<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel>
        <title>News &amp; Announcements | Blog</title>
        <link>https://www.zscaler.com/jp/blogs/feeds/company-news</link>
        <description>Latest news and views from the leading voices in cloud security and secure digital transformation.</description>
        <lastBuildDate>Fri, 01 May 2026 01:07:55 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>RSS 2.0, JSON Feed 1.0, and Atom 1.0 generator for Node.js</generator>
        <language>ja</language>
        <item>
            <title><![CDATA[Introducing the Next Phase of the Zero Trust Browser]]></title>
            <link>https://www.zscaler.com/jp/blogs/company-news/introducing-next-phase-zero-trust-browser</link>
            <guid>https://www.zscaler.com/jp/blogs/company-news/introducing-next-phase-zero-trust-browser</guid>
            <pubDate>Wed, 29 Apr 2026 18:49:58 GMT</pubDate>
            <description><![CDATA[For years, Zscaler has been a leader in enabling secure and seamless browsing and application access for organizations worldwide. We have partnered with thousands of organizations and our Zero Trust Cloud Browser to secure access not only to the internet but also to SaaS and private web apps.&nbsp;As many have realized, securing both browsing and app access from the browser is more critical than ever, as data loss risk rises, risk of non-compliant devices accessing data, and browser-borne threats continue to grow. Attackers increasingly target the browser to steal sensitive data, including:Malicious extensions that execute unauthorized actions or exfiltrate sensitive information.Phishing and identity attacks in the browser aimed at capturing credentials or OAuth tokens.Keystroke loggers and screenshots that silently steal critical corporate data and credentials.GenAI risks, particularly, accidental exposure of sensitive data. What is more, unmanaged devices used by contractors to access apps also present a challenge. By accessing corporate resources without the safeguards of managed endpoints, they increase the risk of data breaches and compliance failures. Without visibility into device posture, such as whether EDR is in place or if the OS is out of date, organizations struggle to determine whether the devices accessing their apps meet security and compliance standards, increasing security risk.To make matters worse, many organizations still rely on risky or expensive tools for app access like VPNs and VDI. These legacy solutions add cost, complexity, and latency, but do little to resolve browser-specific risks be it stopping threats or protecting data. While enterprise browsers are sometimes a viable option, they do require browser migrations that can disrupt work, rendering them unsuitable in certain environments.Ultimately, this means security teams need consistent protections—protections that isolate web threats and stop browser threats, secure app access, and data protection—but delivered through the right form factor for each scenario. Contractors on unmanaged devices may need protection without a migration; sensitive workflows may require stricter in-session controls; and some teams prefer a dedicated managed browser for standardization.Zero Trust Browser uniquely solves for this reality, letting organizations choose the right deployment approach for each scenario. The New Zero Trust BrowserZscaler is excited to announce the Zero Trust Browser is moving into its next phase by expanding into a unique set of form factors that let organizations match security to each use case while also delivering browser-centric security no other enterprise browser can match.This evolution begins with the Zscaler Zero Trust Browser Extension—a new solution for securing modern browsing and application access. Designed to work seamlessly with users’ existing browsers, this lightweight extension delivers Browser Detection and Response (BDR), to stop browser-borne threats like malicious extensions, malicious script, identity and OAuth credential theft or reassembly attacks.&nbsp; It also applies in-browser data protection controls (for example, inline DLP policies and data controls to restrict copy/paste, upload/download, printing, and other risky actions). It also adds real-time device posture signals to app access decisions—so access to SaaS and web apps can be allowed, blocked, or revoked at any time, based on whether the device meets device security requirements such as OS version, EDR, or if disk encryption enabled.&nbsp;All of this helps protect web browsing and enable secure access without relying on VPNs, VDI, or forcing a browser migration when it doesn’t make sense.Zscaler is also bringing the same security and access found in the Extension to a purpose-built Chromium Enterprise Browser. Our dedicated browser brings the same security, access and data protection as our extension, but allows a form factor that lends itself to standardization and a managed browser experience for workers.&nbsp;These two new form factors complement our existing clientless Zero Trust Cloud Browser that offers key protections that isolate web threats in the cloud, and extends secure app access from any browser, while keeping data secure with cloud-deliver data controls and inline Zscaler data security. Our Cloud Browser is excellent for high-security use cases because execution happens in the cloud, keeping data off endpoints. It is also a practical option when installing an extension or new browser on an unmanaged device is not possible.Together, these three form factors—browser extension, enterprise browser, and cloud browser—extend protection across mixed environments and managed or unmanaged devices without fragmenting policy. Zscaler’s Zero Trust Browser pairs advanced security with flexible deployment, so teams can choose the right option for each user, device, and risk level. User ExperienceUser experience is also critical given the browser is a key productivity tool for workers.&nbsp; Zscaler delivers a frictionless “work profile” in the browser that makes secure access simple on their device.&nbsp; Workers are greeted by a customizable home page that makes accessing the app they need for work easy–and it clearly demarcates work from personal use on their device. Cloud users will encounter a similar cloud-delivered portal to app access. The Zero Trust Browser delivers key capabilities in our diverse form factors:Adaptive App Access: Zscaler provides app access with integrated device posture controls, ensuring secure, real-time access to applications only for trusted users and devices from their browser of choice. App access is revocable should device posture deteriorate.Browser-Based Threat Protection: Only Zscaler protects against browser-borne threats with Browser Detection and Response, such as malicious extensions, OAuth and browser identity attacks, malicious scripts, and more.&nbsp; This complements our isolation of web threats.In-Browser and cloud-delivered data security: Granular data security, enforced in the browser or from the cloud, blocks risky actions such as unauthorized screenshots, keystroke logging, printing, and copy/paste, upload and downloads and more.&nbsp; Inline DLP controls, whether browser or cloud, detect and stop sensitive data from exfiltration.Polished User Experience: Users gain a distinct browser profile (on their device or in the cloud) for work activities, separate from personal browsing, for a seamless and polished user experience.&nbsp;&nbsp;Streamlined Security Architecture: By eliminating the need for legacy tools like VDIs or complex infrastructure, the Zero Trust Browser dramatically simplifies secure access and browsing by leveraging existing Zscaler ZIA, ZPA, and data security footprints. It works with any browser, making it scalable and lightweight for enterprise deployment.&nbsp;&nbsp; Only the Zero Trust Browser delivers unmatched deployment flexibility with consistent protections, including browser detection and response, for organizations navigating today’s complex security landscape.Ultimate Form Factor Flexibility: Only Zscaler provides the ability to secure every use case with a choice of form factors—cloud browser, browser extension, or enterprise browser—ensuring seamless protection and access for any user on any browser or device.Unified Cloud and Browser Protection: Leverage world-class cloud threat isolation combined with in-browser threat detection to create the industry’s strongest security posture for modern browsing.Total "Last-Mile" Browser Control: Instantly block browser-layer attacks and data exfiltration by neutralizing threats like malicious extensions, identity theft, unauthorized screenshots, printing, and ensuring data exfiltration never occurs.Browser Freedom, Zero Friction: Secure users in the browsers they already use, eliminating costly migrations to proprietary browsers and reducing change management complexity for organizations.With Zscaler, organizations can seamlessly protect their users while enabling productivity and embracing a modern, secure, and user-friendly approach to browser security.To learn more, sign up for a demo here or contact your account team for a deeper dive.]]></description>
            <dc:creator>Vishal Gupta (Senior Director, Product Management)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Project Glasswingの一員であるZscaler：発見できないものは侵害できないAI]]></title>
            <link>https://www.zscaler.com/jp/blogs/company-news/zscaler-anthropic-project-glasswing</link>
            <guid>https://www.zscaler.com/jp/blogs/company-news/zscaler-anthropic-project-glasswing</guid>
            <pubDate>Tue, 21 Apr 2026 22:00:32 GMT</pubDate>
            <description><![CDATA[概要AnthropicはAIイノベーションの最前線に立ってきました。同社のCEOであるDario Amodei氏は、非常に強力なAIモデルが招く危険性を常に意識し、その責任ある利用を提唱してきました。長年見逃されてきたソフトウェアの脆弱性を発見するMythosモデルの力を認識したAnthropicは、責任あるアプローチを取りました。Project Glasswingを通じて、国家の重要インフラを運営または保護する一部の組織のみにこのモデルを提供したのです。Zscalerは、Anthropicと共同でProject Glasswingに取り組んでおり、その一環としてClaude Mythos Previewへのアクセスを得ています。前提はシンプルです。最先端のAIモデルは、人間よりも速くソフトウェアの脆弱性を発見できる段階に達しています。Mythos Previewは、熟練した人間の研究者のようにコードを理解し、ロジックを読み取り、複数の脆弱性を組み合わせ、数週間ではなく数時間で動作するエクスプロイトを高速で生成します。すでに主要なオペレーティング システムやブラウザーにおいて、数千件もの深刻性の高い脆弱性を発見しています。AIが脆弱性を迅速に発見し、有効なエクスプロイトを生成する能力は今後加速していくでしょう。その時、防御側は先手を打つ必要があります。事後対応型のパッチ適用は、もはや有効な防御戦略とは言えません。AIによる脆弱性発見のスピードには到底追いつけず、自動化された攻撃者の効率にはどんな人材を雇っても勝てないのです。唯一の永続的な解決策は、アーキテクチャーに基づくものです。つまり、既存のセキュリティ スタックに別のツールを追加するだけでは効果がありません。アプリケーションをインターネットに公開したことが原因で発生した問題は、パッチ適用や検知、対応を行っても解決できず、公開をやめる必要があります。 通用しない従来のやり方業界は30年間、同じやり方を続けてきました。境界にファイアウォールを設置し、アプリケーションの前にVPNを設置し、既知の脆弱性をスキャンし、見つかったものにパッチを適用し、攻撃者に見つかる前に発見できることを期待するというものです。このやり方は、攻撃者が人間のスピードで動くことを前提としていました。Mythos Previewはその前提を覆します。アプリケーションがファイアウォールやVPNの背後でインターネットに公開されている場合、最先端モデルはすでにそれを認識できます。インターネットに接続されたすべての領域を並行してスキャンし、人間の担当者ではチェックできない弱点をテストし、それを継続的に実行できるのです。この能力が国家支援型の攻撃者やランサムウェア集団の手に渡ってしまえば、パッチ適用サイクルは無意味になります。従来のセキュリティは、攻撃者よりも先に動けるという期待に基づいて構築されていましたが、AIによるエクスプロイトの時代において、その競争は終わりました。これからは、攻撃者はすでに内部に侵入している前提とせざるを得えません。 根本的に異なるアーキテクチャーZscalerはまさにこの瞬間のために構築されたものであり、私たちは18年以上前から到達可能であれば侵害できると言い続けてきました。ゼロトラストは機能ではありません。新しいラベルの付いたファイアウォールでもありません。これは異なる原則に基づいて構築された根本的に異なるアーキテクチャーです。ユーザーがネットワークに接続することはなく、アプリケーションがインターネットに公開されることもありません。エンドポイントのコンテキストが把握され、接続前にデバイスが検証されます。データはアクセスされた瞬間から保護されます。人間であれAIエージェントであれ、すべての接続は検証済みのアイデンティティーを使用してリアルタイムで1対1に仲介され、他への水平方向の経路は存在しません。Zscaler Zero Trust Exchangeの背後にアプリケーションが隠されている場合、公開されたIPやオープン ポート、検出可能な領域は存在しません。インターネットをスキャンする攻撃者は、存在しないものを見つけることはできません。脆弱性はコード内に存在する可能性もあれば、CVE (Common Vulnerabilities and Exposures)データベースに登録されている可能性もあります。しかし、攻撃者はそこに到達する手段がないのです。これは、攻撃を検知することと、アプリケーションをインターネットから完全に切り離し、攻撃対象をなくすことの違いです。どちらも重要ですが、高速の攻撃に対抗できるのは、後者だけです。 Project GlasswingにおけるZscalerの役割Zscalerは、Global 2000企業の40%が事業を運営するうえで信頼しているプラットフォームです。私たちの貢献はZero Trust Exchangeプラットフォームがすでに組織の中核でどのように機能しているかに基づいています。世界最大のセキュリティ クラウド：Zscalerは1日あたり5,000億件以上のトランザクションと数百兆件のシグナルを処理しています。この規模こそ、ZscalerのAIが良性のリクエストと偵察のプローブを区別できる理由です。この区別は、接続が確立される前にインラインで実行しています。攻撃対象領域の排除：Zscaler Zero Trust Exchangeは、内部アプリケーションをインターネットから不可視化します。これらのアプリケーションの実行場所がデータ センターでも、パブリック クラウドでも、Zscalerはそれらを攻撃から隠します。悪用できるファイアウォールやVPNは存在せす、最先端モデルが発見できるものもありません。利用時点でのデータ保護：新たなリスクは、不正侵入ではなく、自社のAIツールが密かに機密データを持ち出すことです。ZscalerのAIガードレールは、SaaS、プライベート アプリ、メール、暗号化されたトラフィックなど、あらゆるリクエストをリアルタイムで可視化し、データが外部に流出する前に阻止します。AIエージェント向けゼロトラスト：エージェントは現在、ユーザーに代わって自律的に動作しています。エージェントはデータへのアクセスを許可されており、処理を実行して他のシステムに接続します。これらは、人間のユーザーと同じアーキテクチャーで管理されなければなりません。すべてのエージェントは検証済みのアイデンティティーが付与され、1つの特定のアプリケーションにアクセスし、動作が完全に記録されます。 ZscalerによるMythos Previewの活用方法私たちはMythos Previewを、安全なソフトウェア開発ライフサイクルに統合しています。これにより、Zscalerのソフトウェア スタックやZero Trust Exchangeにおける脆弱性を迅速に発見できるようになり、環境をさらに強化し、お客様のリスクを軽減できます。Project Glasswingの一員として、得られた発見をコミュニティーに共有し、世界中のセキュリティ向上に貢献していきます。さらに、AnthropicのOpus 4.7モデルをZscalerのAIレッド チーム演習とエージェント型SecOpsのサービスに統合することで、高度なAIセキュリティ機能によってAIの脅威に対抗できるようにします。 よくあるパターンクラウドが登場した際、業界は従来の境界を維持できると主張しましたが、そうはなりませんでした。モバイルとSaaSが登場した際、業界はVPNが適応するだろうと主張しましたが、実現しませんでした。20～30年ごとにアーキテクチャーは変化する必要があり、それに適応した組織が次の10年を制します。AIはその転換点であり、これまでのどの変化よりも速いスピードで進んでいます。攻撃者はすでにAIモデルを手にしており、私たちも同様です。問題は、組織がもはや存在しない境界を守り続けるのか、それともアプリケーションをインターネットから完全に切り離すのかという点にあります。ゼロトラスト ファイアウォールやAI対策済みのVPNなどというものは存在しません。あるのは、次の侵害が起きる前にどのアーキテクチャーを選択するのかということだけです。その選択となるのがZscalerです。Project Glasswingは、業界全体にそれを加速させるための取り組みです。決断するなら今です。 詳細はこちら4月22日(水)または23日(木)に開催されるウェビナーに今すぐ登録し、参加してください。ウェビナーでは、Claude Mythosのような最先端のAIモデルによって発見される脆弱性から組織を守る方法について解説します。]]></description>
            <dc:creator>Jay Chaudhry (CEO and Founder of Zscaler)</dc:creator>
        </item>
        <item>
            <title><![CDATA[ZscalerとOpenAIが提携し、次世代のサイバーセキュリティを加速]]></title>
            <link>https://www.zscaler.com/jp/blogs/company-news/zscaler-and-openai-join-forces-advance-next-era-cybersecurity</link>
            <guid>https://www.zscaler.com/jp/blogs/company-news/zscaler-and-openai-join-forces-advance-next-era-cybersecurity</guid>
            <pubDate>Thu, 16 Apr 2026 04:27:12 GMT</pubDate>
            <description><![CDATA[概要Zscalerは、OpenAIのTrusted Access for Cyber (TAC)プログラムの一環としてOpenAIと提携しています。このプログラムは、高度なAI機能への信頼された検証済みアクセスを防御者に拡大するものです。プログラムの一環として、Zscalerは、GPT-5.4のTAC対応版であるGPT-5.4-Cyberを活用し、Zero Trust Exchangeプラットフォームとお客様のサイバーセキュリティをさらに強化していく予定です。GPT-5.4-Cyberは、Zscalerの安全なソフトウェア開発ライフサイクル(SDLC)ワークフローに統合され、脆弱性の早期検出、トリアージおよび軽減、ならびにセキュリティの脆弱性へのより迅速なパッチ適用をサポートします。Zscalerには、ソフトウェアの保護に加えて、AIレッド チーム演習やエージェント型SecOpsソリューションなど、AIを悪用した攻撃に対抗するために長期間にわたってOpenAIの技術を活用してきた実績があります。 Zscalerプラットフォームの保護安全なソフトウェアの開発は、Zscalerのビジネスを進めるうえで不可欠です。OpenAIのTACプログラムに参加することで、GPT-5.4-CyberとCodex SecurityをZscalerの社内マルチエージェント型アーキテクチャーに統合し、サイバー防御と製品強化を実現することができます。GPT 5.4-Cyberは、システムの設計段階における脅威モデルの検証から、安全なコード レビューの支援、脆弱性の検出、構築済み成果物に対するブラックボックス テストの実行に至るまで、SDLCプロセス全体を通して開発者にSecurity as a Serviceを提供するための重要な要素となります。私たちは防御と攻撃の両方の視点からTACに取り組んでいます。SDLC全体を通じたセキュリティ強化に加えて、このモデルを活用してサイバー対応力を向上させています。具体的には、大量のセキュリティシグナルを実用的なインテリジェンスに変換し、真のリスクの優先順位付けを行い、修復を加速させています。さらに、攻撃者視点に基づいた態勢強化にもこのモデルを活用しており、攻撃者の攻撃経路のモデル化や、脆弱な制御の特定を行なっています。これにより、これまでにないスピードで露出を無効化することが可能になります。最先端のOpenAIモデルとZscalerの業界をリードするゼロトラスト アーキテクチャーの組み合わせにより、お客様にはこれまで以上に優れたセキュリティを提供できることとなります。Zscalerのゼロトラスト アーキテクチャーは、AIを活用したソフトウェア脆弱性の特定と修復に加え、重要なアプリケーションやソフトウェアをインターネットから不可視化することで、多層的な保護を実現します。この組み合わせにより、Zscalerのお客様は、従来のVPNやファイアウォールよりも優れた保護を利用し、ソフトウェアのレジリエンスを最大限に高めながら、インターネットに面した攻撃対象領域を体系的に排除できます。 OpenAIを活用したAIレッド チーム演習ZscalerはOpenAIの4.xと5.xモデルを活用することで、AIレッド チーム製品スイートにおいて高度な機能を構築し、お客様が安全にAIシステムを構築および展開できるように支援してきました。これには、以下のようなものが含まれます。継続的なレッド チーム演習 プロンプト強化 AI資産分析Agentic Radarオープン ソース プログラムZscalerのAIレッド チーム演習プラットフォーム(旧SPLX)は、2024年初頭からスタック全体でOpenAIモデルを活用してきました。複数のバージョンのOpenAIモデルは、AIシステムを強化するために攻撃シーケンスを動的に生成するうえで中心的な役割を果たしています。音声や画像を含むマルチモーダルなレッド チーム演習においては、OpenAIの画像生成、テキスト読み上げ、音声認識の機能が決定的な戦術的優位性をもたらします。これらの機能を組み合わせることで、AI戦略のセキュリティを強化する業界最先端のソリューションを提供しています。Zscalerのソリューションは、レッド チーム演習中に脆弱性を明らかにするだけでなく、最適化されたシステム プロンプトを生成することで、真のクローズド ループ方式による瞬時の修復を実現します。これは、AIエンジニアがセキュリティと安全性の態勢を向上させるために取るべき、決定的な第一歩となります。Zscalerは、AI資産分析ソリューションの一環としてもOpenAIモデルを活用しています。このソリューションは、MCPツールとそのリスクを分析するとともに、ソースコード スキャンに基づいて複雑なAIエージェントの全体的なリスク分析を提供します。これは、昨年ポーランドのワルシャワで開催された最大規模のOpenAIハッカソンを支えた、オープン ソース プログラムのAgentic Radarの法人版にあたります。 OpenAIを活用したエージェント型SecOpsZscalerのRed Canary検知と対応のマネージド サービス(MDR)は、OpenAIとの提携により、AIを活用した脅威検出と専門家のセキュリティ運用を組み合わせています。OpenAIを活用したエージェントは、Zscalerの専門家と協力し、従来SecOpsアナリストの負担となっていた煩雑なコンテキスト収集に対応します。高度な人間のアナリストがワークフローを統括し、厳格なガードレールを施行するとともに、すべての出力を厳密に検証します。これにより、お客様が信頼する99.6%の真陽性率を維持します。OpenAIの適応力とZscalerのデータ パイプライン、専門家による手順、厳密な検証を組み合わせることで、Zscaler Red Canary MDRサービスの特長である精度を犠牲にすることなく、より迅速で一貫性のある調査を実現します。 適切な基盤の構築AIはサイバーセキュリティのルールを根本から書き換えつつあります。Zscalerは、OpenAIのような大手ベンダーと提携することで、AIを活用してセキュリティ インフラ全体のレジリエンスを高め、AI悪用型の攻撃によるリスクを軽減できるよう取り組んでいます。OpenAIのTACプログラムの一環として同社と連携することは、お客様向けにより優れた成果を実現することにつながるものと期待しています。防御を強化する最先端のOpenAIモデルを、Zscalerの業界をリードするゼロトラスト アーキテクチャーと組み合わせることで、従来のVPNやファイアウォールによってインターネットに露出していた攻撃対象領域や資産を最小限に抑えられます。これは、組織にとって大きなメリットとなります。]]></description>
            <dc:creator>Dhawal Sharma (Executive Vice President, AI Security and Strategic Initiatives)</dc:creator>
        </item>
        <item>
            <title><![CDATA[高速なAIによるVPNセキュリティの崩壊]]></title>
            <link>https://www.zscaler.com/jp/blogs/company-news/ai-machine-speed-breaking-vpn-security</link>
            <guid>https://www.zscaler.com/jp/blogs/company-news/ai-machine-speed-breaking-vpn-security</guid>
            <pubDate>Mon, 23 Mar 2026 22:27:12 GMT</pubDate>
            <description><![CDATA[2026年版 Threatlabz VPNリスク レポートの主な調査結果リモート アクセスは新しい問題ではありません。VPNリスクも、新たな話題ではありません。最新の調査結果であり、2026年版 Zscaler ThreatLabz VPNリスク レポートが明確に示しているのは、脅威環境が変化する速さです。速さが今重要である理由：防御側にとって1番の懸念はAIの速度であり、それはすでに現場で顕在化し始めています。79%はAIを悪用する速さを懸念しています。わずか1年前には「十分」と思われていたVPNの制御も、攻撃者が高速で反復と適応を行うようになると、危険なほど遅いものになり得ます。AIの処理速度は脆弱性の発見から悪用までの時間を短縮していますが、VPNの可視性やパッチ適用サイクルはそれに対応できません。一方、多くの組織は依然としてVPN中心のアクセスを擁護していますが、その実態ははるかに遅い状態です。つまり、検査範囲が限定的であったり、ユーザーが接続すると影響範囲が拡大する可能性のあるアクセス モデルを利用したりしているのです。このレポートは業界の現状の全体像で、攻撃者が防御側の対応速度を上回って規模を拡大した場合、「十分」とされていたリモート アクセス制御が「まったく不十分」になりかねないという警鐘を鳴らすものです。以下は、ITとサイバーセキュリティの専門家822人を対象とした調査結果の主な要点です。これらは、担当部門が経験している実態です。その調査結果がCISO、ネットワーク セキュリティ運用、ITリーダーにとって何を意味するのかを示した後、侵害の時間を短縮するためにできる実践的な対策も紹介しています。 レポートから明らかになった点：AIによる攻撃はすでに現実となっており、VPNによる可視化は追いついていないこのレポートは、AIを悪用した攻撃がもはや仮説ではないことを示しています。過去12か月間にAIを悪用した攻撃を受けたと報告した組織は61%に上ります。しかし、より大きな問題はその後の可視性と制御です。レポートでは以下のことが判明しました。70%は、VPN経由で移動するAIを悪用した脅威について、ほとんど、またはまったく把握できていないと回答しています。さらに、この可視性の問題には別の側面があります。5社中1社は、AIを悪用した侵入と従来の攻撃を区別できません。AIを活用した監視を導入できている組織は、4社中1社(24%)に過ぎません。こうした組み合わせは、侵害を加速させる条件を完璧に満たしています。AIが攻撃者を助け、ソーシャル エンジニアリング、偵察、標的設定を高速で繰り返すことが可能になっている一方で、多くの組織はVPN接続内部で何が起こっているかを十分に把握できず、悪用の早期検知に苦労しています。 パッチ適用が悪用の速度に追いつかないために拡大する侵害期間VPNの重大な脆弱性が明らかになった場合、リスクはCVEのみにとどまりません。問題は、アップグレードのサイクル、変更期間、検証という、修復にかかる全体的な時間です。レポートは、運用上の厳しい現実を浮き彫りにしています。組織の54%は、VPNの重大な脆弱性を修正するには1週間以上かかると回答しています。これは単なる技術的な問題ではなく、運用上の問題です。56%は、パッチ適用を最大の運用上の課題として挙げています。1週間という期間は、従来のIT運用において完全に妥当な範囲内かもしれませんが、AIによって加速された脅威環境においては、まるで一生分とも言えるような時間です。攻撃者はもはや「相手が諦めるまで待つ」必要がないのです。標的を特定し、攻撃経路をテストし、新たな手口をすぐに実用化します。その間防御側は、まだ影響の優先順位付け、変更期間の調整、修正の検証を行っていることが多いのです。 暗号化されたトラフィックが生み出す死角に紛れて活動する攻撃者暗号化は最低限必要ですが、可視化されていない暗号化は、隠れ場所になりかねません。レポートでは以下のことが判明しました。3社中1社は、暗号化されたVPNトラフィックをまったく検査していません。検査している組織であっても、ほぼ完全に可視化しているケースはまれです。ほぼすべて検査できている組織は、わずか8%に過ぎません。これは現代の環境における決定的な脆弱性です。意味のあるトラフィックの流れが不透明であれば、防御側は検知の機会と対応への自信を失います。AI時代において攻撃者は迅速かつ密かに行動できるため、滞在期間が短くても攻撃を成功させられるのです。 攻撃者の侵入後にリスクを増大させるラテラル ムーブメント攻撃者が足がかりを確保した後は、移動範囲の広さが真のリスクになります。このレポートは、ほとんどのVPN環境が依然としてアプリケーションレベルの封じ込めではなく、ネットワークレベルのアクセスを提供していることを示しています。侵害されたセッションを単一のアプリケーションに制限できている組織は、わずか11%に過ぎません。つまり、大多数の組織において、盗まれた資格情報は、より広範な内部アクセスへの経路となる可能性があるということです。これはまさに、攻撃者が水平移動し、影響範囲を拡大させるために悪用できる条件です。 非難の対象ではなくリスクのシグナルとなるユーザーの行動このレポートの最も対応可能な発見の1つは、同時に最も人間的でもあります。63%は、ユーザーがアプリにより速くアクセスするためにVPNの制御を回避していると回答しました。回避する「理由」の多くは、パフォーマンスと信頼性に関するものです。最も多い不満は接続の遅さで29%、次いでデバイスの動作が不安定(23%)、頻繁な切断(19%)となっています。これはユーザーの不注意が原因ではなく、摩擦の問題です。安全なアクセスが遅い、不安定、または扱いにくいと感じられると、ユーザーは仕事を進めるためにそれを回避しようとします。こうした回避は、管理しづらく悪用されやすい「隠れたアクセス経路」を生み出します。ITリーダーにとって、これは信頼性と生産性に関する警告です。アクセスが不安定であれば、ユーザーは代替手段を見つけ出すことになります。セキュリティとネットワーク運用にとっては、制御プレーンにおける警告です。ツールや経路により、ポリシーの施行が断片化するからです。CISOにとっては、リスク ガバナンスの問題となります。「公式アクセス」がデフォルトでない場合、リスク モデルは例外に基づいて構築されることになります。 リーダーにとっての意味：もはや「VPNは安全か安全でないか」を論じる段階ではないレポートの見出しの「高速なAIによるVPNセキュリティの崩壊」は、1つのテクノロジーではなく、以下のような構造的な不適合が問題であることを示しています。AIは攻撃の速度と多様性を加速させるVPNモデルは接続後にアクセス範囲を拡大することが多い重要な部分の可視性は不完全になりがち(特に暗号化されている場合)パッチ適用や変更期間が依然として制約されているユーザーが回避することで攻撃対象領域が拡大するこれが、侵害される隙が生まれる仕組みです。2026年において、侵害される隙を埋められない理由は、担当部門が怠惰であるためではありません。アーキテクチャーや運営方法が、十分な速さで隙を閉じられるように設計されていないためです。 主流になりつつある封じ込め優先のアクセスこのレポートの調査結果を受けて、多くの組織は、ネットワークベースのリモート アクセスからアプリベースのアクセスの原則に移行する動きを見せています。そのために、広範な接続を削減し、アクセス ポリシーを厳格化し、摩擦を増やすことなく可視性と制御を向上させる方法を採用しています。その勢いはすでに主流になりつつあります。84%はゼロトラストへの移行を計画または実施しており、これは2年前の78%から増加しています。モダナイゼーションを評価する際は、結果重視で臨むべきです。影響範囲を縮小する(セッションが到達できる範囲を制限する)実用的な可視性を向上させる(特に暗号化されたトラフィックのパターンや機密性の高いアプリ関連)アイデンティティー、コンテキスト、デバイスの状態に基づいてアクセス許可を施行する安全な経路が簡単な経路となるユーザー エクスペリエンスを提供する重要なのは「何かを購入すること」ではなく、接続優先から封じ込め優先のアクセスへの移行を主導することです。 レポートをベンチマークとし、次のステップへ2026年版 ThreatLabz VPNリスク レポートは、統計情報を提供するだけではありません。VPNセキュリティがAIによりどのように脅かされているかを知るベンチマークでもあります。組織は、可視性のギャップ、パッチ適用の遅れ、ユーザーの回避という問題に直面しています。防御側が広範なアクセス、死角、長い露出期間を強いられる状況下では、高速なAIはVPNセキュリティを崩壊させます。今後の進むべき道は、測定可能な封じ込めです。つまり、影響範囲の縮小、検知速度の向上、回避経路の削減、そして現代の働き方に合ったアクセス モデルの構築です。これらの調査結果の詳細なデータについては、2026年版 ThreatLabz VPNリスク レポートをダウンロードしてご覧ください。]]></description>
            <dc:creator>Olivia Vort (Senior Product Marketing Manager)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Act Fast: RSA 2026]]></title>
            <link>https://www.zscaler.com/jp/blogs/company-news/act-fast-rsa-2026</link>
            <guid>https://www.zscaler.com/jp/blogs/company-news/act-fast-rsa-2026</guid>
            <pubDate>Fri, 20 Mar 2026 16:00:05 GMT</pubDate>
            <description><![CDATA[Next week, the cybersecurity industry gathers in San Francisco for the RSA Conference. While the scale of the event is always a spectacle, its true value lies in how it nurtures the realignment in our collective understanding of risk.This year, that understanding must undergo a fast and fundamental shift because the systems we are trying to secure no longer behave like bounded systems. They behave as networks of decisions which carry risk in every direction.&nbsp; From Static Systems to Dynamic Supply ChainsEnterprise security once relied on a comfortable assumption: systems were bounded and knowable. AI has rendered that assumption obsolete.A single interaction with an AI assistant can trigger a cascade of activity across external models, APIs, and autonomous agents. Data leaves, transforms, and returns. Decisions are delegated across components that often lack a unified security posture. We are no longer just managing applications; we are overseeing AI supply chains.Risk in these environments is not confined to a single breach point. It emerges from the relationships between components. Our research at ThreatLabz confirms the fragility of this new architecture: in controlled testing, 100% of enterprise AI systems analyzed exhibited exploitable vulnerabilities. Often, a full compromise required nothing more than a single interaction.We have also spent years optimizing detection and response, a model that assumes we have time to act. In the age of AI, that time has further evaporated to nothing.Findings from the ThreatLabz 2026 AI Security Report show that AI systems can fail in as little as one second, with a median time to compromise measured in mere minutes. There is no meaningful dwell time in this scenario. There is only the interaction.This implies a hard truth: security cannot be an afterthought. It must exist within the flow of transactions everywhere. Extending Zero Trust to the InteractionThe shift from bounded systems to distributed networks requires a fundamental evolution of our security principles. Zero Trust has traditionally focused on verifying users, devices, and networks. In the age of AI, we must extend this to the interaction.Continuous Evaluation: Trust cannot be granted at the point of entry and assumed thereafter. It must be reassessed at every step of the decision chain.Visibility Beyond the Edge: Security must be able to follow the data and context as they move across models and third-party services.Inline Control: Policies must operate at the point of interaction, where decisions are made, rather than after an outcome is produced.The gap in security today isn't a lack of tools, but a mismatch of models. The traditional perimeter has not just dissolved; it has been replaced by a complex web of AI supply chains and model interactions. While we have focused on securing the edges of environments that are no longer bounded, the true risk has moved to the interaction layer. Understanding and governing the AI supply chain is the only way to close that gap. At RSA, we need to move past the hype and discuss the practical architecture required to secure these dynamic high-velocity workflows.&nbsp; Complexity is a Gift to the AdversaryOne of the biggest challenges I regularly hear from CISOs is the exhaustion caused by tool sprawl. Over the last decade, organizations have layered point product upon point product. While each was intended to solve a specific problem, the collective result is a fragmented mess that creates fatal blind spots.Amongst the many other challenges, every siloed tool is an opportunity for a threat actor. This is why the industry is increasingly shifting toward platform-based security architectures that unify visibility across users, devices, applications, data, and now AI interactions.You will hear a lot of noise about end-to-end solutions next week. However, there is a fundamental difference between a suite of products stitched together and a platform built from the ground up to share intelligence. A cloud-native AI security platform doesn’t just reduce costs; it provides the inline context and automation needed to solve complexity and outpace threats. In a world of high-velocity attacks, simplification is a strategic imperative. Alignment at RSAThe industry does not lack awareness; it lacks alignment between how systems are built and how they are secured. At RSA, we will demonstrate how the Zscaler AI Security Platform applies Zero Trust to this new reality—securing the interactions that now define enterprise risk.We invite you to visit us at Booth #N-5269 and connect with the Zscaler team to discuss how to discover your AI supply chain, reduce risk fast, and stay secure.I look forward to seeing many of you in San Francisco.]]></description>
            <dc:creator>Sunil Frida (Chief Marketing Officer)</dc:creator>
        </item>
        <item>
            <title><![CDATA[See You at RSA 2026]]></title>
            <link>https://www.zscaler.com/jp/blogs/company-news/see-you-rsa-2026</link>
            <guid>https://www.zscaler.com/jp/blogs/company-news/see-you-rsa-2026</guid>
            <pubDate>Fri, 13 Mar 2026 17:01:59 GMT</pubDate>
            <description><![CDATA[Every year, the cybersecurity industry gathers in San Francisco for one reason.RSA.For one week, Moscone becomes the center of the security world. Thousands of practitioners, builders, researchers, CISOs, and innovators come together to share ideas, debate the future, and challenge how security needs to evolve.The conversations start early. They spill out into the hallways, across the show floor, and late into the night.And every year, the drumbeat gets louder.This year feels different.AI is changing how every organization works, builds, and innovates. At the same time, it is expanding the attack surface and accelerating the pace of risk. Security leaders everywhere are asking the same question:How do we move faster without losing control?That is the conversation we are bringing to RSAC 2026.Meet with us | Learn more | Register for RSAC 2026 What Zscaler Is Bringing to RSACAt Booth #N-5269, the Zscaler team will be showcasing the AI Security Platform built on Zero Trust.Not as a concept.As something you can see, experience, and challenge with your toughest questions.Throughout the week we will be demonstrating how organizations are applying security outcomes that matter:Zero Trust EverywhereSecure every user, every app, and every location.Secure AI EverywhereProtect AI adoption and govern how AI is used across your organization.Protect Data EverywhereDiscover sensitive data automatically, secure it across all channels including AI, and prevent exposure before it becomes a breach.Reduce Risk EverywhereUnify exposure and threat management and accelerate response with intelligent security operations.If you are navigating AI adoption, updating your architecture, or simply trying to reduce complexity in your environment, these are conversations worth having. Must See Sessions at RSARSA is always packed with great content, and this year the Zscaler team is bringing five different sessions to get excited about. These are conversations that get to the heart of what security leaders are navigating right now.March 23 | 10:15 – 10:45 AM: Join Jay Chaudry, CEO of Zscaler at the CSA Summit 2026 where he will be discussing Zero Trust and AI as the architecture for the intelligent age with Alan Rosa, CISO, CVS.March 24, 2026 | 9:40 AM – 10:30 AM: Securing GenAI Adoption: Usage Insights, Threats, and Defenses with Deepen Desai, EVP Engineering (Agentic Security Operations) and Dhawal Sharma, EVP Products &amp; Strategy (AI Security).March 24, 2026 | 1:15 – 2:45 PM: Hands-On Threat Hunt: Building a Dynamic Hunt Program with Michael Wylie, Director of Threat Hunting.March 25, 2026 | 12:00 PM – 12:50 PM: What Are You, Really? Authenticating Workloads in a Zero Trust World with Sam Curry, SVP Global CISO and Yaroslav Rosomakho, Chief Scientist.March 25, 2026 | 2:25 PM – 3:15 PM: MASQUE of the Red Death: Rethinking Secure Connectivity with Sam Curry, SVP Global CISO and Yaroslav Rosomakho, Chief Scientist. What I Love About RSARSA is not just about products.It is about the community.It is the one week a year where the entire security industry shows up in one place. The hallway conversations. The sessions. The spontaneous debates about what’s working and what’s not.Some of the most valuable moments happen between meetings, events, and the show floor.That is why so many of us continue to show up every year.And it’s why I am excited for this one. Let’s Connect at RSACIf you are heading to San Francisco, come find us.Stop by the booth. Watch a demo. Attend a speaking session. Challenge our thinking. Share what you are seeing inside your organization.The best part of RSA has always been the conversations.We cannot wait to have them.We will see you at RSAC 2026.Booth #N-5269Moscone Center | San FranciscoAct Fast. Stay Secure.Meet with us | Learn more | Register for RSAC 2026]]></description>
