Zscaler was started in 2008 when a number of industry veterans, including CEO Jay Chaudhry, came together to create the next step in network security. Zscaler was built on several foundational observations, including the fact that business and personal applications had begun moving to the cloud, Web 2.0 was leading to the evolution of web-based apps, and that the adoption of mobility meant that users could be working from anywhere. These observations generated several tenants of a next generation security architecture, including:
64-bit Architecture, Next Gen TCP stack, Drivers; SSMA
(Single Scan Multi Action)
Distributed Network, Multi-tenant Architecture
The answer was a cloud-based firewall proxy architecture, designed to examine web traffic over all ports and protocols including the growing segment that was SSL encrypted. Policies must follow the user, regardless of their location or device. Security functionality must interoperate, combining findings from different approaches to deliver a holistic perspective. The platform must be capable of recognizing threats independent of signature feeds, and should be able to propagate threat information across the cloud in real-time. Visibility must be available on demand, and go from an at-a-glance view to the user/device level in a few clicks.
Realizing this vision included design of almost fifty new, patented technologies, including:
Zscaler’s architecture was created from scratch as a pure cloud provider. We deliver a truly multi-tenant and highly scalable platform by functionally distributing components of a standard proxy to create a giant global network that acts as a single virtual proxy. Any user can go to any gateway at any time for policy-based secure Internet access. Zscaler infrastructure comprises three key components: Zscaler Enforcement Nodes (ZENs), Central Authority (CA), and Nanolog Servers.
100+ DATA CENTERS WORLDWIDE
30B+ REQUESTS PROCESSED EVERY DAY
125M+ THREATS BLOCKED EVERY DAY
120K+ SECURITY UPDATES EVERY DAY
The Central Authority complex is the brain of the Zscaler cloud. The CA manages and monitors all nodes and ensures that they are always up-to-date with the latest real-time feeds and software, and that they are synchronized to propagate threat intelligence cloud-wide. The CA directs users to the closest Zscaler Enforcement Node, ensuring that policy follows the user with minimum latency. The Central Authorities are a globally distributed peer-to-peer cluster with an automatically elected master. This ensures all cloud components can always talk to a CA even if there are major Internet outages that isolate an entire region.
Through its multi-tenant architecture, the CA provides each organization with its own secure portal to administer policy. Any change to the policy is communicated to the ZENs within seconds. The CA provides an end-user authentication framework through integration with Secure LDAP or ID Federation systems.
An enterprise forwards all web traffic to the nearest ZEN, where security, management, and compliance policies served by the CA are enforced.
Powered by over thirty patents, each ZEN is a fully featured inline proxy that enforces policies with user-level granularity. The ZEN incorporates a hardened custom-built OS and a custom TCP/IP stack to deliver 90% of transactions in less than 90 microseconds. Zscaler’s ByteScan technology enables each ZEN to scan every byte of the web request, content, responses, and all related data for inline blocking of threats like viruses, cross site scripting (XSS), and botnets. This capability also enables Dynamic Content Classification (DCC) of unknown sites. By scanning each page, the ZEN computes a PageRisk index for every page loaded and enables administrators to control content served to their users based on acceptable risk.
The ZEN also incorporates Zscaler’s unique authentication and policy distribution mechanism that enables any user to connect to any ZEN at any time. This enables enterprises to simply point traffic to any ZEN and ensure full policy enforcement, while getting all reports back in realtime.
Backed with multiple patents, Zscaler’s Nanolog technology on every ZEN performs lossless compression of logs by a factor of 50:1, enabling administrators to access any transaction log almost instantly. Logs are transmitted every second to the Nanolog servers over secure connections, and multicast to multiple servers for redundancy. Through an innovative reporting and database framework created specifically for web logs, the Nanolog server can support 15 million logs per second.
This technology provides an administrator with real-time reports and the capability to query complete transaction-level details for any user, department or location at any time in seconds. Each server has over 16 Terabytes of capacity, enabling Zscaler to provide multiyear data retention.
Data privacy and security are fundamental to any multitenant architecture. Zscaler ensures these principles in the following ways:
Zscaler is ISO27001-certified and provides 99.999% availability guarantees—with additional SLAs on latency and security too. This level of performance is prohibitively expensive to try to offer yourself with security appliances.