Skip to main content

Protect your organization from cyberattacks associated with the Russia-Ukraine conflict >

Open Open Open
Search Toggle
  • Careers
  • Blog
  • Partners
  • Risk Assessment
  • Support
  • Contact Us
  • Sign In
    • admin.zscaler.net
    • admin.zscalerone.net
    • admin.zscalertwo.net
    • admin.zscalerthree.net
    • admin.zscalerbeta.net
    • admin.zscloud.net
    • Zscaler Private Access
  • en
    • fr
    • de
    • it
    • ja
    • es
Zscaler Cloud Security Logo
The world’s largest security platform built for the cloud
  • See The Difference
    • Zero Trust
    • Zscaler Difference
    • What is Zero Trust The strategy on which Zscaler was built
    • How Zscaler Delivers Zero Trust A platform that enforces policy based on context
    • Zero Trust Resources Learn its principles, benefits, strategies
    Zscaler transformation

    See how the Zero Trust Exchange can help you leverage cloud, mobility, AI, IoT, and OT technologies to become more agile and reduce risk

    Learn More
    • Customer Testimonials Hear first-hand transformation stories
    • Case Studies Learn about pioneering Zscaler customers
    • Analyst Recognition Industry experts weigh in on Zscaler
    • See the Zscaler Cloud in Action Traffic processed, malware blocked, and more
    • Experience the Difference Get started with zero trust
    Zscaler transformation

    See how the Zero Trust Exchange can help you leverage cloud, mobility, AI, IoT, and OT technologies to become more agile and reduce risk

    Learn More
  • Platform
    • Platform
    • Technology
    • Platform Overview Unified platform for transformation
      • Zero Trust Exchange
      • Zscaler Client Connector
      • Compliance
      • Privacy
    • Products Integrated services, infinitely scalable
      • Zscaler Internet Access
      • Zscaler Private Access
      • Zscaler Business to Business
      • Zscaler Cloud Protection
      • Zscaler Digital Experience
      • Zscaler Deception Technology
    Zscaler transformation
    Accelerate your transformation

    Protect and empower your business by leveraging the platform, process and people skills to accelerate your zero trust initiatives

    Learn More
    • Technologies Global proxy-based cloud architecture
      • Secure Web Gateway
      • Cloud Firewall
      • Cloud IPS
      • Cloud DLP
      • Cloud Sandbox
      • Cloud Browser Isolation
      • Cloud Configuration Security (CSPM)
      • Cloud Identity and Entitlements (CIEM)
      • Cloud Access Security Broker (CASB)
    • Capabilities Integrated services, infinitely scalable
      • SSL Inspection
      • Advanced Threat Protection
      • Bandwidth Control
      • Machine Learning Security
      • Security Service Edge
      • Secure Access Service Edge
      • Zero Trust Network Access
      • Cloud Security
    Gartner Report
    Gartner Magic Quadrant Leader

    Zscaler: A Leader in the Gartner® Magic Quadrant™ for Security Service Edge (SSE) New Positioned Highest in the Ability to Execute

    Read the report
  • Solutions
    • Modern Workplace Enablement
    • Security Transformation
    • Infrastructure Modernization
    • Industries & Partners
    • Modern Workplace Enablement Overview Create fast, secure experiences for users everywhere
    • Secure Work-from-anywhere Seamless access for the hybrid workforce
      • VPN Alternative
      • M&A Divestitures
      • Security Cloud Migration
      • Third-party Access
      • ZTNA On-Premises
      • Remote Collaboration
      • Secure Access to OT Systems
    • Ensure great digital experiences Seamless access through fast, secure and reliable connectivity
      • Zscaler Digital Experience Score
      • SaaS/Application Monitoring
      • Cloudpath Analytics
      • Endpoint Monitoring
      • UCaaS Monitoring
    Zscaler workplace enablement
    Make hybrid work possible

    Secure work from anywhere, protect data, and deliver the best experience possible for users

    Get started
    • Security Transformation Overview A modern cloud approach
    • Prevent Cyberthreats Prevent phishing, ransomware, and other attacks
      • Ransomware Protection
      • Log4j
    • Prevent Data Loss Protect data everywhere from exposure or theft
      • Guest Wi-Fi Protection
    Zscaler capabilities
    The World’s Most Effective Ransomware Protection

    Ransomware is the biggest threat to digital business. Learn how to take a proactive, zero trust approach to safeguarding your enterprise

    Get Started
    • Infrastructure Modernization Overview Enable the new world of cloud and mobility
    • Simplify Branch Connectivity Simplify and secure direct-to-cloud connections
      • Office 365
      • Rethink Network Security
      • Direct-to-cloud Architecture
    • Secure Cloud Connectivity Secure connectivity between clouds and workloads
    Zscaler infrastructure modernization
    Enable the Agile Branch

    Your network security is costing more than it’s worth. See how five companies drove simplicity, savings and security

    Watch Now
    • Industries Our ecosystem of zero trust partners
      • Zscaler for Public Sector
      • Zscaler for Federal
      • Zscaler for State and Local
      • Zscaler for Education
      • Zscaler for Australian Government
      • Zscaler for China
      • Zscaler for Banking and FS
    • Partner Integrations Simplified deployment and management
      • AWS
      • Microsoft
      • CrowdStrike
      • VMware
      • Aruba
      • Cisco
      • ServiceNow
      • SAP
      • Splunk
    Zscaler industry partners
    Secure your ServiceNow Deployment

