash Player exploit (CVE-2015-5123) in its operations. Zscaler says the attack was not an isolated incident.
August 19, 2015

China Cybergang Using Hacking Team Exploits Against Financial Firm

According to Zscaler, the group leveraged the CVE-2015-5119 vulnerability to target a major financial services firm. While it has not been named, Zscaler told SecurityWeek that the targeted organization is a multi-national financial services firm with locations across Europe, Middle East and Asia.
August 19, 2015

CYREN: So The Worst Wasn't Over, But Now It Has A Warchest

Then growth should return and the valuation could expand closer to its much more highly valued peers. Its closest competitors, ZScaler and OpenDNS were recently valued over $1 billion and $635 million respectively.
August 19, 2015

Silver Peak Forms Alliance With Nutanix, Infoblox, Zscaler To Expand SD-WAN

The Santa Clara, Calif.-based vendor said partnering with Nutanix, Infoblox and Zscaler will push it ahead of competitors such as Cisco, CloudGenix, VeloCLoud and Viptela.
August 17, 2015

Morning Cybersecurity

Cybersecurity firm Zscaler found a “well-known Chinese cyber espionage group” using zero day exploits exposed to the world by the attack on Hacking Team to penetrate a large, unnamed financial firm. An unknown hacker ransacked Italian intrusion software maker Hacking Team’s internal files in July, posting them online.
August 17, 2015

Zscaler Announces $100 Million Investment Round Led by TPG

"Our mission is to make the Internet safe for business by delivering an amazing security platform that protects our clients and enables the strategic adoption of cloud computing, mobile devices and the Internet of Things," said Jay Chaudhry, CEO of Zscaler.
August 13, 2015

Zscaler announces $100 Million investment led by TPG

Zscaler, Inc., the Internet security company, announced the closing of a new round of financing led by TPG. Zscaler is being funded with an aggregate of $100 million. TPG invested in Zscaler, alongside existing investors EMC and Lightspeed Ventures, who also contributed to the round.
August 13, 2015

Anatomy of a scamware network

Bei der Analyse von Daten aus seiner Cloud-Sandbox hat Zscaler kürzlich ein großes MultiPlug-Netzwerk entdeckt. Aufmerksam geworden ist die Internet Security Company auf das MultiPlug-Netzwerk wegen eines Verhaltensmusters, bei dem Zertifikate mittels Code unterzeichnet werden. Auch die Größe seiner Hosting-Infrastruktur war verdächtig.
August 13, 2015

Startup Zscaler Raises $100M for Cloud Security Technology

Security startups continue to cash in with Zscaler being the latest to join companies like BitSight, Menlo Security and CounterTack on the list of new firms being funded to bolster their respective security strategies.
August 11, 2015

Investors Search for IPO 'Unicorns' Among Cyber-Security Startups

Driven by a seemingly unending parade of breaches, investors looking for the next big score—the rare "unicorn" company that becomes valued at $1 billion or more—are pouring money into security startups and early-stage ventures.
August 11, 2015

Cybersecurity Company Zscaler Finalizes $100M In Funding Led by TPG

Internet security company Zscaler recently announced the finalization of $100M in funding. TPG led the funding round in conjunction with existing investors EMC and Lightspeed Ventures.
August 11, 2015

Billion Dollar Startup Club

The Wall Street Journal and Dow Jones VentureSource are tracking venture-backed private companies valued at $1 billion or more. See how the club has expanded since the project began in January 2014 and select companies to learn more about each.
August 11, 2015

Zscaler raises $100 million

Zscaler Inc, a San Jose-based Internet security start-up, has raised $100 million in a new round of financing, led by private investment firm TPG, with participation from existing investors EMC and Lightspeed Ventures. As part of the new investment, Nehal Raj, partner at TPG, will be appointed to the Zscaler board of directors.
August 10, 2015

The Unicorn List: Private Companies Valued at $1B and Above

TPG Growth, Lightspeed Venture Partners
August 8, 2015

Threat Sheet—Saturday, August 8, 2015

Cybersecurity firm Zscaler raised $100 million in a round led by TPG Growth.
August 8, 2015

Zscaler announces it has raised USD 100 million from TPG

Zscaler, spécialiste de la sécurité sur Internet, a annoncé la fin d’un nouveau round de financement avec TPG. Zscaler a été financé à hauteur de 100 millions de dollars. TPG a investi dans Zscaler aux côtés d’EMC et Lightspeed Ventures, qui ont également participé à ce round de levée de fonds.
August 7, 2015

15 Wackiest Sights And Signs From Black Hat USA 2015

Have you ever felt the need to take a hammer to your networking equipment or firewall? Zscaler gave you the chance at Black Hat to do just that with an enclosed room dedicated to taking out your anger with outdated or underperforming hardware.
August 7, 2015

5 Cloud Computing Funding Stories You Might Have Missed, Aug. 7

Each week Talkin' Cloud compiles a list of cloud computing financing stories for readers who might have missed the news earlier in the week. This week's column features funding news from Tintri, Zscaler, Workfront, Koding and SalesWarp.
August 7, 2015

SaaS security specialist Zscaler closes $100M of financing

Der Security-Anbieter Zscaler hat unter Führung des Investors TPG eine weitere Finanzierungsrunde abgeschlossen. Die Summe von insgesamt 100 Millionen Dollar stammt außer von TPG auch von den ebenfalls bisher bereits aktiven Investoren EMC und Lightspeed Ventures.
August 7, 2015

Zscaler Raises $100M to Grow Internet Security as a Service Platform

Internet security firm Zscaler announced it has raised $100 million to step up global expansion and sales efforts for its platform. The funding round was led by late-stage investor TPG, with existing investors EMC and Lightspeed Ventures contributing.
August 6, 2015

Man-in-the-cloud attacks can compromise enterprise cloud storage

He agreed that it is almost impossible to detect this attack as it is not visible to the user. “Automatic tools like firewalls or even highly sophisticated systems like Zscaler will not be able to detect this attack, because the file sync is normally an ‘allowed' operation and the attacker does not change this. No security system is able to distinguish bad traffic from good,” Edge said.
August 6, 2015

Black Hat USA 2015: Bigger than ever, but still hiring

America's big information security conference comes into its 18th year with standing room only talks and a big-money expo, but still can't hire hackers fast enough to match industry growth.
August 6, 2015

Daily Cloud News Brief - Security Software Startup Zscaler Wins $100M Funding, Now a “Unicorn”