            <dc:creator>Emily Laufer (Director, Product Marketing)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Restrict risk not innovation.  A new mindset for the Financial Services boardroom]]></title>
            <link>https://www.zscaler.com/jp/blogs/company-news/restrict-risk-not-innovation-a-new-mindset-for-the-financial-services-boardroom</link>
            <guid>https://www.zscaler.com/jp/blogs/company-news/restrict-risk-not-innovation-a-new-mindset-for-the-financial-services-boardroom</guid>
            <pubDate>Fri, 13 Mar 2026 13:03:01 GMT</pubDate>
            <description><![CDATA[I met with a CISO last week who could see clear gaps in his internal and external security posture because users were free to disable security controls. He knew it was creating risk but didn’t want to change it because of a ‘user-first’ mentality. This is not a user-centric behaviour, it is creating risk that your organization (and, incidentally, your users) doesn’t need.When caution is risky&nbsp;Big banks can’t out-innovate digital challengers if all their energy is spent ticking compliance boxes. And, if we look at where AI accountability is headed, it’s clear innovation will keep drawing the short straw.&nbsp;That ‘stay in your lane’ understanding between business versus IT is old-school at best, counter-productive at worst. The days of leadership seeing security issues as “something that IT handles” are gone. Singapore is already considering holding top banking execs&nbsp;personally accountable for AI-related risks.&nbsp;If this becomes a global benchmark, leaders will shoot down more bold bets. They will cling to compliance because it feels safe, even if it costs them the win. Customers won’t wait around. If you stall, or seem irrelevant, they’ll jump to the next shiny thing.C-Suite must greenlight innovation to stay competitive. But each new system, AI-driven service or merger comes with risk. Regulators don’t ease up. Every move you make needs evidence, signatures, and someone to blame if it goes wrong. In the financial sector, none of this is new, and it doesn’t go away. Question is, can we protect innovation in this security-first space? Yes. Can we do it without AI? No. If innovation needs confidence and speed, AI gives you the speed. The confidence? That’s where people freeze.Make it safe to go fastIndecision is expensive. While the board takes six months to debate pros and cons of a new capability, a hundred fintechs have beat them to it. It isn’t caution, it’s self-sabotage. They recognize the opportunity but, still, they hesitate.&nbsp;The problem is how we view security. Security isn’t the brakes. It’s the helmet, the seatbelt, and the training the driver gets. You need a roll cage in place. Something that allows you to take the corners at speed, that lets you push hard without worrying that the whole thing will flip over.&nbsp;This is where zero trust comes in. Talk of it is everywhere. Most of it is noise. Here’s what matters: zero trust&nbsp;IS that roll cage. It lets you move fast because it’s built to expect failure and limit the blast radius. It assumes nothing and checks everything; it contains damage, not creative ideas.&nbsp;If the board had the comfort to commit to fast change, they could stop asking “Is this safe?” and start asking “How far can we push this idea?” That’s leadership freedom. It’s not about slowing innovation but about making it safe to maintain speed. Zero trust transforms security from ‘the office of No’ into the foundation that lets the business say “Yes” faster. It gives leaders the confidence to make bold calls.What’s the alternative, really? Keep playing defense? Keep letting legacy liabilities dictate your pace of innovation? Do that and watch competitors lap you.&nbsp;Zero Trust isn’t procurement. It’s postureJust remember not to treat zero trust deployment like a checkbox exercise. It’s a mindset. It’s not just buying a tool; it’s rethinking access, identity, and trust across your entire environment. Beware of vendors who pitch zero trust like it’s a product you can buy on a Tuesday and deploy by Thursday. If someone promises you zero trust in a box, they’re selling you a box.It takes effort to build a great zero trust foundation because ‘verify everything’ isn’t one-size-fits-all. You must define exactly what that means for your business: which users can touch which applications, under what conditions, and which data is truly business‑critical versus routine. It relies on identity‑led policies, granular application access, and data classification that reflects real risk, not blanket permissions or inherited trust.Getting all of this right takes planning and discipline. But done properly, it’s the difference between leading and lagging. This is why zero trust is a leadership issue, not just a technical one.So, here’s my question: What’s the project you’ve been sitting on because you couldn’t justify the risk… to your budget, time, people? What would it take to greenlight it tomorrow?Restrict risk, not innovation:&nbsp;Before you greenlight that project you’ve been sitting on, read&nbsp;The Ripple Effect: A Hallmark of Resilient Cybersecurity for a clear blueprint on extending resilience beyond your walls.]]></description>
            <dc:creator>James Tucker (Head of CISO, International)</dc:creator>
        </item>
        <item>
            <title><![CDATA[波及効果：サイバー レジリエンスを自社だけで完結させてはいけない理由]]></title>
            <link>https://www.zscaler.com/jp/blogs/company-news/the-ripple-effect-why-your-cyber-resilience-must-look-beyond-your-walls</link>
            <guid>https://www.zscaler.com/jp/blogs/company-news/the-ripple-effect-why-your-cyber-resilience-must-look-beyond-your-walls</guid>
            <pubDate>Fri, 27 Feb 2026 20:34:22 GMT</pubDate>
            <description><![CDATA[世界は日ごとに危険になってきています。AIを悪用したサイバー攻撃や迫りくる量子コンピューティングの脅威、さらには地政学的緊張やサプライ チェーンの激しい変化まで、外部からの力があらゆるビジネスに衝撃を与えています。事業継続性と俊敏性を追求する組織にとって、こうした混乱に事後的に対応するだけではもはや十分ではありません。レジリエンスは、内部の防御メカニズムから、外部向けの設計原則に進化する必要があります。組織がこうした外部からの圧力にどのように対応しているのか理解を深めるために、Zscalerは14か国のITリーダー1,750人を対象に調査を実施しました。サイバー レジリエンスへの取り組みや投資は高い水準にあるものの、調査結果では重大なギャップが示されました。組織の信頼感は、内部システムを制御できているという認識を反映していることが多く、外部要因による混乱への真の備えへの信頼とはなっていません。世界のITリーダーの過半数(61%)は、自社のレジリエンス戦略が依然として内向きすぎると認めています。今年のレポート「波及効果：レジリエンスに優れたサイバーセキュリティの証」では、真のレジリエンスは、パートナー、プラットフォーム、サプライ チェーンといった依存関係にある外部の層全体に波及する必要があり、それにより外部の衝撃を吸収および軽減でき、事業運営の不安定化が避けられると論じています。組織の壁を越えたResilience by Designアプローチを採用することで、組織は避けられない事態に耐える機能を導入することができます。重大なギャップ：内向きの視点が機能しない領域内向きのセキュリティは、組織を4つの主要な領域でリスクにさらします。まず、サードパーティーへの依存は脆弱性の大きな原因となっています。68%がサードパーティーへの依存度を高めていますが、レジリエンス戦略を更新しているのは半数未満であり、リスク管理の導入率も50%未満にとどまっています。この重大なギャップにより、昨年は60%の組織がサプライヤーに起因する重大な障害を経験しました。さらに憂慮すべきなのは、サードパーティーの侵害に対してサイバー保険が適用される組織が半数(54%)に過ぎないことです。2つ目に、進化するテクノロジーには課題があります。ITリーダーの52%は、自社の現在のセキュリティでは、エージェント型AIや量子コンピューティングなどの既存の脅威や新たな脅威を防御できないと感じています。42%がエージェント型AIをテストし、34%が導入しましたが、その半数はガバナンスなしで導入していました。10人中7人は「シャドーAI」の使用状況を把握できておらず、56%が機密データの漏洩を懸念しています。さらに、現在盗まれたデータが3～5年後に危険にさらされる可能性があることを60%が認識しているにもかかわらず、57%はポスト量子暗号(PQC)をセキュリティ戦略に組み入れていません。3つ目に、マクロ経済の圧力が急速な変化を迫っています。ITリーダーの74%が、マクロ環境によって急速な方向転換を余儀なくされていることに同意しています。計画は増加していますが(規制順守71%、データ ローカライズ69%)、それでも多くは依然として事後対応となっています。外国の技術への依存は、主権に関する政策や規制をめぐる議論に影響を及ぼしており、積極的な変化を促す要因となっています。Zscalerの調査によると、ITリーダーはこのリスクを積極的に軽減しています。79%が外国の技術への依存状況を評価しており、10人中6人は過去1年間に新しい/進化する主権要件に準拠するためにサイバー レジリエンス戦略を更新しています。昨年は、60%がNIS2、DORA、GDPRなどの規制の変更に対応してサイバー レジリエンス戦略を更新しました。最後に、従来のアーキテクチャーは依然として大きな障壁となっており、81%が依然として従来のシステムに相当程度または中程度に依存しています。回答者の64%も、現在のインフラが障害への効果的な対応を妨げていると認めており、59%はアーキテクチャーがビジネスの変化に追いついていないと述べています。組織が真にレジリエンスに優れた状態になるには、量子技術による混乱、AIのイノベーション、サプライヤーの相互依存をシミュレートするなどの外部ストレス テストを実施し、隠れたリスクを明らかにする必要があります。Resilience by Designの拡大：3つの対応セキュリティ ギャップを解消し、保護の「波及効果」を加速させるには、レジリエンスに関する考え方を外部に拡大する必要があります。これには、可視性を優先し、あらゆる領域への予防的なリスク ハンティングの導入が含まれます。内部システムだけでなく、運用リスクを形成する外部要因にまで対応を広げて、内部システムや外部パートナー、サプライ チェーン全体にわたってデータを追跡するのです。この実現には、3つの戦略的な変化が必要です。全体像を把握し、アーキテクチャーの転換を管理可能にすること：鍵となるのは俊敏性ですが、そのためには急速に変化する外部の脅威に対応できる柔軟なアーキテクチャーが必要です。プラットフォーム設計により、こうした適応を簡素化できます。複雑さは俊敏性の妨げとなるため、セキュリティとネットワーク インフラを分離することが、迅速な実現には欠かせません。可視性を優先し、あらゆる領域に予防的なリスク ハンティングを導入すること：事後対応的な脅威ハンティングから予防的なリスク ハンティングに移行し、内部システム、外部パートナー、サプライ チェーン全体にわたってあらゆる場所のデータを追跡します。将来への備えは、飛躍ではなく進化であるため、着実に構築すること：強力で相互運用可能なプラットフォーム アーキテクチャーがあれば、将来への備えは進化へとつながります。たとえば、エージェント型AIの保護は既存の情報漏洩防止(DLP)を基盤とし、ポスト量子暗号への対応は可視化と段階的な更新という管理可能なプロセスです。外部に波及するレジリエンスの実現Zscaler Zero Trust Exchangeは、この拡大された外部向けのレジリエンスを実現するように設計されています。クラウドネイティブのセキュリティ プラットフォームとして、以下のことが可能になります。可視性の優先：データ セキュリティ、AIセキュリティ、サードパーティーのセキュリティを強化する単一のオーバーレイ セキュリティ プラットフォームにより、請負業者やサプライ チェーンを含むリスク領域全体にわたってエンドツーエンドの制御が可能になります。プラットフォーム アプローチによる簡素化：セキュリティをネットワーク インフラから切り離すことで、安全なアイデンティティーベースの接続が可能になり、組織は状況の変化に応じて市場やデータ フローを迅速に再構成できるようになります。データ センターがヨーロッパ内の25か所に置かれているため、主権要件にも対応します。ゼロトラストに基づいて迅速に適応する機能の提供：生成AIセキュリティやポスト量子暗号の可視化といった機能を、単一のダッシュボードから簡単に有効化できる進化の道筋を提供します。統合された制御という基盤に構築することで、長期的な備えを実現します。現在のサードパーティー依存型の経済において、組織のレジリエンスは、依存するエコシステムの強さによって決まります。組織がサプライヤー、請負業者、共有プラットフォーム全体にわたる制御を設計し、継続的に検証していない場合、パートナーのインシデントが組織本体の障害につながってしまいます。不確実性のなかで成功するには、内部からレジリエンスを構築し、事後対応的な対策から予防的かつ意図的な行動に移行する必要があります。強固な基盤の上にレジリエンスを構築することで、その保護効果が外部に波及し、外部からの衝撃の影響を軽減し、制御できるようになります。ガイダンスが必要な場合は、組織内での波及効果を高めるためにZscalerにお問い合わせください。また、こちらからレポート全文をご覧いただけます。]]></description>
            <dc:creator>James Tucker (Head of CISO, International)</dc:creator>
        </item>
        <item>
            <title><![CDATA[MWC 26: Zscaler Cellular provides a secure and connected world with Telecommunication partners]]></title>
            <link>https://www.zscaler.com/jp/blogs/company-news/mwc-26-zscaler-cellular-provides-a-secure-and-connected-world-with-telecommunication-partners</link>
            <guid>https://www.zscaler.com/jp/blogs/company-news/mwc-26-zscaler-cellular-provides-a-secure-and-connected-world-with-telecommunication-partners</guid>
            <pubDate>Thu, 19 Feb 2026 09:44:23 GMT</pubDate>
            <description><![CDATA[Mobile World Congress is where industries come together to shape what’s next in connectivity - from cellular and private networks to massive-scale IoT. But as enterprises accelerate deployment of connected devices in all manner of environments, from warehouses and retail kiosks to EV chargers and smart city infrastructure, security teams are facing a hard truth: traditional, network-based security models were not built for today’s highly mobile and distributed cellular environments. With AI tools and services booming in organizations, the need for secure device connectivity and accurate data is bigger than ever before.Legacy approaches to cellular-connected security often rely on costly backhaul architectures and infrastructure that can’t scale at the speed of business. Many of these devices operate beyond the practical reach of firewalls, VPNs, and software agents. They are often deployed in hard-to-access locations, managed by different teams, and moved across regions and borders. As a result, organizations struggle with the fundamentals: having visibility into all data streams, controlling how devices connect, enforcing consistent policy, and responding fast when something changes. That lack of visibility and control creates security vulnerabilities and expands organizations' attack surface in exactly the places attackers increasingly target.Zscaler Cellular eliminates these challenges by embedding Zero Trust protection into the SIM itself. That means every packet of data from a cellular-connected device can be evaluated at the first connection—enabling real-time policy enforcement and secure routing through Zscaler’s global, cloud-native security platform. This is a foundational shift from “add security later” to initiate security immediately, at the point where connectivity begins.Visibility and control in “black box” cellular ecosystemsIn many cellular deployments, the customer experience has historically been connectivity-heavy. But security and application-level control are typically left to the enterprise, creating a shared responsibility model where the biggest immediate gap is often visibility. Zscaler Cellular addresses that gap from day one by enabling organizations to treat each asset as an isolated environment, aligned with the Zero Trust architecture. Assets can communicate only according to policy, rather than inheriting implicit trust simply because they are connected. A modern cellular security approach can pair carrier resilience with a control plane for SIM management, while adding security policy enforcement on top turning a fragmented, opaque environment into something measurable and governable. Based on its initial success with the cellular security offer, Zscaler takes the cellular service one step further into the connectivity world.Zscaler partners with leading telecommunications companies to bring advanced Zero Trust security to cellular-connected devices. Connectivity has always been perceived as part of the end-to-end solution and Zscaler is focused on delivering a complete outcome to customers, together with the telecommunication service provider; Providing secure access, protection, and visibility for cellular-connected environments at cloud scale. By leveraging the Zscaler Zero Trust Exchange with telecom infrastructure, Zscaler Cellular delivers secure, scalable, and seamless connectivity to all kinds of mobile devices or things.&nbsp;For enterprises, these partnerships help deliver managed security services that address the unique challenges of securing distributed, cellular-connected environments and thus extending Zero Trust principles across global cellular networks to reduce risk and enable transformation at scale.&nbsp;Partnering with providers to extend reach without heavy liftThat is the reason why Zscaler is investing in partnerships with telecom service providers at this year's MWC. Those partners bring&nbsp;reach, spectrum, and the connectivity footprint, while Zscaler enables&nbsp;Zero Trust security, visibility, and control for the data streams. Zscaler has always been an overlay technology as we don’t depend on&nbsp;how packets move from A to B, but rather focus on securing the conversation between the source and destination. Based on this handshake, providers can deliver an end-to-end offering that customers are actively asking for. This partner-led approach supports the customer‘s choice. Some organizations want to keep their existing provider relationships and SIM estates. Others prefer a fully managed solution. Mobile World Congress 2026 is the right moment for telecom providers to turn security into a growth engine.&nbsp;Zscaler is working with a select set of telecom providers like NTT and Singtel amongst others to build deep integrations that benefit both sides. Providers can continue selling their own SIMs domestically, while enabling customers with international footprints to extend secure connectivity through Zscaler Cellular, delivered via the provider relationship. The result is a practical way for service providers to expand reach and local breakout options without requiring large upfront investments in new equipment or complex deployments. This allows telecom providers to monetize next-generation 5G networks and security with one of the most powerful value-add services they can bring to market. Zscaler has built a global, cloud-native security backbone that now also understands mobile networking. By integrating with Zscaler Cellular, providers can accelerate secure local breakout and deliver 5G-ready experiences with an enterprise-grade security layer without forcing major capital expenditure or rebuilding their portfolios from scratch.Ask for your personal meeting with the Zscaler team on site via this&nbsp;meeting scheduler. See you in Barcelona at MWC!]]></description>
            <dc:creator>Daan Huybregts (Head of Innovation)</dc:creator>
        </item>
        <item>
            <title><![CDATA[2026年 ゼットスケーラー株式会社　年頭所感]]></title>
            <link>https://www.zscaler.com/jp/blogs/company-news/new-year-message-2026</link>
            <guid>https://www.zscaler.com/jp/blogs/company-news/new-year-message-2026</guid>
            <pubDate>Thu, 08 Jan 2026 09:11:22 GMT</pubDate>
            <description><![CDATA[2026年の新年を迎え、ゼットスケーラーは、クラウドとAIを前提とした時代において、日本企業が安心してデジタルトランスフォーメーションを推進できる環境づくりに引き続き取り組んでまいります。2025年は、生成AIの本格的な活用が進む一方で、サイバー脅威の高度化と拡大が顕著になった一年でした。Zscaler ThreatLabz の調査では、Androidマルウェアが前年比67%増加し、IoT攻撃の40%が重要インフラを標的としており、ランサムウェアをはじめとする攻撃が、企業の事業継続に深刻な影響を及ぼしています。こうした環境の中で、AI時代に求められるセキュリティの在り方は大きく変化しています。Zscalerは、FY26第1四半期において、売上高およびARRともに前年比26%成長し、RPOは35%成長、フリーキャッシュフローマージンは52%に達しました。ARRは32億ドルを超え、成長と収益性の両立を実現しています。これらの結果は、Zero Trust Exchange プラットフォームが多くのお客様に支持されていることを示しています。当社の成長は、レガシーなファイアウォールやVPNといった個別製品から、クラウドネイティブで統合されたゼロトラスト基盤へと移行する動きに支えられています。Zero Trust Exchange は、ユーザー、デバイス、アプリケーションを一対一で接続し、ラテラルムーブメントを許さないアーキテクチャを採用しています。現在、当社のクラウド基盤では、1日あたり5,000億件以上のトランザクションを処理し、90億件を超えるセキュリティインシデントやポリシー違反を防止しています。また、5,000兆件以上のAIおよび機械学習シグナルを活用することで、脅威を一度検知すれば、世界中のお客様を同時に保護するクラウドエフェクトを実現しています。AI活用の進展に伴い、当社はAIセキュリティの強化にも注力しています。生成AIの利用からエージェント型AIへの進化を見据え、SPLXの技術を統合することで、AI資産の可視化、レッドチーミング、データ保護を含む包括的なAIセキュリティ基盤を拡張しました。AIも人と同様に適切なアクセス制御とガバナンスが求められる存在であり、Zero Trust Everywhere の考え方がその基盤になると考えています。2026年、日本企業にとっては、AIとクラウドの活用を加速させながら、リスクと複雑性をいかに抑えるかが重要なテーマとなります。境界型防御に依存した従来のモデルでは、この変化に対応することは困難です。ゼロトラストを全社および全環境に適用する Zero Trust Everywhere の実践が、レジリエンスと競争力を高める鍵になると考えています。ゼットスケーラーは、グローバルで培った知見とクラウド規模のデータを活かし、日本企業が安全にAIを活用し、持続的に成長できる基盤を提供し続けます。2026年も、より安全で信頼できるデジタル社会の実現に向けて、皆さまと共に歩んでまいります。]]></description>
            <dc:creator>Hiroyuki Kaneda (RVP for Asia)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zenith Live Encore Highlights Resilience and the secure Future of AI]]></title>
            <link>https://www.zscaler.com/jp/blogs/company-news/zenith-live-encore-highlights-resilience-and-the-secure-future-of-ai</link>
            <guid>https://www.zscaler.com/jp/blogs/company-news/zenith-live-encore-highlights-resilience-and-the-secure-future-of-ai</guid>
            <pubDate>Mon, 22 Dec 2025 13:40:26 GMT</pubDate>
            <description><![CDATA[It was a privilege to join my colleagues on stage for Zenith Live Encore in London earlier this month at the Vision Hall in King’s Cross. Alongside Lee Langley we welcomed over 400 security leaders and innovators to discuss the convergence of AI and Zero Trust. The energy was palpable, and if you couldn’t join us, here is a summary of the key themes and discussions that defined the day.&nbsp;A year of bold transformationThe pace of transformation across EMEA over the last 12 months has been remarkable. We are proud to having been able to help a growing number of organizations fully embrace Zero Trust, consolidate their platforms, and effectively counter real-world threats.&nbsp;However, as we move forward, the lines between internal networks and the public cloud have become increasingly blurred. To navigate this evolution, organizations must shift their mindset. I am continually inspired by the boldness and innovation demonstrated by our customers, but we must all recognize that we aren’t just deploying technology for technology’s sake, we are deploying it to solve critical business challenges.&nbsp;Value over enforcementIn a session on Secure AI Innovations led by James Tucker, Head of CISO at Zscaler, we dug into the reality of AI adoption. There was a clear consensus: the implementation of AI is fundamentally a business process discussion. We need to move from application to finding genuine value. This means focusing on what brings the most time back to employees and identifying where the biggest vulnerabilities lie. Often, the simplest problems to identify are the most complex to solve, which is why bringing employees into the conversation is vital to understand what AI tools they are using to bridge these gaps. This insight is critical for mapping the true flow of data across an organization is a necessary step when we accept that the AI universe is in fact a data security challenge.&nbsp;Speed vs. security – can we have both?&nbsp;One of the day’s standout moments was our industry panel, “The Need for Speed (And Security): Enabling Agentic AI Innovation Without Hitting the Brakes”. Featuring insights from Zeki Turedi, Field CTO at CrowdStrike, Rob Hale, Principal EMEA Security Leader at AWS, and Yaroslav Rosomakho as Zscaler Chief Scientist. The discussion underscored that we are in the midst of the Agentic era and shifting from where AI simply automates tasks but actively executes them on our behalf. This means that we will face more adversaries and more threats than ever before, requiring our defenses to keep pace.&nbsp;As AI agents become more autonomous, the attack surface expands, making it even more of a challenge to enable innovation without wanting to take pause. For security leaders, this means we now need to find that delicate balance and apply a slight break to ensure that we can move at the speed of AI, while still maintaining robust Zero Trust principles.&nbsp;Zero Trust EverywhereFrom disrupting new cyberthreats online, to hearing the real-world stories shared on stage, I feel even more assured that security must be woven into the very fabric of our digital future. And our mission – Zero Trust Everywhere, Powered by AI – is the blueprint for that future.&nbsp;But we cannot do it alone and none of this is possible without the trust of our customers and the dedication of our partners. Thank you for your continued faith in us and I look forward to seeing you all at our next&nbsp;event in January 2026 where we will demonstrate how organisations can accelerate their AI initiatives with Zero Trust.&nbsp;]]></description>
            <dc:creator>Justin Brooks (Area Vice President, Sales - UK&amp;amp;I)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zenith Live Encore: How to Build a Resilient Digital Future with Zero Trust and AI]]></title>
            <link>https://www.zscaler.com/jp/blogs/company-news/zenith-live-encore-how-to-build-a-resilient-digital-future-with-zero-trust-and-ai</link>
            <guid>https://www.zscaler.com/jp/blogs/company-news/zenith-live-encore-how-to-build-a-resilient-digital-future-with-zero-trust-and-ai</guid>
            <pubDate>Wed, 26 Nov 2025 21:50:57 GMT</pubDate>
            <description><![CDATA[Organizations face unprecedented pressure to push their technological boundaries as AI adoption accelerates and competition intensifies. However, the current pace of AI integration far outstrips the speed in which organizations normally assess and address the risks. As a result, the race between innovation, speed and security is leaving defenders in an increasingly vulnerable position.&nbsp;IT security practitioners must enable this new technology’s use - whether public tools or internal deployments - while establishing reasonable guardrails that ensure visibility and robust data security assessments. Organizations are urgently seeking best practices to navigate AI-driven transformation. Extending Zero Trust principles to regain visibility and control of all data streams is now more critical than ever.As companies rethink how employees safely consume generative or agentic applications, they must also apply Zero Trust to their broader ecosystem of suppliers, partners, and B2B integrations. Modern supply chains increasingly share data, applications, and now AI models - creating a new attack surface if not properly secured.That’s why Zscaler’s Zenith Live event series is returning in its one-day roadshow format across Europe - turning AI insights into action. The events will showcase how a cloud-based approach to Zero Trust Everywhere can help security practitioners reduce risk, complexity, and cost in the new technology era. Zscaler experts will reveal how AI and Zero Trust are converging to redefine networking and security, fuelling rapid digital transformation and building resilient, mission-critical infrastructures to safeguard today's business aspirations.&nbsp;Participants will discover how a cloud-centric Zero Trust approach is redefining security to protect every connection, from users and workloads to IoT, OT, branches, and even AI. Security practitioners, IT architects, or networking professionals will gain practical insights and tools to drive real transformation, learning from their peers how to reset boundaries&nbsp; in the pursuit of digitalization while carefully managing cybersecurity risks. Zscaler experts will be on hand to share the latest strategies to minimize attack surfaces, eliminate lateral movement and prevent data loss.&nbsp;Following the recent SPLX acquisition, attendees will get first-hand insights at how this addition to the Zero Trust Exchange platform will extend shift-left AI asset discovery, automated red teaming, and governance - helping organizations secure their AI investments from development through deployment. We’re also bringing back industry panels and fireside chats, offering attendees the opportunity to learn from industry leaders and network with their peers.Agentic AI – Friend or Foe?As part of the agenda, we will also be speaking with Zscaler customers at different stages of their Zero Trust transformation journey. Panellists from leading private and public organizations will share their learnings in a ‘fireside chat’ - helping others who wish to take that first step towards a Zero Trust architecture. Having overcome their own implementation challenges, they’ll offer insights and guidance to make Zero Trust a reality.&nbsp;New this year: a panel on the emergence, adoption and security of Agentic AI. Zeki Turedi, Field CTO at Crowdstrike, and Rob Hale, Principal Security Segment Leader at AWS, will debate whether Agentic AI is a friend or foe - and underline the importance of retaining control over critical digital infrastructure, redefining data governance, and unlocking innovation securely.To learn more about the Zenith Live Encore agenda in your city and discover how Zscaler secures data, applications, devices and users on organizations’ transformation journeys, visit the&nbsp;registration site. See you in London on Tuesday, 9th of December 2025 in Vision Hall!&nbsp;]]></description>
            <dc:creator>Yaroslav Rosomakho (Chief Scientist)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Enabling Europe’s Digital Sovereignty Through Technology]]></title>
            <link>https://www.zscaler.com/jp/blogs/company-news/enabling-europes-digital-sovereignty-through-technology</link>
            <guid>https://www.zscaler.com/jp/blogs/company-news/enabling-europes-digital-sovereignty-through-technology</guid>
            <pubDate>Fri, 14 Nov 2025 20:21:06 GMT</pubDate>
