Zscaler Client Connector™ is a lightweight agent for any user endpoint, enabling hybrid work through secure, fast, and reliable access to any destination, over any network.

Why It’s Important

A mobile world needs secure remote access

Users now work from anywhere, and require seamless access to websites, SaaS apps, and private apps, whether in the cloud or a data center. To help workforces be productive and secure, organizations need to retire network-centric solutions in favor of simpler, safer, zero trust communications.

Architecture Matters

Secure digital transformation requires zero trust

Firewall-and-VPN architectures connect users to the network for security and connectivity—even remote users accessing SaaS. This slows productivity, enables lateral threat movement, and entails other risks.

 

Client Connector, a lightweight agent, forwards user traffic to the Zscaler Zero Trust Exchange, the world’s largest cloud security platform, which acts as an intelligent switchboard to securely connect users directly to their destinations.

The Zscaler Difference

What sets Client Connector apart?

Security-for-any-access

Client Connector facilitates seamless zero trust communications to the internet, SaaS, and private apps in the cloud and data center.

Security-for-any-user-device

Client Connector supports laptops, smartphones, and tablets, and runs on Windows, macOS, Linux, ChromeOS, iOS, and Android.

Context-aware-security

Client Connector provides granular insights into device security posture, enabling Zscaler to deliver context-based adaptive access control.

Protection for endpoint data

Zscaler Endpoint DLP uses Client Connector to stop data leakage via channels like removable storage, printing, and personal cloud storage.

user-experience-monitoring

Zscaler Digital Experience (ZDX) uses Client Connector to gain valuable insights into device events and health, accelerating issue resolution.

cybercriminal-deception

Zscaler Deception uses Client Connector to deploy decoy passwords, cookies, sessions, and app bookmarks on endpoints, luring attackers.

operational-excellence

Zscaler’s unified UI offers comprehensive, cloud-based management (and automation via OneAPI) that streamlines administration.

BG Image

our platform

The Zscaler Zero Trust Exchange

Secure user, workload, and device communication between and 

within the branch, cloud, and data center.

Zero Trust Everywhere
Stop Cyberattacks

Stop Cyberattacks

  • Become Invisible to Attackers
  • Prevent Compromise
  • Prevent Lateral Movement
Learn more
Secure Data

Secure Data

  • Find, Classify, and Assess Data Security Posture
  • Prevent Data Loss Across All Channels
Learn more
Secure AI

Secure AI

  • Secure the Use of Public AI
  • Secure Private AI Apps and Models
  • Secure Agent Communications
Learn more
Automate Ops

Automate Ops

  • Accelerate Security Operations
  • Optimize Digital Experiences
Learn more

Benefits

The benefits of using Client Connector

Reduced risk
Reduced risk

Leverage zero trust communications, decoys that lure and detect sophisticated threats, and endpoint data loss prevention (DLP).

Less cost and complexity
Less cost and complexity

Eliminate disjointed tools and agents for VPN, NAC, and endpoint DLP, as well as standalone SWG, CASB, and ZTNA.

Enhanced productivity
Enhanced productivity

Improve user experiences and productivity with direct-to-app connectivity, intelligent traffic routing, and digital experience monitoring.

Rapid, frictionless deployment
Rapid, frictionless deployment

Quickly deploy the agent via Microsoft Intune or any other MDM; silently auto-install client and TLS/SSL certificates onto devices.

Resilient lifecycle management
Resilient lifecycle management

Gain cloud-managed release updates and rollback support for security and traffic forwarding, ensuring resilient lifecycle management.

Strict Enforcement
Strict enforcement

Protect user endpoints before they have connectivity to the Zero Trust Exchange as well as during any events where they might be disconnected.

EDR, MDM, and IdP integrations
EDR, MDM, and IdP integrations

Inform adaptive access policy with additional device context from CrowdStrike, VMware Carbon Black, Intune, Okta, JAMF, and more.