    It’s time to protect your ServiceNow data better and respond to security incidents quicker

    Get Started
  • Resources
    • Learn
    • Act
    • Engage
    • Content Library Explore topics that will inform your journey
    • Blog Perspectives from technology and transformation leaders
    • Security Assessment Toolkit Analyze your environment to see where you could be exposed
    • Webinars and Demos A first-hand look into important topics
    • Executive Insights App Security insights at your fingertips
    • Ransomware ROI Calculator Assess the ROI of ransomware risk reduction
    Zscaler resources
    Zero Trust Content Library

    Dive into the latest security research and best practices

    Get Started
    • Security & Threat Analytics Threat dashboards, cloud activity, IoT, and more
    • Security Advisories News about security events and protections
    • Vulnerability Disclosure Program Webinars, training, demos, and more
    • Trust Portal Zscaler cloud status and advisories
    Zscaler resources
    Zero Trust Content Library

    Dive into the latest security research and best practices

    Get Started
    • The Cloud-First Architect Tools and best practices for the cloud
    • Zenith Community Discuss ideas and issues with peers
    • CXO REvolutionaries Events, insights, and resources for CXOs
    • Training and Certifications Ongoing programs via Zero Trust Academy
    • Cloud Security Alliance Securing the cloud through best practices
    • Events Upcoming opportunities to meet with Zscaler
    Zscaler resources
    Zero Trust Content Library

    Dive into the latest security research and best practices

    Get Started
  • Company
    • About
    • Media
    • Partners
    • About Zscaler How it began, where it’s going
    • Leadership Meet our management team
    • Investor Relations News, stock information, and quarterly reports
    • Customers Learn about their transformation journeys
    • Compliance Our adherence to rigorous standards
    • ESG Our Environmental, Social, and Governance approach
    • Events Upcoming opportunities to meet with Zscaler
    Careet at Zscaler
    Zscaler Careers

    Join a recognized leader in Zero trust to help organization transform securely

    Apply Now
    • Media Center News, blogs, events, photos, logos, and other brand assets
    • News and Press Zscaler in the news
    Careet at Zscaler
    Zscaler Careers

    Join a recognized leader in Zero trust to help organization transform securely

    Apply Now
    • Partner Portal Tools and resources for Zscaler partners
    • Summit Partner Program Collaborating to ensure customer success
    • System Integrators Helping joint customers become cloud-first companies
    • Service Providers Delivering an integrated platform of services
    • Technology Deep integrations simplify cloud migration
    • Partner Inquiry Become a Zscaler partner
    Careet at Zscaler
    Zscaler Careers

    Join a recognized leader in Zero trust to help organization transform securely

    Apply Now
    • Request a demo
  • Request a demo

DATA PRIVACY AND PROTECTION OVERVIEW

Zscaler’s Company Privacy Policy

Company Privacy Policy

Learn more
Zscaler’s Company Privacy Policy

Privacy FAQ

Learn More
GDPR

GDPR

Learn more
Data Transfer

International Data Transfers

Learn more
Zscaler DPA and SCC Amendment

DPA and SCC Amendment

Learn more
Zscaler DPA and SCC Amendment

Sub-processors

Learn more
Cookies Policy

Cookies Policy

Learn more
Privacy around the world

Privacy around the World

Learn more
Questions

Questions?

[email protected]

For information about Compliance

Learn More
  • Platforms & Products
    • Zero Trust Exchange
    • Zscaler Client Connector
    • Zscaler Internet Access
    • Zscaler Private Access
    • Zscaler B2B
    • Zscaler Cloud Protection
    • Zscaler Digital Experience
  • Solutions
    • Secure Work-from-Anywhere
    • Modern Workplace Enablement
    • Security Transformation
  • Technologies & Capabilities
    • Secure Access Service Edge
    • Zero Trust Network Access
    • Secure Web Gateways
    • Cloud Firewall
    • Cloud Sandbox
    • Cloud IPS
    • Cloud DLP
    • Cloud Browser Isolation
    • Cloud Security
  • Technologies & Capabilities
    • Cloud Configuration Security
    • Cloud Identity and Entitlements
    • CASB
    • SSL Inspection
    • Advanced Threat Protection
    • Bandwidth Control
    • Machine Learning Security
  • Popular Links
    • Careers
    • About Zscaler
    • Leadership
    • Content Library
    • News and Press Releases
    • Media Kit
    • CXO REvolutionaries
    • Zenith Community
  • Information
    • Glossary
    • Plans and Pricing
    • Virtual Briefing Center
    • Zscaler FAQs
    • Contact Us
  • Sitemap
  • Privacy
  • Legal
  • Security
©2022 Zscaler, Inc. All rights reserved. ZscalerTM and Zero Trust ExchangeTM are either (i) registered trademarks or service marks or (ii) trademarks or service marks of Zscaler, Inc. in the United States and/or other countries. Any other trademarks are the properties of their respective owners.