Security software provider Zscaler announced it has closed a funding round worth $100 million and achieved a coveted “unicorn” valuation of over $1 billion. The financing round was led by TPG and included investments from existing investors EMC and Lightspeed Ventures.
August 5, 2015

Wheelings & Dealings: Zscaler Nets $100 Million in New Funding Round

Already considered one of the top security firms in the world, Zscaler has just landed a brand new round of funding that totals around $100 million that was led by TPG Growth.
August 5, 2015

A Unicorn is Born: Zscaler Raises $100M and Snags a $1B Valuation

And right on the heels of CrowdStrike’s announcement comes the latest $100 million round, though this time it is a Series B and going to Zscaler — bringing the firm’s total fundraising to $138 million and its valuation to $1 billion.
August 5, 2015

Zscaler, Latest Cloud Security Unicorn, Raises $100M

Cloud security company Zscaler Inc. is the latest to join the "Unicorn" club -- private venture-backed companies with valuations of $1 billion or better -- with a $100 million raise this week.
August 5, 2015

What Internet Security Company Zscaler Plans To Do With The $100 Million Of Venture Capital They’ve Raised

Cloud based security company Zscaler recently raised over $100 million in a second round of venture capital funding which brings the company to a total of $138 million raised from investors. The most recent round of funding valued the company at $1 billion and was led by TPG Growth.
August 5, 2015

Zscaler CEO Chaudhry: We'll Go Public When Time Is Right

Jay talks to Emily Chang about Zscaler’s $100 million financing round and plans for an IPO.
August 5, 2015

Investment in Zscaler Brings TPG Into Cybersecurity Arena

TPG has backed such prominent software developers as Uber Technologies, Airbnb and Box, and this new investment in Zscaler marks its first stake in a cyber security company.
August 4, 2015

Cloud Security Platform Zscaler Raises $100 Million Series B Funding Round

Cloud security platform is demonstrating the rapid growth possible for companies providing cloud security services, as it announced a $100 million Series B funding round based on a valuation of over $1 billion. The funding round was led by TPG, which was joined by existing investors Lightspeed Ventures and EMC.
August 4, 2015

Security Startup Zscaler Raises $100 Million at $1 Billion Value

TPG led the funding round, which is only Zscaler’s second outside financing effort. The 500-employee security company operates entirely from the cloud and doesn’t require any hardware to protect its customers from malicious viruses or other security threats. Chaudhry, who has founded and worked at multiple startups, has partly financed the company himself, allowing Zscaler to skip many traditional venture capital funding rounds.
August 3, 2015

Cyberthreat investments soar along with attacks

Zscaler is the latest to join the mix. The San Jose, California-based company said Monday that it raised $100 million from TPG along with existing investors EMC and Lightspeed Ventures.
August 3, 2015

Cyber security start-up Zscaler nets $100 million in round led by TPG

Cloud security group Zscaler is joining the ranks of cyber security start-ups raising large sums, as private market investors bet on solutions to help organisations defend against hackers. The California-based company, which provides security-as-a-service, has raised $100m in a round led by TPG, the private equity group, with contributions from existing investors EMC, the storage company, and Lightspeed Ventures. The fundraising was at an undisclosed valuation, but similar-sized rounds are usually valued at above $1bn.
August 3, 2015

Zscaler raises $100 million to pulverize appliances

Jay Chaudhry—the CEO, founder, and chairman of the cloud-based security company Zscaler—has a brashness about him. At the RSA conference earlier this year, a representative of his company obliterated competitors’ electronics on stage with a mallet. (Much to the periodic vexation of the neighboring booths.) One cannot mistake his message.
August 3, 2015

Zscaler Raises $100Mn

Cloud security platform Zscaler has announced a $100 million funding round led by late-stage investor TPG. The investment means that Zscaler is now valued in excess of $1 billion, making it a ‘tech unicorn.’ Silicon Valley-based Zscaler has an eight-year old SaaS platform that has 5,000 customers and more than 13 million end users protected. Top-name customers include United Airlines, Humana, NBC and the National Health Services of the UK. The company has doubled its growth year-over-year and remains cash-flow positive.
August 3, 2015

Zscaler Raises $100 Million to Expand Cloud Security Business

Zscaler is hardly Chaudhry's first success story. Chaudhry founded CipherTrust, an email security firm that was acquired by Secure Computing in a cash and stock deal valued at approximately $274 million in 2006. Secure Computing was ultimately acquired by McAfee. Chaudhry also founded AirDefense, a wireless IDS/IPS vendor that was acquired by Motorola in 2008. Additionally, Chaudhry was the founder of CoreHarbor, an ASP for e-procurement solutions, which was ultimately acquired by USi/AT&T. Back in 1996, Chaudhry started SecureIT, an Internet security services company that was bought out by VeriSign.
August 3, 2015

Zscaler scores $100 million to expand its cloud-based security service

Zscaler Inc. moved $100 million closer to its long-anticipated public offering this morning after announcing the completion of an oversubscribed round led by private equity giant TPG Capital. The investment is the latest sign of the venture capital community’s unprecedented interest in cloud security amid the accelerating migration of corporate data beyond the firewall.
August 3, 2015

Cyber security company Zscaler raises $100 million to join unicorns

Cyber security company Zscaler raised $100 million in funding Monday on a valuation of $1 billion, joining Silicon Valley’s growing unicorn club. The company scans and filters traffic for malware, viruses or advanced persistent threats. Large-scale businesses such as United Airlines, Humana, NBC and National Health Services of the UK make use of Zscaler’s technology. The company claims to secure more than 15 billion Internet requests and stop more than 100 million cyber-threats per day.
August 3, 2015

Cloud Security Platform Zscaler Raises A $100M Series B Round Led By TPG, Now Valued At Over $1B

Security platform Zscaler today announced that it has raised a $100 million Series B funding round led by late stage investor TPG. The company, which offers a wide range of web, mobile and cloud security services for enterprises, has now raised a total of $138 million and says that its valuation in this last round was over $1 billion.
August 3, 2015

Zscaler raises USD 100 mln

Internet security specialist Zscaler has raised USD 100 million in a new round of financing led by an investment fund of TPG. Zscaler said the investment meant it is now valued at over USD 1 billion in total. Zscaler provides an online security platform delivered as a cloud service, with real-time insights into security issues.
August 3, 2015

