In the News

Read what the experts are saying about Zscaler

Tweetable hack could pwn your Mac

“It does not appear from the post that Stefan [Esser] had previously reported the flaw to Apple, so it is quite likely as he noted that this was a 'code cleanup' effort as opposed to a 'security patch',” said Michael Sutton, CISO at Zscaler.
July 23, 2015

Ashley Madison hack: adulterers at risk of opportunistic blackmail

“It’s highly likely that scammers who have had nothing to do with the breach will take advantage of it,” commented Michael Sutton, vice president of security research at cloud security company Zscaler.
July 22, 2015

Ashley Madison security breach exposes adulterers to blackmail risk

Experts have predicted the user data may end up changing hands in the illicit marketplaces of the Deep Web. According to Michael Sutton, vice president of security research at cloud security company Zscaler, that potentially opens the path to blackmailers.
July 22, 2015

Ashely Madison security breach exposes adulterers to blackmail risk

Experts have predicted the user data may end up changing hands in the illicit marketplaces of the Deep Web. According to Michael Sutton, vice president of security research at cloud security company Zscaler, that potentially opens the path to blackmailers.
July 22, 2015

Users could sue Ashley Madison for failure to control data

Michael Sutton, chief information security officer (CISO) at Zscaler, said: “The attackers are stating that while Ashley Madison customers have been charged US$ 20 for a 'full delete' of customer data, this is not actually occurring. The payment for the 'full delete' is recorded and the customer name and credit card information is retained, thus maintaining a record that the individual was a customer, thereby largely defeating the purpose of the payment.”
July 22, 2015

What Does The Security Industry Really Think About The Ashley Madison Hack?

“It is highly likely that scammers who have had nothing to do with the breach will take advantage of it. Scammers are likely to see an opportunity to profit by sending random ransom emails. With 37 million accounts compromised it won’t be difficult to identify people that are indeed Ashley Madison customers and are willing to pay a ransom in the hopes that it will maintain their anonymity
July 22, 2015

Trust, Scammers & Data Hoarding: 5 Experts React to Ashley Madison Hack

“The attackers are stating that while Ashley Madison customers have been charged $20 for a ‘full delete’ of customer data, this is not actually occuring. The payment for the ‘full delete’ is recorded and the customer name and credit card information is retained, thus maintaining a record that the individual was a customer, thereby largely defeating the purpose of the payment.”
July 22, 2015

New Norms of Managing the Hybrid Enterprise

Now these capabilities are being made available as a cloud service. Interfacing with a security service provider like zScaler enables local Internet breakouts without requiring further investment in on-premises Internet security appliances.
July 20, 2015

The dangers of BYOD

Michael Sutton, de CISO Zscaler, nous propose une Tribune Libre consacrée aux menaces du BYOD (Bring Your Own Device), c'est à dire le fait d'apporter et d'utiliser vos appareils personnels dans le cadre professionnel.
July 19, 2015

Welcome To The Unicorn Club, 2015: Learning From Billion-Dollar Companies

It’s been over a year since we wrote our original post sharing our analysis of the last decade’s most successful U.S.-based, venture-backed tech companies.
July 18, 2015

The dangers of BYOD

Heureusement, la plupart des employés acceptent des mesures de sécurité de base qui assurent la protection des données de l’entreprise tant que leurs contenus et usages personnels restent intouchés, commente Michael Sutton, CISO Zscaler.
July 17, 2015

The dangers of BYOD

L’essor du BYOD pousse à repenser la sécurité des terminaux mobiles car l’entreprise ne peut dicter la politique de sécurité des appareils ne lui appartenant pas mais ne peut, non plus, autoriser un appareil potentiellement corrompu accéder à ses ressources internes. Un juste milieu doit être trouvé si l’on veut que le BYOD fonctionne en entreprise. Heureusement, la plupart des employés acceptent des mesures de sécurité de base qui assurent la protection des données de l’entreprise tant que leurs contenus et usages personnels restent intouchés.
July 15, 2015

Michael Sutton, CISO Zscaler : Les menaces du Bring Your Own Device

Les entreprises ne peuvent plus se contenter des contrôles de sécurité traditionnels pour protéger les appareils mobiles. Les solutions de sécurité cloud permettent au trafic des appareils mobiles d’être surveillé même en dehors de l’entreprise ainsi que sur les réseaux tiers sans qu’il y ait besoin d’installer des applications de sécurité lourdes ou de mettre des restrictions difficilement acceptables pour le propriétaire de l’appareil.
July 15, 2015

The dangers of BYOD

L’essor du BYOD pousse à repenser la sécurité des terminaux mobiles car l’entreprise ne peut dicter la politique de sécurité des appareils ne lui appartenant pas mais ne peut, non plus, autoriser un appareil potentiellement corrompu accéder à ses ressources internes. Un juste milieu doit être trouvé si l’on veut que le BYOD fonctionne en entreprise.
July 15, 2015