            <description><![CDATA[For years, Europe has discussed the concept of digital sovereignty, but geopolitical fragmentation and a growing ambition for technological independence have moved the discussion from theory toward action. On November 18, the French and German governments will host a high-level summit aimed at turning this aspiration into a practical roadmap. It’s a pivotal moment as policymakers, industry leaders, and advocates unite to safeguard Europe’s digital future.Let’s be clear: Europe is charting new territory. The ambition to secure control over critical digital infrastructure, redefine data governance, and unlock innovation is bold, understandable, and yet complex. It is, however, not a concept with a clear definition. In fact, if one visited the various EU capitals one would probably encounter more than 27 different versions of what “digital sovereignty” could mean. But the lack of one coherent and agreed upon definition should not be misunderstood. To paraphrase a senior official from one of the largest member states during a recent conversation: The call for digital sovereignty is loud and ideological.&nbsp;In Europe, there is indeed an increasing convergence on a number of principles. First and foremost, it’s about securing the future; about being in control of data, being independent, ensuring service continuity, demanding transparency, and making sure that Europe reaps the benefits of the digital age and remains competitive on the global stage.The tech industry has a responsibility to respond in earnest. At Zscaler, we understand the critical nature of this goal. We believe sovereignty must be achieved on European terms. As a global leader in cybersecurity with almost 2,500 customers across Europe, we are committed to innovating and delivering cutting-edge technology that aligns with and supports Europe’s digital vision. As a testament to this commitment Zscaler was in 2010 the first security service provider to build a cloud for Europe.Ahead of the Summit in Berlin, we offer our perspective on some of the defining elements of digital sovereignty and explore how solutions deliver the security, flexibility, and independence European organizations demand to thrive in today’s interconnected world.1. Safeguarding European DataEurope’s data must be private, secure, and local. As organizations adopt global cloud systems, they are concerned about losing control over sensitive information to outside actors or cyberthreats. Data sovereignty is about keeping data protected, and ensuring compliance with national rules while building trust for critical operations.How Zscaler Supports Europe’s Data Protection and Localization Goals:Zscaler does not store end-user content: All inline traffic processing is performed in-memory inside the local infrastructure, simplifying data control.The Zscaler Zero Trust Exchange secures application access without exposing sensitive data.The platform’s cloud-native design leverages encryption, data visibility, and granular access controls, seamlessly aligning with GDPR and broader compliance requirements.Customers can opt to exclusively use European infrastructure. Zscaler has 25 data centers across Europe (20 in EU countries), ensuring data processing happens locally for optimal performance and sovereignty.European customers' can ensure that their log data is stored within Europe. However, customers have full control over storage decisions and have the option to have data hosted in any sovereign or in-country logging zones.Zscaler makes data control simple and enables organizations to uphold the principles of Privacy by Design and Privacy by Default while delivering low-latency, highly secure access.&nbsp;2. Securing Digital AutonomyDigital sovereignty involves reducing overreliance on foreign technologies, and keeping control over systems. Europe needs flexible frameworks that avoid vendor lock-in while enabling secure innovation. Without autonomy, organizations risk being limited in how they evolve and protect their most critical digital assets.How Zscaler Facilitates Europe's Technological Independence and Cybersecurity Goals:Enabling Europe’s Technological Independence:Zscaler’s vendor-neutral architecture allows European businesses to retain flexibility in their IT frameworks, allowing organisations to mix and match solutions across cloud, data, endpoint, identity, and services from different technology providers. For more information, please visit:&nbsp;/partners/technologyZscaler facilitates delegation of administration which allows only EU citizens to define policies, logging and viewing of any data on our platform.A cloud-based approach ensures businesses can reduce dependencies on legacy systems while avoiding vendor lock-in, preserving sovereignty and freedom to innovate.Zscaler ensures businesses can migrate from legacy systems without being locked into specific hardware, proprietary ecosystems, or constrained by external dependencies.Securing Europe’s Critical Infrastructure:With Zscaler’s Zero Trust architecture, users and devices are continuously authenticated and authorized before accessing applications, preventing breaches.Zscaler’s advanced threat protection capabilities protect organisations from malware, Zero-Day vulnerabilities, and AI-driven cyberthreats, while safeguarding operations across the continent.Zscaler is working with hosting and service providers to own &amp; operate sovereign solutions built on Zscaler cloud solutions in their European datacenters.&nbsp;Zscaler is redefining security for a resilient, self-reliant Europe by blending cutting-edge technology with scalable and best-in-class security.3. Accelerating InnovationInnovation drives growth and competitiveness, and Europe must embrace new technologies to stay ahead. To succeed, organizations need to adopt solutions that are secure and compliant, while still giving them the ability to operate and scale confidently without putting sensitive data at risk.How Zscaler Facilitates Europe’s Innovation and Competitiveness Goals:By facilitating secure, cloud-first strategies, Zscaler reduces infrastructure costs, freeing resources for new investments in innovation and growth. Scalable, flexible solutions allow organizations to confidently adopt emerging technologies.With Zscaler’s capabilities, businesses can seamlessly enable secure hybrid work environments, delivering security and flexibility for modern workplaces.Zscaler innovates, improves operational efficiencies, and responds to market trends faster, gaining a critical edge against international competitors, while maintaining compliance with Europe’s rigorous regulatory standards.A no-compromise Zero Trust approach ensures that organizations can innovate and expand without exposing their systems, people, or data to unnecessary risk.At the same time, a transition away from legacy technology offers the additional advantage of combining state-of-the-art protection while reducing costs: Unlike previous technological innovations, moving forward saves resources.&nbsp;Zscaler redefines what it means to innovate securely in the digital age, ensuring that European businesses grow and stay competitive internationally.4. Delivering Responsible AIAI has the potential to transform the digital economy, but it also brings security vulnerabilities and the risk of misuse. Europe’s goal is to adopt AI responsibly by focusing on privacy, ethical standards, and robust safeguards that ensure trust and transparency in AI systems.&nbsp;As recently recommended in a joint report&nbsp;by French and German authorities, Zero Trust must be applied to LLM systems to address AI-specific security challenges.How Zscaler Enables Responsible AI Adoption:Achieving the productivity gains from AI requires that the AI systems can run safely without exposing organizations to risk.Zscaler is committed to ensuring that any AI systems it deploys in its products adheres to the regulatory requirements set forth in the EU AI Act, which is the first comprehensive AI regulatory framework enacted in the world establishing global standards for transparency, fairness, and accountability in AI.Zero Trust principles protect sensitive AI datasets and data pipelines, preventing manipulation, theft, and malicious exploitation while preserving the integrity of algorithms and models.Through Zero Trust architecture, Zscaler safeguards the use of AI models, agentic AI, and their data pipelines, ensuring the integrity of AI solutions.Zscaler helps European organizations maximize the potential of AI, meeting ethical standards, and protecting systems and data pipelines against misuse.5. Providing Operational ResilienceDisruptions from cyberattacks, natural disasters, damage to undersea cables, and political uncertainty can threaten critical systems and data. Operational resilience helps businesses stay functional and secure during such events, ensuring stability and continuity even in unforeseen circumstances.How Zscaler Bolsters Operational Resilience:Zscaler’s Zero Trust architecture ensures secure, direct access to cloud services and applications, even during disruptions caused by internet outages or attacks on critical infrastructure such as undersea cables, due to our resilient data center architecture, keeping European businesses operational when it matters most.With real-time threat protection, Zscaler prevents ransomware and other cyber threats from disrupting critical infrastructure and business operations.Zscaler provides secure, flexible access that supports employees working from anywhere while maintaining security standards.By decoupling security from legacy network models, and embracing cloud-native solutions, Zscaler empowers organizations to adapt quickly to shifting geopolitical conditions, ensuring business continuity in even the most uncertain environments.Zscaler is the first cloud security solution to deliver a business continuity solution.&nbsp; Through either customer-hosted or third-party hosted infrastructure, Zscaler customers are protected from service interruptions due to black-outs, brown-outs, catastrophic failures of infrastructure, terrorism, or regulatory/policy changes.&nbsp; Issues local to the user, between the user and the cloud, or a cloud incident are detected and fail-over to a business continuity solution occurs automatically.Our customers have an option to keep using a self-hosted private service edge even in case of a catastrophic global routing event which would make all cloud services unavailable.Zscaler builds resilience into organizations’ systems, protecting operations against disruptions and safeguarding sovereignty goals.Zscaler delivers destination agility and resilience by dynamically rerouting traffic and adapting paths in real time, maintaining secure and continuous connectivity during internet or cloud disruptions.The New Reality Requires a Renewed Commitment to Europe’s Digital FutureAs we approach the Franco-German Summit on European Digital Sovereignty, two principles stand out as essential to the success of Europe’s digital ambitions:Digital sovereignty and open strategic autonomy must be shaped on European terms, driven by European priorities and values. This means that technology companies must innovate and deliver solutions that align with Europe’s needs and aspirations.Trusted technology providers that deliver Europe’s sovereignty in practice—not just in words—should be empowered to keep contributing to this vision. EU policy should allow trusted technology providers that demonstrably advance Europe’s sovereignty to continue contributing to this vision.Combining these principles is, in our view, critical to achieving Europe’s sovereign digital future, as well as its global competitiveness at this pivotal moment in history.At Zscaler, we recognize that enabling Europe’s digital sovereignty is about empowering European organizations to secure their systems, innovate without boundaries, and thrive on their own terms. As a global leader in Zero Trust security Zscaler is uniquely positioned to help European organizations meet today’s challenges and build a resilient, self-reliant future.]]></description>
            <dc:creator>Casper Klynge (VP, Government Partnerships)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Step Into the Future of Zero Trust + AI Security with Zscaler at AWS re:Invent 2025]]></title>
            <link>https://www.zscaler.com/jp/blogs/company-news/step-future-zero-trust-ai-security-zscaler-aws-re-invent-2025</link>
            <guid>https://www.zscaler.com/jp/blogs/company-news/step-future-zero-trust-ai-security-zscaler-aws-re-invent-2025</guid>
            <pubDate>Tue, 04 Nov 2025 19:46:37 GMT</pubDate>
            <description><![CDATA[Zscaler and AWS are redefining what’s possible in the cloud. Visit Booth #1375 at the Venetian, December 1-5, to see how zero trust + AI security come together to protect data, power innovation, and simplify cloud security operations.Meet with Zscaler at AWS re:Invent 2025: Schedule a meeting | Explore Zscaler for AWSIn today’s cloud-first world, agility and innovation are everything. Yet many organizations are still weighed down by legacy tools that can’t keep up. VPNs, firewalls and static security models were never built for AI-driven transformation or a distributed workforce. They slow progress, create blind spots and expose new attack surfaces in the cloud. As organizations move more applications to the cloud and adopt GenAI, traditional security approaches put users, devices, and data at risk. The future of security depends on moving beyond these limitations towards a unified zero trust architecture. Together, Zscaler and AWS help enterprises simplify, automate, and scale securely across workloads, users, and data while keeping innovation moving forward.&nbsp; What to Expect at AWS re:Invent with ZscalerHere’s what you’ll see:Live demos showcasing Zero Trust + AI innovations in actionExpert insights on securing GenAI Apps and cloud workloadsProven strategies to eliminate VPNs/Firewalls and reduce riskReal-world customer use cases powered by Zscaler on AWSExpert theater presentations on the latest Zscaler solutionsDon’t miss these sessions:Tue., Dec. 2, 2:30PM: Securing the AI Era with Dhawal Sharma, EVP Products &amp; Strategy, ZscalerWed., Dec. 3, 4:00PM: Zero Trust: The Blueprint for Securing AI-Powered SDLC with Brian Lazear, VP, Product Management - Cloud Workloads How Zscaler + AWS Make It PossibleTogether, Zscaler and AWS deliver a secure foundation for cloud transformation.Here’s how:Unify security across AWS environments. Protect users, workloads, and data through the Zscaler Zero Trust Exchange, a global cloud platform built on AWS infrastructure.Secure GenAI applications. Discover and control AI tool usage while preventing data leakage and unauthorized access.Simplify access and eliminate VPNs. Provide seamless, content-based access to private apps on AWS and beyond without the cost and complexity of legacy VPNs.Protect workloads at scale. Segment and secure inter-workload traffic with cloud-native controls that reduce lateral movement and risk.Accelerate cloud migration. Move from on-prem to AWS with built-in visibility, automation, and policy consistency.&nbsp; Join us at AWS re:Invent 2025Zscaler and AWS are shaping the future of secure cloud innovation. Visit Booth #1375 at the Venetian December 1-5, to explore how Zero Trust and AI come together to protect data, accelerate transformation, and simplify security across your organization.Meet our experts, get a live demo, and learn how leading enterprises are using Zscaler and AWS to scale securely, operate efficiently, and innovate with confidence.Schedule a meeting | Explore Zscaler for AWS | Customer success stories | AWS Marketplace]]></description>
            <dc:creator>Dhawal Sharma (Executive Vice President, AI Security and Strategic Initiatives)</dc:creator>
        </item>
        <item>
            <title><![CDATA[The Tension Between ‘Decentralized Ops’ and ‘Security Compliance’]]></title>
            <link>https://www.zscaler.com/jp/blogs/company-news/the-tension-between-decentralized-ops-and-security-compliance</link>
            <guid>https://www.zscaler.com/jp/blogs/company-news/the-tension-between-decentralized-ops-and-security-compliance</guid>
            <pubDate>Thu, 23 Oct 2025 07:17:13 GMT</pubDate>
            <description><![CDATA[When responsibilities for security governance, implementation, and innovation are spread across multiple business units, there’s a lack of cohesion that makes security compliance more complex than it needs to be. Navigating this complexity is made even trickier for those still operating on legacy infrastructure. It’s a problem faced by many large banks in the Financial Services sector.Operational Friction PointsThe vast organizational scale of established banks naturally creates a complex operational ecosystem. This often results in fragmented decision-making, with different teams managing isolated parts of the technology and security landscape. While there is an argument to be made for how this approach supports domain expertise, it obscures a bigger problem: inconsistent application of security governance. And inconsistency is a word we want to avoid in banking’s highly regulated environment.&nbsp;When it comes to security, there are a few critical shared responsibilities that teams headed by the CISO, CIO, and CTO must all navigate: regulatory compliance, risk management, and incident response. However, as the authority on security governance, it is the CISO who sets the organization’s guiding framework—with the CIO and CTO left to implement its outlined requirements across their respective domains of IT infrastructure and product environments. Even with a single framework in place, siloed operations often lead to inconsistent implementation across departments. Without a unified approach, risk exposure increases—especially when legacy landscapes mean visibility (into who is connecting to what and when) is not the default.Time and budgets are additional compliance pain points. As the number of regulations relevant to the financial services sector continues to grow, staying compliant has become a resource-intensive endeavor. Audits can stretch over weeks or months, requiring significant investment in both people and technology to ensure that security policies are embedded into day-to-day operations. In legacy set-ups, this burden means manual oversight and patchworking or compensating controls across fragmented systems. The ongoing operational expense of maintaining these controls typically falls to the CIO and CTO, who are already stretching budgets to reduce costs, maintain resilience, and deliver on transformation goals. If security was embedded into the architecture by design, CIOs and CTOs wouldn’t bear the long-term costs of decisions made outside their control.&nbsp;Technical Reality ChecksWhile compliance challenges in day-to-day operations are well known, what happens when banks try to innovate? Increasingly, a gap is emerging surrounding these efforts between the strategic optimism of non-technical leadership and the grounded realism of technical teams.&nbsp;As new-age challengers emerge, many banking CEOs equate staying competitive with embracing emerging technologies like AI. It’s true, AI holds real potential to drive innovation, growth, and market leadership. But one major barrier stands in the way: legacy systems weren’t built to support AI integration, increasing exposure risk and the complexity of maintaining security compliance. What’s more, AI introduces a new operational domain with fresh challenges around observability and control. These challenges are compounded by fragmented infrastructures, where the data that AI depends on resides in siloed systems. As a result, previously distinct technology domains are now colliding at greater speed—and with heightened internal volatility, as teams scramble to move fast while staying secure.Solving for Security at ScaleHow do banks address the challenges they face when trying to unify security enforcement across different divisions and innovate across the organization with emerging technologies? Many are turning to zero trust architecture.&nbsp;Unlike traditional perimeter-based approaches, this security approach assumes no implicit trust within the network and enforces strict verification at every access point, regardless of user, device, or location. The zero trust model aligns the responsibilities of the CISO, CIO, and CTO by centralizing policy enforcement, improving visibility across systems, and reducing the complexity of managing compliance in siloed environments.&nbsp;But zero trust is more than a security framework—it’s a strategic enabler of scalable protection, which becomes clear when we think of these points below:&nbsp;By delivering security as a service and connectivity at scale, zero trust empowers banks to adopt new technologies safely and rapidly. It provides the same level of protection, features, and control in both on-prem and cloud use cases, bringing much-needed consistency across hybrid environments. This means teams don’t have to compromise or choose between use cases. Everything works consistently, no matter where the data or applications live.It delivers visibility across&nbsp;all domains. This means that while technology domains may remain segmented, the visibility&nbsp;and control&nbsp;is not, allowing security teams to monitor and influence activity without friction.Data security is embedded at the heart of zero trust’s proxy-based architecture—not bolted on after the fact. It means banks can move quickly to scale new tech integrations—even advanced integrations like AI agents—without compromising compliance or operational integrity. In fact, it offers onramps for both legacy and emerging services, extending protection not just within the bank but also across its broader ecosystem—including partners and community-facing platforms.&nbsp;Common Security LanguageIn a decentralized operating environment, the question of who’s really in charge of security is less about hierarchy and more about cohesion. Zero trust helps banks speak a common security language—one that embeds compliance into every action, across every team, no matter who’s leading the charge.READY TO SECURE AT SCALE? Financial Services not only want but need a modern security approach to handle the ‘now’ and prepare for ‘what’s next’. The key is finding the right architecture with zero trust at its core to help you secure, simplify and comply with confidence.&nbsp;Find your future-proofed path here]]></description>
            <dc:creator>Martyn Ditchburn (Zscaler)</dc:creator>
        </item>
        <item>
            <title><![CDATA[The Cost of Trust: Preventing Breaches with Damages in the Millions]]></title>
            <link>https://www.zscaler.com/jp/blogs/company-news/the-cost-of-trust-preventing-breaches-with-damages-in-the-millions</link>
            <guid>https://www.zscaler.com/jp/blogs/company-news/the-cost-of-trust-preventing-breaches-with-damages-in-the-millions</guid>
            <pubDate>Thu, 16 Oct 2025 07:51:29 GMT</pubDate>
            <description><![CDATA[In Financial Services, trust is foundational. In cybersecurity, implicit trust can be a costly liability, running up millions of dollars in losses.&nbsp;To help ground this statement, I want you to consider a specific amount: $6.08 million to be exact. This is the real-world price tag that Financial Services enterprises are paying for putting their trust in the wrong people, processes, and technologies—it’s the average cost of a data breach in the sector, according to the latest data from&nbsp;IBM.&nbsp;The astronomical stakes make the case for a zero trust approach and highlight that traditional security models, despite their enduring presence&nbsp;in the market, are no longer enough.The Financial Impact of BreachesFinancial Service organizations have always been on cybercriminals’ radar. Over the past two decades, nearly one-fifth of all global cyber incidents have targeted—you guessed it—a financial firm according to the latest&nbsp;IMF report.It’s a significant number and includes many high-profile breaches. For example, in 2019, a CNN headline read:&nbsp;A hacker gained access to 100 million Capital One credit card applications and accounts. This was one&nbsp;of the biggest breaches in recent history, with considerable financial fallout for the American credit provider. There were regulatory fines to the tune of&nbsp;$80 million, because the OCC regulator found that Capital One failed to put risk management practices in place before migrating to the cloud. There was also a hefty&nbsp;$190 million Class Action Settlement&nbsp;to resolve lawsuits from affected customers.When we think about financial consequences of cyber incidents, the first point that comes to mind is the very tangible cost needed to recover and secure operations. Then come potential costs in regulatory fines. But one impact that’s most damaging and enduring is to a brand’s reputation. Customers are increasingly wary of entrusting their data to organizations that have faced a breach. Their concern is valid: the latest ThreatLabz research revealed that data exfiltration surged 92.7% from last year. It shows that data theft is fuelling extortion campaigns, so it makes sense that 47% of businesses (across sectors) say they struggle to attract new customers after publicized cyberattacks according to&nbsp;Hiscox Cyber Readiness Report.Gaining trust is a competitive advantage, but one that’s easily lost. Especially in a digital system ‘protected’ by legacy security.&nbsp;Where Traditional Models FailLegacy security tools&nbsp;fall short of today’s demands in many ways. They focus on protecting the perimeter yet do&nbsp;not offer enough visibility and, as such, deprioritize resilience.Legacy tools like VPNs, firewalls, and static access controls were designed for a time when users and data stayed inside the network perimeter. Today’s cloud-first hybrid environments render these tools insufficient. Once attackers breach the (blurred boundary of an imagined) perimeter, they often face little resistance. And lateral movement could mean unfettered access to masses of sensitive data.What about visibility? There are several reasons why security architects managing traditional set-ups aren’t getting the necessary visibility they need to enforce least privilege or respond quickly to anomalies. One is a flat network architecture where tools like firewalls struggle to&nbsp;differentiate between normal and suspicious traffic&nbsp;because everything looks the same. Without traffic segmentation, it's hard to apply context-aware monitoring that delivers the necessary visibility. Another is broad network access, where the activity of connected users isn’t monitored, meaning suspicious behavior can go unnoticed. Bottom line? Security should provide always-on, real-time visibility of user and device activity.Finally, we touch on the&nbsp;topic of resilience; it’s become something of a mantra at Zscaler, and for good reason. When we look at technology and processes, resilience isn’t only about securing but about responding: how quickly can you contain a breach and bring business back online? We’re in a ‘when not if’ cyberattack era where no business is immune, which is why running threat detection alone is shortsighted. Unfortunately, the reality is, traditional security models struggle to contain an attack, which is disastrous for business continuity.&nbsp;Zero Trust as a Cost-Saving StrategyConsidering the financial ramifications of a security breach, I feel that zero trust can be framed as a cost-saving investment. We should move away from the notion of zero trust being ‘just’ a security upgrade—embracing this modern approach has more to do with implementing a solid business resilience strategy.The return on investment plays out in a few ways. For one, it stops attackers moving from one compromised system to others. Zero trust is also about implementing privilege escalation. In the case of a breach,&nbsp;unauthorized access to higher-level systems is blocked because every access request is verified. Another feature of zero trust architecture is that it enables micro-segmentation to, similarly, reduce the attack surface, but also enact real-time access-policy enforcement without disrupting other workflows.When a zero trust architecture is powered by AI, the ROI is about saving time for often overburdened security architects. They will be able to detect anomalies as they occur and can reduce manual triage because containment measures can be automated. The result is faster incident response and recovery times, which helps lower remediation costs. The cost benefit is especially important in regulated environments like Financial Services, where fines for non-compliance around data protection can be hefty.Cybersecurity is no longer just a technical issue. As this blog shows, the cost of getting it wrong isn’t limited to a dollar figure. It’s tied to your brand’s reputation and affects your ability to give customers what they’re paying for. For decision-makers serious about protecting their brand value and business continuity, zero trust is a logical next step in what has, to date, been a legacy journey. Time to leave that legacy behind.&nbsp;Ready to implement zero trust? If you’re just starting your journey, consider Zscaler’s checklist of features ahead of investing in zero trust architecture. It’ll give you an overview of what you need to embed the necessary control and resilience for navigating our complex world. Details in our&nbsp;Financial Services&nbsp;eBook and our&nbsp;Financial Services Page.]]></description>
            <dc:creator>Marc Lueck (CISO Northern Europe, Zscaler)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Resilience Reimagined: The Next Chapter Begins]]></title>
            <link>https://www.zscaler.com/jp/blogs/company-news/resilience-reimagined-the-next-chapter-begins</link>
            <guid>https://www.zscaler.com/jp/blogs/company-news/resilience-reimagined-the-next-chapter-begins</guid>
            <pubDate>Tue, 14 Oct 2025 15:49:08 GMT</pubDate>
            <description><![CDATA[Over the past year, one of Zscaler’s central missions across EMEA has been to help enterprises unlock&nbsp;The Resilience Factor. We define this as the unique ability of a business – or indeed, an individual employee and their team – to withstand adversity, adapt operations, and move forward with confidence, ready to thrive in the face of any challenge.From our flagship&nbsp;Resilience Factor research report to the engaging&nbsp;Personal Resilience Superpower quiz, we have primarily explored resilience through an internal lens. With constant disruption the new norm, we've looked at how organizations can build robust strategies and processes, the proactive technologies they should prioritize, and – just as importantly – how they can nurture resilience within their people.As we approach the end of the calendar year, pursuing true cyber resilience is more critical than ever. Hardly a day passes without news of the latest breach happening to companies of all shapes and sizes, and the consequences of those breaches now linger far longer than anticipated. It’s no surprise that resilience was a central theme at the recent Gartner Security &amp; Risk Management Summit, and remains a focus for enterprises, industry analysts, governments and international NGOs like the&nbsp;World Economic Forum alike.CISOs and their teams continue to operate on the front line in a “when, not if” world of cyber incidents – where the only certainty is that the next inevitable breach could come from any direction. In today’s interconnected landscape, however, a focus on internal resilience alone is no longer sufficient.Organizations must now contend with:Turbulent market forces: Regulatory shifts, sovereignty demands, and economic disruptions are forcing rapid operational pivots that legacy architectures cannot keep up with.Emerging technologies: AI is already dramatically reshaping the threat landscape and quantum is right on the horizon – exposing dangerous blind spots in security strategies.Operational ecosystem complexity: Distributed – and increasingly contractor-based – workforces and volatile supply chains introduce new vulnerabilities into an organization’s attack surface.That’s why we’re now turning our focus outward. We’ll be exploring how organizations are evolving their resilience strategies to address external factors – managing exposure to market disruption, emerging risks from the latest threats and technologies, and the complexities of their ever-extending user base and supply chain.Our stance remains unchanged: organizations must become&nbsp;Resilient by Design. This means rethinking reactive approaches and embracing resilience as a proactive, central principle – one that enables businesses to anticipate, withstand, and recover confidently from both internal and external threats to operational continuity.This next chapter is about expanding the conversation. It’s about recognizing that resilience isn’t just a security imperative – it’s a strategic one. And it’s about equipping leaders with the insights and tools they need to build 360° resilience into the very fabric of their organizations.So stay tuned. We’ll be sharing new perspectives, fresh research, and practical guidance to help you extend your cyber resilience strategies beyond your dissolving walls. And if you missed any of our earlier materials, now’s the perfect time to catch up.The future is unpredictable. But with the right mindset and design, resilience can be your greatest competitive advantage.&nbsp;]]></description>
            <dc:creator>Brian Marvin (SVP, Sales)</dc:creator>
        </item>
        <item>
            <title><![CDATA[The Psychology of Trust in Cybersecurity (part 2): The Illusion of the Trusted Perimeter]]></title>
            <link>https://www.zscaler.com/jp/blogs/company-news/the-psychology-of-trust-in-cybersecurity-part-2-the-illusion-of-the-trusted-perimeter</link>
            <guid>https://www.zscaler.com/jp/blogs/company-news/the-psychology-of-trust-in-cybersecurity-part-2-the-illusion-of-the-trusted-perimeter</guid>
            <pubDate>Thu, 11 Sep 2025 06:59:30 GMT</pubDate>