Security firm Zscaler raises $100 million, led by TPG

Zscaler CEO Jay Chaudhry says he likes to think of his company as the Salesforce of security in terms of how he envisions its growth. He also notes that as a cloud service, it’s easy for his company to appeal to a wide range of companies from small businesses to large enterprises.
August 3, 2015

Wall Street Journal, Deb Gage: Aiming for an IPO, Zscaler raises $100 million to provide security from the cloud

Zscaler Inc., for now, has raised $100 million at a valuation of more than $1 billion. It is the sixth company started by Mr. Chaudhry, who’s founder, chairman and chief executive. All of his previous companies were acquired—one of them, CipherTrust, sold to Secure Computing in 2006 for about $274 million—but Zscaler is already bigger.
August 3, 2015

Tweetable hack could pwn your Mac

“It does not appear from the post that Stefan [Esser] had previously reported the flaw to Apple, so it is quite likely as he noted that this was a 'code cleanup' effort as opposed to a 'security patch',” said Michael Sutton, CISO at Zscaler.
July 23, 2015

Ashley Madison hack: adulterers at risk of opportunistic blackmail

“It’s highly likely that scammers who have had nothing to do with the breach will take advantage of it,” commented Michael Sutton, vice president of security research at cloud security company Zscaler.
July 22, 2015

Ashley Madison security breach exposes adulterers to blackmail risk

Experts have predicted the user data may end up changing hands in the illicit marketplaces of the Deep Web. According to Michael Sutton, vice president of security research at cloud security company Zscaler, that potentially opens the path to blackmailers.
July 22, 2015

Ashely Madison security breach exposes adulterers to blackmail risk

Experts have predicted the user data may end up changing hands in the illicit marketplaces of the Deep Web. According to Michael Sutton, vice president of security research at cloud security company Zscaler, that potentially opens the path to blackmailers.
July 22, 2015

Users could sue Ashley Madison for failure to control data

Michael Sutton, chief information security officer (CISO) at Zscaler, said: “The attackers are stating that while Ashley Madison customers have been charged US$ 20 for a 'full delete' of customer data, this is not actually occurring. The payment for the 'full delete' is recorded and the customer name and credit card information is retained, thus maintaining a record that the individual was a customer, thereby largely defeating the purpose of the payment.”
July 22, 2015

What Does The Security Industry Really Think About The Ashley Madison Hack?

“It is highly likely that scammers who have had nothing to do with the breach will take advantage of it. Scammers are likely to see an opportunity to profit by sending random ransom emails. With 37 million accounts compromised it won’t be difficult to identify people that are indeed Ashley Madison customers and are willing to pay a ransom in the hopes that it will maintain their anonymity
July 22, 2015

Trust, Scammers & Data Hoarding: 5 Experts React to Ashley Madison Hack

“The attackers are stating that while Ashley Madison customers have been charged $20 for a ‘full delete’ of customer data, this is not actually occuring. The payment for the ‘full delete’ is recorded and the customer name and credit card information is retained, thus maintaining a record that the individual was a customer, thereby largely defeating the purpose of the payment.”
July 22, 2015

New Norms of Managing the Hybrid Enterprise

Now these capabilities are being made available as a cloud service. Interfacing with a security service provider like zScaler enables local Internet breakouts without requiring further investment in on-premises Internet security appliances.
July 20, 2015

The dangers of BYOD

Michael Sutton, de CISO Zscaler, nous propose une Tribune Libre consacrée aux menaces du BYOD (Bring Your Own Device), c'est à dire le fait d'apporter et d'utiliser vos appareils personnels dans le cadre professionnel.
July 19, 2015

Welcome To The Unicorn Club, 2015: Learning From Billion-Dollar Companies

It’s been over a year since we wrote our original post sharing our analysis of the last decade’s most successful U.S.-based, venture-backed tech companies.
July 18, 2015

The dangers of BYOD

Heureusement, la plupart des employés acceptent des mesures de sécurité de base qui assurent la protection des données de l’entreprise tant que leurs contenus et usages personnels restent intouchés, commente Michael Sutton, CISO Zscaler.
July 17, 2015

The dangers of BYOD

L’essor du BYOD pousse à repenser la sécurité des terminaux mobiles car l’entreprise ne peut dicter la politique de sécurité des appareils ne lui appartenant pas mais ne peut, non plus, autoriser un appareil potentiellement corrompu accéder à ses ressources internes. Un juste milieu doit être trouvé si l’on veut que le BYOD fonctionne en entreprise. Heureusement, la plupart des employés acceptent des mesures de sécurité de base qui assurent la protection des données de l’entreprise tant que leurs contenus et usages personnels restent intouchés.
July 15, 2015

Michael Sutton, CISO Zscaler : Les menaces du Bring Your Own Device

Les entreprises ne peuvent plus se contenter des contrôles de sécurité traditionnels pour protéger les appareils mobiles. Les solutions de sécurité cloud permettent au trafic des appareils mobiles d’être surveillé même en dehors de l’entreprise ainsi que sur les réseaux tiers sans qu’il y ait besoin d’installer des applications de sécurité lourdes ou de mettre des restrictions difficilement acceptables pour le propriétaire de l’appareil.
July 15, 2015

The dangers of BYOD

L’essor du BYOD pousse à repenser la sécurité des terminaux mobiles car l’entreprise ne peut dicter la politique de sécurité des appareils ne lui appartenant pas mais ne peut, non plus, autoriser un appareil potentiellement corrompu accéder à ses ressources internes. Un juste milieu doit être trouvé si l’on veut que le BYOD fonctionne en entreprise.
July 15, 2015

Les menaces du Bring Your Own Device, Par Michael Sutton, CISO Zscaler

Les entreprises ne peuvent plus se contenter des contrôles de sécurité traditionnels pour protéger les appareils mobiles. Les solutions de sécurité cloud permettent au trafic des appareils mobiles d’être surveillé même en dehors de l’entreprise ainsi que sur les réseaux tiers sans qu’il y ait besoin d’installer des applications de sécurité lourdes ou de mettre des restrictions difficilement acceptables pour le propriétaire de l’appareil.
July 15, 2015

Les menaces du Bring Your Own Device, Par Michael Sutton, CISO Zscaler

L’écosystème mobile est différent de celui des ordinateurs et cette différence est d’autant plus vraie lorsqu’il s’agit de sécurité. Au bureau, les ordinateurs fixes et portables appartiennent, le plus souvent, à l’entreprise. Il est donc normal que ces appareils aient des restrictions d’accès et soient équipés de logiciels de sécurité contrôlant les accès et les données qui s’y trouvent. Ce n’est pas le cas dans le contexte du BYOD.
July 15, 2015

Hacked surveillance firm says its tool could be used by terrorists

Michael Sutton, CISO at Zscaler, told SCMagazine.com this IP address can serve as a primary indicator of compromise.
July 13, 2015

Ransomware not as sophisticated as feared – or is it?

