Today, 60 percent of enterprises are running apps in AWS to increase scalability and speed. This move has extended the perimeter to the internet. Yet, many enterprises still rely on remote access VPNs, which are network-centric and not built to secure access to the internet. They also place users on the network and require physical or virtual appliances, which increases complexity and limits scalability.
Zscaler Private Access (ZPA) for AWS is a cloud service from Zscaler that provides zero-trust, secure remote access to internal applications running on AWS. With ZPA, applications are never exposed to the internet, making them completely invisible to unauthorized users. The service enables the applications to connect to users via inside-out connectivity versus extending the network to them. Users are never placed on the network. It provides a software-defined perimeter for AWS, that supports any device and any internal application.Read the Solution Brief
Transform with Zscaler.
Users have fast, direct-to-cloud access without having to login to remote access VPN client each time.
Policy-based access, with no access to network. Visibility into apps being accessed by users and ability to discover unsanctioned apps running within AWS.
The cloud service requires no hardware. Enterprises can easily scale across multiple AWS and Zscaler data centers with no need to replicate gateways.
Network admins can segment based on application from within the web UI. No need to segment by network. No IP address segmentation or access control lists required.
Service uses dynamic, application-specific, TLS-based end-to-end encryption. All data remains private and enterprises can bring their own PKI.
The service uses the global AWS network to ramp up new users and route them to the app location nearest to them via internet-based networking.
Many enterprise teams are unaware of the sheer number of applications in their environment. ZPA identifies previously undiscovered internal applications running in the data center or on AWS infrastructure. Once identified, admins can set granular policies for each application, ensuring the environment remains secure and controlled. This, combined with ZPA’s ability to make known applications invisible to unauthorized users, reduces the attack surface dramatically.
How to Securely Access AWS VPCs using ZPARead the AWS blog
See how MAN Energy Solutions uses ZPA to provide zero trust access to internal apps at global scaleRead the Case Study
See how ZPA maps to the AWS Cloud Adoption FrameworkGet the Paper
Read their stories and hear their accounts of moving security off the
network and into the cloud.