            <description><![CDATA[Traditional security models were built around the idea of a trusted perimeter: everything inside it was assumed to be trustworthy, and the goal was to keep bad actors out. But that model no longer holds.Now, users connect from anywhere, using a mix of corporate and personal devices, accessing data across multiple platforms. The perimeter has dissolved. And, with it, the illusion of internal safety.It’s something network architects are becoming acutely aware of. They need to make sure that the burgeoning number of users and devices can all connect to the network. This includes connecting unmanaged IoT devices, which—due to their effective invisibility—create a critical point of vulnerability when the network is ‘protected’ by a legacy tool like a VPN.And this critical vulnerability is only growing, as we see leaps and bounds made in interconnected vehicles, smart buildings and the like. In fact, the global number of IoT devices is forecast2 to more than double from 19.8 billion this year to over 40.6 billion in the next decade.The more pervasive IoT becomes, the greater the vulnerabilities in legacy networks will be. IoT introduces proprietary software that often lacks integration with legacy network and security tooling—creating vulnerabilities in your defenses. What’s more, IoT devices are increasing faster than employee counts, rapidly expanding the attack surface. With AI now being embedded into these devices, combined with the emergence of Agentic AI intent, the traditional castle-and-moat architecture is entirely inadequate.These outdated architectures fail to correctly tailor permissions—a critical flaw in a landscape where lateral movement remains one of the biggest threats. They simply aren’t sophisticated enough to correctly tailor permissions. They give broad network access to users and devices with verified credentials. If those credentials are compromised, a hacker using them can bypass your ‘trusted perimeter’ and access any sensitive data hosted internally without going through any further checks.Bottom line? Never trust, always verify, because there is no safe boundary around your network anymore.The Urgent Need for a Psychological ReframeIt seems like a cynical principle: never trust, always verify. However, this foundational philosophy of the zero trust movement isn’t about being paranoid—it’s about being prepared. It’s a recognition that trust, while essential in human relationships, must be earned and continuously verified in digital systems.Understanding this, we can safely say that zero trust isn’t just a technical framework. It’s a mindset shift. We must safeguard our digital environment from the threat of our own familiarity bias; we must turn the decision to trust into an objective action instead of a subjective one to gain assurance that security policies are consistently applied. By enforcing least-privilege access and carrying out continuous authentication, zero trust transforms security from a static barrier into a dynamic, adaptive system.This approach aligns with today’s ‘when not if’ cyberattack reality. It acknowledges that breaches are inevitable, and that internal actors (whether malicious or compromised) can be just as dangerous as external ones.Email phishing, of course, isn’t the only way a compromised internal actor can expose data. Employees using public-facing AI tools to speed up work tasks could unwittingly share private data. And, they are also less likely, considering the familiarity bias undercurrent, to spot AI-refined social engineering. Hackers are also turning to AI to automate their efforts, giving them greater scope and sophistication in less time with far less effort. This increases the likelihood that they’ll hook a victim.Clearly, AI is a pervasive threat and arguably will eventually erode trust to the point we trust nothing. But it’s not all bad. We need to reframe how we view AI: it can be a powerful ally, used to objectively enforce security policies in a way that takes trust out of the equation.From Paranoia to PrudenceFor business decision-makers, the path forward is clear. The threats are evolving. The perimeter is gone. And the psychology of trust must evolve with it.Zero trust offers a way to do just that—not by rejecting trust, but by redefining it for a world where control through continuous verification is the new foundation of security.For further information please visit: https://explore.zscaler.com/emea-financial-services/PART OF A HIGHLY REGULATED INDUSTRY? For organizations in tightly regulatedsectors, particularly those in Financial Services, the need to embrace zero trust now is critical. If you’re just starting your journey, view Zscaler’s checklist of features toconsider ahead of investing in zero trust architecture. It’ll give you an overview of what you need to embed the necessary control and resilience for navigating our complex world. Details in our Financial Services eBook2Statista, Number of Internet of Things (IoT) connections worldwide from 2022 to 2023, with forecasts from 2024 to 2034. June 2025. Available at: https://www.statista.com/statistics/1183457/iot-connected-devices-worldwide/]]></description>
            <dc:creator>Martyn Ditchburn (Zscaler)</dc:creator>
        </item>
        <item>
            <title><![CDATA[“AI-liens at the Workforce“ and how new trust frameworks provide risk management strategies in the wake of Agentic AI]]></title>
            <link>https://www.zscaler.com/jp/blogs/company-news/ai-liens-at-the-workforce-and-how-new-trust-frameworks-provide-risk-management-strategies-in-the-wake-of-agentic-ai</link>
            <guid>https://www.zscaler.com/jp/blogs/company-news/ai-liens-at-the-workforce-and-how-new-trust-frameworks-provide-risk-management-strategies-in-the-wake-of-agentic-ai</guid>
            <pubDate>Tue, 09 Sep 2025 08:16:30 GMT</pubDate>
            <description><![CDATA[From Agentic AI to Geopolitics: Zscaler’s Agenda for the Gartner Risk &amp; Security Management SummitLater this month, I’ll be delivering a keynote at the Gartner Risk &amp; Security Management Summit EMEA, where Zscaler will be a Premier Plus Sponsor. Hosted in London between 22-24 September, the annual summit convenes the region’s top security minds to tackle the latest challenges in the evolving digital landscape – where a complex mix of cyber threats, AI, regulatory shifts, and sovereignty demands are all converging to put pressure on business operations.As a global leader in Zero Trust transformation, Zscaler has a wealth of insights on how organizations can adapt to a rapidly changing risk environment, while driving innovation and safeguarding operational resilience. And we’ll be delivering these insights in a variety of different forums across the three days of the Summit.&nbsp;On September 22nd, I’ll be taking to the mainstage for “AI-liens in the Workforce: A New Trust Model with the Introduction of Advanced NHI.” This session will explore how agentic AI is reshaping enterprise ecosystems – driving accelerated automation and enhancing decision-making, but also creating an urgent need for new trust frameworks and more comprehensive risk management strategies. Attendees will leave with actionable insights on how to evolve their trust models to navigate autonomous AI environments securely and adaptively.The following day in our theatre keynote, “Driving Business Leadership with AI, Cellular, and Zero Trust,” Zscaler’s innovations team will reveal how these three technologies are revolutionizing both enterprise security and operational agility. The audience will learn how cutting-edge AI-driven frameworks, secure cellular connectivity, and transformative Zero Trust architectures are enabling businesses to turn risk into strategic advantage. Armed with this knowledge, they will also discover practical strategies to protect distributed environments, future-proof their security architecture, and embrace innovation on the edge in a digital-first world.In addition to the two keynotes, Casper Klynge, our VP of Government Affairs EMEA, will host an exclusive roundtable on day one titled “Navigating the Geopolitics of Tech: Should the Private Sector Be the Custodians of the Transatlantic Relationship?” This invitation-only session will explore the evolving interplay between tech dependency and cybersecurity, set against the backdrop of Europe’s digital sovereignty debate. Focused on the private sector’s role in particular, the roundtable aims to spark meaningful dialogue on the intersections between geopolitics, technology, and private-sector leadership.The Gartner Risk &amp; Security Management Summit offers those of us in the industry an invaluable forum to engage with forward-thinking professionals and security innovators. Whether you are a CIO, CISO, governmental leader, or strategic decision-maker, I believe Zscaler has a compelling perspective to share on how to approach the most pressing challenges facing enterprises today, from managing risk in AI-driven ecosystems to navigating geopolitical complexities. We look forward to exploring groundbreaking ideas, fostering collaboration, and contributing to meaningful discussion.Join us at the Zscaler booth, attend our keynotes, and connect with our executive team at the cocktail reception on Monday, September 22nd. Reach out for your personal invitation&nbsp;here.Together, let’s shape the future of resilience, AI innovation, and security leadership.&nbsp;]]></description>
            <dc:creator>Sam Curry (SVP, Global CISO)</dc:creator>
        </item>
        <item>
            <title><![CDATA[2025年第3四半期 Forrester Wave™セキュア アクセス サービス エッジ ソリューション部門でZscalerがリーダーの1社としての評価を獲得：未来の鍵を握るゼロトラスト]]></title>
            <link>https://www.zscaler.com/jp/blogs/company-news/zscaler-named-leader-forrester-wave-tm-secure-access-service-edge-solutions-q3</link>
            <guid>https://www.zscaler.com/jp/blogs/company-news/zscaler-named-leader-forrester-wave-tm-secure-access-service-edge-solutions-q3</guid>
            <pubDate>Mon, 08 Sep 2025 17:26:16 GMT</pubDate>
            <description><![CDATA[このたび、Zscalerは2025年第3四半期 Forrester Wave™:セキュア アクセス サービス エッジ ソリューション部門でリーダーの1社と評価されました。特に光栄な点として、Zscalerは今回、戦略カテゴリーで最高スコアを獲得しています。これは、Zscaler独自のゼロトラスト アプローチが評価された結果であると考えています。今回のForresterからの評価は、当社が長年抱いてきた信念の妥当性をを改めて裏付けるものです。真のSASEは、パケットのルーティングや製品の寄せ集めでは実現できません。組織のネットワークに一切接続することなく、ポリシーに基づいて、適切なユーザーを適切なアプリケーションに安全に接続すること。この原則こそが、世界最大のセキュリティ クラウドであるZscaler Zero Trust Exchange™を支える原動力となっています。 第一世代のSASEの問題初期のSASE製品の多くは、古い問題を単にパッケージ化し直したものにすぎず、異なるSD-WAN製品を個別のセキュリティ スタック(SSE)と統合することで、ネットワーク経路を最適化することに重点を置いていました。このアプローチでも目的を果たすには「十分」であったものの、依然として複雑なWANを所有、運用し、ネットワークとセキュリティのポリシーを別々に管理しなければならず、可視性のギャップが課題となっていました。また、根本的にネットワーク中心のアーキテクチャーのままであるため、複雑さ、コスト、攻撃対象領域の拡大につながるという問題もありました。そこで、こうした課題を解決できる真のSASEプラットフォームが求められていたのです。 新しいアーキテクチャー アプローチ：Zero Trust Exchangeこうした課題に対する答えとして、Zscalerは従来とは根本的に異なるアーキテクチャー モデルを提供しています。Zero Trust Exchangeはクラウドネイティブなプラットフォームであり、ユーザー、デバイス、アプリケーションを接続するインテリジェントな交換機として機能します。パケットをルーティングする代わりに、ポリシーベースの安全な接続の仲介という1点に特化しています。すべてのトラフィックはユーザーのノートパソコン、ゲストWi-Fi、サーバー、IoT/OTシステムから、Zscalerクラウドの最寄りのポイント オブ プレゼンスに転送されます。Zero Trust Exchangeは、包括的なセキュリティ サービスをインラインで提供します。完全なSSEスタック(ZTNA、SWG、CASB、DLP、FWaaSなど)を含み、トラフィックを100%検査して、きめ細かなゼロトラスト ポリシーを適用します。エンティティーとアプリケーション間を直接仲介することで安全な接続を確立するため、脅威のラテラル ムーブメントが排除されるほか、インフラをインターネットに公開する必要性もなくなります。 あらゆる領域へのゼロトラストの拡張がもたらす革新的なメリットZero Trust Exchangeプラットフォームを活用することで、組織は直ちに以下のようなメリットを得られます。ITの根本的な簡素化：WANの所有と運用からIT部門を解放します。Zero Trust Exchangeは従来のオフィスを変革し、安全なカフェ型の拠点エクスペリエンスを実現します。新しい拠点にも、クラウド型の完全なセキュリティを数か月ではなく数分で提供します。大幅なコスト削減：高額なプライベートMPLS回線への投資をやめ、費用対効果の高いインターネットへの直接接続に移行できます。煩雑な設備投資(CapEx)モデルから予測可能な運用支出(OpEx)モデルに移行することで、総所有コストを大幅に削減します。優れたセキュリティ：ユーザーや拠点をインターネットから不可視化することで、攻撃対象領域をゼロに削減します。すべての接続に対する完全なSSL/TLSインスペクションと一貫したポリシー施行により、脅威のラテラル ムーブメントを防止し、攻撃を未然に阻止します。驚異的なユーザー エクスペリエンス：ユーザーをクラウド アプリに迅速に直接接続し、トラフィックのバックホールによるレイテンシーを排除します。その結果、あらゆる場所のすべてのユーザーに対して、より高速かつ生産的なエクスペリエンスを提供します。 未来の鍵を握るゼロトラスト業界は転換点を迎えています。クラウドファーストの世界において、ネットワークを所有、管理して組織を保護するアプローチはもはや持続可能ではありません。未来を支えるのは、真のゼロトラスト アーキテクチャーです。Zscalerは、ゼロトラストのシンプルさこそが未来につながる実証されたアプローチであると確信しおり、今回Forrester Wave™のSASEソリューション部門でリーダーの1社と評価され、戦略カテゴリーで最高スコアを獲得したことは、その妥当性を裏付けるものであると考えています。当社は、市場を牽引するソリューションの数々の中でリーダーの1社として評価されたことを光栄なこととして受け止めながら、今後もお客様を支援するために革新を続けていきます。詳細は2025年第3四半期 Forrester Wave™:セキュア アクセス サービス エッジ ソリューション部門の無料のレポート(英語)をご覧ください。また、Zscaler Zero Trust Exchangeがネットワークとセキュリティを変革する仕組みについてもご確認ください。Forresterは、リサーチの発行物に掲載された特定の企業、製品、ブランド、またはサービスを推奨するものではありません。また、当該発行物に掲載された評価に基づいて特定の企業またはブランドの製品またはサービスを選択するよう個人に助言するものではありません。情報は入手可能な最善のリソースに基づいています。意見は発表時点の判断を反映したものであり、変更される可能性があります。Forresterの客観性に関する詳細については、こちら(英語)をご覧ください。]]></description>
            <dc:creator>Adam Geller (Chief Product Officer)</dc:creator>
        </item>
        <item>
            <title><![CDATA[The Psychology of Trust in Cybersecurity: it’s not Paranoia, it’s Prudence]]></title>
            <link>https://www.zscaler.com/jp/blogs/company-news/the-psychology-of-trust-in-cybersecurity-it-is-not-paranoia-it-is-prudence</link>
            <guid>https://www.zscaler.com/jp/blogs/company-news/the-psychology-of-trust-in-cybersecurity-it-is-not-paranoia-it-is-prudence</guid>
            <pubDate>Thu, 04 Sep 2025 12:58:38 GMT</pubDate>
            <description><![CDATA[An innate trust in what’s familiar is a very human response. In the workplace, it’s almost a given that colleagues, internal systems, and corporate networks are all trustworthy.But in today’s ‘everything-and-everyone-connects-from-everywhere’ world, this instinct can be dangerously misleading. The enterprise network is the most vulnerable it’s ever been—not only because cloud-first hybrid environments have vastly expanded the attack surface.There are three other reasons we’re experiencing heightened vulnerability. First, there’s the greater chance of compromise as hackers are turning to AI to launch increasingly sophisticated social engineering campaigns. Second is how easy it is for a bad actor to move laterally through the network, unmonitored, using verified credentials to log in (not hack in!). Finally, there’s the danger to data: the alarming rise of ransomware or of data exfiltration (without any alarms being triggered).This is bad news for any industry. Especially for those already ranked among the most attacked1 of all global industries. Considering the sector’s high-value data and regulatory exposure, it’s no surprise to find Financial Services among that group.Heritage status is a double-edged sword for established finance brands. They’ve amassed incredible experience that digital-first challengers can’t compete with; however, years and years of built-up, bolted-on security and performance updates to their legacy tech infrastructure have created complex, unwieldy environments. This means less agility and greater cyber-risk exposure. Complexity extends to the sector’s vast supply chain ecosystem—and the fact that every move within it is highly regulated.There are clear challenges for the Financial Services sector, particularly for the bigger established legacy banks that are up against agile digital-first challengers. Organizations in this industry, and all highly regulated sectors for that matter, really need to double down on security—and fast.This isn’t fearmongering; it’s about challenging the trust bias that, too often, becomes a risky default. It’s about championing security prudence to ensure that control and resilience are maintained.The Human Bias Toward TrustEver heard about cognitive heuristics? Rooted in cognitive science, the term describes the mental shortcuts we take when we need to make decisions quickly or with limited information. There are different types of shortcuts but the one that we really need to be aware of in the digital workplace is the familiarity heuristic. This is about seeking out the familiar in the face of uncertainty. It’s a judgement bias that many of us have defaulted to.In a corporate setting, a familiarity heuristic may see us giving trust without second thought. For example, instinctively believing internal emails are ‘safer’ than external ones, assuming our own company systems are secure by default, or believing our colleagues are less likely to pose a threat to our cybersecurity.This assumption that what’s ‘inside’ is safe is exactly what cybercriminals prey on. Network breaches could be the result of an external threat. More often, they are due to staff credentials being compromised, unintentionally, and largely over email. In 2024, our ThreatLabz team examined 1.2 billion data transactions across apps and core business channels like email. The findings, shared in our 2025 Data@Risk Report, highlight the scale of the issue: sensitive company data (including source code and financial information) was leaked in nearly 104 million email transactions.It’s telling that email phishing is still one of the most effective attack vectors, even in 2025 with all our knowledge about the perils of poor security hygiene. Again, it’s down to that human bias toward trusting the familiar: an internal email from a seemingly legitimate sender lands in the inbox of an employee who clicks on a link as directed, opening the door to a hacker. The attacker then moves laterally across the network—going undetected in a legacy security environment where trust is assumed rather than verified. The question is, can an entity’s trustworthiness ever be assumed?Part 2 of this series on the psychology of trust in Cyber Security is here. If you want to learn more about Cyber Security in the FSI space download the ebook here.1Statista, Distribution of cyberattacks across worldwide industries in 2024. May 2025. Available at:https://www.statista.com/statistics/1315805/cyber-attacks-top-industries-worldwide/]]></description>
            <dc:creator>Martyn Ditchburn (Zscaler)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Salesloft Driftのサプライ チェーン インシデント：概要とZscalerの対応]]></title>
            <link>https://www.zscaler.com/jp/blogs/company-news/salesloft-drift-supply-chain-incident-key-details-and-zscaler-s-response</link>
            <guid>https://www.zscaler.com/jp/blogs/company-news/salesloft-drift-supply-chain-incident-key-details-and-zscaler-s-response</guid>
            <pubDate>Sat, 30 Aug 2025 19:42:18 GMT</pubDate>
            <description><![CDATA[本ブログは、2025年8月30日(現地時間)に掲載された英語版ブログ“Salesloft Drift Supply Chain Incident: Key Details and Zscaler’s Response”の日本語参考訳です(https://www.zscaler.com/blogs/company-news/salesloft-drift-supply-chain-incident-key-details-and-zscaler-s-response)。
Zscalerは、ビジネス トランスフォーメーションの保護、簡素化、加速をミッションとしています。お客様データの保護と透明性の維持はその中核を成す重要事項であり、当社はお客様の組織に影響を与え得る重要な出来事について、常に最新の情報を提供できるよう努めています。インシデントの概要Zscalerは、Salesloft Drift (マーケティングSaaS)を標的としたキャンペーンにより、Salesloftの多数の顧客に影響が発生していることを認識しました。このインシデントは、Salesloft Drift用のOAuthトークンを窃取するものでした。Salesloft Driftは、セールス ワークフローの自動化に使用されるサードパーティー アプリケーションであり、Salesforceと統合してリードおよび連絡先情報の管理を担います。 インシデントの範囲はSalesloftのDriftアプリに限定されており、Zscalerの製品、サービス、基盤となるシステムやインフラストラクチャーへの不正アクセスは伴っていません。今回のキャンペーンの一環として、攻撃者はZscalerを含むSalesloft Drift顧客の、Salesloft Drift用の認証情報へのアクセス権を取得しました。現在も進行中の調査において詳細確認を行った結果、これらの認証情報により、Salesforce内にあるZscalerの一部の情報に対する限定的なアクセスが可能であることが判明しました。 影響を受けた可能性がある情報不正アクセスを受けた情報は、担当者の一般に入手可能なビジネス上の連絡先情報、CRMに関連する特定のコンテンツに限定されています。具体的には以下のような情報です。名前業務用メール アドレス役職電話番号地域/所在地の詳細Zscaler製品のライセンス情報および商用情報サポート チケットのヘッダー部に含まれる文字([Case Number]、[Opened]、[Preferred Contact Number]、[Description]、[Priority]、[Case Owner]、[Preferred Time Zone]、[Case Status]、[Type]、[Customer Case Reference]、[Product]、[Last Activity]、[Subject]、[Resolution Notes]、[Reason for Hand Off]、[Current Status / Next Plan of Action]、[Data Collected]、[Issue Summary / Business Impact]、[Requestor]フィールドに限られます)。今回のインシデントはチケットのヘッダー部にある構造化されたテキスト データのみに関連するものであり、添付、ファイル、画像は影響範囲に含まれません。Zscalerの広範な調査の結果、現在までのところ、これらの情報が悪用されたことを示唆する証拠は確認されていません。状況に変化が生じた際には、随時お知らせし、情報を更新します。 現在までのZscalerの対応Zscalerは、インシデントへの対処およびリスク軽減のため、以下を含む対応を速やかに実施しました。Salesloft DriftからZscalerのSalesforceデータへのアクセス権を削除しました。万全を期すため、他のAPIアクセス トークンのローテーションを行いました。今回の事象の影響範囲に関する詳細な調査を開始しました。Salesloftとも緊密に連携し、同社が調査を継続するなかで影響の評価および把握を進めます。将来の同様のインシデントを防ぐために、追加の保護対策を実装し、プロトコルを強化しました。Zscalerが使用する第三者ベンダーについて、第三者リスク管理調査を直ちに開始しました。Zscalerのカスタマー サポート部門は、潜在的なフィッシング攻撃からお客様を保護するため、お客様からの電話に応答する際の顧客認証プロトコルをさらに強化しました。 推奨されるお客様の対応インシデントの影響範囲は(上記のように)限定的なものにとどまっており、悪用を示唆する証拠は確認されていませんが、お客様には引き続き警戒を強化していただくことをお勧めします。漏洩した連絡先情報がフィッシング攻撃やソーシャル エンジニアリングに悪用される可能性もあるため、十分ご注意ください。Salesloft Driftに起因する今回のインシデントは、他の組織においても発生していることを踏まえ、電子メール、電話、機密情報の要求など、身に覚えのない連絡については十分に警戒することが重要です。常に連絡元を確認し、非公式な経路でパスワードや財務データを開示することは絶対に行わないでください。Zscalerのサポートが電話やSMSなど、お客様からのご依頼なく行う連絡において、認証情報または認可情報の提供を求めることは絶対にありません。Zscalerのすべての公式な連絡は、すべてZscalerの信頼できるチャネルを通じて行われます。十分にご注意いただき、フィッシングが疑われる行為を発見した場合はsecurity@zscaler.comまでご報告ください。サポートが必要な場合やご質問がある場合ご懸念事項や追加のサポートが必要な場合は、Zscalerのカスタマー サクセスおよびサポート チームが、help.zscaler.jpまたは既存のZscalerサポート チャネルを通じて対応いたします。また、当社のセキュリティ部門までご連絡いただくことも可能です(driftincident@zscaler.com)。お客様のセキュリティは当社の最優先事項です。Zscalerとの継続的なパートナーシップに感謝申し上げます。更新：2025年9月3日、本インシデントにより影響を受けたサポート チケットに関する情報を追加しました。2025年9月7日、本インシデントにより影響を受けたサポート チケットに関する情報をさらに追加しました。]]></description>
            <dc:creator>Sam Curry (SVP, Global CISO)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler’s Commitment to Responsible AI]]></title>
            <link>https://www.zscaler.com/jp/blogs/company-news/zscalers-commitment-to-responsible-ai</link>
            <guid>https://www.zscaler.com/jp/blogs/company-news/zscalers-commitment-to-responsible-ai</guid>
            <pubDate>Thu, 21 Aug 2025 02:00:00 GMT</pubDate>
            <description><![CDATA[There was a question recently posted about how Zscaler trains AI models. We wanted to provide accurate information on how we train our AI models. Zscaler does not use customer data to train its AI models. Each customer owns their proprietary information or personal data (user names, email addresses, device IDs, etc.) in the Zscaler logs. We only use data or metadata that does not contain customer or personal data for AI model training.Organizations want to safely unlock the value of artificial intelligence and machine learning, but they also need to ensure that this does not come at the expense of privacy, security and compliance controls. This becomes particularly charged when we consider the potential of training AI using proprietary data or personal data.&nbsp;The foundation of our architectural approach is data containment. Every customer’s tenant is self-contained: their data lives within their tenancy, under their control. Sensitive information never leaves that boundary. This is not just a principle: it’s a design choice by Zscaler that governs how we build, scale, and deliver value. This is how Zscaler can ensure that customer data is never used to train an AI model beyond a given tenant.Within that contained environment, customers can harness the power of their own data. Logs, transactions, and telemetry generated by their use of our platform are used to improve outcomes for their organization alone. This means customers benefit directly from their own signals, whether it’s for risk modeling, AI copilots, or policy enforcement, without having to trade away autonomy or privacy or security.Leveraging Data ResponsiblyA common concern is whether preserving privacy limits the ability to benefit from large-scale insights. Here’s where an important distinction comes in: personal data remains private, secured, and not included as model training data while metadata that does not contain proprietary information or personal data is used to enrich each tenant’s environment.Think of it like water flowing through pipes: while the content of the water belongs entirely to each customer, the knowledge of how the water moves (its pressure, velocity, and patterns) can inform the system without ever extracting the water itself. Similarly, Zscaler’s platform can use traffic patterns and telemetry that does not contain personal data, and aggregated signals to strengthen AI models and improve the overall environment while still enforcing the guarantee that sensitive data never leaves a customer’s tenancy.Zscaler’s ability to learn from over half a trillion transactions per day leverages a network effect without sacrificing customers’ privacy (specifically and technically a logarithmic utility). Customers benefit from the sheer breadth of signals Zscaler processes because it allows us to recognize global threat trends and provide resilient, real-time defenses. At the same time, customer-specific data is never exposed outside of respective tenancy.Instead, Zscaler leverages the aggregate knowledge of signals across the platform, never tied to an individual customer’s data, to strengthen detection and modeling. Each tenant gains from this global intelligence while maintaining strict boundaries for its own data.To re-emphasize: customers’ proprietary information or personal data in the Zscaler logs is never shared outside of the customer boundary.&nbsp;A Core Security Principle Rooted in Shannon’s Information TheoryThere is deep alignment of our approach with Shannon’s Information Theory, a topic I will delve into more in a future blog. Zscaler views data along a continuum that stretches from low entropy, high-information states such as clear text, through progressively higher entropy forms like ciphertext, and ultimately to encryption and the extreme of pure randomness. At Zscaler, our architectural principle begins with data control. Sensitive classes of data never leave a tenant boundary in any form including customer data. Beyond that, we apply a disciplined progression toward maximum entropy wherever possible, ensuring that only the minimum necessary information is exposed. Techniques such as anonymization, tokenization, de-identification, and other data strategies are not applied as afterthoughts but as deliberate mechanisms to elevate entropy while still preserving just enough structure for essential operations, such as AI modeling and training at the platform level. This approach ensures that the system operates at the highest entropy state consistent with utility, minimizing information exposure while maximizing privacy, trust, and compliance. This is how Zscaler unlocks the value of artificial intelligence but still ensures privacy and compliance for all customers.]]></description>
            <dc:creator>Sam Curry (SVP, Global CISO)</dc:creator>
        </item>
        <item>
            <title><![CDATA[It’s Time to Take Resilience Personally]]></title>
            <link>https://www.zscaler.com/jp/blogs/company-news/it-is-time-to-take-resilience-personally</link>
            <guid>https://www.zscaler.com/jp/blogs/company-news/it-is-time-to-take-resilience-personally</guid>
            <pubDate>Thu, 24 Jul 2025 15:23:42 GMT</pubDate>
            <description><![CDATA[In a recent&nbsp;blog post, I explored resilience as a central topic for Zscaler. At that stage we’d already released our&nbsp;Resilience Factor research, which highlighted the state of cyber resilience strategies within global businesses and put forward a more proactive ‘Resilient by Design’ approach as the next cyber security imperative. But I also previewed some further work we were undertaking on personal resilience.Why is a technology company looking at personal resilience you might ask?&nbsp;Connecting resilient teams with business continuityAt Zscaler, we believe that the best cyber resilience strategies feature three key elements:&nbsp;processes, technology,&nbsp;and&nbsp;people. However, while companies understand only too well how technology and operational processes affect continuity strategies, that last element is frequently overlooked.&nbsp;And that is a critical misstep. Resilience is an inner strength that prepares individuals and teams to navigate challenges and quickly bounce back. In today’s ‘when not if’ cyberattack reality – where our previous research showed us that 60% of IT leaders expect to experience a cybersecurity failure within the next six months –&nbsp;personal resilience has become a non-negotiable for employees at the frontline of digital defense. And there’s a proven link between this trait and business performance. In fact, studies have shown that resilient employees are almost&nbsp;twice as likely to be motivated and productive than their non-resilient peers.Put simply, business leaders who invest in cultivating the resilience of their people and teams – combined with efforts to address its causes from a technology and process perspective – will have&nbsp;a competitive advantage. At Zscaler we want to empower our customers with this advantage, helping them move forward with confidence, no matter what threat or disruption they faceFostering resilience within your teamSo how do you design your environment to foster resilience, both for yourself and your team – and what do you need your people to be resilient against? To help you get started, we’ve created two key resources:The Missing Link: Why Investing in the Resilience of Your People is Imperative for Business Continuity: Firstly, we’ve teamed up with professional coaching experts Positive Intelligence to create a&nbsp;practical roadmap for strengthening resilience as a core leadership skill. Complemented by valuable insights from our survey of 200+ IT and security professionals across EMEA, the roadmap focuses on integrating resilience into personal habits, team dynamics, and company culture.The Personal Resilience Superpower Quiz:&nbsp;To help identify the resilience “personality types” within your team, we’ve developed the&nbsp;Personal Resilience Superpower Quiz. In just 12 quick questions, you’ll uncover your superpower, potential watch-outs, and strategies to enhance collaboration. Beyond individual advice, you’ll also learn how the four resilience types can work together to create a team that’s prepared for anything.As a Cool Commander, the description of facing problems head-on and going after challenges confidently and in control definitely resonates with me. So it was interesting to read how other personas like the Practical Problem Solver can be vital to sense-check my fast-paced approach.Facing the futureFor over 18 years, Zscaler has offered cloud-based services to protect enterprise networks and their data. Based on this wealth of experience, we know firsthand the risks organizations face by not investing in their front-line employees' resilience as well as not adequately protecting their business.Our mission this year is to help enterprises unlock “The Resilience Factor”, which we define as the unique ability of a business (or an individual employee) to withstand adversity, adapt operations, and be ready to thrive in the face of any challenge. With 47% of the IT professionals telling us they feel only somewhat resilient, and 51% believing their organization doesn’t care about personal resilience, we think it is an urgent one.&nbsp;&nbsp;]]></description>
            <dc:creator>Brian Marvin (SVP, Sales)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Unlock Ransomware Resilience and AI Defense with Zscaler at Black Hat 2025]]></title>
            <link>https://www.zscaler.com/jp/blogs/company-news/unlock-ransomware-resilience-and-ai-defense-zscaler-black-hat-2025</link>