Les menaces du Bring Your Own Device, Par Michael Sutton, CISO Zscaler

Les entreprises ne peuvent plus se contenter des contrôles de sécurité traditionnels pour protéger les appareils mobiles. Les solutions de sécurité cloud permettent au trafic des appareils mobiles d’être surveillé même en dehors de l’entreprise ainsi que sur les réseaux tiers sans qu’il y ait besoin d’installer des applications de sécurité lourdes ou de mettre des restrictions difficilement acceptables pour le propriétaire de l’appareil.
July 15, 2015

Les menaces du Bring Your Own Device, Par Michael Sutton, CISO Zscaler

L’écosystème mobile est différent de celui des ordinateurs et cette différence est d’autant plus vraie lorsqu’il s’agit de sécurité. Au bureau, les ordinateurs fixes et portables appartiennent, le plus souvent, à l’entreprise. Il est donc normal que ces appareils aient des restrictions d’accès et soient équipés de logiciels de sécurité contrôlant les accès et les données qui s’y trouvent. Ce n’est pas le cas dans le contexte du BYOD.
July 15, 2015

Hacked surveillance firm says its tool could be used by terrorists

Michael Sutton, CISO at Zscaler, told SCMagazine.com this IP address can serve as a primary indicator of compromise.
July 13, 2015

Ransomware not as sophisticated as feared – or is it?

Michael Sutton, chief information security officer at Zscaler, warned that contrary to the researchers' proposal, there is no silver bullet for dealing with ransomware.
July 13, 2015

Surveillance Company Loses Control Of Flagship Spy Program

Michael Sutton, CISO at Zscaler, told SCMagazine.com this IP address can serve as a primary indicator of compromise. “Patching is the most prudent course of action to deal with this exploit that is very much in the wild”.
July 13, 2015

Google Inc Removes Malicious Apps From

Now removed from Play, the fake BatteryBot Pro was offered for free (the real thing sells for 179.99 Rupees, about US$2.84), and as Zscaler’s Shivang Desai writes, its intentions were revealed by the permissions it seeks (basically, everything).
July 12, 2015

Google search app starts offering ‘did you mean’ corrections

“While in some of the scenarios we were able to manually delete the app, the malware authors have taken care to ensure persistence”, said Shivang Desai, the Zscaler researcher that discovered the app
July 12, 2015

Breach at Italian surveillance vendor prompts security alert

Zscaler wrote in a blog post that in addition to these vulnerabilities, it found various modules and other tools Hacking Team used to compromise victims.
July 9, 2015

Don’t be a data breach casualty (print)

During the 'initial infection' phase of any attack, proactive protection to prevent infection of the initial target is essential, says Michael Sutton, vice president of Security Research, Zscaler.
July 10, 2015

The 3-step plan to make your website harder to hack

Earlier this year, for example, security firm Zscaler found that compromised WordPress Web sites were forwarding visitors’ login credentials to an attacker-controlled site. Last year, in one of the worst cases of serial compromise, a malicious program, known as SoakSoak, infected more than 100,000 Wordpress sites using a vulnerability in a popular plugin.
July 9, 2015

Hacking Team comments on breach while industry reels from data trove

Zscaler wrote in a blog post that in addition to these vulnerabilities, it found various modules and other tools Hacking Team used to compromise victims.
July 9, 2015

Hacking Team’s Flash Player Zero-Day Spotted in Attacks Prior to Breach

Zscaler researchers have analyzed the exploits and remote control tools found in the leak and they have identified a Mac OS X rooting exploit, a multistage Java exploit module, driver files that could contain rootkit functionality, and various components of Hacking Team’s flagship Remote Control System (RCS) product.
July 9, 2015

Fraudulent BatteryBot Pro App Yanked from Google Play

Researchers at Zscaler reported the app, which had a package name of com.polaris.BatteryIndicatorPro. The app requested excessive permissions from the user in an attempt to get full control of an Android device.
July 9, 2015

How to spot fake apps on the Google Play store

As Zscaler wrote, “The legit BatteryBotPro app demanded for minimal permissions,” while, in contrast, “Upon installation of the malicious app, it demanded administrative access, which clearly portrays the motive of malware developer to obtain full control access of the victim’s device.”
July 8, 2015

Google Removes Malicious App From Play Store

Google has removed a malicious application posing as a popular batter monitoring app from Google Play, following revelations from security firm Zscaler
July 8, 2015

Google blocks 'undeletable' app from Play store

The fake app was able to send premium-rate text messages and blocked people from deleting it, said security company Zscaler on its blog.
July 7, 2015

Google pulled a fake app from its app store after it charged users to check their battery

