Zscaler Provides Advanced Protection for Largest-Ever Microsoft Patch Cycle
Sunnyvale, California, April 12, 2011
Zscaler, Inc., the market leader in cloud security, today announced that it has deployed immediate protections against threats included in Microsoft’s largest-ever patch cycle. With Zscaler’s cloud-delivered security, customers were transparently protected from 33 vulnerabilities, many of which are critical in nature. Since Zscaler’s protection is in-line, Zscaler customers were automatically protected without having to take any action on their own.
Enterprises often struggle with large patch cycles as remediating devices across locations and for mobile workers is a daunting challenge. As a SaaS provider, Zscaler has been able to deploy protections in the network; blocking threats before they can reach vulnerable systems. Such protections apply to both end-user systems on the enterprise network and laptops out in the field.
“Zscaler is uniquely positioned to provide immediate endpoint protection, and working with Microsoft’s MAPPs program ensures our mutual customer is safe from critical vulnerabilities from the outset, regardless of their location,” said Michael Sutton, Vice President of Security Research at Zscaler. Microsoft’s Active Protections Program (MAPPs), ensures that trusted security partners receive details of vulnerabilities ahead of public release in order to build protections.
Today Zscaler deployed protections for 33 vulnerabilities from the following April 2011 Security Bulletins:
MS11-018 – Cumulative Security Update for Internet Explorer
MS11-021 – Vulnerabilities in Microsoft Excel
MS11-022 – Vulnerabilities in Microsoft PowerPoint
MS11-023 – Vulnerabilities in Microsoft Office
MS11-028 – Vulnerability in .NET Framework
MS11-029 – Vulnerability in GDI+
MS11-033 – Vulnerability in WordPad Text Converters
MS11-026 – Vulnerability in MHTML
MS11-027 – Cumulative Security Update of ActiveX Kill Bits
MS11-032 – Vulnerability in the OpenType Compact Font Format (CFF) Driver
MS11-034 – Vulnerabilities in Windows Kernel-Mode Drivers