Michael Sutton, chief information security officer at Zscaler, warned that contrary to the researchers' proposal, there is no silver bullet for dealing with ransomware.
July 13, 2015

Surveillance Company Loses Control Of Flagship Spy Program

Michael Sutton, CISO at Zscaler, told SCMagazine.com this IP address can serve as a primary indicator of compromise. “Patching is the most prudent course of action to deal with this exploit that is very much in the wild”.
July 13, 2015

Google Inc Removes Malicious Apps From

Now removed from Play, the fake BatteryBot Pro was offered for free (the real thing sells for 179.99 Rupees, about US$2.84), and as Zscaler’s Shivang Desai writes, its intentions were revealed by the permissions it seeks (basically, everything).
July 12, 2015

Google search app starts offering ‘did you mean’ corrections

“While in some of the scenarios we were able to manually delete the app, the malware authors have taken care to ensure persistence”, said Shivang Desai, the Zscaler researcher that discovered the app
July 12, 2015

Breach at Italian surveillance vendor prompts security alert

Zscaler wrote in a blog post that in addition to these vulnerabilities, it found various modules and other tools Hacking Team used to compromise victims.
July 9, 2015

Don’t be a data breach casualty (print)

During the 'initial infection' phase of any attack, proactive protection to prevent infection of the initial target is essential, says Michael Sutton, vice president of Security Research, Zscaler.
July 10, 2015

The 3-step plan to make your website harder to hack

Earlier this year, for example, security firm Zscaler found that compromised WordPress Web sites were forwarding visitors’ login credentials to an attacker-controlled site. Last year, in one of the worst cases of serial compromise, a malicious program, known as SoakSoak, infected more than 100,000 Wordpress sites using a vulnerability in a popular plugin.
July 9, 2015

Hacking Team comments on breach while industry reels from data trove

Zscaler wrote in a blog post that in addition to these vulnerabilities, it found various modules and other tools Hacking Team used to compromise victims.
July 9, 2015

Hacking Team’s Flash Player Zero-Day Spotted in Attacks Prior to Breach

Zscaler researchers have analyzed the exploits and remote control tools found in the leak and they have identified a Mac OS X rooting exploit, a multistage Java exploit module, driver files that could contain rootkit functionality, and various components of Hacking Team’s flagship Remote Control System (RCS) product.
July 9, 2015

Fraudulent BatteryBot Pro App Yanked from Google Play

Researchers at Zscaler reported the app, which had a package name of com.polaris.BatteryIndicatorPro. The app requested excessive permissions from the user in an attempt to get full control of an Android device.
July 9, 2015

How to spot fake apps on the Google Play store

As Zscaler wrote, “The legit BatteryBotPro app demanded for minimal permissions,” while, in contrast, “Upon installation of the malicious app, it demanded administrative access, which clearly portrays the motive of malware developer to obtain full control access of the victim’s device.”
July 8, 2015

Google Removes Malicious App From Play Store

Google has removed a malicious application posing as a popular batter monitoring app from Google Play, following revelations from security firm Zscaler
July 8, 2015

Google blocks 'undeletable' app from Play store

The fake app was able to send premium-rate text messages and blocked people from deleting it, said security company Zscaler on its blog.
July 7, 2015

Google pulled a fake app from its app store after it charged users to check their battery

The Register reports that Google accepted the BatteryBot Pro app onto the Google Play Store, meaning that Android users were able to download and use the app. But researchers from Zscaler Research looked into the app and found some worrying things happening in the background.
July 7, 2015

Fraudulent Application Removed From Google Play Store

Google has removed a fake battery monitoring application that appears designed to compromise the device it is installed on. The malicious application, named BatteryBot Pro, was offered for free and was spotted by Zscaler.
July 7, 2015

Fake Android battery monitor app thoroughly compromises users’ devices

Zscaler's researchers have analyzed the spoofed BatteryBot Pro app, and discovered that it asks considerably more permissions than the legitimate app, and among them is the permission to send SMS, access the Internet, get account details, process outgoing calls, download additional software packages without notifying the user, and so on.
July 7, 2015

Google pulls phony BatteryBot Pro app from Play store

Zscaler wrote that the app disguises itself as the free version of a legitimate pay-to-use app, BatteryBot Pro, which sells in the official Google Play store for $2.99. The app was even briefly slipped into the Play store before Google removed it, the firm revealed, noting that it greatly differs from the legitimate app in that it asks for minimal permissions, including access to photos and to disable a screen lock.
July 7, 2015

Malicious Version of BatteryBot Pro App Found on Google Play

According to cloud-based security firm Zscaler, cybercriminals have taken the legitimate BatteryBot Pro app and embedded malicious modules into it.
July 7, 2015

Fake Battery Monitoring App Can Take Over Users’ Smartphones

A battery monitoring app has been yanked from Google’s app store after online security firm Zscaler discovered hackers could use it to obtain control of users’ devices.
July 7, 2015

MongoDB has been a unicorn since 2013 - now it’s got a new CFO, hinting at a possible IPO

Gordon replaces previous CFO Sydney Carey who left in February (and landed at internet security company Zscaler
July 6, 2015

Google yanks fake Android battery monitor

“Upon installation of the malicious app, it demanded administrative access, which clearly portrays the motive of malware developer to obtain full control access of the victim's device”, Desai writes.
July 6, 2015

MongoDB Names Yodle Executive as New CFO

Ms. Carey left MongoDB in February for venture-backed security company Zscaler Inc. and couldn’t be reached for comment.
July 6, 2015

The Daily Startup: MongoDB Has a New Chief Financial Officer

MongoDB, one of the largest and most popular of the emerging database startups, hired Michael Gordon as chief financial officer, replacing previous CFO Sydney Carey, VentureWire’s Deborah Gage reports. Ms. Carey left MongoDB in February for venture-backed security company Zscaler and couldn’t be reached for comment.
July 6, 2015

Zscaler Recognized as a Leader in SaaS Web Content Security Market by Independent Research Firm