The Register reports that Google accepted the BatteryBot Pro app onto the Google Play Store, meaning that Android users were able to download and use the app. But researchers from Zscaler Research looked into the app and found some worrying things happening in the background.
July 7, 2015

Fraudulent Application Removed From Google Play Store

Google has removed a fake battery monitoring application that appears designed to compromise the device it is installed on. The malicious application, named BatteryBot Pro, was offered for free and was spotted by Zscaler.
July 7, 2015

Fake Android battery monitor app thoroughly compromises users’ devices

Zscaler's researchers have analyzed the spoofed BatteryBot Pro app, and discovered that it asks considerably more permissions than the legitimate app, and among them is the permission to send SMS, access the Internet, get account details, process outgoing calls, download additional software packages without notifying the user, and so on.
July 7, 2015

Google pulls phony BatteryBot Pro app from Play store

Zscaler wrote that the app disguises itself as the free version of a legitimate pay-to-use app, BatteryBot Pro, which sells in the official Google Play store for $2.99. The app was even briefly slipped into the Play store before Google removed it, the firm revealed, noting that it greatly differs from the legitimate app in that it asks for minimal permissions, including access to photos and to disable a screen lock.
July 7, 2015

Malicious Version of BatteryBot Pro App Found on Google Play

According to cloud-based security firm Zscaler, cybercriminals have taken the legitimate BatteryBot Pro app and embedded malicious modules into it.
July 7, 2015

Fake Battery Monitoring App Can Take Over Users’ Smartphones

A battery monitoring app has been yanked from Google’s app store after online security firm Zscaler discovered hackers could use it to obtain control of users’ devices.
July 7, 2015

MongoDB has been a unicorn since 2013 - now it’s got a new CFO, hinting at a possible IPO

Gordon replaces previous CFO Sydney Carey who left in February (and landed at internet security company Zscaler
July 6, 2015

Google yanks fake Android battery monitor

“Upon installation of the malicious app, it demanded administrative access, which clearly portrays the motive of malware developer to obtain full control access of the victim's device”, Desai writes.
July 6, 2015

MongoDB Names Yodle Executive as New CFO

Ms. Carey left MongoDB in February for venture-backed security company Zscaler Inc. and couldn’t be reached for comment.
July 6, 2015

The Daily Startup: MongoDB Has a New Chief Financial Officer

MongoDB, one of the largest and most popular of the emerging database startups, hired Michael Gordon as chief financial officer, replacing previous CFO Sydney Carey, VentureWire’s Deborah Gage reports. Ms. Carey left MongoDB in February for venture-backed security company Zscaler and couldn’t be reached for comment.
July 6, 2015

Zscaler Recognized as a Leader in SaaS Web Content Security Market by Independent Research Firm

Zscaler a pu constater le succès rencontré par sa plateforme de sécurité Internet basée sur le Cloud, avec des entreprises industrielles qui passent de simples dispositifs matériels à une offre de sécurité as a service, et avec la convergence de solutions ponctuelles dans les plateformes intégrées.
July 3, 2015

Zscaler Recognized as a Leader in SaaS Web Content Security Market by Independent Research Firm

Zscaler, spécialiste de la sécurité sur Internet, annonce que le cabinet d'analystes indépendant Forrester Research l'a nommé Leader de la sécurité des contenus Web en mode SaaS Security as a Service , dans son rapport du 2e trimestre 2015 The Forrester Wave SaaS Web Content Security.
July 3, 2015

Zscaler Recognized as a Leader in SaaS Web Content Security Market by Independent Research Firm

Dans le domaine de la sécurité as a service, Forrester mentionne Zscaler comme le leader. Ce spécialiste de la sécurité sur Internet qui revendique 5 000 entreprises clientes a obtenu les meilleurs classements, devant les autres sociétés entrant dans le cadre de cette étude (Barracuda Networks, Blue Coat Systems, Cisco, iboss, Intel Security (McAfee), Symantec, Websense), dans les trois catégories évaluées : Current Offering (Offre actuelle), Strategy (Stratégie) et Market Presence (Présence sur les marchés).
July 3, 2015

Beginning of the end for security applicances. Zscaler reacts to OpenDNS acquisition by Cisco

Daniel Druker, Chief Marketing Officer chez Zscaler explique : Cette aquisition est un nouveau signal marquant le début de la fin des appliances de sécurité. Un déclin porté par l’infatigable croissance du cloud computing, de la mobilité et de l’internet des objets.
July 2, 2015

Beginning of the end for security applicances. Zscaler reacts to OpenDNS acquisition by Cisco

Daniel Druker, Chief Marketing Officer chez Zscaler explique Cette aquisition est un nouveau signal marquant le début de la fin des appliances de sécurité. Un déclin porté par l'infatigable croissance du cloud computing, de la mobilité et de l'internet des objets.
July 2, 2015