            <guid>https://www.zscaler.com/jp/blogs/company-news/unlock-ransomware-resilience-and-ai-defense-zscaler-black-hat-2025</guid>
            <pubDate>Mon, 21 Jul 2025 21:33:29 GMT</pubDate>
            <description><![CDATA[Black Hat 2025 is right around the corner, and this year’s agenda hits at the core of what cybersecurity professionals care about the most: stopping AI-driven ransomware by leveraging AI to stay ahead of evolving threats.Whether you are on the front lines of incident response, working to secure hybrid environments or researching the next wave of cyberthreats, Zscaler product and industry leaders will be available to provide insights and showcase new solutions and strategies designed for real-world defense.Here is what you can expect from Zscaler at Black Hat 2025:&nbsp; Experience Zero Trust Everywhere at Booth #3551Cybersecurity isn't a spectator sport - so get hands on with Zscaler at booth #3551. Our in-booth sessions and live demos are designed to help you understand how AI and automation are being used to stop ransomware in real time, reduce attack surfaces and protect sensitive data.Meet face-to-face with our product experts and technology partners to explore new capabilities in inline data protection, threat containment and exposure management. If you are tackling challenges around endpoint visibility or identity-driven policy, the Zscaler booth is the place to ask questions, test solutions and get the technical depth you are looking for.&nbsp; From Risk to Readiness: Combat the Latest Ransomware Extortion Surge with the Zero Trust Defense PlaybookThe intersection of AI and ransomware is reshaping the cybersecurity battlefield – and Deepen Desai, Zscaler CSO, and Dr. Brett Stone-Gross, Zscaler’s Distinguished Security Researcher, are diving into the heart of it. Join their session on Wednesday, August 6 at 2:35 PM to uncover the latest ransomware surge and how organizations can respond with resilient frameworks and smarter defenses. This powerhouse duo will go beyond theory, showcasing the latest research and delivering practical guidance on how to combat AI-driven ransomware.&nbsp; Your Path to AI-Powered Security Starts Here: Schedule a Meeting with Zscaler at Black Hat 2025Transform how you approach cybersecurity by scheduling an on-site meeting with the Zscaler team at Black Hat 2025. Learn how Zscaler addresses emerging threats, boosts operational efficiency, and reshapes security architecture to align with today’s fast-evolving landscape. Tailor the conversation to your unique goals for deploying modern, scalable defenses.Don’t just keep up with cybercriminals—take the lead and visit Zscaler at Black Hat 2025 to discover cutting-edge solutions designed to keep you ahead of the curve.]]></description>
            <dc:creator>Diana Shtil (Sr. Product Marketing Manager)</dc:creator>
        </item>
        <item>
            <title><![CDATA[A New Chapter for Zscaler in the Heart of London]]></title>
            <link>https://www.zscaler.com/jp/blogs/company-news/a-new-chapter-for-zscaler-in-the-heart-of-london</link>
            <guid>https://www.zscaler.com/jp/blogs/company-news/a-new-chapter-for-zscaler-in-the-heart-of-london</guid>
            <pubDate>Wed, 16 Jul 2025 10:04:45 GMT</pubDate>
            <description><![CDATA[Zscaler has proudly opened the doors to its new EMEA headquarters in London, marking an exciting milestone for the company. Our new home is located on the third floor of the iconic Royal Exchange, a historic building overlooking the Bank of England in the heart of the City district.Originally opened by Queen Victoria in 1844, the Royal Exchange has long been a cornerstone of historic trade and governance. It was the location of the first stock exchange, cementing its role as a global hub for commerce. Over the years, it has witnessed monumental moments, including the proclamation of King Edward VII in 1901 and the announcement of the new Sovereign in 2022. Now in its third iteration, rebuilt after catastrophic fires including the Great Fire of London in 1666, The Royal Exchange stands as a symbol of resilience and reinvention, qualities that closely mirror Zscaler’s mission of empowering customers to overcome challenges and thrive securely in the digital economy.The relocation underscores Zscaler’s dedication to the thriving UK market, which is among the company’s top five regions globally. London’s role as a leading tech hub makes it an ideal base, providing unmatched opportunities to engage with diverse talent, enterprise customers, policymakers, and strategic partners. Being in close proximity to many of our key partners further enhances our ability to collaborate effectively and innovate solutions. This strategic move enables Zscaler to accelerate advancements in cybersecurity, support transformative security initiatives, and strengthen collaboration with customers across EMEA.Beyond serving as Zscaler’s EMEA headquarters, this new space will also act as the primary hub for our Executive Design Center (EDC). EDCs are pivotal in hosting discussions that inspire innovation, foster collaboration, and advance strategic agendas for cyber transformation. Here in the UK, we will leverage the center to deepen relationships with customers and partners, explore new ideas to solve the most pressing cybersecurity and operational challenges, and foster the kind of thought leadership that drives impactful business results.While this move is a celebration of new beginnings, it is also about the hardworking team that drives Zscaler’s success every day. We are proud of our 300+ UK employees and are planning to&nbsp;grow our headcount over the next year, with roles focused on Sales, Marketing, Solution Engineering, Cybersecurity Analysis &amp; Research, Customer Success, and Partner Enablement. At Zscaler, we believe diversity of thought and experience is essential to building exceptional teams. This culture of growth, learning, and impact has earned us distinctions such as the UK’s Best Workplace™ for Employee Development award.The energy within the new space has been palpable as we officially welcomed our teams this week. We look forward to continuing to push boundaries in cybersecurity innovation for our customers across the region. This new office marks a brilliant step forward for Zscaler in EMEA. We’re here to stay, to grow, and shape the future of cybersecurity right from the heart of London.]]></description>
            <dc:creator>Justin Brooks (Area Vice President, Sales - UK&amp;amp;I)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Why Our New London Office Marks a Milestone for Zscaler in EMEA]]></title>
            <link>https://www.zscaler.com/jp/blogs/company-news/why-our-new-london-office-marks-a-milestone-for-zscaler-in-emea</link>
            <guid>https://www.zscaler.com/jp/blogs/company-news/why-our-new-london-office-marks-a-milestone-for-zscaler-in-emea</guid>
            <pubDate>Tue, 15 Jul 2025 11:44:23 GMT</pubDate>
            <description><![CDATA[This week’s London office opening in the amazing Royal Exchange building is big news for not just the UK, but all of EMEA. More than just another address to add to our global footprint, the office represents our long-term commitment to the region as a strategic hub for security innovation, cloud transformation, talent, and customer collaboration. This new and expanded office reflects our ethos as a world-class international company.Previously, Zscaler’s EMEA operations have been distributed across several regional hubs. Now we’re proud to announce that London is the official headquarters for Zscaler in EMEA. This centralization brings together leadership, strategy, sales, and marketing under one roof – creating a vibrant environment for ideation, collaboration, and the delivery of cybersecurity strategies that protect critical data, enable agility, and drive business outcomes at scale.The centerpiece of the new space is something truly special: our first purpose-built European Executive Design Center (EDC) for the region.Until now, our only Executive Briefing Center was located in San Jose, which meant a long flight for EMEA customers looking to make use of it! With the launch of the London EDC, we’re bringing customers that same immersive, hands-on experience – right on their doorstep. This is truly a game-changer. It will allow prospects and customers to see firsthand how Zscaler technology protects and modernizes some of the world’s largest and most complex organizations. More importantly, it will enable them to co-create strategies with our top-tier consultants to solve the most pressing cybersecurity and IT infrastructure challenges facing enterprises and the public sector across EMEA.Some of the key features the EDC offers include:Access to Zscaler’s global innovation roadmapWorkshops on threat intelligence, AI in security, and Zero Trust Everywhere strategyPeer-to-peer customer sessions and best practice sharingEvery detail of the center has been carefully considered – from a dedicated customer entrance and terrace to flexible meeting rooms to accommodate larger gatherings and a private kitchen – ensuring a tailored, high-impact experience for every visitor.For our customers, the EDC ultimately means earlier access to innovations, more localized support, and direct engagement with EMEA leadership.But it is just one milestone in a far broader regional story.EMEA has always been Zscaler’s second-largest market by geography, contributing approximately 30% of our global revenue – with the UK accounting for a significant portion of that. And our presence here continues to expand. Over the past two years, we’ve established offices and customer hubs in key markets such as Germany, France, the Netherlands, and the UAE. We’ve seen significant team growth, supporting everything from go-to-market roles to technical and partner-focused functions. And we’ve built out our partner ecosystem and joint go-to-market programs with regional system integrators and MSSPs.This growth is being driven by a surge in demand from organizations in the region that are accelerating their move to zero trust security. As concerns around threat protection, data sovereignty, operational resilience and more continue to rise, we are&nbsp;scaling our people and infrastructure to meet that demand – locally and effectively.The opening of our London HQ and EDC is a reflection of EMEA’s growing significance in Zscaler’s global operations. It’s a signal of expanded investment in the region’s cybersecurity ecosystem – and a promise to our customers that we’re thinking long-term about how we support them on the journey ahead.We look forward to welcoming our staff and customers to our new home in London.]]></description>
            <dc:creator>Brian Marvin (SVP, Sales)</dc:creator>
        </item>
        <item>
            <title><![CDATA[A Transformational Zenith Live EMEA]]></title>
            <link>https://www.zscaler.com/jp/blogs/company-news/a-transformational-zenith-live-emea</link>
            <guid>https://www.zscaler.com/jp/blogs/company-news/a-transformational-zenith-live-emea</guid>
            <pubDate>Thu, 10 Jul 2025 09:39:03 GMT</pubDate>
            <description><![CDATA[As the digital landscape continues to evolve at breakneck speed, Zscaler’s Zenith Live EMEA 2025 proved to be more than just a conference—it was a bold statement about the future of secure digital transformation.&nbsp;From demonstrating our latest AI-powered innovations around segmentation, data security classification, prompt visibility and more, to providing deep dives into securing private LLM deployments and on-prem data environments, the event showcased how Zero Trust Everywhere is no longer a concept—it's a necessity.&nbsp;As was evidenced in the brilliant turnout in Prague, this is something more and more organizations – of every size and industry – are coming to realize. I had the pleasure of spending four days at the show and during that time I witnessed firsthand many lightbulb moments for our attendees – where one of our speakers or even a peer introduced an idea or solution that they hadn’t thought of previously.&nbsp;The key topics of discussion were largely what I had expected them to be. As predicated in my&nbsp;previous blog, data resiliency was a huge talking point for customers, partners and media attendees alike, and especially front of mind given the current macroeconomic climate. But we also saw a great deal of interest in data sovereignty and the different approaches organizations could take to achieving this. Whether the use case is public sector or private, country-level or regional, as sovereign demand only grows more nuanced, so too will the need for security companies like Zscaler to respond.And of course, no conference in 2025 would be complete without a heavy focus on AI. With our recent acquisition of Red Canary to expand our AI-powered security operations, and a whole batch of advanced AI security capabilities announced during Zenith Live AMS, we had a lot to say. And a lot to be proud of. As organizations continue to adapt to the AI era, Zscaler is enabling our customers to adopt cutting-edge AI technologies securely and at scale. Our platform leverages the world’s largest inline security cloud—analyzing over 500 trillion security signals daily. This unmatched volume of real-world telemetry fuels Zscaler’s AI engines, enabling precise threat detection and robust automated security.&nbsp;For newer customers attending the show for the first time from markets such as the Middle East, Africa and Eastern Europe, I hope their time in Prague will have solidified something they were already starting to see – that Zscaler isn’t just a security tool, but a platform for unlocking true transformation outcomes.&nbsp;We’re now in a race to the end of our financial year – but the show has yet again proved to us that our direction is the right one. So why not join us on the journey – we’re here to help you deliver security, resilience and operational agility wherever you need it most.&nbsp;&nbsp;]]></description>
            <dc:creator>Brian Marvin (SVP, Sales)</dc:creator>
        </item>
        <item>
            <title><![CDATA[The End of Network Guesswork: Cellular Control Made Simple]]></title>
            <link>https://www.zscaler.com/jp/blogs/company-news/the-end-of-network-guesswork-cellular-control-made-simple</link>
            <guid>https://www.zscaler.com/jp/blogs/company-news/the-end-of-network-guesswork-cellular-control-made-simple</guid>
            <pubDate>Fri, 20 Jun 2025 06:14:08 GMT</pubDate>
            <description><![CDATA[Most organizations assume that once a device connects to a cellular network, it’s automatically under control. In reality, that assumption is rarely true. When a SIM card is active and connected, its traffic flows freely across networks and borders with little visibility or control. The result is an illusion of security that leaves organizations exposed to risks and policy violations, especially when they need to enforce compliance based on geography or behaviour.As I outlined in my previous&nbsp;blog, telcos provide a certain layer of control at the network-level, but granular control related to an organization’s specific security policies is often missing from their offering. As a result, most organizations still tend to rely on legacy architectures such as firewalls, VPNs, and backhaul networks to try and fill the gap. Not only do these add complexity and cost, but they often fail to deliver the proactive, zero trust control that today’s cellular environments demand. Once connected, devices are allowed to communicate too freely, violating zero trust principles that require strict verification of every interaction.Zscaler Cellular changes this dynamic entirely by giving organizations granular control of every packet leaving the device. Instead of having to wait for traffic to reach a network hub or firewall, every connection attempt is evaluated and decided upon instantly at the edge. This early decision determines whether the traffic is routed to the internet or a private application, and allows organizations to apply related policy enforcement before the data ever leaves the device. Because the control is integrated at this base level, organizations no longer need to deploy complex infrastructure or configure multiple layers of security. The SIM or eSIM simply activates, and control is live.This approach enables highly granular, context-aware policies to be implemented based on identity, location, behaviour, or risk factors. For example, a SIM can be restricted to operate only within specific countries or regions, preventing unwanted roaming, data transfers or misuse. Anomaly detection capabilities further enhance security by flagging or blocking unusual behaviour, such as attempts to access disallowed resources or connect from unexpected locations. These controls are delivered globally and consistently, ensuring seamless security anywhere in the world without added operational overhead.And I’d underline seamlessly here. What makes Zscaler Cellular truly revolutionary is its simplicity by design. There is no need to manage firewalls, tunnels, or backhaul networks. There is no complex setup or manual intervention required beyond inserting or activating the SIM. The traditional guesswork and delays associated with network security are eliminated. Instead, organizations gain immediate visibility and policy enforcement aligned with zero trust principles, transforming reactive security measures into proactive, intelligent control.This seamless integration of connectivity and zero trust security is made possible by uniting two previously separate domains; connectivity from mobile operators and zero trust frameworks from security providers. Zscaler is the first to bring these together in a unified service, delivering secure, ubiquitous communication with intelligent control.In a world where cellular devices increasingly power critical business functions, Zscaler Cellular offers a decisive step forward in protection. This is zero trust application without complexity - and it’s just the beginning. Because once control is simplified, the next frontier is zero trust everywhere.&nbsp;Learn more about the power of ubiquitous protection in my third and final blog of this series next week.]]></description>
            <dc:creator>Nathan Howe (Global VP of Innovation)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Out of Sight, Out of Control: Bridging the Cellular Visibility Gap]]></title>
            <link>https://www.zscaler.com/jp/blogs/company-news/out-of-sight-out-of-control-bridging-the-cellular-visibility-gap</link>
            <guid>https://www.zscaler.com/jp/blogs/company-news/out-of-sight-out-of-control-bridging-the-cellular-visibility-gap</guid>
            <pubDate>Thu, 12 Jun 2025 04:22:05 GMT</pubDate>
            <description><![CDATA[Do You Know What Your Organization’s Cellular Devices Are Doing Right Now?Every day, countless cellular-connected devices quietly communicate across the internet and private networks, without the knowledge or oversight of the organizations that own them. These devices - which could range from lighting sensors to critical industrial equipment - operate outside traditional security controls, creating a blind spot in many enterprises’ security strategies. Indeed while it’s commonly assumed that mobile networks provide a secure path for all cellular devices even if you have trouble seeing them, the reality is far more complex and risk-prone than most realize. And so it begs the question, do you know what your organization’s cellular devices are doing right now?Mobile carriers do offer network-level protections, but these aren’t necessarily designed with applications or the sensitive data flowing across them as the priority focus. Cellular devices frequently run multiple software components, making a variety of outbound requests that go unseen by traditional security tools. The implicit trust placed in these mobile connections leaves organizations vulnerable to threats that can easily slip through the cracks.Without full visibility into what these devices are doing, security teams cannot detect unusual activity, enforce granular policies, or respond effectively to emerging risks. The legacy approach of relying on firewalls, VPNs, and costly backhaul infrastructure simply doesn’t scale or adapt well to the sprawling, dynamic world of cellular-connected devices. This results in increased attack surfaces and operational headaches.That’s where Zscaler Cellular changes the game. By ensuring every single data packet from cellular devices go through Zscaler’s zero trust platform, organizations gain complete visibility into device behavior - even for those that were previously out of reach. This transparency means businesses can see exactly where each device connects, what it’s communicating with, and how policies are being applied to it in real-time. Most importantly, it enables a shift from blind trust in mobile networks to informed control over every connection. This is visibility by design.&nbsp;Visibility is more than a technical advantage; it’s the foundation for extending modern security to mobile and IoT environments. But the real opportunity goes further: with Zscaler Cellular, organizations can move from passive insight to active, ubiquitous protection.By bringing zero trust to devices that were previously out of reach, security teams can enforce consistent policy across every connection, everywhere - no matter the network or location. In my next blog, we’ll dive deeper into how this newfound visibility empowers organizations to enforce powerful controls - moving beyond passive monitoring to actively securing every session at the very first packet.If you want to find out more about Zscaler Cellular, join us at Zenith Live EMEA in Prague from 16th - 18th of June 2025.]]></description>
            <dc:creator>Nathan Howe (Global VP of Innovation)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zero Trust is Reshaping Cyber Insurance by Reducing Risk]]></title>
            <link>https://www.zscaler.com/jp/blogs/company-news/zero-trust-is-reshaping-cyber-insurance-by-reducing-risk</link>
            <guid>https://www.zscaler.com/jp/blogs/company-news/zero-trust-is-reshaping-cyber-insurance-by-reducing-risk</guid>
            <pubDate>Wed, 11 Jun 2025 06:52:49 GMT</pubDate>
            <description><![CDATA[In an era where ransomware attacks continue to show the shortcomings of perimeter-based defenses, Zero Trust has proven itself as a game-changer for cyber insurance outcomes.A&nbsp;landmark report from&nbsp;Zscaler, leveraging Marsh McLennan’s Cyber Risk Intelligence Center, found that&nbsp;up to 31% of cyber losses could have been prevented with Zero Trust architecture properly deployed alongside solid cyber hygiene. That translates into&nbsp;$465 billion in avoided global economic damage annually–a staggering figure with major implications for both security leaders and insurers.Where Traditional Security FailsTraditional security models rely on perimeter security appliances like firewalls and virtual private networks (VPNs), but recent data paints a troubling picture: these very devices are often the&nbsp;initial access vector in ransomware attacks.&nbsp;According to Coalition insurance claims data, organizations using perimeter security products like firewalls and VPN’s are&nbsp;up to 12 times more likely to report a claim.Why? Because perimeter defenses foster a&nbsp;false sense of security, encouraging risky behavior like enabling firewalls, VPN’s, remote desktop protocol (RDP) or skipping multi-factor authentications (MFA) under the illusion of “protected borders.” In contrast,&nbsp;Zero Trust assumes breach,&nbsp;verifying every user, device, and application continuously, thereby&nbsp;limiting an attacker’s ability to access and move within a network, even after an initial compromise.Real-World Impact: The Zscaler Zero Trust Exchange and Cyber InsuranceOrganizations that deploy the&nbsp;Zscaler Zero Trust Exchange are not only reducing the risk of breaches and business interruption stemming from ransomware or other attacks, they're also seeing&nbsp;measurable improvements in cyber insurance outcomes.Take&nbsp;Risk360, Zscaler’s cyber risk quantification engine, which helps customers&nbsp;translate Zero Trust posture into dollar-value risk assessments. With telemetry from 50+ million devices and deep visibility across IT estates, Zscaler equips underwriters with the data needed to streamline cyber insurance applications and renewals.That’s already happening. Through relationships like Zscaler and Resilience Insurance, organizations can now feed Zero Trust telemetry into insurance renewals. The result?Simplified Zero Trust inclusion, during policy submissionsBetter assessment of overall riskUnderstanding of Zero Trust controls that address exposure&nbsp;Beyond the Boardroom: Proving ROI on Security InvestmentsCyber insurance isn’t just a financial backstop; it’s becoming a&nbsp;real-time barometer of cybersecurity maturity. And Zero Trust is proving its worth.Darin Hurd, CISO of US-based mortgage company Guaranteed Rates, puts it plainly: “We now have independent validation that Zero Trust offers significant benefits... Companies that prioritize Zero Trust investments gain a significant edge as cyber defenders.”IBM’s 2024&nbsp;Cost of a Breach Report provides further confirmation: organizations with Zero Trust experience&nbsp;20.5% lower breach costs than those without. The report puts the average cost of a breach in the US at $9.48 million.Zero Trust: Best Practice and Business-CriticalAs the threat landscape evolves, organizations can no longer afford to rely on outdated perimeter defenses. Apply proper cyber hygiene in addition to Zero Trust is a better approach. It’s a risk management imperative for cyber resilience. When properly deployed, Zero Trust reduces the external attack surface, prevents lateral spread, protects against comprise and data loss, resulting in:&nbsp;&nbsp;Enhanced cyber insurability, often resulting in more favorable policiesPrevents one third of cyber eventsCuts breach costs by over 20%Reduces insured loss by up to 31%Zscaler’s industry leading Zero Trust Exchange solution enables clients to identify, mitigate and report on their security posture, while streamlining the cyber insurance submission and renewal process with an automated Zero Trust addendum.&nbsp;We knew it. Insurers knew it. Attackers knew it. And now, thanks to&nbsp;Zscaler and Marsh McLennan, we have the data to prove it.&nbsp;]]></description>
            <dc:creator>Stephen Singh (VP, M&amp;amp;A/Divestiture and ITO integration at Zscaler)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Having Resilient Conversations at Zenith Live 2025]]></title>
            <link>https://www.zscaler.com/jp/blogs/company-news/having-resilient-conversations-at-zenith-live-2025</link>
            <guid>https://www.zscaler.com/jp/blogs/company-news/having-resilient-conversations-at-zenith-live-2025</guid>
            <pubDate>Tue, 03 Jun 2025 09:30:53 GMT</pubDate>
            <description><![CDATA[Since the start of this year, I have been all over the EMEA region – from Spain to Scandinavia, the UK to the Middle East. It’s been inspiring to understand the different priorities of each market, and where individual companies and broader industries are on their Zero Trust journeys.&nbsp;No matter the location or vertical, however, one topic that is coming up time and time again in my conversations with customers is resilience. Or more specifically, how companies can back-up and protect their existing data estate, and why this action should be acted upon immediately vs. being something that can wait.&nbsp;Exploring today’s resilient landscapeResilience is a topic we’ve been discussing a lot at Zscaler - and not just in terms of our own cloud infrastructure. Earlier this year, we launched&nbsp;research exploring the state of cyber resilience within global businesses. While the results showed an increasing recognition of resilience’s critical business value within a volatile operating environment and escalating threat landscape, they also highlighted worrying inconsistencies, gaps and inefficiencies in current strategies that IT leaders cannot afford to ignore any longer.&nbsp;In particular, we’ve seen that many organizations still rely on outdated or reactive security models. They feel confident in their resilience posture because nothing’s gone wrong yet. But without getting far more proactive with their approaches, set-ups and risk hunting, that confidence may well be misplaced in the wake of emerging developments like AI powered threats. Real resilience comes from visibility, awareness and preparation – not just hope and assumption.The key is building what we call “Resilience by Design.” That means designing systems that can absorb shocks, adapt quickly and keep the business running, even when things go wrong. It applies across every layer of the tech stack, from infrastructure and networks to applications and data. But so too does it apply to the people behind these stacks. As Gartner&nbsp;puts it in ‘Succeed as an SRM Leader by Infusing Resilience Into Your Program’: “Resilient people embody many of the same characteristics as resilient systems and are a key component of a resilient program.”&nbsp;At Zscaler we fully agree with the need for a more holistic approach to resilience – that’s why we’ve also commissioned research into personal resilience, and are due to launch those results in the coming month.&nbsp;Continuing the conversationMy next destination will be Prague for Zenith Live EMEA – Zscaler’s annual user conference. And I’m sure resilience will be a central topic of discussion there as well, as we plan to demonstrate how organizations can thrive in AI with the help of Zero Trust.&nbsp;My attendance of Zenith Live will mark almost a year to the day since I joined Zscaler, so it’s an important milestone for me to reflect upon. In the past 12 months I’ve seen our relationships with partners and customers grow and mature. As companies look to the convergence of AI and Zero Trust to fuel their next level of digital transformation and establish resilient, mission-critical infrastructures, Zscaler’s platform message is&nbsp;resonating more than ever.We’ve also expanded into markets like the Middle East, Africa and Eastern Europe – and I’m really looking forward to meeting some of our newest customers in Prague, as well as our growing partner ecosystem and my team members who are flying in from across the region.&nbsp;We’ve a packed schedule of keynotes, transformation theatre presentations featuring Zero Trust Everywhere and over 60 breakout sessions co-presented by customers, so it promises to be a great event.&nbsp;I’ll be onsite for the full&nbsp;conference so do come and find me on the show floor. We can chat resilience, AI, zero trust and much more.&nbsp;]]></description>