Zscaler a pu constater le succès rencontré par sa plateforme de sécurité Internet basée sur le Cloud, avec des entreprises industrielles qui passent de simples dispositifs matériels à une offre de sécurité as a service, et avec la convergence de solutions ponctuelles dans les plateformes intégrées.
July 3, 2015

Zscaler Recognized as a Leader in SaaS Web Content Security Market by Independent Research Firm

Zscaler, spécialiste de la sécurité sur Internet, annonce que le cabinet d'analystes indépendant Forrester Research l'a nommé Leader de la sécurité des contenus Web en mode SaaS Security as a Service , dans son rapport du 2e trimestre 2015 The Forrester Wave SaaS Web Content Security.
July 3, 2015

Zscaler Recognized as a Leader in SaaS Web Content Security Market by Independent Research Firm

Dans le domaine de la sécurité as a service, Forrester mentionne Zscaler comme le leader. Ce spécialiste de la sécurité sur Internet qui revendique 5 000 entreprises clientes a obtenu les meilleurs classements, devant les autres sociétés entrant dans le cadre de cette étude (Barracuda Networks, Blue Coat Systems, Cisco, iboss, Intel Security (McAfee), Symantec, Websense), dans les trois catégories évaluées : Current Offering (Offre actuelle), Strategy (Stratégie) et Market Presence (Présence sur les marchés).
July 3, 2015

Beginning of the end for security applicances. Zscaler reacts to OpenDNS acquisition by Cisco

Daniel Druker, Chief Marketing Officer chez Zscaler explique : Cette aquisition est un nouveau signal marquant le début de la fin des appliances de sécurité. Un déclin porté par l’infatigable croissance du cloud computing, de la mobilité et de l’internet des objets.
July 2, 2015

Beginning of the end for security applicances. Zscaler reacts to OpenDNS acquisition by Cisco

Daniel Druker, Chief Marketing Officer chez Zscaler explique Cette aquisition est un nouveau signal marquant le début de la fin des appliances de sécurité. Un déclin porté par l'infatigable croissance du cloud computing, de la mobilité et de l'internet des objets.
July 2, 2015

Searches for Pirated Content Lead to Pain and Little Gain

Researchers at Zscaler have been tracking a long-term campaign that dupes users who are looking for various pirated content such as games or TV shows into installing adware. Rather than getting the content they’re looking for, users download a file that appears to be legitimate but includes the malicious content instead.
July 2, 2015

Cisco grabs OpenDNS for £405 million

Commenting on the launch Zscaler’s (a fellow security as a service firm) CMO, Daniel Druker, said the acquisition is another signal for the beginning of the end of security appliances, driven by the unstoppable growth of cloud computing, mobility and the Internet of Things.
July 1, 2015

Updated: Cisco Systems moves to buy OpenDNS for £405m

Daniel Druker, chief marketing officer at Zscaler, said this acquisition is another sign that the days of security appliances are numbered due to the “unstoppable growth of cloud computing, mobility and the Internet of Things”.
July 1, 2015

CISCO/DNS: The Beginning of the End of Security Appliances?

In response to the news that Cisco plans to acquire OpenDNS for $635 million, Daniel Druker, Chief Marketing Officer at Zscaler, said this could kick start the end to security appliances.
July 1, 2015

What does the channel REALLY think of security vendors?

As with all CRN Intelligence reports, this one has allowed for free text feedback, and the 200+ UK resellers that took part have not held back. Painful reading for some maybe, but nowhere else will you see such open and honest feedback, and be able to improve your channel programmes and partner interactions as a result.
June 30, 2015

Zscaler email customers rescued by WeCloud - source

WeCloud operates through a network of channel partners and lists a number of other vendors – including Zscaler – as technology partners.
June 29, 2015

91% of OutBrowse, MultiPlug Adware/Spyware Attacks Come from the US

Content that appears to be legitimate should not be trusted implicitly if it comes from a suspicious source like sites offering pirated content, says Chris Mannon of Zscaler.
June 29, 2015

How CISOs can find and secure rogue cloud applications

There are a number of CASBs, including Mississauga, Ont.-based Perspecsys Inc. CipherCloud Inc., SkyHigh Networks, Netskope, Adallom, CloudLock, Zscaler, Actifio, Bitglass, Trend Micro’s SecureCloud and CloudLink
June 26, 2015

Alliancy Le Mag: Guide de la cybersécurité


June-Juli, 2015

ICYMI: Adult Friend Finder breach, Android woes and leaky Bluetooth

Zscaler researchers explained on the corporate blog that it has seen a large number of sites, dressed up as search engines, that lead to malicious content including sites hosting the Magnitude Exploit Kit.
May 29, 2015

Cloud-Based Cyber Threat Protection

Jay Chaudhry, CEO and founder of Zscaler joins Francine Lacqua on “The Pulse” to discuss his startup that is revolutionizing the world of internet security. His company is currently the only one that protects against cyber threats with a totally cloud-based solution.
May 28, 2015

Sécurité dans le cloud : pour protéger l’entreprise mobile d’aujourd’hui les approches de sécurité doivent être repensées

Les DSI éprouvent souvent des difficultés pour s’adapter à cette nouvelle réalité en raison de la rapidité à laquelle les besoins métier évoluent. Historiquement, les Directions IT ont toujours préféré déployer leurs projets applicatifs dans un délai relativement long, en étudiant attentivement l’impact sur la conception du réseau et la stratégie de sécurité de l’entreprise.
May 28, 2015

Repenser la sécurité dans le cloud ?

Le monde de la sécurité en entreprise traverse actuellement une période de mutation liée aux bouleversements rapides qui transforment profondément la façon de travailler des entreprises. De nouvelles technologies et de nouvelles tendances sont en train de modifier la définition même du réseau d’entreprise, la manière dont nous travaillons et les lieux où nous travaillons, ainsi que les outils utilisés pour accomplir notre travail.
May 28, 2015

Pour protéger l’entreprise mobile d’aujourd’hui les approches de sécurité doivent être repensées,

Par Charles Milton, directeur de Zscaler Services Providers pour la région EMEA
May 27, 2015

Pour protéger l’entreprise mobile d’aujourd’hui les approches de sécurité doivent être repensées

Par Charles Milton, directeur de Zscaler Services Providers pour la région EMEA
May 27, 2015

#IoT : Sécurité et objets connectés ne semblent décidément pas faire bon ménage

Les fournisseurs de matériels n’en sont pas au même niveau de connaissance en matière de sécurité que leurs homologues dans l’industrie du logiciel qui ont été poussés très tôt à modifier leur tactiques de développement à mesure qu’une multitude de vulnérabilités ont été révélées au grand jour » selon Michael Sutton, Vice Président en Recherche Sécuritaire chez Zscaler.
May 26, 2015

Did you want some government spyware with that app store purchase?