Searches for Pirated Content Lead to Pain and Little Gain

Researchers at Zscaler have been tracking a long-term campaign that dupes users who are looking for various pirated content such as games or TV shows into installing adware. Rather than getting the content they’re looking for, users download a file that appears to be legitimate but includes the malicious content instead.
July 2, 2015

Cisco grabs OpenDNS for £405 million

Commenting on the launch Zscaler’s (a fellow security as a service firm) CMO, Daniel Druker, said the acquisition is another signal for the beginning of the end of security appliances, driven by the unstoppable growth of cloud computing, mobility and the Internet of Things.
July 1, 2015

Updated: Cisco Systems moves to buy OpenDNS for £405m

Daniel Druker, chief marketing officer at Zscaler, said this acquisition is another sign that the days of security appliances are numbered due to the “unstoppable growth of cloud computing, mobility and the Internet of Things”.
July 1, 2015

CISCO/DNS: The Beginning of the End of Security Appliances?

In response to the news that Cisco plans to acquire OpenDNS for $635 million, Daniel Druker, Chief Marketing Officer at Zscaler, said this could kick start the end to security appliances.
July 1, 2015

What does the channel REALLY think of security vendors?

As with all CRN Intelligence reports, this one has allowed for free text feedback, and the 200+ UK resellers that took part have not held back. Painful reading for some maybe, but nowhere else will you see such open and honest feedback, and be able to improve your channel programmes and partner interactions as a result.
June 30, 2015

Zscaler email customers rescued by WeCloud - source

WeCloud operates through a network of channel partners and lists a number of other vendors – including Zscaler – as technology partners.
June 29, 2015

91% of OutBrowse, MultiPlug Adware/Spyware Attacks Come from the US

Content that appears to be legitimate should not be trusted implicitly if it comes from a suspicious source like sites offering pirated content, says Chris Mannon of Zscaler.
June 29, 2015

How CISOs can find and secure rogue cloud applications

There are a number of CASBs, including Mississauga, Ont.-based Perspecsys Inc. CipherCloud Inc., SkyHigh Networks, Netskope, Adallom, CloudLock, Zscaler, Actifio, Bitglass, Trend Micro’s SecureCloud and CloudLink
June 26, 2015

Alliancy Le Mag: Guide de la cybersécurité


June-Juli, 2015

ICYMI: Adult Friend Finder breach, Android woes and leaky Bluetooth

Zscaler researchers explained on the corporate blog that it has seen a large number of sites, dressed up as search engines, that lead to malicious content including sites hosting the Magnitude Exploit Kit.
May 29, 2015

Cloud-Based Cyber Threat Protection

Jay Chaudhry, CEO and founder of Zscaler joins Francine Lacqua on “The Pulse” to discuss his startup that is revolutionizing the world of internet security. His company is currently the only one that protects against cyber threats with a totally cloud-based solution.
May 28, 2015

Sécurité dans le cloud : pour protéger l’entreprise mobile d’aujourd’hui les approches de sécurité doivent être repensées

Les DSI éprouvent souvent des difficultés pour s’adapter à cette nouvelle réalité en raison de la rapidité à laquelle les besoins métier évoluent. Historiquement, les Directions IT ont toujours préféré déployer leurs projets applicatifs dans un délai relativement long, en étudiant attentivement l’impact sur la conception du réseau et la stratégie de sécurité de l’entreprise.
May 28, 2015

Repenser la sécurité dans le cloud ?

Le monde de la sécurité en entreprise traverse actuellement une période de mutation liée aux bouleversements rapides qui transforment profondément la façon de travailler des entreprises. De nouvelles technologies et de nouvelles tendances sont en train de modifier la définition même du réseau d’entreprise, la manière dont nous travaillons et les lieux où nous travaillons, ainsi que les outils utilisés pour accomplir notre travail.
May 28, 2015

Pour protéger l’entreprise mobile d’aujourd’hui les approches de sécurité doivent être repensées,

Par Charles Milton, directeur de Zscaler Services Providers pour la région EMEA
May 27, 2015

Pour protéger l’entreprise mobile d’aujourd’hui les approches de sécurité doivent être repensées

Par Charles Milton, directeur de Zscaler Services Providers pour la région EMEA
May 27, 2015

#IoT : Sécurité et objets connectés ne semblent décidément pas faire bon ménage

Les fournisseurs de matériels n’en sont pas au même niveau de connaissance en matière de sécurité que leurs homologues dans l’industrie du logiciel qui ont été poussés très tôt à modifier leur tactiques de développement à mesure qu’une multitude de vulnérabilités ont été révélées au grand jour » selon Michael Sutton, Vice Président en Recherche Sécuritaire chez Zscaler.
May 26, 2015

Did you want some government spyware with that app store purchase?

