Skip to main content
Open Open Open
Search Toggle
  • Careers
  • Blog
  • Partners
  • Risk Assessment
  • Support
  • Contact Us
    • Get in touch
    • 1-408-533-0288
    • Chat with us
  • Sign In
    • admin.zscaler.net
    • admin.zscalerone.net
    • admin.zscalertwo.net
    • admin.zscalerthree.net
    • admin.zscalerbeta.net
    • admin.zscloud.net
    • Zscaler Private Access
  • en
    • fr
    • de
    • it
    • ja
    • mx
    • es
Zscaler Cloud Security Logo
The world’s largest security platform built for the cloud
  • See The Difference
    • Zero Trust
    • Zscaler Difference
    • What is Zero Trust The strategy on which Zscaler was built
    • How Zscaler Delivers Zero Trust A platform that enforces policy based on context
    • Zero Trust Resources Learn its principles, benefits, strategies
    Zscaler transformation

    See how the Zero Trust Exchange can help you leverage cloud, mobility, AI, IoT, and OT technologies to become more agile and reduce risk

    Learn More
    • Customer Success Stories Hear first-hand transformation stories
    • Analyst Recognition Industry experts weigh in on Zscaler
    • See the Zscaler Cloud in Action Traffic processed, malware blocked, and more
    • Experience the Difference Get started with zero trust
    Zscaler transformation

    See how the Zero Trust Exchange can help you leverage cloud, mobility, AI, IoT, and OT technologies to become more agile and reduce risk

    Learn More
  • Products & Solutions
    • Overview
    • Industries & Partners
    • Secure Your Users Provide users with seamless, secure, reliable access to applications and data. Secure Your Workloads Build and run secure cloud apps, enable zero trust cloud connectivity, and protect workloads from data center to cloud. Secure Your OT and IoT Provide zero trust connectivity for OT and IoT devices and secure remote access to OT systems.
    • Products Transform your organization with 100% cloud-native services
      • Secure Internet Access (ZIA)
      • Secure Private Access (ZPA)
      • Digital Experience (ZDX)
      • Posture Control
    • Solutions Propel your business with zero trust solutions that secure and connect your resources
      • Stop Cyberattacks
      • Protect Data
      • Zero Trust App Access
      • VPN Alternative
      • Accelerate M&A/Divestitures
      • Optimize Digital Experiences
      • Zero Trust SD-WAN
      • Build and Run Secure Cloud Apps
      • Zero Trust Cloud Connectivity
      • Zero Trust for IoT/OT
      • Zero Trust for Private 5G
    Zscaler workplace enablement
    Make hybrid work possible

    Secure work from anywhere, protect data, and deliver the best experience possible for users

    Get Started
    • Industries Our ecosystem of zero trust partners
      • Zscaler for Public Sector
      • Zscaler for Federal
      • Zscaler for State and Local
      • Zscaler for Education
      • Zscaler for Australian Government
      • Zscaler for China
      • Zscaler for Banking and FS
      • Zscaler for Healthcare
    • Partner Integrations Simplified deployment and management
      • Microsoft
      • CrowdStrike
      • AWS
      • Okta
      • Splunk
      • Aruba
      • Cisco
      • VMware
      • SAP
      • Salesforce
      • ServiceNow
    Zscaler industry partners
    Secure your ServiceNow Deployment

    It’s time to protect your ServiceNow data better and respond to security incidents quicker

    Get Started
  • Platform
    • Platform
    • Technology
    • Platform Overview Unified platform for transformation
      • Zero Trust Exchange
      • Zscaler Client Connector
      • Zscaler Resilience
      • Compliance
      • Privacy
    • Capabilities Integrated services, infinitely scalable
      • SSL Inspection
      • Advanced Threat Protection
      • Bandwidth Control
      • Machine Learning Security
      • Security Service Edge
      • Secure Access Service Edge
      • Zero Trust Network Access
    Zscaler transformation
    Accelerate your transformation

    Protect and empower your business by leveraging the platform, process and people skills to accelerate your zero trust initiatives

    Learn More
    • Technologies Global proxy-based cloud architecture
      • Secure Web Gateway
      • Firewall
      • IPS
      • DLP
      • Sandbox
      • Browser Isolation
      • Cloud Configuration Security (CSPM)
      • Cloud Identity and Entitlements (CIEM)
      • Cloud Access Security Broker (CASB)
      • Cloud Native Application Protection Platform (CNAPP)
      • Deception
    Gartner Report
    Gartner Magic Quadrant Leader

    Zscaler: A Leader in the Gartner® Magic Quadrant™ for Security Service Edge (SSE) New Positioned Highest in the Ability to Execute