In the interests of "data loss prevention" (a euphemism for stopping people sending commercially sensitive data out of the company), companies such as Zscaler will, when brought into a corporate site, covertly install self-signed SSL certificates onto every employee's computer.
May 23, 2015

Novel malvertising attack leads to drive-by ransomware

Zscaler researchers explained on its blog that it has seen a large number of sites, dressed up as search engines, that lead to malicious content including sites hosting the Magnitude Exploit Kit.
May 21, 2015

Malvertising makes use of the Magnitude exploit kit to deliver ransomware

Online advertisements can be annoying. But what if they spread malware too? The excessive greed of few has lead to the rise of malvertising, advertisements that redirect or lead to malware. A recent Zscalar study revealed that several compromised websites contained ads that led to ransomware.
May 20, 2015

Malvertising leads to Magnitude Exploit Kit, ransomware infection

“This is a highly profitable ransomware payload that leverages Bitcoin transactions executed over the Tor Anonymizer to monetize the attack,” wrote ZScaler researchers Edward Miles & Chris Mannon.
May 19, 2015

Michael Sutton, Zscaler : Internet des Objets, la menace est réelle

Les objets connectés se multiplient et dans le même temps les menaces de sécurité s’amplifient. Nous souhaiterions vous proposer l’expertise de Zscaler pour aborder cette thématique.
May 19, 2015

Word Press: authentification data stolen without users’ knowledge

Les sites WordPress piratés ouvrent une « porte dérobée » – backdoor – au moment où les utilisateurs se connectent à leur compte. D’après Zscaler les identifiants sont encodés et transférés au site pirate par une requête GET
May 19, 2015

You have a WordPress site? You should read this right now

The SaaS provider Zscaler said that a number of WordPress-based websites have been compromised after users have logged on to their site from a home page containing malicious code . Once the captured data, they were then sent in encrypted format to hacker.
May 12, 2015

Glasgow chair and Winchester music festival hit by 'unique' cyber-attack

The Glasgow Contemporary Choir and the Blissfields music festival near Winchester are among the innocent victims of what's being described as a 'unique' attack on WordPress-powered websites. Security firm Zscaler's Sameer Patil and Deepen Desai said they found the attack was planting backdoor code on the sites, in order to capture the credentials of everyone logging into them and send them to a US-based attacker website, the dodgy domain “conyouse.com”.
May 12, 2015

Venture Capitalism and the Future of IT

Ravi Mahtre from Lightspeed Venture Partners writes about the companies he believes will be the new generation of market leaders, and notes that Zscaler is the market leader in cloud-based security.
May 12, 2015

Unusual WordPress attack steals login credentials

Wordpress, the Internet's favorite content management system, is a common target for criminals who redirect innocent users to malware download sites. But a new type of malware steals user login credentials instead, while leaving the rest of the user experience unchanged. "It's an interesting attack -- we haven't seen this before," said Michael Sutton, VP of Security Research at San Jose-based cloud security vendor Zscaler, Inc., which recently issued a report about the malware.
May 11, 2015

Fresh WordPress Campaign Steals Credentials

WordPress, being one of the most popular content management systems and blogging platforms on the internet, remains an attractive target for cybercriminals due to its large user base. According to Zscaler researchers Sameer Patil and Deepen Desai, the compromised sites run backdoor code, which activates when the user submits login credentials. The credentials are then encoded and sent to an attacker website in the form of a GET request.
May 11, 2015

Got a WordPress website? You should read this now

SaaS (Security-as-a-Service) provider Zscaler reported that a number of WordPress-based websites have been compromised with users trying to login to them being served malicious code as part of the login page. Once captured, that data is then sent, in an encrypted format, to the hacker.
May 11, 2015

Small WordPress sites leaking like sieves

Wordpress admins hoping for some feet up time after last week's Twenty Fifteen XSS plugin vulnerability appear to have yet another vulnerability to handle. Researchers at Zcaler have identified a bunch of compromised sites that are all leaking user credentials to the same target domain – conyouse.com hosts the command and control.
May 11, 2015

WordPress Sites Backdoored, Leaking Credentials

With a raft of WordPress vulnerabilities—most of them in plugins—to address, now comes word from researchers at Zscaler that a number of sites running the content management system have been compromised and are sending credentials via a backdoor to a criminal group.
May 8, 2015

WordPress Websites Targeted by Credential Leak Campaign

With a raft of WordPress vulnerabilities—most of them in plugins—to address, now comes word from researchers at Zscaler that a number of sites running the content management system have been compromised and are sending credentials via a backdoor to a criminal group.
May 8, 2015

WordPress Patches XSS Vulnerability Exploited in the Wild

Zscaler researchers reported spotting a campaign in which malicious actors have compromised multiple WordPress website in an effort to steal their users’ credentials. The compromised websites contain a backdoor designed to harvest credentials and send them back to the attackers.
May 8, 3025

IRC Botnets Are Not Quite Dead Yet

Far from going the way of the dodo as many had surmised, Internet Relay Chat (IRC) botnets are alive and thriving. A new study by security vendor Zscaler shows that IRC botnets, while not growing at a particularly rapid rate, continue to be active and have incorporated several new features over the years that make them as a potent a threat as ever.
April 29, 2015

Ipanema Releases Dynamic WAN Selection

Enable Ipanema devices (IP engines) to establish VPN tunnels via the Internet, towards remote data centers that have VPN concentrators (public or private) or web security gateways such as Zscaler
April 29, 2015

Ipanema DWS offers application performance guarantee

The Ipanema devices can establish VPN tunnels via the Internet, towards remote data centers that have VPN concentrators or web security gateways such as Zscaler.
April 28, 2015

Takeaways from RSA 2015: The stars of the show

Visibility, data center security, two-factor authentication, and services were the stars of RSA 2015.
April 27, 2015

Bogus Adult Content Page Foists Android SMS Trojan

Researchers at Zscaler say that this tactic is most likely adopted to evade detection based on blacklists with known names for malicious apps.
April 24, 2015

IRC Botnets Continue to Evolve: Zscaler

Researchers at Zscaler have conducted an analysis of some of the most prevalent IRC-based botnets and determined that these types of threats remain effective as the features incorporated into them continue to improve.
April 24, 2015