In the interests of "data loss prevention" (a euphemism for stopping people sending commercially sensitive data out of the company), companies such as Zscaler will, when brought into a corporate site, covertly install self-signed SSL certificates onto every employee's computer.
May 23, 2015

Novel malvertising attack leads to drive-by ransomware

Zscaler researchers explained on its blog that it has seen a large number of sites, dressed up as search engines, that lead to malicious content including sites hosting the Magnitude Exploit Kit.
May 21, 2015

Malvertising makes use of the Magnitude exploit kit to deliver ransomware

Online advertisements can be annoying. But what if they spread malware too? The excessive greed of few has lead to the rise of malvertising, advertisements that redirect or lead to malware. A recent Zscalar study revealed that several compromised websites contained ads that led to ransomware.
May 20, 2015

Malvertising leads to Magnitude Exploit Kit, ransomware infection

“This is a highly profitable ransomware payload that leverages Bitcoin transactions executed over the Tor Anonymizer to monetize the attack,” wrote ZScaler researchers Edward Miles & Chris Mannon.
May 19, 2015

Michael Sutton, Zscaler : Internet des Objets, la menace est réelle

Les objets connectés se multiplient et dans le même temps les menaces de sécurité s’amplifient. Nous souhaiterions vous proposer l’expertise de Zscaler pour aborder cette thématique.
May 19, 2015

Word Press: authentification data stolen without users’ knowledge

Les sites WordPress piratés ouvrent une « porte dérobée » – backdoor – au moment où les utilisateurs se connectent à leur compte. D’après Zscaler les identifiants sont encodés et transférés au site pirate par une requête GET
May 19, 2015

You have a WordPress site? You should read this right now

The SaaS provider Zscaler said that a number of WordPress-based websites have been compromised after users have logged on to their site from a home page containing malicious code . Once the captured data, they were then sent in encrypted format to hacker.
May 12, 2015

Glasgow chair and Winchester music festival hit by 'unique' cyber-attack

The Glasgow Contemporary Choir and the Blissfields music festival near Winchester are among the innocent victims of what's being described as a 'unique' attack on WordPress-powered websites. Security firm Zscaler's Sameer Patil and Deepen Desai said they found the attack was planting backdoor code on the sites, in order to capture the credentials of everyone logging into them and send them to a US-based attacker website, the dodgy domain “conyouse.com”.
May 12, 2015

Venture Capitalism and the Future of IT

Ravi Mahtre from Lightspeed Venture Partners writes about the companies he believes will be the new generation of market leaders, and notes that Zscaler is the market leader in cloud-based security.
May 12, 2015

Unusual WordPress attack steals login credentials

Wordpress, the Internet's favorite content management system, is a common target for criminals who redirect innocent users to malware download sites. But a new type of malware steals user login credentials instead, while leaving the rest of the user experience unchanged. "It's an interesting attack -- we haven't seen this before," said Michael Sutton, VP of Security Research at San Jose-based cloud security vendor Zscaler, Inc., which recently issued a report about the malware.
May 11, 2015

Fresh WordPress Campaign Steals Credentials

WordPress, being one of the most popular content management systems and blogging platforms on the internet, remains an attractive target for cybercriminals due to its large user base. According to Zscaler researchers Sameer Patil and Deepen Desai, the compromised sites run backdoor code, which activates when the user submits login credentials. The credentials are then encoded and sent to an attacker website in the form of a GET request.
May 11, 2015

Got a WordPress website? You should read this now

SaaS (Security-as-a-Service) provider Zscaler reported that a number of WordPress-based websites have been compromised with users trying to login to them being served malicious code as part of the login page. Once captured, that data is then sent, in an encrypted format, to the hacker.
May 11, 2015

Small WordPress sites leaking like sieves

Wordpress admins hoping for some feet up time after last week's Twenty Fifteen XSS plugin vulnerability appear to have yet another vulnerability to handle. Researchers at Zcaler have identified a bunch of compromised sites that are all leaking user credentials to the same target domain – conyouse.com hosts the command and control.
May 11, 2015

WordPress Sites Backdoored, Leaking Credentials

With a raft of WordPress vulnerabilities—most of them in plugins—to address, now comes word from researchers at Zscaler that a number of sites running the content management system have been compromised and are sending credentials via a backdoor to a criminal group.
May 8, 2015

WordPress Websites Targeted by Credential Leak Campaign

With a raft of WordPress vulnerabilities—most of them in plugins—to address, now comes word from researchers at Zscaler that a number of sites running the content management system have been compromised and are sending credentials via a backdoor to a criminal group.
May 8, 2015

WordPress Patches XSS Vulnerability Exploited in the Wild

Zscaler researchers reported spotting a campaign in which malicious actors have compromised multiple WordPress website in an effort to steal their users’ credentials. The compromised websites contain a backdoor designed to harvest credentials and send them back to the attackers.
May 8, 3025