            <dc:creator>Brian Marvin (SVP, Sales)</dc:creator>
        </item>
        <item>
            <title><![CDATA[How Zscaler’s CMMC Level 2 Certification Empowers U.S. Department of Defense Contractors]]></title>
            <link>https://www.zscaler.com/jp/blogs/company-news/how-zscaler-s-cmmc-level-2-certification-empowers-u-s-department-defense</link>
            <guid>https://www.zscaler.com/jp/blogs/company-news/how-zscaler-s-cmmc-level-2-certification-empowers-u-s-department-defense</guid>
            <pubDate>Tue, 27 May 2025 14:37:12 GMT</pubDate>
            <description><![CDATA[Cyber threats are escalating at an unprecedented rate, and as contractors supporting the U.S. Department of Defense (DoD), the stakes couldn’t be higher. Protecting sensitive data, such as Controlled Unclassified Information (CUI), is a mission-critical responsibility for every contractor within the Defense Industrial Base (DIB). With the establishment of the Cybersecurity Maturity Model Certification (CMMC) framework, the DoD has provided clear guidelines to strengthen the security posture of its contractors and safeguard the digital supply chain that underpins U.S. national defense.At Zscaler, we understand the immense responsibility that comes with operating in this high-stakes environment. It is with great pride that I share the news that Zscaler takes a prominent role as a Security SaaS provider in&nbsp;achieving CMMC Level 2 certification. This accomplishment is not just a certification milestone—it’s a testament to Zscaler’s commitment to empowering DoD contractors with the tools and technologies they need to achieve compliance, modernize security, and execute their mission-critical projects with confidence. Why CMMC Compliance Is a Game Changer for DoD ContractorsThe CMMC framework is DoD’s self-induced catalyst toward strengthening the cybersecurity posture of the DIB. Developed by the DoD, CMMC establishes a governance framework that defines a set of cybersecurity, compliance, and contractual standards that contractors must meet to be eligible for defense contracts. The framework emphasizes the protection of sensitive government data—including CUI—and ensures that cybersecurity is not an afterthought, but a foundational aspect of every contract.Achieving CMMC compliance is about much more than meeting contract requirements. Compliance demonstrates a contractor’s ability to protect critical assets, ensuring mission continuity and safeguarding the integrity of the overall national defense strategy. As threats continue to evolve, the financial, operational, and reputational risks of failing to secure sensitive information mean that compliance has become a strategic imperative for every DoD contractor.At Zscaler, we view compliance not as an endpoint but as a springboard for comprehensive cybersecurity excellence. With our achievement of CMMC Level 2 certification, we are positioned to help DoD contractors strengthen their cyber defenses, streamline compliance, and adopt solutions that meet today’s needs while anticipating tomorrow’s risks. The Zscaler Approach: Zero Trust and Cloud-First SecurityOur journey to earning CMMC Level 2 certification was rooted in our implementation of a Zero Trust Architecture. This approach is powered by Zscaler Internet Access™ (ZIA™) and Zscaler Private Access™ (ZPA™), two of our core solutions that are&nbsp;FedRAMP-authorized and purpose-built to meet the security demands of federal and defense environments.Zero Trust flips the traditional perimeter-based security model on its head. Instead of assuming that entities within a network can inherently be trusted, Zero Trust applies the principle of “never trust, always verify.” It ensures that no user, device, or application can access sensitive resources without first being authenticated and authorized. For the DoD contracting community, this model is a game changer. It eliminates unnecessary risk, minimizes the attack surface, and ensures sensitive data remains secure—no matter where users or applications are located.Our cloud-native approach is designed to simplify the complex. Many contractors today struggle with the operational burden of fragmented legacy systems and disjointed compliance workflows. By centralizing cybersecurity and compliance under the Zscaler platform, we enable contractors to reduce complexity, eliminate inefficiencies, and focus on their core missions. How CMMC Level 2 Certification Benefits DoD ContractorsEarning CMMC Level 2 certification is more than an achievement for Zscaler—it’s a call to action to help DoD contractors embrace industry-leading security solutions. Here’s what this milestone means for your operations:Streamlined Compliance Process: Managing compliance across the DoD contracting landscape can often feel like navigating through a maze of fragmented tools and requirements. Zscaler consolidates and simplifies compliance efforts, helping contractors achieve regulatory requirements faster and with minimal disruption to operations.Enhanced Cybersecurity Posture: With our Zero Trust approach, DoD contractors benefit from robust, cloud-native protections that evolve alongside emerging threats. This proactive security architecture reduces the risk of data breaches and other cyber exploits.Accelerated Digital Transformation: Our cloud-first solutions were built to empower contractors to innovate without sacrificing security. Whether transitioning workloads to the cloud or modernizing IT operations, Zscaler ensures that contractors can embrace digital transformation with confidence.Future-Ready Protections: In the constantly shifting cybersecurity landscape, future-proofing your operations is essential. As Zscaler actively works toward alignment with CMMC Level 3 requirements, contractors can rest assured that their cybersecurity framework will remain adaptable and aligned with DoD mandates.Compliance represents much more than a checkbox exercise; compliance is the foundation for achieving higher levels of organizational resilience and operational agility. As I often say, “Compliance is the foundation and the floor, not the ceiling.” That philosophy drives Zscaler’s approach to CMMC compliance. Looking AheadOur CMMC Level 2 certification is not the endpoint of our journey but a stepping stone to even greater achievements as we continue to support the DIB. We are actively assessing our alignment with CMMC Level 3 requirements and remain dedicated to helping contractors prepare for what’s next.To all U.S. Department of Defense contractors: Zscaler is here to help you protect sensitive data, drive innovation, and sustain mission success in an era of increasingly complex challenges. We’re proud to stand alongside you as a partner in security excellence and a catalyst for meaningful digital transformation.If you’re ready to accelerate compliance and adopt modern security built for the demands of the DoD ecosystem, I invite you to explore Zscaler and see how we can work together to defend the critical missions that keep our nation safe.]]></description>
            <dc:creator>Kumar Selvaraj (Sr. Director, Technology Risk &amp;amp; Compliance)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler Named a Leader in the 2025 Gartner® Magic Quadrant™ for Security Service Edge (SSE)]]></title>
            <link>https://www.zscaler.com/jp/blogs/company-news/zscaler-named-leader-2025-gartner-r-magic-quadrant-tm-security-service-edge-sse</link>
            <guid>https://www.zscaler.com/jp/blogs/company-news/zscaler-named-leader-2025-gartner-r-magic-quadrant-tm-security-service-edge-sse</guid>
            <pubDate>Fri, 23 May 2025 15:31:03 GMT</pubDate>
            <description><![CDATA[IntroductionAt Zscaler, our mission is to secure, simplify, and accelerate business transformation, empowering your organization to be more competitive. For more than 15 years, we have been pioneering the technology that secures any-to-any zero trust communication using business policies, not corporate networks, and we have witnessed the widespread adoption of SSE solutions that provide a practical path for organizations to follow.Gartner Magic Quadrant for SSEThe 2025 Gartner® Magic Quadrant™ for&nbsp;Security Service Edge (SSE) has been published and Zscaler has again been named a Leader in this report,&nbsp;positioned highest for Ability to Execute. This is the fourth year that Zscaler has been named a Leader in the Magic Quadrant for SSE.We believe that our placement in the Leader Quadrant in this report, alongside 1,000+ reviews for Zscaler SSE on Gartner Peer Insights™, averaging a score of 4.65 out of 5 (as of today), demonstrates our strength in addressing the market for SSE solutions.&nbsp;In our opinion, the services that make up SSE are foundational elements of the&nbsp;Zscaler Zero Trust Exchange™, the first cloud native, multitenant, proxy-based security architecture, that is now processing over 500 billion daily transactions.Zero Trust EverywhereSSE, as defined by Gartner, ensures that authorized users have secure identity- and policy-driven access to approved internet, SaaS, and private applications. Building on more than 15 years of&nbsp;cybersecurity innovation and feedback from thousands of CIOs and CISOs,&nbsp;Zscaler takes this concept further with&nbsp;Zero Trust Everywhere, enabling customers to extend the benefits of SSE and unify security across three broad areas:Users: Secure application access for employees, contractors, partners, suppliers, and other B2B third parties.Branches: Secure each branch, factory, warehouse, and IoT/OT device, treating each as an island of one.Clouds: Secure workload communications across multicloud environment.&nbsp;&nbsp;By extending the SSE platform beyond users, Zscaler enables its customers to simplify their IT operations with a comprehensive, cloud native architecture that can protect their&nbsp;entire organization.Customer EndorsementWe believe that a key measure of Zscaler’s success is the value we deliver to our customers, and the trust they put in us to provide a resilient, scalable, and secure service as they progress through their digital transformation journeys. We’re proud of Zscaler’s recognition, validated by the following proof points:&nbsp;&nbsp;47 million users across approximately 8,500 customers worldwide~45% of Fortune 500 companies across all verticals rely on Zscaler to protect their operationsGlobal reach, with approximately 50% of our revenue in North America and 50% internationallyAn NPS score consistently above 75 vs. an average of 30 for SaaS organizationsConclusionAt Zscaler, driving innovation to empower organizations with a robust SSE-based zero trust platform is at the core of everything we do. Our goal is to stay ahead of evolving security needs, enhancing the Zero Trust Exchange with advanced capabilities to secure workforces, cloud workload communications, IoT/OT access, and B2B connections. With relentless focus, we ensure our customers are always prepared for what’s next.To receive a copy of the 2025 Gartner Magic Quadrant for SSE and see why Zscaler was recognized, please&nbsp;click here.We will be hosting a special webinar looking into the SSE market in 2025. Click here to register.&nbsp;&nbsp;&nbsp;Gartner DisclaimerGartner, Magic Quadrant for Security Service Edge, Charlie Winckless,&nbsp;Thomas Lintemuth,&nbsp;Dale Koeppen,&nbsp;Charanpal Bhogal, 20 May 2025Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences with the vendors listed on the platform, should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, MAGIC QUADRANT and PEER INSIGHTS are registered trademarks of Gartner, Inc. and/or its affiliates and are used herein with permission. All rights reserved.]]></description>
            <dc:creator>Adam Geller (Chief Product Officer)</dc:creator>
        </item>
        <item>
            <title><![CDATA[IDC MarketScapeでZscalerがDLPのリーダーの1社としての評価を獲得]]></title>
            <link>https://www.zscaler.com/jp/blogs/company-news/idc-marketscape-recognizes-zscaler-leader-data-loss-prevention-dlp</link>
            <guid>https://www.zscaler.com/jp/blogs/company-news/idc-marketscape-recognizes-zscaler-leader-data-loss-prevention-dlp</guid>
            <pubDate>Tue, 29 Apr 2025 15:00:01 GMT</pubDate>
            <description><![CDATA[情報漏洩防止(DLP)は、長年にわたって大きな変革を遂げてきました。当初はデータの悪用を防ぐための事後対応型対策を提供するものでしたが、AIと機械学習を活用した予測機能と自動化機能を組み込む形で進化してきました。これを活用することで、組織は機密データの検出と分類、異常なパターンの特定、世界的な規制の順守、全体的なセキュリティ態勢の強化が可能です。組織が深刻化するデータ侵害のリスクへの対応を進めるなか、堅牢な情報漏洩防止(DLP)ソリューションに対する需要はこれまで以上に高まっています。IDCによると、DLPは、機密データへの不正アクセスやその悪用、流出を検出、監視、防止するための技術とプロセスであると定義されています。 IDC MarketScapeのDLP評価「IDC MarketScape: Worldwide Data Loss Prevention 2025 Vendor Assessment」は、DLP製品を扱う世界の主要ベンダー9社を包括的に評価したものです。この調査には、ベンダーの能力のマッピング、導入事例、顧客インタビュー、戦略的および戦術的レベルでのイノベーションの評価が含まれます。抜粋資料は、ベンダーのパフォーマンスに関する詳しい調査結果と市場の動向をまとめたもので、高度なDLPソリューションによるデータ保護戦略の強化を目指す組織のためのベンチマークとして役立ちます。厳密な調査手法によって、ベンダーの能力を詳細に分析し、競争の激しいDLP分野の状況について、価値あるインサイトを提供します。最近発表された「IDC MarketScape: 2025 Worldwide Data Loss Prevention (DLP) Vendor Assessment」において、Zscalerはリーダーの1社と評価されました。&nbsp;IDC MarketScapeのベンダー分析モデルは、特定の市場におけるテクノロジーとサプライヤーの競争力について、全体像を把握できるように設計されています。この調査手法では、質的および量的な基準の両方に基づく厳格なスコアリング手法が利用されており、特定の市場における各サプライヤーの位置を1つの図で示します。Capabilitiesスコアは、サプライヤーの製品、市場投入戦略、ビジネス実行力について短期的に測定したものです。Strategiesスコアは、3〜5年の時間軸でサプライヤーの戦略と顧客のニーズとの整合性を測定したものです。円の大きさは、サプライヤーの市場シェアを表しています。 「IDC MarketScape: Worldwide DLP 2025 Vendor Assessment」の重要なポイントIDC MarketScapeの評価は、テクノロジーの導入を検討するうえで重要な情報を提供しています。組織は、高度なデータ検出、リアルタイムの脅威対策、マルチクラウド環境でのスケーラブルな統合を同時にサポートするベンダーを優先することが推奨されます。シームレスな展開、既存のITエコシステムのツールとの統合、高度なレポート作成と分析は、将来を見据えたデータ保護戦略に必須の機能です。また、脅威や情報漏洩を取り巻く状況の変化に合わせてソリューションを迅速に調整できるよう、DLPへの投資にあたっては、抜粋資料の内容に加え、ゼロトラスト セキュリティの原則に則ったものを選択することが強く求められます。&nbsp; ZscalerがIDC MarketScapeでDLPのリーダーの1社と評価された理由Zscalerは、IDC MarketScapeの2025年DLPベンダー評価で、DLP市場のリーダーの1社として評価されました。Zscalerの強みとして、以下の点が挙げられています。「Zscalerは、ゼロトラスト ネットワーク製品において大きな顧客基盤を持っています。これが、顧客に統合的な体験を提供しながら、データ セキュリティのフットプリントを拡大するための強固な基盤となっています」「顧客のフィードバックでは、Zscalerのカスタマー サービスとサポートのスピードときめ細かさ、そしてポートフォリオ内の他の製品との相互運用性が挙げられています」当社が考えるZscaler製品の特長と強み包括的なデータ保護プラットフォーム：Zscalerの際立った強みは、Zscaler Data Protectionと、この製品の基盤であるZscaler Zero Trust Exchange™のアーキテクチャーにあります。この統合プラットフォームは、堅牢なデータ検出、分類、データ セキュリティ ポスチャー管理、規制要件のプロアクティブなマッピングなど、現代のDLPソリューションに不可欠な機能を提供します。すべてのデータ チャネルに完全に対応し、さまざまなワークロード、アプリケーション、エンドポイントで機密データを特定すると同時に、リアルタイムのセキュリティ機能を展開し、許可されていないデータの公開を防ぎます。ゼロトラスト アーキテクチャー：Zscaler Zero Trust Exchangeは、最も効果的なセキュリティ原則の一つに則っており、これを利用することで組織はすべてのデジタル チャネルで暗黙の信頼を排除し、通信を保護できます。検出と分類：抜粋資料では、AIを活用した強力な分類とそれを補完する従来の手法(正規表現、IDM、OCR、EDMなど)によるZscalerプラットフォームの包括的な検出機能が注目されています。あらゆるデータ保護戦略の重要な基盤である堅牢な分類により、すべてのデバイス、アプリケーション、拠点が詳細に可視化され、機密データを効果的に保護できます。統合DSPM: Zscalerのプラットフォームの対応範囲は、データの可視化だけにとどまらず、データ セキュリティ ポスチャー管理(DSPM)にも及びます。これにより、組織はコンプライアンスを確保し、最小特権アクセスを自動化するとともに、優先順位を付けたリスク修復によって設定ミスや内部脅威に関連するリスクを軽減できます。ZscalerのDSPM機能は現在、Zscaler AI Data Protection Platformのアドオンとして利用できます。メールDLP:メールはZscalerのプラットフォームが新たに対応した情報漏洩のチャネルです。これにより、メールと添付ファイルの統合的な制御を実現します。M365やGoogleのサービスへの追加のホップとして既存のメール インフラに簡単に追加して、DLP制御の統合をこの重要なチャネルに拡張できます。レポート作成：Zscalerの主要製品では、包括的なレポート作成機能を提供しています。履歴データ、傾向、アクティビティー パターン、ユーザー行動のほか、指標やインサイトをカスタマイズ可能なエグゼクティブ サマリーなどを含むレポートを作成できます。急速なイノベーションには、特有の課題が伴います。その中でも最も重要なのが、従来のシステムからクラウド主体の高度なモデルへの移行に伴う複雑性です。組織によっては、使い慣れたオンプレミスのツールと高度なクラウドネイティブ ツールとの間のギャップのために、最初は適切なリソースや組織的な賛同を得られず、適応が進まない可能性があります。この場合、変革のプロセスを管理するための広範な取り組みが必要です。さらに、DLPポリシーの厳格化が進むなかで実装を成功させるには、組織内のセキュリティ、コンプライアンス、エンドユーザーの各部門間の強力な連携が必要です。また、従来のソリューションに慣れ親しんだ関係者に対して、現場レベルで意識を変えていくことも課題になります。そこで、Zscalerは移行を容易にするための堅牢なオンボーディング サービスを提供しています。 まとめ：将来を見据えたDLPを提供するZscalerのビジョン機密データが従来の境界を越えて移動する環境において、Zscalerはデータ保護を再定義し続けていきます。ポリシーベースの自動化とAIを活用したインサイトを基盤とするZero Trust Exchangeは、組織のデータ保護における新たな基準を打ち立てています。データ リスクが変化し、規制当局による監視が厳しくなるなか、データ セキュリティに対するプロアクティブなアプローチを求める組織は、Zscalerの革新的なソリューションを利用することで、こうした状況に対応することが可能です。DLPの複雑さに対処しようとしている組織にとって、ZscalerがIDC MarketScapeにおけるリーダーの1社となったことは、単なる評価以上の意味があります。この評価は、将来を見据えた戦略への投資の必要性を示しているのです。適切なガイダンスとテクノロジーを活用することで、コンプライアンスを維持しながら、AIを活用したクラウドファーストの環境でイノベーションを促進することができます。詳細は、IDC MarketScape: Worldwide DLP 2025 Vendor Assessmentの抜粋資料をダウンロードしてご確認ください。&nbsp;出典：「IDC MarketScape: Worldwide DLP 2025 Vendor Assessment」、Jennifer Glenn、IDC doc #US53234325、2025年3月]]></description>
            <dc:creator>Mahesh Nawale (Product Marketing Manager)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Start Spreading the News: Zscaler Rocks Exposure Management]]></title>
            <link>https://www.zscaler.com/jp/blogs/company-news/start-spreading-news-zscaler-rocks-exposure-management</link>
            <guid>https://www.zscaler.com/jp/blogs/company-news/start-spreading-news-zscaler-rocks-exposure-management</guid>
            <pubDate>Mon, 28 Apr 2025 20:14:32 GMT</pubDate>
            <description><![CDATA[It’s not just our customers who love our Exposure Management offerings – now Cyber Defense Magazine has chimed in to recognize the excellence of our solutions with not one but two Global InfoSec Awards!We took the top prize in two categories:Visionary Continuous Threat Exposure Management (CTEM)Cutting Edge Exposure ManagementThe CDM Global InfoSec Awards honor information security innovators who provide unique and compelling products and services. What perfect timing, to earn this recognition just as we kick off the RSA Conference this week! Come see these award-winning solutions in action, at Booth N-5361. Our best-in-class Exposure Management solutionsPowered by our Data Fabric for Security, our solutions provides our customers with a complete and contextual understanding of their risk posture.Our Asset Exposure Management solution for CAASM:Creates a complete and accurate asset inventory by integrating data across hundreds of sources and normalizing the asset metadata for increased accuracy.Identifies coverage gaps to pinpoint missing controls, misconfigurations, and ensure compliance.Automates workflows to adjust access policies and update CMDBs to maintain asset hygiene.Our Unified Vulnerability Management solution:Consolidates data ingested from multiple vulnerability scanners, plus dozens of other security and business tools providing other findings and business context.Correlates the aggregated information to identify a company’s most critical exposures, taking into account their mitigating controls.Prioritizes vulnerabilities based on business impact and exposure severity and identifies key mitigation requirements for high-risk areas.&nbsp;Our Risk360 solution:Assesses risk across Zscaler systems and third-party data sources, surfacing configuration change recommendations within Zscaler offerings to reduce customer risk.Quantifies the financial loss estimates associated with industry standard and custom risk factors.&nbsp;&nbsp; Come see us at RSAAll these solutions, along with Zscaler’s full Zero Trust Exchange solution and Data Protection offerings, will be featured at our RSA Booth, and we’ll have live presentations nearly every hour. We’d love to see you there!If you’re not lucky enough to be at RSA this year, don’t fret – you can always schedule a personalized demo.]]></description>
            <dc:creator>Michelle McLean (Sr. Director, Product Marketing)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler UK User Group provides Insight, Collaboration and Networking opportunities]]></title>
            <link>https://www.zscaler.com/jp/blogs/company-news/zscaler-uk-user-group-provides-insight-collaboration-and-networking-opportunities</link>
            <guid>https://www.zscaler.com/jp/blogs/company-news/zscaler-uk-user-group-provides-insight-collaboration-and-networking-opportunities</guid>
            <pubDate>Thu, 17 Apr 2025 16:53:57 GMT</pubDate>
            <description><![CDATA[Our recent Zscaler User Group Event at Hijingo in London was once more a testament to the power of collaboration, bringing together over 55 customers for a day of networking, information sharing, and open discussions on how to navigate the evolving landscape of Zero Trust security. As a customer-only event, a user group meeting is designed to foster meaningful dialogue, with an agenda that encourages peer learning, exchange of experiences, and exploring best practices together. In addition to the customer-led sessions that focussed on individual organizations' Zero Trust transformation journeys, and a session from our Customer Success team on 'Zero Trust Beyond Remote Work,' these events truly thrived on the personal exchanges between participants.Key take aways from real-world Zero Trust experiencesThe day’s standout moments are usually the fireside chats amongst customers. These conversations offer candid, real-world insights into both the challenges and successes of implementing Zero Trust across organizations. Interestingly, the key takeaway this year wasn’t technical at all. Customers consistently emphasised that aligning stakeholders, securing executive buy-in, and shifting organizational mindsets are the true foundations of a successful Zero Trust journey. To drive this transformation, it is essential to clearly demonstrate the ROI of a Zero Trust approach by focussing on leadership priorities such as cost reduction and security simplification.As multi-cloud environments grow increasingly complex, organizations are finding it difficult to maintain visibility and control - unless they can unify their data streams through a centralized dashboard. Once they transition to a cloud-based Zero Trust platform, the next challenge often lies in managing Zero Trust across distributed, virtual teams. This shift highlights the need to upskill teams to effectively handle the new security paradigm. This opening session brought a key theme into focus: Zero Trust is as much about operational and cultural transformation as it is about technology.&nbsp;AI, Risk, and the Zero Trust Journey&nbsp;Inspiration provided the session on AI governance in a Zero Trust world. It served as a timely wake-up call for organizations to take a proactive stance on defining AI security policies before security gaps have a chance to emerge. As AI adoption accelerates, so do the challenges around governance, security, and risk management. The session explored how businesses must strike a careful balance between innovation and security, ensuring AI-driven progress boosts productivity without introducing unnecessary risk.&nbsp;As employees will always try to find a way to boost their productivity with the help of AI, organizations have to understand usage patterns of the tools. Only by identifying how employees interact with AI, will they be able to counterfeit the associated risks of the modern ways of working. The recently launched&nbsp;ThreatLabZ 2025 AI security report showed an explosion of AI/ML transactions in the Zscaler cloud with a 3,464.6% year-over-year increase, highlighting the massive growth of enterprise AI adoption. However, AI can be a double edged sword that enables not only a productivity boost, accelerated decision-making, and automated workflows, but cybercriminals are using the same technology to automate and scale more sophisticated attacks. From hyper-realistic deepfakes to advanced vishing scams, AI-generated threats have quickly raised the stakes for enterprise security.According to the report, blocking is the immediate reaction to the emerging threat landscape. With 59% of AI/ML transactions prohibited by enterprises, this signals concerns over data security and the uncontrolled use of AI applications. However, blocking AI-related transactions is only a reaction and not a strategy. Organizations must work to establish AI governance frameworks to ensure AI use is controlled without stifling innovation or user productivity. A risk-based approach that centers around protecting critical assets must begin with a clear classification of the AI tools in use. This foundational step enables IT teams to define precise policies for sanctioned, tolerated, and unsanctioned AI applications. Building on this session, much of the discussion within the user group centered around governance strategies for effectively managing AI-related risks.&nbsp;Fireside Chat: From Strategy to SuccessParticipants also gained valuable insights from peers who shared real-world lessons on implementing Zero Trust in complex environments. The fireside chat highlighted the critical role of cross-functional collaboration in successfully adopting and scaling Zero Trust strategies. One customer shared how they streamlined their security architecture by consolidating firewalls and proxies through the Zscaler cloud – simplifying their toolset while maintaining robust protection. At the same time, they focused on strengthening business continuity by enhancing resilience and improving incident response as part of their disaster recovery planning – a topic that resonated strongly throughout the day’s discussions.&nbsp;While the customer conversations were front and center, Zscaler closed the event with a session on Zero Trust beyond Remote Work. It showcased how the Zscaler cloud platform continues to evolve, enabling organizations to extend Zero Trust principles to all networks and devices, regardless of location. Emphasis was placed on securing all traffic through the Zscaler platform using tools like Client Connector, App Connector, and Private Service Edge. Together, these components help build a resilient Zero Trust architecture that supports granular access controls based on user identity, device posture, and business context. The key message was clear: Zero Trust isn’t just for remote work – it must be embedded across the entire enterprise to effectively replace broad network access with precise, application specific segmentation.&nbsp;&nbsp;In conclusion, our customers’ experiences highlight that Zero Trust is not a one-time project, but an ongoing journey that hinges on stakeholder alignment and strong cross-functional collaboration. As organizations adopt AI, security teams must take a proactive stance, implementing governance frameworks while maintaining visibility and control across increasingly complex multi-cloud environments. Close partnership with product teams also plays a vital role in unlocking the full value of new capabilities. By actively listening to and building alongside our customers, we can guide them through every step of their Zscaler journey and help ensure lasting, successful transformations. Because in the end Zero Trust isn’t a destination - it’s a continuous journey.&nbsp;&nbsp;]]></description>
            <dc:creator>James Tucker (Head of CISO, International)</dc:creator>
        </item>
        <item>
            <title><![CDATA[日本へのコミットメントを強化: ゼットスケーラーが関西地域での成長を目指し大阪オフィスを開設]]></title>
            <link>https://www.zscaler.com/jp/blogs/company-news/introducing-zscaler-osaka-office</link>
            <guid>https://www.zscaler.com/jp/blogs/company-news/introducing-zscaler-osaka-office</guid>
            <pubDate>Wed, 09 Apr 2025 07:57:56 GMT</pubDate>
            <description><![CDATA[企業や社会が急速にデジタルトランスフォーメーションを遂げる中で、サイバーセキュリティの重要性はこれまでになく高まっています。ゼットスケーラーは、クラウドファースト時代における企業の成功を支える安全な基盤構築を使命に、日々取り組んでいます。この度、日本における安全なデジタルトランスフォーメーションを推進する旅の中で重要な節目となる、大阪オフィスの開設を発表できることを大変嬉しく思います。この新オフィスは2025年4月1日に正式に営業を開始しました。活気あふれる関西地域に位置する大阪オフィスは、当社の戦略的な成長計画の重要な一環を担っています。これにより、西日本地域のお客様やパートナー企業に対してサービス提供を強化し、日本国内でもっとも活気あるビジネスコミュニティとの結びつきをさらに深めることができます。この大阪への投資は、デジタルイノベーションの力を安全かつ効果的に活用しようとする企業への支援を表明するものです。なぜ大阪なのか？大阪を中心とした関西地域は、日本経済と技術において重要な役割を果たしています。この地域は多様な業種が集まり、世界的に認知された企業も数多く拠点を構えています。さらに、2025年の大阪・関西万博、統合型リゾート（IR）プロジェクト、大規模なインフラ投資といった進行中の取り組みにより新しい成長の機会が生まれています。同時に、現代的で安全なIT環境へのニーズも急速に高まっています。これらの進展は、従来の境界型セキュリティモデルを脱却し、場所を問わずユーザー、アプリケーション、デバイスに安全なアクセスを提供するゼロトラスト アーキテクチャに基づく堅牢なサイバーセキュリティソリューションの需要を加速させています。企業が複雑なハイブリッドワーク環境を管理し、クラウドネイティブ技術を取り入れる中で、ゼットスケーラーの「Zscaler Zero Trust Exchange™」は運用の回復力を強化し、サイバーリスクを低減し、インフラを簡素化するための最適なソリューションを提供します。大阪への投資は、これらのニーズを満たすための戦略的な展開を意味します。関西地域に専用拠点を構えることで、より迅速で地域密着型のサポートを提供し、企業が日本の急速に変化する技術環境で成功するために地域企業との接点をさらに深めることができます。関西地域における私たちのビジョン大阪オフィスは単なる地理的な拠点拡大以上の意味を持っています。それは私たちの意志を表明するものなのです。関西は経済的な原動力であるとともに、未来志向の革新の拠点でもあります。当社は、この地域のダイナミックなエコシステムと直接結びつくことを心から歓迎しています。特にデジタルトランスフォーメーションを積極的に推進している主要な企業や組織と協力できることに期待しています。このオフィスの開設により、関西地域に深く根付く産業に特化したソリューションを提供する能力を強化すると同時に、日本全国の企業が直面する共通のサイバーセキュリティの課題にも取り組んでいきます。セキュアなハイブリッドワーク環境を支援し、ITインフラを簡素化し、コンプライアンスを保証するなど、Zero Trust Exchange™ は企業がセキュリティ脅威や運用の要求に先んじて対応するためのスケーラブルで未来志向のプラットフォームを提供します。さらに、大阪オフィスは当社の成長を加速させるプラットフォームでもあります。この拠点は、地元のサイバーセキュリティの最前線で働きたいという情熱を持った優秀な人材を引き付ける採用活動の拠点としても機能します。私たちは、人工知能、エッジコンピューティング、データ主権といった変革的なトレンドの中、お客様、パートナー、そして協業者の皆さまとより強固なつながりを築きながら、共に未来を切り拓いていきます。今後の展望大阪・関西地域は、成長と進化に満ちたエキサイティングな時代を迎えています。ゼットスケーラーは、この歩みに加われることを誇りに思います。新しい大阪オフィスは、地域の企業や組織との直接的なつながりを強化し、安全でクラウドファーストの革新の利点を存分に活用できるよう支援する上で理想的な拠点となります。この新オフィスは、日本での投資を反映するだけでなく、関西地域の生き生きとした経済を支えている企業を力強く後押しするという、私たちのコミットメントを体現するものです。ともにデジタルトランスフォーメーションを加速させると同時に、サイバー脅威への脆弱性を軽減することを目指しています。関西地域のお客様、パートナー、コミュニティメンバーとの関係を築くことを楽しみにしており、急速に進化するデジタル経済において、この地域が安全に繁栄するための重要な役割を果たしたいと考えています。この重要な一歩を踏み出すゼットスケーラー日本法人を率いる機会をいただけたことに感謝するとともに、大阪への進出が西日本の顧客にとってさらに大きな成功の物語の始まりとなると確信しています。当社のソリューションや、企業独自のデジタルトランスフォーメーションの道のりをサポートする方法についての詳細をご希望の場合は、ぜひお問い合わせください。ゼットスケーラーは、皆様の成功に向けて、全力でサポートいたします。]]></description>
            <dc:creator>Hiroyuki Kaneda (RVP for Asia)</dc:creator>
        </item>
        <item>
            <title><![CDATA[How organisations can weather future storms by becoming ‘Resilient by Design‘]]></title>
            <link>https://www.zscaler.com/jp/blogs/company-news/how-organisations-can-weather-future-storms-by-becoming-resilient-by-design</link>
            <guid>https://www.zscaler.com/jp/blogs/company-news/how-organisations-can-weather-future-storms-by-becoming-resilient-by-design</guid>
            <pubDate>Thu, 03 Apr 2025 08:33:11 GMT</pubDate>