    Read Report
  • Resources
    • Learn
    • Act
    • Engage
    • Content Library Explore topics that will inform your journey
    • Blog Perspectives from technology and transformation leaders
    • Security Assessment Toolkit Analyze your environment to see where you could be exposed
    • Webinars and Demos A first-hand look into important topics
    • Executive Insights App Security insights at your fingertips
    • Ransomware ROI Calculator Assess the ROI of ransomware risk reduction
    • Training and Certifications Engaging learning experiences, live training, and certifications
    • Customer Success Center Quickly connect to resources to accelerate your transformation
    • Customer Success Stories Hear first-hand transformation stories
    Customer success center
    Customer Success Center

    All your Zscaler essentials in one place

    Get Started
    • Security & Threat Analytics Threat dashboards, cloud activity, IoT, and more
    • Security Advisories News about security events and protections
    • Vulnerability Disclosure Program Webinars, training, demos, and more
    • Trust Portal Zscaler cloud status and advisories
    Zscaler resources
    Zero Trust Content Library

    Dive into the latest security research and best practices

    Get Started
    • The Cloud-First Architect Tools and best practices for the cloud
    • Zenith Community Discuss ideas and issues with peers
    • CXO REvolutionaries Events, insights, and resources for CXOs
    • Cloud Security Alliance Securing the cloud through best practices
    • Events Upcoming opportunities to meet with Zscaler
    Zscaler resources
    Zero Trust Content Library

    Dive into the latest security research and best practices

    Get Started
  • Company
    • About
    • Media
    • Partners
    • About Zscaler How it began, where it’s going
    • Leadership Meet our management team
    • Investor Relations News, stock information, and quarterly reports
    • Compliance Our adherence to rigorous standards
    • ESG Our Environmental, Social, and Governance approach
    • Events Upcoming opportunities to meet with Zscaler
    • Zenith Ventures Strategic cybersecurity investments
    Careet at Zscaler
    Zscaler Careers

    Join a recognized leader in Zero trust to help organization transform securely

    Apply Now
    • Media Center News, blogs, events, photos, logos, and other brand assets
    • News and Press Zscaler in the news
    Careet at Zscaler
    Zscaler Careers

    Join a recognized leader in Zero trust to help organization transform securely

    Apply Now
    • Partner Portal Tools and resources for Zscaler partners
    • Summit Partner Program Collaborating to ensure customer success
    • System Integrators Helping joint customers become cloud-first companies
    • Service Providers Delivering an integrated platform of services
    • Technology Deep integrations simplify cloud migration
    • Partner Inquiry Become a Zscaler partner
    Careet at Zscaler
    Zscaler Careers

    Join a recognized leader in Zero trust to help organization transform securely

    Apply Now
    • Request a demo
  • Request a demo

DATA PRIVACY AND PROTECTION OVERVIEW

Zscaler’s Company Privacy Policy

Company Privacy Policy

Learn more
Zscaler’s Company Privacy Policy

Privacy FAQ

Learn more
GDPR

GDPR

Learn more
Data Transfer

Transfer Impact Assessment

Learn more
Zscaler DPA and SCC Amendment

DPA and SCC Amendment

Learn more
Zscaler DPA and SCC Amendment

Sub-processors

Learn more
Cookies Policy

Cookies Policy

Learn more
Privacy around  the world

Privacy around the World

Learn more
Questions

Questions?

[email protected]

For information about Compliance

Learn More
Zscaler Cloud Security Logo
  • Platforms & Products
    • Zero Trust Exchange
    • Zscaler Client Connector
    • Zscaler Internet Access
    • Zscaler Private Access
    • Zscaler B2B
    • Zscaler Cloud Protection
    • Zscaler Digital Experience
  • Solutions
    • Secure Work-from-Anywhere
    • Modern Workplace Enablement
    • Security Transformation
  • Technologies & Capabilities
    • Secure Access Service Edge
    • Zero Trust Network Access
    • Secure Web Gateways
    • Firewall
    • Sandbox
    • IPS
    • DLP
    • Browser Isolation
  • Technologies & Capabilities
    • Cloud Identity and Entitlements
    • CASB
    • SSL Inspection
    • Advanced Threat Protection
    • Bandwidth Control
    • Machine Learning Security
  • Popular Links
    • Careers
    • About Zscaler
    • Leadership
    • Content Library
    • News and Press Releases
    • Media Kit
    • CXO REvolutionaries
    • Zenith Community
  • Information
    • Zpedia
    • Plans and Pricing
    • Virtual Briefing Center
    • Zscaler FAQs
    • Contact Us
Thanks for subscribing
  • Sitemap
  • Privacy
  • Legal
  • Security
©2023 Zscaler, Inc. All rights reserved. Zscaler™ and Zero Trust Exchange™ are either (i) registered trademarks or service marks or (ii) trademarks or service marks of Zscaler, Inc. in the United States and/or other countries. Any other trademarks are the properties of their respective owners.