IRC Botnets Are Not Quite Dead Yet

Far from going the way of the dodo as many had surmised, Internet Relay Chat (IRC) botnets are alive and thriving. A new study by security vendor Zscaler shows that IRC botnets, while not growing at a particularly rapid rate, continue to be active and have incorporated several new features over the years that make them as a potent a threat as ever.
April 29, 2015

Ipanema Releases Dynamic WAN Selection

Enable Ipanema devices (IP engines) to establish VPN tunnels via the Internet, towards remote data centers that have VPN concentrators (public or private) or web security gateways such as Zscaler
April 29, 2015

Ipanema DWS offers application performance guarantee

The Ipanema devices can establish VPN tunnels via the Internet, towards remote data centers that have VPN concentrators or web security gateways such as Zscaler.
April 28, 2015

Takeaways from RSA 2015: The stars of the show

Visibility, data center security, two-factor authentication, and services were the stars of RSA 2015.
April 27, 2015

Bogus Adult Content Page Foists Android SMS Trojan

Researchers at Zscaler say that this tactic is most likely adopted to evade detection based on blacklists with known names for malicious apps.
April 24, 2015

IRC Botnets Continue to Evolve: Zscaler

Researchers at Zscaler have conducted an analysis of some of the most prevalent IRC-based botnets and determined that these types of threats remain effective as the features incorporated into them continue to improve.
April 24, 2015

In The Know: Top 5 Must-Read Cloud Stories, April 21

Talkin' Cloud at the end of each day pulls out five must-read cloud computing stories from the news cycle for its readers to review in the morning. Today's column features Zscaler, Ericsson (ERIC) and Intel Security.
April 21, 2015

Securing The Branch Office Via the Cloud

Enter Zscaler, a provider of IT security services delivered via the cloud, which just added a next-generation firewall service that can protect both network infrastructure and applications.
April 20, 2015

What you missed in Cloud: Services galore

Zscaler, Inc. led charge with the addition of a firewall to its managed security platform that promises to keep threats outside the organization and sensitive data inside.
April 20, 2015

New Products of the Week 4.20.15

Zscaler is a cloud-based firewall, providing network security, control and visibility with no on-premise hardware or software required.
April 20, 2015

SDxCentral Weekly News Roundup

Zscaler introduced Winter 2015, its cloud-based next-generation firewall.
April 17, 2015

Zscaler Introduces Zscaler Winter 2015 Security As A Service Platform

Zscaler introduced the Winter 2015 release of the Zscaler security platform. Zscaler Winter 2015 is a cloud-based firewall providing network security and application control requiring no on-premises hardware or software.
April 16, 2015

Zscaler Introduces World's First Cloud-Based Next Generation Firewall With Zscaler Winter 2015

Zscaler democratizes security with economical, easy to deploy, easy to manage next-generation firewall for distributed enterprises and mid-market organizations
April 14, 2015

Zscaler Launches Cloud-Based Firewall

The firewall also fully integrates with Zscalers platform which offers sandboxing, web security, DLP, content filtering, SSL inspection, malware protection and correlation, reporting and analytics.
April 14, 2015

Clean Pipes At Last: Zscaler Introduces Cloud Firewall

Zscaler today announced a cloud-based firewall into a market that is finally ready for a clean pipes offering. Not in the press release is the fact that they hired iPolicy founder Pankaj Parekh to take the project forward.
April 14, 2015

Amazon launches a desktop app exchange for business software

The new AWS Marketplace for Desktop Apps makes available such desktop software as security and data storage applications, including Zscaler Security Cloud from Zscaler Inc. and IDM Ultra Security from IDM Computer Solutions;
April 13, 2015

Entrevista: Lane M. Bess and William Welch of Zscaler

Zscaler’s Bill Welch and Lane Bess were featured in a leading Spanish security and IT publication in a story about the growth of the cloud-based security model.
April 2015

5 Cloud Security Firms To Stir Crazy Spring Funding Frenzy

Zscaler is mentioned in this round up story that looks at venture funding and acquisitions dollars have been flying fast and furious over the past two months as investors try to cash in on cloud security.
April 9, 2015

Security spending shift: moving to the cloud

As companies increasingly move sensitive data into the cloud, a number of security implications arise, as well as concerns about investments in these services and technologies. While many organizations are attracted to the benefits of cloud storage, breaches persist, meaning enterprises must create effective plans for migrating their data and monitoring risks, despite the hand-off to third parties. Zscaler’s CEO, Jay Chaudhry, talks to SC Magazine about trends in security spending.
April 6, 2015