            <description><![CDATA[In today's world of escalating cyber threats, organisations face unprecedented challenges trying to maintain IT and business operations without disruption. As the pressure to digitally transform continues, cyber resilience is fast emerging as the driving force behind survival and success. But with bad actors currently controlling the pace of change, organisations are having to find more and more ways to improve their security posture, which is why cyber resilience has gained popularity.As an approach, cyber resilience recognises the fact that an appropriate security posture is not just having the best defensive controls, but includes how to stay in business - no matter how significant the attack. The process is never complete, and instead must be constantly evolved to keep up with adversaries. That means that within their cyber security strategies, organisations must respond to the challenge of not only putting controls in place to prevent incidents from occurring, but also having the mechanisms set-up to be able to respond to and recover when they inevitably do. We call this being ‘Resilient by Design.’This is where a mindset shift is needed. According to our recent research report&nbsp;‘Unlock the Resilience Factor: Why Resilient by Design is the Next Cyber Security Imperative’ 60% of IT leaders globally believe their organisation overly prioritizes prevention in its cyber security strategy, and more than half of the respondents (57%) say their leadership continues to define cyber security failure as initial access by a threat actor.&nbsp;This needs to change. Effective cyber resilience approaches that are ‘Resilient by Design,’ must go beyond the technical challenge of cyber prevention, and instead look at the situation far more holistically. They must answer the question: Do we have the ability across our business, infrastructure and people to prevent, withstand and recover from a successful attack?Preparing for the cyber stormThe analogy that comes to mind is that organisations should think of their cyber resilience as if they are preparing for a storm. If they only have an umbrella to hand, that will offer little protection against a hurricane. That is why humans rely so heavily on the weather forecast to warn us of coming storms – so we can take action to not only protect ourselves by seeking shelter, but also deploy additional security and recovery measures in advance. Continuing the analogy, there is more to overcoming the effects of a hurricane than just taking shelter. You also need to be able to prevent and withstand as much damage or impact as possible. Are building construction codes set up in such a way to endure the gale-force winds?&nbsp; Are there clean up plans after the storm clears - and are they prioritised to ensure essential services keep running?Of course, taking effective recovery measures means that you have to declare what those essential services are going to be beforehand. You might, for example, need ambulances to be able to go down roads to tend to the injured – meaning those roads have to be cleared first, and those ambulances are ready to go with medical staff available to equip them. Similar “cyber preparedness” steps have to be taken into consideration to become ‘Resilient by Design.’How to become ‘Resilient by Design’?Organisations need to ensure that they can respond quickly to cyber incidents. At Zscaler we are already helping our customers to shift to an architecture that can weather the cyber storm – not only putting appropriate security controls in place, but also replacing aging architectures that were built on what was effectively a house of cards.&nbsp;Per my introduction, we are also tackling the challenge from a more holistic point of view, looking beyond technology aspects and considering the full breadth of an organisation to deliver the capabilities for a robust response and recovery strategy. Forecasting cyber incidents, based on AI delivered insights should become part of the strategy as well. Additionally, as part of this, ‘Resilient by Design’ must encompass business capability requirements as well. The change to a zero trust based architecture, for example, not only solves the security challenges of digitized organisations, it also supports business agility and delivers a competitive advantage at the same time.&nbsp;With business capability an increasing part of the protection equation, security has already become a board level topic – and so too must resilience. Organisations need a business vision and an investment plan to switch gears to become truly cyber resilient. To continue to innovate with confidence, they also need to know they are as protected as possible, and able to recover from any incident without major interruption to business operations.&nbsp;The changing role of security&nbsp;Security’s role as a business enabler is a new paradigm that has become a reality in the past few years of transformation. In recognition of this, the CISO must also transform their role to reflect the more modern function of a BISO (Business Information Security Officer) and ensure that today’s security processes take business operations into account as well. As the security function matures, a ‘Resilient by Design’ approach is yet further evidence of the increasingly central role it is taking on.&nbsp;Looking ahead, organisations must leave the old school thinking of isolated security controls behind to achieve holistic resilience across their operations. In doing so, they will be able to weather whatever cyber security storms come their way. In today's volatile world, being ‘Resilient by Design’ isn't just a nice to have. It's your ticket to get a competitive advantage and unlock The Resilience Factor.This blog summarizes the first episode of The Resilience Factor podcast series. You can listen to the full conversation of the podcast&nbsp;here.]]></description>
            <dc:creator>Marc Lueck (CISO Northern Europe, Zscaler)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Lessons from Gartner on Infusing Resilience Into Your Security and Risk Program]]></title>
            <link>https://www.zscaler.com/jp/blogs/company-news/lessons-from-gartner-on-infusing-resilience-into-your-security-and-risk-program</link>
            <guid>https://www.zscaler.com/jp/blogs/company-news/lessons-from-gartner-on-infusing-resilience-into-your-security-and-risk-program</guid>
            <pubDate>Tue, 25 Feb 2025 18:43:25 GMT</pubDate>
            <description><![CDATA[2025 demands a new approach to cybersecurity resilience. As network complexity collides with ever-more volatile threat and operating landscapes, traditional security measures have become untenable.While a security framework with perfectly synchronised people, processes, and partners might sound aspirational, it's no longer something you can choose to reach for—it's essential for business survival.&nbsp;Yet too often, proactive, sustained cyber resilience takes a back seat to reactive responses when cyber-attacks and operational failure scenarios strike.A timely research report from Gartner,&nbsp;Succeed as an SRM Leader by Infusing Resilience Into Your Program 1), offers a practical blueprint for organisations caught in these reactive cycles. It reveals how to build cyber resilience into your operations and create an adaptable system that can tackle constant interruptions, remove complexity, and stay prepared for threats both big and small.At Zscaler, we believe cyber resilience will define business success in 2025. And that a new approach is desperately needed. This isn't about better controls or technology alone – it's about making those controls and technologies work more effectively while supporting the teams that use them. Our mission this year is to help our customers unlock&nbsp;The Resilience Factor—something we define as the unique ability of a business (or indeed individual employee) to&nbsp;withstand adversity,&nbsp;adapt operations, and move forward with confidence, ready to thrive in the face of any challenge.Ready to strengthen your organisation's cyber resilience strategy?&nbsp;Download the Gartner report now to discover practical steps for building a more resilient security programme. And stay tuned—this is just the beginning of our exploration into The Resilience Factor.1) Gartner, Succeed as an SRM Leader by Infusing Resilience Into Your Program, Authors: Michael Aldridge, Belinda Wilson, Arthur Sivanathan, 18th June 2024]]></description>
            <dc:creator>Brian Marvin (SVP, Sales)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Legacy Architecture is Preventing a Modern Digitised NHS]]></title>
            <link>https://www.zscaler.com/jp/blogs/company-news/legacy-architecture-is-preventing-a-modern-digitised-nhs</link>
            <guid>https://www.zscaler.com/jp/blogs/company-news/legacy-architecture-is-preventing-a-modern-digitised-nhs</guid>
            <pubDate>Tue, 25 Feb 2025 12:53:45 GMT</pubDate>
            <description><![CDATA[May 12th, 2017 is a day burned into the memories of IT and security teams nationwide. For those lucky enough to not be impacted, it was the first large-scale ransomware attack - titled WannaCry - which encrypted the data on Windows devices that hadn’t updated to a recent Microsoft patch. That data was held for ransom by bad actors who exploited the unpatched software, which had a major impact on more than a third of NHS Trusts and subsequently thousands of patients across the country.Now you might be thinking it’s 2025 – how is WannaCry still relevant eight years later? Well, although the Windows patching has improved beyond what it was in 2017, the fundamental flaws that were culpable in 2017 are still seen today. Traditional connectivity practices are still being used in hospitals and continue to leave our health system open to vulnerabilities due to implicitly trusted network access. Third parties and other organizations continue to connect to internal networks via VPNs or firewalls that have consistently proved to be plagued with basic vulnerabilities and zero-day threat software gaps.&nbsp;All of this subpar infrastructure time from already over stretched IT teams within the public sector and more specifically, our health system. We can’t keep trying to mitigate the flaws in legacy architecture by patching up the holes – there has to be a better way!Four steps to robbing a bankBefore we can identify the solution, we need to identify the root of the problem by understanding how a breach can happen. To put it into non-technical terms, an IT security breach is much like robbing a bank.&nbsp;The first step is to identify all the possible bank branches to hit. Perhaps there are 50 or 500 bank branches out there, so the next step is to narrow this down to a branch that can be broken in without getting caught. Perhaps it is in a secluded area, or the surveillance cameras are not working. The third step, once you're in, is to move laterally - find a cash safe, and make your escape. Four simple steps.&nbsp;This is the same four-step approach to conducting a cyber attack. First, they find your attack surface. What's your attack surface in the cyber world? Well, it's every public IP which may be firewall, a VPN, or application portal. And today, AI is helping bad guys to identify the attack surface very, very quickly. Secondly, they want to compromise you. They do this by essentially finding a vulnerable user or vulnerable applications. And today, you can actually generate phishing campaigns using AI or Machine Learning, or you can even create a webpage to really bring them in. So, either users fall for it through social engineering, or they exploit a vulnerable application. Once infected, the malware moves laterally through the wider network. It finds high-value assets, then encrypts it and asks for ransom. Number four, they don't stop there, they steal your data. And stolen data is often sent to the Internet.Build a zero trust strategyNow you understand the principle of a cyber breach, you need to learn how to mitigate these four steps. This is where a zero trust architecture is the ideal counter-measure. Zero trust isn’t about plugging the gap by creating a new form of firewall or VPN. Its key focus is to make sure the bad guys can be stopped at each of the four steps. For instance, Zscaler’s platform is far more effective than traditional firewall-based architecture. Generally, when new technologies like cloud come, IT vendors try to take existing technologies of networking security and try to adapt it to the cloud. Zscaler Zero Trust is fundamentally different. It never put users or third parties on the network and it only uses inside-out connections, always verify identity, policy and risk before allowing access.&nbsp;Meet us at NHS Cyber Security ConferenceReliance on outdated legacy systems is increasingly untenable in today’s digital age. To avoid another WannaCry incident, NHS Trusts must update their security architecture to a Zero Trust approach to prevent lateral movement and decrease the attack surface of traditional technology stacks. To learn more about how NHS networks are being continuously exposed to threats, please join us on&nbsp;5th of March 2025 at 12:55 for Zscaler’s session on “Why Legacy Architecture is No Longer Fit for Purpose in a Modern Digital NHS”. Using lessons from real world examples of ransomware attacks, we will highlight the limits of patching, and why VPNs and their daily CVEs continue to expose NHS networks to threats. Additionally, we’ll examine the dangers of lateral movement between interconnected NHS trusts and why this sharing of data might increase vulnerability. Attendees will leave with actionable insights on modernizing IT infrastructure to reduce these risks and better secure the future of digital healthcare using zero trust principles.&nbsp;We look forward to seeing you there.&nbsp;]]></description>
            <dc:creator>Mike Culshaw (Sales Engineer)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Mobile World Congress: The Demand for Uniformity in Zero Trust]]></title>
            <link>https://www.zscaler.com/jp/blogs/company-news/mobile-world-congress-the-demand-for-uniformity-in-zero-trust</link>
            <guid>https://www.zscaler.com/jp/blogs/company-news/mobile-world-congress-the-demand-for-uniformity-in-zero-trust</guid>
            <pubDate>Tue, 18 Feb 2025 12:43:22 GMT</pubDate>
            <description><![CDATA[My key take away from last year’s Mobile World Congress was that&nbsp;now almost everything is SIM-enabled, the industry focus moving forward will be on how telcos can make use of connectivity being delivered everywhere. Related to this, the open question coming away from the conference was how mobile connectivity can be orchestrated in one environment with effective controls?&nbsp;I have long seen security as the great unifier in this regard - as every user, device, and service demands uniform security on any network. This year I will return to Barcelona to deliver on that vision with an orchestration approach based on the uniformity of Zero Trust delivered via the Zscaler security cloud.For uniformity, the challenge has always been to extend an enterprise’s control, visibility and protection to all its assets, wherever they may be. To do so requires going beyond where physical infrastructure is located, where we have a forwarding router on the edge, or where clients are. To date, our Zero Trust based security cloud has been covering client side software and the edge of a network, and forwarding the edge of the cloud to all things in the IoT or OT-space.&nbsp;But we have not yet addressed the last unexplored territory of cellular connectivity with Zero Trust - meaning that this has still been a blind spot contributing to unsecured data streams from mobile services or things. And I deliberately say “things” here to signify that this goes beyond the scope of devices. The last mile for true uniformity of Zero Trust services has been unrealized – until now. With the extension of our Zscaler Cellular portfolio, we just added the last piece of the puzzle to deliver unified Zero Trust everywhere, at any time, and on anything in the various form factors that we need to deliver.Closing the security gap of mobile thingsZscaler Cellular brings secure Zero Trust-based connectivity into a cellular format; it is designed to enable the secure connectivity of IoT and OT devices or things that move outside the boundaries of a traditional network infrastructure.&nbsp;Typically, the traffic of such mobile devices outside the traditional enterprise perimeter would fall outside the control of IT security teams. Now, by providing organizations with an innovative way to send such traffic of these mobile devices or things through the Zscaler Zero Trust Exchange security platform, Zscaler Cellular helps the devices to achieve secure bi-directional connectivity from enterprises or their customers, and therefore close any potential security gaps.Zscaler Cellular can be deployed with existing cellular providers or through an end-to-end service from Zscaler. To deliver this Zero Trust functionality, Zscaler has built the Zscaler Cellular Edge, which can be deployed via three different routes:1. As a bolt-on for existing telco services&nbsp;2. Through a direct service from Zscaler&nbsp;3. By moving the cellular edge into private cellular environments. Customers that are looking into replacing their Wi-Fi ecosystem with a high speed, low latency solution based on 5G can use this path to gain secure gateway functionality to enable those devices and services to be protected.Zscaler Cellular makes routable or public IPs obsoleteTraditionally, SIMs would connect via a private APN to the customer’s network, which would require an IP address that makes it fully routable. Once the mobile traffic is inside the private network it is secured via the firewall. Such a set-up repeats the old story of tromboning and backhauling data (i.e. per traditional MPLS traffic flows) which a modern Zero Trust approach already made obsolete. The problem with continuing to use these routable networks is that their security models add latency, vulnerabilities, cost and backhauling to the data center, and also make devices visible to attackers.To simplify such a complex set-up, Zscaler Cellular has a direct relationship with any mobile network - turning the cell edges into the gateway to access private or Internet workloads without having to backhaul data. Similar to the early days when the Zscaler service removed backhauling by providing secure direct access to the Internet for users accessing their applications in the cloud, the cloud platform now also considerably simplifies the infrastructure for mobile connectivity and makes SIMs invisible to the outside world. Rather than the heavy lift of previous network configurations, one unified Zero Trust policy secures all cellular data streams via the Zero Trust Exchange platform. As well as simplifying the set-up, this enables Zscaler to give secure connectivity, protection and visibility via one unified approach that serves a multitude of customer use cases.Simplified security for the mobile world at MWCThe benefit of a unified Zero Trust approach is the universal applicability for various use cases of basically everything that is mobile. Whether it is handheld devices, vehicles, machinery, or other use cases in the logistics or mobility space the concept of simplified combined connectivity and security resonates broadly across a variety of industries.&nbsp;If you want to experience the power of the Zscaler Cell Edge and private cellular networks at Mobile World Congress, visit Zscaler at our Deloitte and NTT partner stands or drop by our booth on the executive meeting room level. We are looking forward to showcase how Zscaler Cellular extends the reach of Zero Trust to shape the future of secure connectivity.]]></description>
            <dc:creator>Nathan Howe (Global VP of Innovation)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Resilient by Design:リアクティブなインシデント対応からプロアクティブなサイバー戦略への移行]]></title>
            <link>https://www.zscaler.com/jp/blogs/company-news/resilient-by-design-from-reactive-incident-response-to-proactive-cyber-strategies</link>
            <guid>https://www.zscaler.com/jp/blogs/company-news/resilient-by-design-from-reactive-incident-response-to-proactive-cyber-strategies</guid>
            <pubDate>Tue, 11 Feb 2025 08:00:05 GMT</pubDate>
            <description><![CDATA[レジリエンスをセキュリティの構造に組み込む方法IT部門は、テクノロジーの急速な進化への対応を試みるなかで、イノベーションとデジタル化という大きなプレッシャーに直面し続けています。同時に、従来のアーキテクチャーやハイブリッド ワークなどの内部条件、さらには業界規制の強化やサイバーセキュリティの脅威の急増といった外部条件により、組織の保護をめぐる課題はこれまで以上に複雑化しています。現実的には、サイバー攻撃、ブラウンアウト、ブラックアウト、あるいはそれ以上の重大なセキュリティ障害を避けることは、もはや不可能だと考える必要があります。つまり、インシデントの被害から可能な限り迅速かつ効率的に回復し、被害自体を軽減できるサイバー レジリエンス戦略が必須となります。今、IT部門は既存のサイバー レジリエンス戦略を検証し、この新しいデジタル時代の目的にかなったものになっているかどうかを見直す必要があります。では、死角はどこにあるのでしょうか？そして、セキュリティ アプローチを変更することでどのようにその死角を埋め、競争優位性を強化できるのでしょうか？見当違いの自信2024年12月、Zscalerは世界12か国1,700人のITリーダーを対象に業界横断的な調査を実施し、現在の組織におけるサイバー レジリエンスの状況を明らかにし、『レジリエンス ファクターの最大化：今後のサイバーセキュリティに「Resilient by Design」が不可欠な理由』と題したレポートにまとめました。このレポートでは、ITリーダーの約3分の2 (60%)が今後12か月以内に重大な障害シナリオの発生を予想しており、45%が過去6か月間にすでに経験していることが明らかになっています。この調査データは暗い現実を示す一方、ITリーダーがこのようなインシデントに対応するためのレジリエンス戦略に自信を持っていることも示唆しています。回答者のほぼ半数(49%)は組織のITインフラが高いレジリエンスを備えていると考えており、現在のサイバー レジリエンス対策が少なくともある程度効果的であると考える回答者の割合は94%と大幅に高くなります。これがITリーダーの認識です。危機を回避することができ、あらゆる事態に対応する備えができていると考えて安心していられます。しかし、より詳しく見ていくと、その土台の危うさが浮かび上がってきます。実際、このレポートの調査結果からは、こうしたサイバー レジリエンス戦略における憂慮すべき矛盾が明らかになりました。また、いつか必ず直面する新たな脅威への対応に関する一部のITリーダーの自信は見当違いである可能性が示唆されています。たとえば、さまざまな業界のサイバーセキュリティ関係者がAIを悪用したサイバー攻撃の潜在的な脅威について認識しているにもかかわらず、組織のサイバー レジリエンス戦略がこうしたテクノロジーの台頭に合わせた最新のものになっていると回答したITリーダーはわずか45%にどとまっています。さらに詳しく調べると、サイバー レジリエンス戦略を過去6か月間見直していなかったと認める回答者は5分の2 (40%)に上りました。レジリエンスの重要性に対する経営陣の認識不足この現実との乖離について詳しく見てみると、レジリエンス対策が遅れている主な理由の一つとして浮かび上がってくるのが、経営陣からの投資不足です。多くの回答者は、堅牢なサイバー レジリエンスを実現することの重要性の高まりを経営陣が理解していると答えたものの、それが経営陣の最優先事項であると感じている回答者の割合はわずか39%でした。投資額がニーズの高まりに対応できていないことに同意する回答者は約半数(49%)、CISOがレジリエンス計画に積極的に参加していると回答したITリーダーはわずか44%、サイバー レジリエンス戦略が組織の全体的なレジリエンス戦略に含まれていると答えた回答者の割合はわずか36%であることも、この状況を反映しています。サイバー レジリエンス戦略が脆弱なことで起こる潜在的な影響を経営陣が理解していなければ、IT部門は常に苦しい対応を迫られることになります。IT部門が組織内の考えられるすべての脆弱性について脅威ハンティングを行い、より広範なビジネス戦略に沿ったレジリエンス戦略を構築できるようにするには、投資の拡大が必要です。サイロ化したサイバー レジリエンス戦略は目的にかなわず、従来のレジリエンス戦略のなかでビジネスに不可欠なテクノロジーが優先されなければ、障害の長期化につながる可能性があります。「Resilient by Design」アプローチの構築サイバー レジリエンスのリスクを軽減するためには、セキュリティ ソリューションの構造そのものに可視性と制御を組み込む必要があります。これを実現するのが、「Resilient by Design (設計によるレジリエンス)」と呼ばれるアプローチです。障害に備えて計画を立てることで、各部門が即座に対応をとれる態勢を整えます。具体的には、どの領域でどのような障害シナリオが想定されるのかを把握し、深刻なインシデントへの発展を阻止するための補助的なテクノロジー ソリューションを準備します。まさにこの点で役立つのがZscalerのZero Trust Exchangeです。このクラウド セキュリティ プラットフォームとそのサービスのDNAには「Resilient by Design」のアプローチが組み込まれており、組織はただリスクを経験してそれに反応するのではなく、リスクをより適切に予測、軽減できるようになります。従来のセキュリティ関係者にとって、これはどのような状況でも可用性、機密性、完全性を確保できるようになることを意味します。「Resilient by Design」アプローチに対応し、リスクの軽減、攻撃対象領域の最小化、初期侵害やラテラル ムーブメント、データ流出の阻止を実現するZscalerのサービスを以下に紹介します。Zscaler Internet Access™ (ZIA™)は、ユーザー リスク スコアリングを通じ、さまざまなリスク要因に基づく動的なアクセス制御ポリシーを設定できます。最新の脅威インテリジェンスを考慮に入れながら、リスク スコアが高いユーザーによる機密性の高いアプリケーションへのアクセスを制限します。Zscaler Private Access™ (ZPA)™は、適応型アクセス ポリシーによって、リスクの高いユーザーやデバイスのポスチャーの変化を継続的に評価し、これらのセキュリティ イベントに基づいてユーザーやデバイスごとにポリシーを適用します。Zscaler Data Protectionは、SaaSやパブリック クラウド アプリケーション全体にわたり、転送中データおよび保存データに統一されたセキュリティを提供することで、ランサムウェア攻撃による潜在的な被害だけでなく、データが持ち出されるリスクも低減させます。Unified Vulnerability Managementは、統合されたセキュリティ データとビジネス コンテキストを活用して、リスクの優先順位付けや修復ワークフローの自動化を実現するとともに、動的なレポートとダッシュボードを提供します。Risk360™は、Zscalerのシステムの構成に関するインサイトを提供し、組織のリスク ポスチャーを改善するための変更を提案します。Zscalerのセキュリティ クラウドとサードパーティーのソースからのテレメトリーを活用することで、組織全体のリスクを定量化および可視化するとともに、Active Directoryの設定ミスを検出し、公開資産のセキュリティ ギャップを特定できます。Zscaler Deceptionは、リアルなデコイを環境全体に展開して活動中の攻撃者をおびき寄せ、検出し、阻止します。まとめ現在のビジネス環境では、サイバー レジリエンスにいっそう注力し、適切な投資を行って組織全体に適用することが求められています。しかし、こうした取り組みはサイロ化した環境では実施できません。セキュリティ戦略に最初から組み込み、予防と同じように重視する必要があります。「Resilient by Design」のアーキテクチャーは、迅速な封じ込め、効果的な対応、障害シナリオ発生時の中断の最小化を可能にするツールを提供し、脅威に対する検知と対応という従来のアプローチからの脱却を後押しします。この原則を採用することで、どのような課題にも対応できる態勢が整い、IT部門は困難な状況を切り抜け、状況に応じて運用を調整しながら、自信を持って前進できるようになるでしょう。]]></description>
            <dc:creator>Brian Marvin (SVP, Sales)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing the Zscaler Cyber Academy: Elevate Your Zero Trust Cybersecurity Journey]]></title>
            <link>https://www.zscaler.com/jp/blogs/company-news/introducing-zscaler-cyber-academy-elevate-your-zero-trust-cybersecurity-journey</link>
            <guid>https://www.zscaler.com/jp/blogs/company-news/introducing-zscaler-cyber-academy-elevate-your-zero-trust-cybersecurity-journey</guid>
            <pubDate>Wed, 05 Feb 2025 17:38:43 GMT</pubDate>
            <description><![CDATA[We are thrilled to unveil Zscaler Cyber Academy, a completely reimagined learning experience designed to empower you with the knowledge and skills to navigate the evolving threat landscape, with a core focus on zero trust principles.The cybersecurity landscape is constantly evolving, especially in the realm of zero trust, demanding a continuous learning approach. To best serve our community, we have significantly enhanced the Zscaler Cyber Academy, delivering a more comprehensive, engaging, and impactful learning experience, centered around building and maintaining robust zero trust architectures.Why the Change?Evolving Threat Landscape in Zero Trust:&nbsp;The sophistication of cyber threats targeting zero trust implementations is increasing rapidly. The Zscaler Cyber Academy is designed to equip you with the latest knowledge and skills to effectively combat these threats and protect your organization's zero trust framework.Enhanced Learner Experience:&nbsp;We understand the importance of a seamless and engaging learning experience. The reimagined Academy focuses on providing a more intuitive and user-friendly platform, making learning more accessible and enjoyable.Industry Alignment with Zero Trust Standards:&nbsp;The Zscaler Cyber Academy aligns with the latest industry best practices and certifications, ensuring your learning reflects the most current and in-demand skills.Key Changes to look out for:From Zscaler Academy to Zscaler Cyber Academy:&nbsp;The new name reflects the broader scope of cybersecurity expertise you'll gain. It emphasizes our commitment to providing comprehensive and in-depth cybersecurity knowledge.Revamped Learning Paths:Highly customizable learning paths tailored to your specific role, skill level, and career goals. Explore a wider range of specializations, including cloud security, threat detection and response, and more.Updated Certifications:Expanded range of certifications that validate your expertise in specific areas, such as Zscaler product specialties and industry-recognized certifications (e.g., CISSP, CISA). Certifications now emphasize hands-on skills and real-world application.Modernized Learning Experience:Sleek and modern Learning Management System (LMS) with improved navigation, enhanced search capabilities, interactive elements, and personalized dashboards.Redesigned Website:User-friendly interface with improved search functionality, clear calls to action, and easy access to all learning resources.The Zscaler Cyber Academy's alignment with the latest industry best practices and certifications related to zero trust ensures that your learning reflects the most current and in-demand skills. This includes knowledge of various zero trust frameworks, technologies, and compliance requirements, all of which are essential for working with the Zscaler Zero Trust Exchange.Who is this for?The updated learning journeys for roles like administrators, engineers and delivery consultants who configure or deploy the latest suite of Zscaler products like ZIdentity, Experience Center, Risk Management portfolio, or those who wish to&nbsp; learn more about these new features.&nbsp;We have launched a&nbsp;bridge course for each of the learning journeys so that you can move from the old learning journeys to the new learning journeys at each stage of your progress.&nbsp;If you have any questions, please don't hesitate to write to us at&nbsp;training@zscaler.com.&nbsp;We invite you to explore the new Zscaler Cyber Academy today, and embark on your journey to cybersecurity excellence.]]></description>
            <dc:creator>Prameet Chhabra (VP, Platform Enablement)</dc:creator>
        </item>
        <item>
            <title><![CDATA[London’s Calling: Zenith Live Encore Kicks Off Its EMEA Tour]]></title>
            <link>https://www.zscaler.com/jp/blogs/company-news/londons-calling-zenith-live-encore-kicks-off-its-emea-tour</link>
            <guid>https://www.zscaler.com/jp/blogs/company-news/londons-calling-zenith-live-encore-kicks-off-its-emea-tour</guid>
            <pubDate>Thu, 09 Jan 2025 10:33:50 GMT</pubDate>