In The Know: Top 5 Must-Read Cloud Stories, April 21

Talkin' Cloud at the end of each day pulls out five must-read cloud computing stories from the news cycle for its readers to review in the morning. Today's column features Zscaler, Ericsson (ERIC) and Intel Security.
April 21, 2015

Securing The Branch Office Via the Cloud

Enter Zscaler, a provider of IT security services delivered via the cloud, which just added a next-generation firewall service that can protect both network infrastructure and applications.
April 20, 2015

What you missed in Cloud: Services galore

Zscaler, Inc. led charge with the addition of a firewall to its managed security platform that promises to keep threats outside the organization and sensitive data inside.
April 20, 2015

New Products of the Week 4.20.15

Zscaler is a cloud-based firewall, providing network security, control and visibility with no on-premise hardware or software required.
April 20, 2015

SDxCentral Weekly News Roundup

Zscaler introduced Winter 2015, its cloud-based next-generation firewall.
April 17, 2015

Zscaler Introduces Zscaler Winter 2015 Security As A Service Platform

Zscaler introduced the Winter 2015 release of the Zscaler security platform. Zscaler Winter 2015 is a cloud-based firewall providing network security and application control requiring no on-premises hardware or software.
April 16, 2015

Zscaler Introduces World's First Cloud-Based Next Generation Firewall With Zscaler Winter 2015

Zscaler democratizes security with economical, easy to deploy, easy to manage next-generation firewall for distributed enterprises and mid-market organizations
April 14, 2015

Zscaler Launches Cloud-Based Firewall

The firewall also fully integrates with Zscalers platform which offers sandboxing, web security, DLP, content filtering, SSL inspection, malware protection and correlation, reporting and analytics.
April 14, 2015

Clean Pipes At Last: Zscaler Introduces Cloud Firewall

Zscaler today announced a cloud-based firewall into a market that is finally ready for a clean pipes offering. Not in the press release is the fact that they hired iPolicy founder Pankaj Parekh to take the project forward.
April 14, 2015

Amazon launches a desktop app exchange for business software

The new AWS Marketplace for Desktop Apps makes available such desktop software as security and data storage applications, including Zscaler Security Cloud from Zscaler Inc. and IDM Ultra Security from IDM Computer Solutions;
April 13, 2015

Entrevista: Lane M. Bess and William Welch of Zscaler

Zscaler’s Bill Welch and Lane Bess were featured in a leading Spanish security and IT publication in a story about the growth of the cloud-based security model.
April 2015

5 Cloud Security Firms To Stir Crazy Spring Funding Frenzy

Zscaler is mentioned in this round up story that looks at venture funding and acquisitions dollars have been flying fast and furious over the past two months as investors try to cash in on cloud security.
April 9, 2015

Security spending shift: moving to the cloud

As companies increasingly move sensitive data into the cloud, a number of security implications arise, as well as concerns about investments in these services and technologies. While many organizations are attracted to the benefits of cloud storage, breaches persist, meaning enterprises must create effective plans for migrating their data and monitoring risks, despite the hand-off to third parties. Zscaler’s CEO, Jay Chaudhry, talks to SC Magazine about trends in security spending.
April 6, 2015

Angler Exploit Kit Now Relies on More Successful Infection Tactics

Zscaler’s research team weighs in on the browser-based attack tool Angler Exploit Kit (EK) for an article on Softpedia that outlines how the the EK attack tool works. The story also linked back to the Zscaler blog post on the topic for more information.
April 6, 2015

Movers and Shakers

The SF Chronicle featured Sydney Carey’s appointment as Zscaler’s CFO in it’s regular feature on loca executive moves.
April 5, 2015

Cloud Security Platform for the Consumer: Zscaler

Zscaler CEO Jay Chaudhry discusses the important of internet security in the cloud and Zscaler’s IPO plans. He speaks with Bloomberg’s Alix Steel on “Street Smart.”
March 25, 2015

njRAT Infections on the Rise: Security Firms

The notorious remote access Trojan (RAT) known as njRAT is making a comeback, according to security firms Zscaler and PhishMe.
March 23, 2015

Cyber Threat Alliance signs up 4 new members

Zscaler have joined the Cyber Threat Alliance (CTA) in its efforts to make united progress in the fight against sophisticated cyber enemies through deep collaboration on threat intelligence and sharing indicators of compromise.
March 18, 2015

This Google product was so full of hackers and trolls that Google shut it down

Google Code may have been especially attractive to no-goodniks given that people trust anything downloaded from the Google.com domain without knowing or caring that it's from a third-party developer, security firm Zscaler pointed out in 2013. People would download a game or app and unknowingly hand the keys to the kingdom to a bad actor.
March 13, 2015

The full Cybersecurity 500 list

CRN published The Cybersecurity 500 List, which ranked Zscaler 108 out of 500 cybersecurity companies. The list ranked companies based on innovation, rather than size or revenue. Zscaler was on the list alongside many well-known players in cybersecurity, including FireEye and Palo Alto Networks.
March 10, 2015

IPO prep? Cloud security upstart hires former TIBCO, MongoDB CFO

Seven-year-old Zscaler has accepted relatively little outside money compared to other security startups, but big companies like Dollar General, Hormel Foods, La-Z-Boy, Nestle and United Airlines rely on its cloud services to fight cyberthreats.
March 4, 2015

High Risk, High Reward: The Ups And Downs Of Security Startups

Cloud security is a focus of many of the startups coming to market. When Zscaler arrived in 2008, it aimed to take on secure Web gateway vendors with its cloud security platform. Today the company does SaaS-based Web filtering, cloud-based anti-malware, data loss prevention and secure Wi-Fi services.
February 26, 2015

Cloud security software set for boom time

Vendors included in the research include CA Technologies, McAfee, Symantec, Trend Micro, CipherCloud, CloudLock, CloudPassage, Commtouch Software, CREDANT Technologies, CYREN, HyTrust, IBM, Okta, Panda Security, SafeNet, Skyhigh Networks, ThreatMetrix and Zscaler.
February 23, 2015

Cloud security software set to balloon by 50 percent

endors included in the research include CA Technologies, McAfee, Symantec, Trend Micro, CipherCloud, CloudLock, CloudPassage, Commtouch Software, CREDANT Technologies, CYREN, HyTrust, IBM, Okta, Panda Security, SafeNet, Skyhigh Networks, ThreatMetrix and Zscaler.
February 23, 2015