Angler Exploit Kit Now Relies on More Successful Infection Tactics

Zscaler’s research team weighs in on the browser-based attack tool Angler Exploit Kit (EK) for an article on Softpedia that outlines how the the EK attack tool works. The story also linked back to the Zscaler blog post on the topic for more information.
April 6, 2015

Movers and Shakers

The SF Chronicle featured Sydney Carey’s appointment as Zscaler’s CFO in it’s regular feature on loca executive moves.
April 5, 2015

Cloud Security Platform for the Consumer: Zscaler

Zscaler CEO Jay Chaudhry discusses the important of internet security in the cloud and Zscaler’s IPO plans. He speaks with Bloomberg’s Alix Steel on “Street Smart.”
March 25, 2015

njRAT Infections on the Rise: Security Firms

The notorious remote access Trojan (RAT) known as njRAT is making a comeback, according to security firms Zscaler and PhishMe.
March 23, 2015

Cyber Threat Alliance signs up 4 new members

Zscaler have joined the Cyber Threat Alliance (CTA) in its efforts to make united progress in the fight against sophisticated cyber enemies through deep collaboration on threat intelligence and sharing indicators of compromise.
March 18, 2015

This Google product was so full of hackers and trolls that Google shut it down

Google Code may have been especially attractive to no-goodniks given that people trust anything downloaded from the Google.com domain without knowing or caring that it's from a third-party developer, security firm Zscaler pointed out in 2013. People would download a game or app and unknowingly hand the keys to the kingdom to a bad actor.
March 13, 2015

The full Cybersecurity 500 list

CRN published The Cybersecurity 500 List, which ranked Zscaler 108 out of 500 cybersecurity companies. The list ranked companies based on innovation, rather than size or revenue. Zscaler was on the list alongside many well-known players in cybersecurity, including FireEye and Palo Alto Networks.
March 10, 2015

IPO prep? Cloud security upstart hires former TIBCO, MongoDB CFO

Seven-year-old Zscaler has accepted relatively little outside money compared to other security startups, but big companies like Dollar General, Hormel Foods, La-Z-Boy, Nestle and United Airlines rely on its cloud services to fight cyberthreats.
March 4, 2015

High Risk, High Reward: The Ups And Downs Of Security Startups

Cloud security is a focus of many of the startups coming to market. When Zscaler arrived in 2008, it aimed to take on secure Web gateway vendors with its cloud security platform. Today the company does SaaS-based Web filtering, cloud-based anti-malware, data loss prevention and secure Wi-Fi services.
February 26, 2015

Cloud security software set for boom time

Vendors included in the research include CA Technologies, McAfee, Symantec, Trend Micro, CipherCloud, CloudLock, CloudPassage, Commtouch Software, CREDANT Technologies, CYREN, HyTrust, IBM, Okta, Panda Security, SafeNet, Skyhigh Networks, ThreatMetrix and Zscaler.
February 23, 2015

Cloud security software set to balloon by 50 percent

endors included in the research include CA Technologies, McAfee, Symantec, Trend Micro, CipherCloud, CloudLock, CloudPassage, Commtouch Software, CREDANT Technologies, CYREN, HyTrust, IBM, Okta, Panda Security, SafeNet, Skyhigh Networks, ThreatMetrix and Zscaler.
February 23, 2015

President’s cyber security summit: Share attack info but protect privacy, civil liberties

During the summit, the Cyber Threat Alliance, founded by Palo Alto, Symantec, Fortinet and McAfee, announced four new members: Barracuda Networks, Reversing Labs, Telefonica and ZScaler. The goal of the group is for members to share threat information so they can build stronger defenses against advanced adversaries.
February 17, 2015

Microsoft Corporate Clients Targeted with Volume License Phishing Email

Cybercriminals adept at social engineering take aim at corporate users luring them with fake emails purporting to be from Microsoft Volume Licensing Service Center and informing the recipient that they received administration permissions for handling volume licenses. Zscaler researchers named it Chanitor, and it has been seen in January to deliver the Vawtrak banking Trojan, but it can also be employed to funnel in other types of malware, too.
February 10, 2015

In The Know: Top 5 Must-Read Cloud Stories

One of Talkin’ Cloud’s “must-read” stories of the week, VeloCloud announced its support for a policy engine on its namesake service and the signing of a new alliance with Zscaler. These new relationships are making it possible to extend data protection and security policies across the WAN.
February 10, 2015

VeloCloud Enhances its SD-WAN Service with Zscaler and Websense

VeloCloud Networks, a start-up offering a subscription-based, virtualized WAN service for enterprises that aggregates multiple access lines (cable modem, DSL, LTE) into a single secure connection, announced interoperability with leading cloud security platform, Zscaler, spurring growth of its SD-WAN ecosystem.
February 9, 2015

The Rise Of The Software-Defined WANs

VeloCloud today announced its support for a policy engine on its namesake service and the signing of a new alliance with Zscaler, making it possible to extend data protection and security policies across the WAN.
February 9, 2015