            <description><![CDATA[It was an absolute honor to host the Zenith Live Encore event in London alongside our Software Engineering leader, Lee Langley. With over 200 guests joining us, the day was packed with inspiring discussions on how AI-enabled zero trust is shaping the future of secure and seamless digital transformation. The energy in the room was electrifying, as attendees, customers, and speakers shared real-world transformation stories, product innovations, and thought-provoking insights. The passion and collaboration on display reinforced how vital these conversations are as we all strive to drive meaningful change in the digital era. Below is a recap of the event highlights for those who couldn’t join us in person.&nbsp;The Platform Revolution in CybersecurityWe opened the event with a thoughtful discussion about the importance of a platform mentality for security. Platforms are foundational systems that enable organizations to operate efficiently and also to innovate effectively. An example of cloud-based platforms would include Amazon Web Services (AWS) and Microsoft Azure. Or alternatively you could also use work platforms such as Workday and Salesforce. Zscaler differentiates itself from the above by being a platform that spans both categories – providing a unified, cloud-native architecture that integrates seamlessly into existing platforms and enhances their capabilities while also securing operations.Unlike point solutions that address isolated problems, the Zscaler platform delivers a complete security ecosystem. It ensures secure access, data protection, and zero trust principles across an entire environment. Whether it’s providing secure connectivity to AWS, safeguarding workflows in Salesforce, or enabling protected operations in ServiceNow, Zscaler transforms how platforms interact with each other and with users. This integration is what makes Zscaler a true platform—not just a tool or add-on.&nbsp;Zscaler doesn’t just secure your business, it enables you to run your business, securely.&nbsp;AI-Driven Zero Trust: A Game-ChangerOur day continued with more detailed speaker sessions with product experts who discussed how AI is enhancing the way the Zscaler platform operates. Our first speaker, Yaroslav Rosomakho, CTO in residence at Zscaler, provided unparalleled insight into the real-world outcomes of implementing AI-enabled zero trust to transform business operations. Yaroslav argued that zero trust needs to be viewed less as a cost-saver for businesses and more as a business-enabler.&nbsp; It helps organizations to innovate while maintaining a strong level of security. This was followed by a session with Mark Ryan, VP of Product Management at Zscaler, who demonstrated Zscaler’s commitment to proactive threat management, whilst enabling the best user experience. By delivering groundbreaking tools to enable the user to work securely - using isolation, or notifications - users are informed of how security is empowering them to work.The final sessions focused on transformational Zscaler product innovations that have taken place since Zenith Live 2024. We touched upon how AI is being utilised to support risk management analysis in real-time. This improves efficiency by assigning AI to focus on the most critical tasks first. It provided a great showcase of how AI can transform security operations from a defensive posture to proactive risk management.We also highlighted Zscaler’s commitment to driving innovation in data protection. Many of the audience confirmed that some form of generative AI applications were permitted within their organization. Peter Szabo and Luke Miller took to the stage to outline how Zscaler’s transformational platform approach safeguarded against sensitive data leakage using cutting edge innovations. Using an AI-based unified policy engine, IT leaders can determine whether the data being fed to the GenAI application is private. If so, it will initiate browser isolation to avoid that data becoming accessible to the wider internet. It allows users to work with the application but have control of the endpoint to prevent certain data being stored by the application for public use.Here are the top three learnings from our product experts:Zero trust should be viewed as a business-enabler rather than just a cost-saver.If implemented correctly, zero trust security empowers employees to work, no matter where they are, using proactive threat management.AI-enabled zero trust can support real-time threat analysis and protect against data loss, using a policy engine that can isolate users while still allowing them to utilise applications such as generative AI.Advice from customers’ journeysWe closed out the day with a ‘fireside chat’ panel with three Zscaler customers who are all at varying points in their own zero trust journey. Each speaker shared his personal zero trust story and gave invaluable practical advice on how best to sell zero trust to their executive board. The key discussion point among the panellists was on cultural change. How do you convince an organization to take this leap?&nbsp;Sam Grossick, Enterprise Architect at Leonardo had recently presented his business case to the board, so was able to provide key insights into how security professionals can help guide their organization through to the point of purchase. Whereas BP and Unilever were multiple years along in their journey and could discuss how to keep convincing an organization to continue moving forward with the platform and innovating. There's&nbsp;sometimes&nbsp;a perception at board level&nbsp;in some organisations that once they buy a security platform they have completed their protection and will forever be in a state of safety. However, a platform approach is a journey that continuously evolves in order to reap the benefits. Our role at Zscaler is to ensure we are navigating the organizational change of customers and support overcoming any internal hurdles in order to align security with business goals.We are incredibly grateful to all the customers who joined us and spoke at Zenith Live Encore – thank you!&nbsp;Next stop, Zenith Live 2025With the combined power of zero trust and AI, Zscaler can enable businesses to transform securely without fear of opening the attack surface of their organization. Using AI to combat other AI attacks means that we can constantly evolve and keep pace with the evolving threat landscape.The Zenith Live Encore event helped to showcase these platform evolutions in the platform and provided attendees with actionable insights and a deeper understanding of how a zero trust platform can empower their digital transformation journeys.&nbsp;While 2024 may be coming rapidly to a close, Zscaler continues to innovate and push the envelope for our customers and partners. We look forward to sharing our latest evolutions at&nbsp;Zenith Live 2025 in Prague from 16th - 19th of June!&nbsp;Be part of the conversation and the innovation—register today to secure your spot!]]></description>
            <dc:creator>Justin Brooks (Area Vice President, Sales - UK&amp;amp;I)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler’s Zenith Live Encore will showcase the power of AI &amp; Zero Trust]]></title>
            <link>https://www.zscaler.com/jp/blogs/company-news/zscalers-zenith-live-encore-will-showcase-the-power-of-ai-and-zero-trust</link>
            <guid>https://www.zscaler.com/jp/blogs/company-news/zscalers-zenith-live-encore-will-showcase-the-power-of-ai-and-zero-trust</guid>
            <pubDate>Thu, 28 Nov 2024 12:58:07 GMT</pubDate>
            <description><![CDATA[The new customer roadshow kicks off in London on December 3rd, 2024At our annual Zenith Live event in June, Zscaler discussed the inflection point between zero trust and AI. The combination of both innovations promises to unlock vast protection potential for cybersecurity practitioners – enabling their organizations to continue to push technological boundaries in their pursuit of digitalization while carefully managing cybersecurity risks.To showcase Zscaler’s progress since June and facilitate even more face-to-face interaction with our customers and partners, we have launched the Zenith Live Encore roadshow. Taking the format of one-day events hosted in key cities across the globe, the roadshow will demonstrate how AI innovations can help security practitioners reduce risk, complexity, and cost. Our zero trust experts will be on hand to provide the latest insights into how security can minimise attack surfaces, eliminate lateral movement and stop data loss. We will also give attendees the chance to learn from industry leaders and network with their peers.Keeping up with the pace of innovationAt Zenith Live, our CEO Jay Chaudhry laid out his vision for how AI and zero trust were set to intersect and evolve the solutions that Zscaler offers. Picking up from Jay, at Zenith Live Encore we will give a keynote exploring how these innovations have progressed over the past five months and what that means for customers on their zero trust journeys. In particular, we will explain how Zscaler is introducing additional depth to its zero trust offering by enhancing adaptive risk capabilities and increasing AI-driven automation to support customers’ deployment from historic flat networks into a segmented architecture.The keynote will be followed by deep-dive sessions into these innovations with our Zscaler experts to provide practical examples of how each solution is evolving and the different business cases it solves. During the&nbsp;Data Platforms Innovations&nbsp;session, for example, we will consider the topic of&nbsp;accelerating businesses with Generative AI while managing associated data risks. Here our experts will highlight how businesses can secure the usage of GenAI across their organizations to enable employees to unlock the benefits of the technology without fear of data loss or breach. Each session is designed to inspire discussion and outline clear business cases for IT teams to present back&nbsp;to wider teams in their organisations.Learn from Zero Trust adoptersAs part of the agenda, we will also be speaking to Zscaler customers at varying stages of their zero trust transformation. Panellists from Unilever, BP, and Leonardo, will take part in a ‘fireside chat’ aimed at sharing their learnings and inspiring others who wish to take that first step towards a zero trust architecture. Having already overcome the hurdles of implementing such an architecture on their current technology stacks, each panellist will provide practical guidance and insights that will help truly bring zero trust to life. It promises to be a lively and informative discussion!A cybersecurity evolutionAI innovations combined with a zero trust architecture represent a truly game-changing evolution for the cyber security industry. Working together, these two technologies can not only protect businesses against the evolving threat from bad actors, but also enable them to thrive and innovate without fear of widening their attack surface.If you are interested in learning more about this evolution and hearing directly from those who are already experiencing it, register for the&nbsp;Zenith Live Encore event in London today!]]></description>
            <dc:creator>Yaroslav Rosomakho (Chief Scientist)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Understanding the CyberRatings SSE Report and Why Zscaler is Named A Top Provider]]></title>
            <link>https://www.zscaler.com/jp/blogs/company-news/understanding-cyberratings-sse-report-zscaler-named-top-provider</link>
            <guid>https://www.zscaler.com/jp/blogs/company-news/understanding-cyberratings-sse-report-zscaler-named-top-provider</guid>
            <pubDate>Wed, 23 Oct 2024 21:15:58 GMT</pubDate>
            <description><![CDATA[CyberRatings, the leading non-profit security testing organization, recently tested several vendors’ security service edge (SSE) offerings with the goal of deriving empirical data that would answer the question, “Are SSE products secure by default?”&nbsp;&nbsp;The emphasis is aligned to a shift in the industry towards “secure by default” approaches to develop and deploy software products. The trend is an outcome of a&nbsp;2023 report authored by CISA and its international partners that emphasizes that the burden of security should be shifted away from the end-user and back towards software vendors.In CISA’s words: Secure-by-Default means products are resilient against prevalent exploitation techniques out of the box without additional charge. These products protect against the most prevalent threats and vulnerabilities without end-users having to take additional steps to secure them.&nbsp; Scope of the test: a “quick look” at default security postureCyberRating labeled this as a “mini-test” because their analysts did not intentionally run through a comprehensive evaluation of the full capabilities of the vendors’ SSE platforms. Instead, with the mini-test, CyberRating’s analysts sought to provide a data-driven “quick look” at the default security posture vendors can deliver with minimal to no additional security configuration of their SSE.In short, CyberRatings wanted to test the initial functional working state of these SSE offerings. For a more complete evaluation of Zscaler SSE, see the&nbsp;June 2024 CyberRatings SSE Report in which Zscaler achieved an “AAA” rating.&nbsp; SSE security posture test methodologyThe SSE mini-test was designed to provide insight into the default security posture across these platforms using a small subset of malware samples (using ~3,000 samples vs. the 100,000+ samples in CyberRating’s more all-inclusive tests). CyberRatings ran the following tests using Windows 11 clients configured with each vendor’s SSE client software:Test 1: Download ~1,000 benign samples over HTTP&nbsp;designed to be susceptible to being classified as malware despite being innocuous (e.g., the solution’s propensity for triggering false positives).&nbsp;Test 2: Download ~3,000 active malware samples over HTTP, current to within 30 days of the test (e.g., the SSE’s ability to detect and block basic malware downloads). No evasions were applied. Zscaler SSE found “secure-by-default” with zero false positivesIn its default configuration, Zscaler stands above our competitors in the mini-test of SSE platforms: Zscaler blocked about 97% of the malware test samples with no false positives. Zscaler also includes Cloud Sandbox capability out of the gate, unlike several of our competitors.&nbsp;Here’s what's notable in the evaluation results in relation to our competitors:&nbsp;Zscaler blocked the most malware samples when compared to other vendors’ SSE platforms running in their default configurations. Zscaler also did not produce any false positives. With our SSE, the most important security controls needed are automatically enabled to protect enterprises from malicious cyber actors.&nbsp;Cisco’s, Checkpoint’s, and Versa Networks’ SSE platforms did not detect any malware samples when their default configuration remained unchanged. In other words, they do not provide security by default. Their ability to inspect traffic for malware is dependent on making configuration changes. Yet, security teams are frequently overloaded with security and operational responsibilities, resulting in limited time to dig through documentation to understand and implement robust cybersecurity posture.&nbsp;Cisco still drew false-positives, even when the CyberRatings evaluators made changes to their default configuration.The keys to effective AI-driven threat detection are a quality dataset and Zscaler’s AI models training on the telemetry collected by operating the world’s largest security cloud. This cloud continuously collects and analyzes over 500 trillion daily signals and 500 billion daily transactions.&nbsp;&nbsp; An effective SSE offering also reduces complexityThe results of this mini-test are clear: customers need ease-of-use combined with high efficacy to defeat today’s advanced cyberthreats—and Zscaler was found to deliver:&nbsp;&nbsp;Security by default—there is no configuration option hidden somewhere in the administrative console that must be enabled.&nbsp;&nbsp;Zscaler automatically enables the most important security controls needed to protect enterprises from malicious threat actors. In short: we deliver security value upon deployment and thus deliver fast time to value.&nbsp;&nbsp;Effective blocking of malware without introducing false positives. False positives can consume a security team’s valuable time that could have been spent on higher-value work.&nbsp;&nbsp;Frictionless configuration that eliminates complexity.&nbsp;Security teams are frequently overloaded with security and operational responsibilities, resulting in limited time to understand and implement robust cybersecurity posture.&nbsp;Find out more about the CyberRating’s SSE mini-test:&nbsp;Get your copy now]]></description>
            <dc:creator>Brendon Macaraeg (Sr. Product Marketing Manager)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscalerの新たな事業継続性ソリューション]]></title>
            <link>https://www.zscaler.com/jp/blogs/company-news/introducing-new-business-continuity-solutions</link>
            <guid>https://www.zscaler.com/jp/blogs/company-news/introducing-new-business-continuity-solutions</guid>
            <pubDate>Wed, 16 Oct 2024 23:34:35 GMT</pubDate>
            <description><![CDATA[レジリエンスで信頼されるZscaler多くのお客様が求めているのは、高度な保護と優れたユーザー エクスペリエンスを提供できるセキュリティ クラウドです。先日発表したとおり、Zscalerはこうしたお客様にサービスを提供することで成長を続けています。1日あたりのトランザクション数が5,000億件にまで達したことは、お客様からの信頼があるからこそ実現できた大きな成果です。当然ながら、こうした信頼は簡単に得られるものではありません。Zscalerはユーザー、デバイス、アプリケーションの間にインラインで配置されるセキュリティ クラウドであり、お客様にとって極めて重要な役割を果たしています。サービスの信頼性とパフォーマンスを最優先に考え、可用性や処理能力の両面で常に需要に応えられるよう、徹底的な取り組みを行っています。そして、この取り組みは着実に成果を上げており、近年、1日あたりのトランザクション数が増加する一方で、カスタマー サクセス部門が対応するサポート チケットの件数は減少傾向にあります。事業継続性への注力事業継続計画(BCP)は、2024年に入って一層注目を集めています。この背景には、DORAなど、政府および業界によるBCP策定を義務づける規制の強化に加え、世界中に広範な影響を与えた大規模なIT障害の発生があります。セキュリティと常時接続への依存が高まる中、ベンダーは信頼性の高いサービスを提供しつつ、規制要件への準拠も確実に維持する責任があります。これまで、特に規制の厳しい業界のお客様から「Zscalerのセキュリティ クラウドへの取り組みを信頼しているものの、万が一の不可抗力(フォース マジュール)にはどう備えるべきか？」といった質問が寄せられていました。こうした声に応えるかたちで、Zscalerは2023年初頭に当社のセキュリティ クラウドにレジリエンス機能を導入しました。この新たな機能により、大規模なインターネット障害やZscalerの基盤インフラに対する国家レベルの攻撃といった事象が発生した場合でも、お客様は接続を維持できるようになります。多くの組織に導入されてきたお客様側で制御するレジリエンス ソリューションは、基本的なシステムと運用を継続させるという点にのみ焦点を当てるものでした。しかし、Zscalerはより高度な機能を導入することでレジリエンスを向上させます。この機能強化により、壊滅的な事象、いわゆる「ブラック スワン」が発生した場合でも、組織は事業運営の中断を最小限に抑えられるようになります。初期のレジリエンス機能をさらに強化するにあたり、Zscalerは以下の3つの目標を掲げました。壊滅的な事象が発生した場合でも、完全なセキュリティ態勢を維持しながら事業継続性を確保する構成と展開をさらに簡素化する簡単にトリガーを起動できる仕組みにし、可能であれば自動化するプライベート クラウドの事業継続性の導入レジリエンス ソリューションの次なる進化として、Zscalerはプライベート クラウドの事業継続性を導入します。これは、既存のプライベート データ プレーンにプライベート コントロール プレーンを追加するもので、パブリック クラウドが利用できない、または到達不能な状況においても、完全なセキュリティ態勢を維持したままアプリケーションへのアクセスを可能にします。お客様は、このソリューションを自社のデータ センター内にローカルに展開するか、今後リリース予定のZscalerによるフルマネージド型オプションを選択することができます。なお、インターネットおよびSaaSアプリケーション向けとプライベート アプリケーション向けで必要なコンポーネントが異なるため、以下で詳しく解説します。インターネットとSaaSアプリケーション(ZIA)WebやWebホスト型(SaaS)アプリケーションへのアクセスにおいて、壊滅的な障害時にも詳細な制御を維持したい場合、お客様は1台以上のPrivate Service Edgeを導入することになります。この物理または仮想アプライアンスは、Zscalerのクラウド オペレーションによって管理され、通常時に動作するZscalerのPublic Service Edge (世界中に展開された160以上のZero Trust Exchangeへのインターネット ゲートウェイ)と同じ機能を提供します。サービス エッジには、マルウェアを検出するための双方向のWebトラフィック検査のほか、マルウェア対策、セキュリティ、コンプライアンス、情報漏洩防止、ファイアウォール ポリシーの施行などの機能が含まれます。今回のアップデートでは、Client ConnectorがPrivate Service Edgeに自動フェイルオーバーし、事業継続性PACファイルを活用してZ-Tunnel 1.0を確立する機能が追加されました。また、新たに追加されたプライベート ポリシー キャッシュ機能により、Private Service EdgeとPublic Service Edgeとの間でシームレスなフェイルオーバーが可能になります。これは、パブリックのCentral Authorityサーバーのバックアップとして機能することで実現されます。これらのサーバーは、お客様のすべてのポリシーと構成設定をホストする役割を担っています。また、クラウド全体を監視し、ソフトウェアおよびデータベースの更新、さらには脅威インテリジェンスの集中管理を行うことでセキュリティを強化します。このプライベート ポリシー キャッシュ機能により、組織は壊滅的な障害が発生した場合でも完全なセキュリティ態勢を維持しながら、認証されていないユーザーのアクセスを安全に制御できます。プライベート アプリケーション(ZPA)プライベート アプリケーションは、アクセス権を持つユーザー以外からは見えないように設計されています。一方で、SaaSアプリケーションはインターネット上で公開されることでアクセス可能になります。この違いは、壊滅的な障害が発生した場合の対処において特有の課題を引き起こします。Zscalerはこの課題に対応するために、Private Cloud Controllerを新たに導入しました。この仮想アプライアンスは、通常運用中はパブリックZero Trust Exchangeと継続的に同期されます。何らかの理由でZTEが利用できなくなった場合やフェイルオーバーが発生した場合、Private Cloud Controllerが引き継いで運用を維持します。このソリューションはもともと、軍事分野のDDIL (Denied, Disrupted, Intermittent, and Limited)ユース ケースに対応するために開発されたものであり、連邦政府機関がパブリック クラウドへの接続が失われた場合でも、重要なアプリケーションへのゼロトラスト アクセスを確保する必要がある状況を想定しています。このようなケースでは、Private Cloud Controllerが従来の機能を超えて、幅広い機能を担うようになります。エンドポイント向けの事業継続性もう一つ重要なユース ケースとして考えなければならないのが、組織のエンドポイント(ノートPCやモバイル デバイス)が侵害された場合の対応です。たとえば、2017年にMaerskで発生したケースのようにエンドポイントが侵害されてしまうと、Zscalerのパブリック クラウドが利用可能であっても、アプリケーションに安全に接続する手段がなくなり、業務が完全に停止する可能性があります。こうしたケースで役立つのが、クラウド ブラウザー分離です。この技術を活用すれば、エージェントをインストールすることなくBYODからWebアプリケーションに安全にアクセスできます。クラウド ブラウザー分離はすでにZscalerサービスの一部として提供されており、VDIの代替手段やBYODデバイスの利用を保護する目的で使用されています。この技術により、壊滅的な障害が発生した際も、影響を受けた組織は管理対象外のデバイスやBYODデバイスからブラウザー経由でアプリケーションにアクセスできるようになります。つまり、使用できなくなった社用デバイスから別のデバイスに切り替えるだけで、業務を継続できるということです。Zscalerはアプリケーションのピクセル データのみをゲスト デバイスにストリーミングすることで、完全なセキュリティとポリシー制御を維持しながら、データ損失も防止します。まとめ問題や障害のリスクがない技術は存在しません。世界中のIT専門家は生産性への影響を最小限に抑えるために、迅速に復旧できるシステムと戦略の構築に多大な時間を費やしています。サイバーセキュリティにおける事業継続計画は保険のようなものですが、多くの業界では法規制への準拠が必須要件になりつつあります。こうした要件により、壊滅的な事象が発生した場合でも対応できるより高度な機能が求められるようになっています。Zscalerが新たに提供する業界初のソリューションを導入することで、業務の中断を最小限に抑えながら、事業を安全に続けられるようになります。詳細は、ソリューションの概要をご覧いただくか、オンデマンド ウェビナー(英語)をご視聴ください。&nbsp;&nbsp;&nbsp;]]></description>
            <dc:creator>Lidor Pergament (Director, Product Management)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Another Milestone: Zscaler’s Daily Transactions Pass Half a Trillion!]]></title>
            <link>https://www.zscaler.com/jp/blogs/company-news/another-milestone-zscaler-s-daily-transactions-pass-half-trillion</link>
            <guid>https://www.zscaler.com/jp/blogs/company-news/another-milestone-zscaler-s-daily-transactions-pass-half-trillion</guid>
            <pubDate>Wed, 09 Oct 2024 11:58:01 GMT</pubDate>
            <description><![CDATA[The Largest and Most Trusted Security CloudIn support of our vision for a future built around zero trust, Zscaler’s security technology is served through the world’s largest inline security cloud. What does this mean in practice? Simply, every customer sends traffic destined for the internet or their private applications through an infrastructure cloud operated by Zscaler. The Zero Trust Exchange serves to identify, assess, police, and route that traffic on a session-by-session basis, at considerable scale.Our customers put their faith in our ability to operate a dependable security cloud that is always available and able to scale to meet growing demand. Zscaler provides a mission-critical service for every one of them. So it is with great pride that we announce the number of daily transactions through our cloud has, for the first time, surpassed 500 billion!We would never have reached this staggering scale without the vote of confidence each and every one of our customers consistently places in Zscaler.Exponential GrowthZscaler was conceived as a service that would offer the “zenith of scalability”, from which the company name was derived. The early Zscaler team knew that a scalable architecture would be fundamental for the company’s growth, so we have always invested to stay one step ahead, maintaining capacity to spare, and a performant experience. Today, more than 160 Zscaler hosted Zero Trust Exchange cloud edges around the world work together to process this incredible volume of daily transactions.What Is a Transaction?Every time you interact with an application or service you’re creating a transaction. One simple example would be when you want to visit a web page. A query is made to a DNS server to identify the IP address of the web server, and this is returned to you so that an IP connection can be built. That’s one transaction. An HTTP request is then made to the web server which comes back with an HTTP response. That’s another transaction. With Zscaler’s proxy security model every one of these transactions passes through the Zero Trust Exchange. Needless to say that across Zscaler’s many thousands of customers these add up quickly!&nbsp;Understanding 500 Billion Daily TransactionsHow can we visualize a number this big? Here are a few fun facts about 500 billion:That’s almost 60x the number of Google searches per day500 billion gallons of water is enough to fill over 750,000 Olympic-sized swimming pools500 billion trees could cover an area the size of the United States500 billion dollar bills laid on their side would reach 1.3 times around the EarthCounting from 1 to 500 billion at a rate of one number per second would take more than 15,700 years……fortunately Zscaler can handle 500 billion a little faster than that!&nbsp;Threats and OpportunitiesSo how does having such a high transaction count help Zscaler and its customers? First and foremost, traffic inspection at this scale helps identify threats, established and zero day, that have the potential to do real damage.Zscaler blocks over 150M threats every day, amounting to approximately 57 billion threats over a recent one-year period. That’s perhaps an even more important number than the transaction count, demonstrating real-world threat avoidance that could have impacted organizations around the world. As our recent&nbsp;ThreatLabz report showed, threats continue to escalate, leading to a 17.8% increase in ransomware attacks over the past year. What we learn as we discover threats we are able to pass on for the benefit of all.On the flip side, the metadata created as a result of the relentless increase in transactions through the Zero Trust Exchange helps inform Zscaler’s Digital Experience Monitoring tool (ZDX) and strengthen defenses through better risk management. In 2024, operating the world’s largest security cloud means having the broadest data set with which to take the fight back to the criminals exploiting AI for nefarious purposes.Relentless Focus on Performance and AvailabilityStaying on top of cloud service demand is a top priority for Zscaler, so we continue to invest in new data centers around the world to ensure ample capacity is available where it’s most needed. The global distribution of these data centers, aligned with population centers, leads to shorter round-trip delays and better performance for our customers, who can use the Zscaler Digital Experience (ZDX) toolset to troubleshoot any issues that arise.The bold claims we make for our cloud are backed by rigorous&nbsp;service level agreements (SLAs) that are based on percentage of lost transactions as a result of downtime or slowness, rather than time the service is unavailable, as is typical with other vendors. In other words, Zscaler focuses on actual business impact, because we know that’s what our customers ultimately care about.SummaryAt Zscaler, it is our passion to provide a dependable, secure SaaS cloud service that eliminates cyberthreats around the clock and helps our customers stay confidently focused on what they do best. We wouldn’t have reached this incredible milestone without the faith that more than 8,500 organizations around the world put in us every day.Get in touch or or reach out to your account team to learn more about how our security cloud reliably protects your most valuable data, wherever your employees are located. And if Business Continuity is on your radar, be sure to sign-up for this webinar where we'll be covering enhancements to our already industry-leading resilience solutions.]]></description>
            <dc:creator>Lidor Pergament (Director, Product Management)</dc:creator>
        </item>
        <item>
            <title><![CDATA[The public sector needs more disruptors]]></title>
            <link>https://www.zscaler.com/jp/blogs/company-news/the-public-sector-needs-more-disruptors</link>
            <guid>https://www.zscaler.com/jp/blogs/company-news/the-public-sector-needs-more-disruptors</guid>
            <pubDate>Wed, 18 Sep 2024 12:44:10 GMT</pubDate>
            <description><![CDATA[According to Zscaler’s most recent ‘State of Encrypted Attacks Report’, the public sector experienced a sharp rise in encrypted attacks, with a 185% year-over-year increase globally. Government entities are an attractive target for cybercriminals due to their pivotal role in shaping and safeguarding national interests and personal data of inhabitants. Only the&nbsp;education sector topped government entities with a surge of 276% year-over-year in encrypted attacks. As this sector continues to embrace digital transformation, adopting innovative systems and tools to handle vast amounts of sensitive student data, it faces the prospect of becoming a key target for attackers due to its expanded attack surface.In order to prevent public sector organizations from becoming easy prey for attackers who are using modern AI technology to drive their malware campaigns,&nbsp; IT security decision makers are well advised to take action and modernize their security infrastructure to better combat these new tactics. However, government bodies, municipalities, educational or healthcare institutions are not known to be among early adopters of new technologies in general. They stick to&nbsp; legacy technology and keep investing into security hardware, as this is&nbsp; their comfort zone. Inertia is unfortunately the enemy of security, as malware actors keep innovating their tools and tactics continuously. In order to break that vicious cycle and shift away from traditional methods and towards new innovative approaches, the public sector needs more disruptors among their IT security decision makers.Disruptors pave the way to transformationDisruptors have the innate understanding that in order for things to change or transform they require a different approach. They are willing to change their mindset and look for new ways of working, even against the resistance of the broader team. Starting a transformative process is not an easy task as the disruptor has to be prepared to force their organization to accept this journey of change at the beginning.&nbsp;First of all, it takes a certain curiosity to explore the benefits of a new technology approach like zero trust. A certain tech nerdiness helps to translate the benefits of a new solution into something that other people are willing to get involved with. When it comes to making a move to the cloud, one of the biggest concerns has always been security. These concerns tend to be even greater among public sector organizations, given the value and nature of the data residing within their systems. Hence a change to a cloud-based security platform is a hard sell internally, even if a zero trust approach - based on the principles of the least privileged access permission - proves to be able to become a game changer.End users want simplificationThe biggest hurdle in any technology transformation is to fight against the human habit of sticking to known processes. Moving away from everything an administrator has ever known makes them feel uncomfortable in the first place. A disruptor has to be able to inspire a vision for the internal tech community in order to support the change. And one important driver for transformation that should not be underestimated in the decision process is the end user itself.&nbsp;If IT is made simple for the end user and allows them to be more productive and more effective at the same time then they can become an internal advocate for a technology change. Nothing is more helpful than the end user community who stands up and speaks for a technology. They are the greatest case study for innovation and simplification to those involved in either the buying process or the rollout. At the beginning it might feel like having to fight and force the transformational process through the IT teams and business units, until the technology can advocate for itself by demonstrating its value.&nbsp;Disruptors at the GovTech SummitAt the upcoming GovTech Summit the topic of encouraging a culture of change to combat the ever increasing cyberthreat landscape is only one of the topics at a panel discussion I will attend. We will also be taking a look at the current cyber threats and the attack vectors that are going to increase their impact on public sector organizations and discuss defense strategies. Zscaler enables the public sector to fully embrace the cloud and modernize IT by leveraging zero trust—securely connecting users to applications regardless of device, location, or network.Being a disruptor might feel like a lonely role, but it is one of the most important jobs that an IT decision maker will take on. In the long run, a cloud-based zero trust approach will make a difference. Our&nbsp;Zero Trust Exchange™ enables the seamless, secure exchange of information, transforming the way the public sector work today and tomorrow. As a former public sector CISO I can only encourage the IT function to stop doing what they have always done and approach security differently. Not only will the end user appreciate the simplification but the security posture will as well.Join me for the panel discussion at GovTech on Tuesday 24th of September 11:30.am.]]></description>
            <dc:creator>Mike Culshaw (Sales Engineer)</dc:creator>
        </item>
    </channel>
</rss>