President’s cyber security summit: Share attack info but protect privacy, civil liberties

During the summit, the Cyber Threat Alliance, founded by Palo Alto, Symantec, Fortinet and McAfee, announced four new members: Barracuda Networks, Reversing Labs, Telefonica and ZScaler. The goal of the group is for members to share threat information so they can build stronger defenses against advanced adversaries.
February 17, 2015

Microsoft Corporate Clients Targeted with Volume License Phishing Email

Cybercriminals adept at social engineering take aim at corporate users luring them with fake emails purporting to be from Microsoft Volume Licensing Service Center and informing the recipient that they received administration permissions for handling volume licenses. Zscaler researchers named it Chanitor, and it has been seen in January to deliver the Vawtrak banking Trojan, but it can also be employed to funnel in other types of malware, too.
February 10, 2015

In The Know: Top 5 Must-Read Cloud Stories

One of Talkin’ Cloud’s “must-read” stories of the week, VeloCloud announced its support for a policy engine on its namesake service and the signing of a new alliance with Zscaler. These new relationships are making it possible to extend data protection and security policies across the WAN.
February 10, 2015

VeloCloud Enhances its SD-WAN Service with Zscaler and Websense

VeloCloud Networks, a start-up offering a subscription-based, virtualized WAN service for enterprises that aggregates multiple access lines (cable modem, DSL, LTE) into a single secure connection, announced interoperability with leading cloud security platform, Zscaler, spurring growth of its SD-WAN ecosystem.
February 9, 2015

The Rise Of The Software-Defined WANs

VeloCloud today announced its support for a policy engine on its namesake service and the signing of a new alliance with Zscaler, making it possible to extend data protection and security policies across the WAN.
February 9, 2015

Looking for a Cloud Computing Job? Here are the Best Companies and CEOs to Work for in the Industry

According to a list compiled by Forbes based on Glassdoor.com data, there are several CEOs of cloud companies with more than 90-percent employee approval. Zscaler’s Jay Chaudhry, is among the highest rated CEOs.
February 4, 2015

New Banking Trojan Targets Android, Steals SMS

A relatively new Android Trojan that specializes in stealing banking information by intercepting SMS messages has been making the rounds. Researchers at zScaler spotted the as yet unnamed Trojan circulating as 888.apk. Like many types of malware that came before it, at least for the moment, the Trojan appears to be targeting Chinese Android users.
February 3, 2015

The 20 Coolest Cloud Security Vendors

Zscaler is an IPO candidate for 2015. The Security-as-a-Service provides secure Web gateway capabilities, Web filtering, intrusion prevention and deep packet inspection capabilities. Its data loss prevention can decrypt and inspect content encrypted with SSL.
January 28, 2015

The Best Cloud Companies and CEOs to Work for in 2015

Using the 2015 CRN list as a baseline to compare the Glassdoor.com scores of the (%) of employees who would recommend this company to a friend and (%) of employees who approve of the CEO, the following series of tables were constructed.
January 29, 2015

Cybersecurity Utilities - The Future of Managed Security Services

Z-Scaler (www.zscaler.com), another cloud based solution, takes the OpenDNS model a step further by integrating additional security features into its offering such as malware sandboxing. Z-Scaler's approach is to address complex security issues by engineering the capability into their solution.
January 27, 2015

On the Move: William Welch

The San Jose Internet Security Provider named William Welch global vice president of sales and chief revenue officer. Recently he was vice president and general manager at HP Software Americas.
January 27, 2015

Adobe to patch Flash Player zero-day next week

Researchers at Zscaler provide more details on the use of the vulnerability in the Angler exploit kit. They say that two legitimate ad networks are being used to serve malicious ads, which redirect users to the exploit kit. This is then used to push the 'Bedep' trojan onto the victim's system.
January 23, 2015

Viptela brings Software-Defined WANs to the enterprise

Traditional WANs are too complex, too costly and too inflexible to support today's bandwidth-intensive services and applications. Viptela says software defined WANs can fix that.
January 22, 2015

Zscaler Appoints HP, Symantec Exec Global VP of Sales

Bill Welch, veteran software industry executive, joins Zscaler as Vice President of Global Sales and Chief Revenue Officer to scale the company’s sales and channel organizations and accelerate growth worldwide.
January 14, 2015

The Convoluted Trail Linking North Korea to Sony

"I know a number of people who are concerned that we don't have definitive proof to give proper attribution to the attack, but in cases like this we rarely have all the evidence we need to provide attribution," noted Michael Sutton, vice president of security search for Zscaler. "I do think that while we don't have conclusive proof -- the FBI hasn't been that transparent with us -- I do think North Korea remains the most viable suspect in this attack," Sutton said.
January 13, 2015

Cradlepoint & Zscaler Get Together to Reinforce the Branch Office

One of the biggest security problems when it comes to mobile technology is that of the retail store and the branch office. To that end, Cradlepoint and Zscaler got together to introduce a new breed of hybrid solution that takes the best of a cloud-based solution and matches it with parts of an on-premise solution to deliver powerful, yet useful, protection.
January 13, 2015

Cradlepoint Releases Zscaler Support

Yesterday at the 2015 NRF Conference (National Retail Federation), Cradlepoint has announced the availability of the long awaited Zscaler Internet Security integration. Developed as a joint program between Cradlepoint and Zscaler, this advanced protection monitors data breaches, ensures PCI compliance, and helps remote offices by running a single threat management solution. Built into enterprise routers like the MBR1200, MBR1400, AER 2100, and COR IBR, this is both a rapidly deployed, and easily managed, threat protection solution.
January 13, 2015

William Welch

William Welch has joined Zscaler as global vice president of sales, responsible for for scaling Zscaler’s sales and channel organizations and accelerating growth worldwide.
January 13, 2015

New Variant of Vawtrak Banking Trojan Delivered by Chanitor Downloader

A new strain of the Vawtrak banking Trojan has been discovered by Zscaler security researchers, who observed that it was delivered by malware downloader Chanitor.
January 12, 2015

Feedback Friday: Is North Korea Behind the Sony Hack?

In late November, Sony Pictures Entertainment was hacked by a group calling itself Guardians of the Peace (GOP). What initially appeared to be another hacktivist attack, later turned out to be a sophisticated operation possibly orchestrated by a state actor. Zscaler’s Michael Sutton weighs in.
January 9, 2015

Ad Retargater