Looking for a Cloud Computing Job? Here are the Best Companies and CEOs to Work for in the Industry

According to a list compiled by Forbes based on Glassdoor.com data, there are several CEOs of cloud companies with more than 90-percent employee approval. Zscaler’s Jay Chaudhry, is among the highest rated CEOs.
February 4, 2015

New Banking Trojan Targets Android, Steals SMS

A relatively new Android Trojan that specializes in stealing banking information by intercepting SMS messages has been making the rounds. Researchers at zScaler spotted the as yet unnamed Trojan circulating as 888.apk. Like many types of malware that came before it, at least for the moment, the Trojan appears to be targeting Chinese Android users.
February 3, 2015

The 20 Coolest Cloud Security Vendors

Zscaler is an IPO candidate for 2015. The Security-as-a-Service provides secure Web gateway capabilities, Web filtering, intrusion prevention and deep packet inspection capabilities. Its data loss prevention can decrypt and inspect content encrypted with SSL.
January 28, 2015

The Best Cloud Companies and CEOs to Work for in 2015

Using the 2015 CRN list as a baseline to compare the Glassdoor.com scores of the (%) of employees who would recommend this company to a friend and (%) of employees who approve of the CEO, the following series of tables were constructed.
January 29, 2015

Cybersecurity Utilities - The Future of Managed Security Services

Z-Scaler (www.zscaler.com), another cloud based solution, takes the OpenDNS model a step further by integrating additional security features into its offering such as malware sandboxing. Z-Scaler's approach is to address complex security issues by engineering the capability into their solution.
January 27, 2015

On the Move: William Welch

The San Jose Internet Security Provider named William Welch global vice president of sales and chief revenue officer. Recently he was vice president and general manager at HP Software Americas.
January 27, 2015

Adobe to patch Flash Player zero-day next week

Researchers at Zscaler provide more details on the use of the vulnerability in the Angler exploit kit. They say that two legitimate ad networks are being used to serve malicious ads, which redirect users to the exploit kit. This is then used to push the 'Bedep' trojan onto the victim's system.
January 23, 2015

Viptela brings Software-Defined WANs to the enterprise

Traditional WANs are too complex, too costly and too inflexible to support today's bandwidth-intensive services and applications. Viptela says software defined WANs can fix that.
January 22, 2015

Zscaler Appoints HP, Symantec Exec Global VP of Sales

Bill Welch, veteran software industry executive, joins Zscaler as Vice President of Global Sales and Chief Revenue Officer to scale the company’s sales and channel organizations and accelerate growth worldwide.
January 14, 2015

The Convoluted Trail Linking North Korea to Sony

"I know a number of people who are concerned that we don't have definitive proof to give proper attribution to the attack, but in cases like this we rarely have all the evidence we need to provide attribution," noted Michael Sutton, vice president of security search for Zscaler. "I do think that while we don't have conclusive proof -- the FBI hasn't been that transparent with us -- I do think North Korea remains the most viable suspect in this attack," Sutton said.
January 13, 2015

Cradlepoint & Zscaler Get Together to Reinforce the Branch Office

One of the biggest security problems when it comes to mobile technology is that of the retail store and the branch office. To that end, Cradlepoint and Zscaler got together to introduce a new breed of hybrid solution that takes the best of a cloud-based solution and matches it with parts of an on-premise solution to deliver powerful, yet useful, protection.
January 13, 2015

Cradlepoint Releases Zscaler Support

Yesterday at the 2015 NRF Conference (National Retail Federation), Cradlepoint has announced the availability of the long awaited Zscaler Internet Security integration. Developed as a joint program between Cradlepoint and Zscaler, this advanced protection monitors data breaches, ensures PCI compliance, and helps remote offices by running a single threat management solution. Built into enterprise routers like the MBR1200, MBR1400, AER 2100, and COR IBR, this is both a rapidly deployed, and easily managed, threat protection solution.
January 13, 2015

William Welch

William Welch has joined Zscaler as global vice president of sales, responsible for for scaling Zscaler’s sales and channel organizations and accelerating growth worldwide.
January 13, 2015

New Variant of Vawtrak Banking Trojan Delivered by Chanitor Downloader

A new strain of the Vawtrak banking Trojan has been discovered by Zscaler security researchers, who observed that it was delivered by malware downloader Chanitor.
January 12, 2015

Feedback Friday: Is North Korea Behind the Sony Hack?

In late November, Sony Pictures Entertainment was hacked by a group calling itself Guardians of the Peace (GOP). What initially appeared to be another hacktivist attack, later turned out to be a sophisticated operation possibly orchestrated by a state actor. Zscaler’s Michael Sutton weighs in.
January 9, 2015

Ad Retargater