Zscaler Client Connector™ is a lightweight agent for any user endpoint, enabling hybrid work through secure, fast, and reliable access to any destination, over any network.

Why It’s Important

A mobile world needs secure remote access

Users now work from anywhere, and require seamless access to websites, SaaS apps, and private apps, whether in the cloud or a data center. To help workforces be productive and secure, organizations need to retire network-centric solutions in favor of simpler, safer, zero trust communications.

Architecture Matters

Secure digital transformation requires zero trust

Firewall-and-VPN architectures connect users to the network for security and connectivity—even remote users accessing SaaS. This slows productivity, enables lateral threat movement, and entails other risks.

 

Client Connector, a lightweight agent, forwards user traffic to the Zscaler Zero Trust Exchange, the world’s largest cloud security platform, which acts as an intelligent switchboard to securely connect users directly to their destinations.

The Zscaler Difference

What sets Client Connector apart?

Security-for-any-access

Client Connector facilitates seamless zero trust communications to the internet, SaaS, and private apps in the cloud and data center.

Security-for-any-user-device

Client Connector supports laptops, smartphones, and tablets, and runs on Windows, macOS, Linux, ChromeOS, iOS, and Android.

Context-aware-security

Client Connector provides granular insights into device security posture, enabling Zscaler to deliver context-based adaptive access control.

Protection for endpoint data

Zscaler Endpoint DLP uses Client Connector to stop data leakage via channels like removable storage, printing, and personal cloud storage.

user-experience-monitoring

Zscaler Digital Experience (ZDX) uses Client Connector to gain valuable insights into device events and health, accelerating issue resolution.

cybercriminal-deception

Zscaler Deception uses Client Connector to deploy decoy passwords, cookies, sessions, and app bookmarks on endpoints, luring attackers.

operational-excellence

Zscaler’s unified UI offers comprehensive, cloud-based management (and automation via OneAPI) that streamlines administration.

BG Image

nuestra plataforma

Zscaler Zero Trust Exchange

Comunicación segura entre usuarios, cargas de trabajo y dispositivos 

dentro de la sucursal, la nube y el centro de datos.

Zero Trust en todas partes
Detenga los ciberataques

Detenga los ciberataques

  • Vuélvase invisible para los atacantes
  • Evite el compromiso
  • Evitar el movimiento lateral
Más información
Datos protegidos

Datos protegidos

  • Encuentre, clasifique y evalúe la postura de seguridad de los datos
  • Prevenga la pérdida de datos en todos los canales
Más información
Proteja la IA

Proteja la IA

  • Proteja el uso de la IA pública
  • Proteja los modelos y aplicaciones de IA privados
  • Proteja las comunicaciones entre agentes
Más información
Automatice las operaciones

Automatice las operaciones

  • Acelere las operaciones de seguridad
  • Optimice las experiencias digitales
Más información

Benefits

The benefits of using Client Connector

Reduced risk
Reduced risk

Leverage zero trust communications, decoys that lure and detect sophisticated threats, and endpoint data loss prevention (DLP).

Less cost and complexity
Less cost and complexity

Eliminate disjointed tools and agents for VPN, NAC, and endpoint DLP, as well as standalone SWG, CASB, and ZTNA.

Enhanced productivity
Enhanced productivity

Improve user experiences and productivity with direct-to-app connectivity, intelligent traffic routing, and digital experience monitoring.

Rapid, frictionless deployment
Rapid, frictionless deployment

Quickly deploy the agent via Microsoft Intune or any other MDM; silently auto-install client and TLS/SSL certificates onto devices.

Resilient lifecycle management
Resilient lifecycle management

Gain cloud-managed release updates and rollback support for security and traffic forwarding, ensuring resilient lifecycle management.

Strict Enforcement
Strict enforcement

Protect user endpoints before they have connectivity to the Zero Trust Exchange as well as during any events where they might be disconnected.

EDR, MDM, and IdP integrations
EDR, MDM, and IdP integrations

Inform adaptive access policy with additional device context from CrowdStrike, VMware Carbon Black, Intune, Okta, JAMF, and more.