Zero Trust Network Access for your Private Apps
You no longer have to choose
between user experience and security.
The challenge of network-centric security
For 30 years, enterprises have relied on network-centric methods to connect users to the network, and by extension the applications running on it. But the way users work has changed, and with applications moving to cloud, the perimeter has extended to the internet. This renders network-centric solutions, like remote access VPNs, obsolete.
Common pitfalls of network-centric approaches:
- Places users on-net, which increases risk
- Provides a poor end-user experience
- Inbound connections create opportunity for DDoS attacks
- Requires appliances, ACLs, and firewall policies
- No ability to provide application segmentation
- Lack of visibility into app-related activity
Zscaler Private Access
The experience users want with the zero trust access IT needs
Zscaler Private Access (ZPA) is a cloud service from Zscaler that provides seamless, zero trust access to private applications running on public cloud or within the data center. With ZPA, applications are never exposed to the internet, making them completely invisible to unauthorized users. The service enables the applications to connect to users via inside-out connectivity versus extending the network to them. Users are never placed on the network. This zero trust network access (ZTNA) approach supports both managed and unmanaged devices and any private application (not just web apps).
NOV, a 150-year-old oil and gas company, uses ZPA to enable zero trust for more than 7,000 apps and 10,000 users.
Growmark, a U.S.-based agricultural supply cooperative, enabled zero trust access to SAP and cloud apps with Zscaler’s ZTNA technology.
See how Paychex empowers a seamless application experience for users while accelerating and simplifying M&A IT integrations.
See how MAN Energy Solutions uses ZTNA technology to provide zero trust access to private applications at sea.
A better access experience
Users have seamless access across all apps and devices. Uses the same Zscaler Client Connector app as ZIA, and browser access is available for web apps.
Never place users on-network
Authorized users have access to specific private apps without the need to access the network, reducing the risk of lateral movement and the spread of ransomware.
Segment by application, not network
Micro-tunnels enable network admins to segment by application with no need to segment networks or manage ACLs or FW policies.
Inside-out connectivity means app invisibility
Service-initiated ZTNA architecture ensures apps connect outbound to authorized users. IP addresses are never exposed and DDoS is impossible.
The internet becomes the new corporate network
Cloud adoption extends the perimeter to the internet. Use TLS-based encrypted tunnels and custom PKI to ensure private apps remain secure.
100% cloud-delivered ZTNA service
ZTNA as a service allows for simple management, high availability, greater scale, and strong protection against DDoS attacks.
ZPA: Zero trust network access (ZTNA) delivered as a service
Zscaler Private Access (ZPA) takes a user- and application-centric approach to private application access. A fully cloud-delivered service, ZPA ensures that only authorized users have access to specific private applications by creating secure segments of one between individual devices and apps. That means no more network access, no more lateral movement. And, rather than relying on physical or virtual appliances, ZPA uses lightweight software to connect apps and users to the Zscaler security cloud, where the brokered micro-tunnels are stitched together in the location closest to the user.
1. ZPA Public Service Edge
- Hosted in cloud
- Used for authentication
- Customizable by admins
- Brokers a secure connection between a Client Connector and an App Connector
2. Client Connector (formerly Zscaler App/Z App)
- Mobile client installed on devices
- Requests access to an app
3. App Connector
- Sits in front of apps in the data center, Azure, AWS, and other public cloud services
- Provides inside-out TLS 1.2 connections to broker
- Makes apps invisible to prevent DDoS attacks
Discover and secure shadow IT applications
ZPA provides visibility into previously undiscovered internal applications running in the data center or public cloud. Admins can set granular policies for discovered applications to ensure least-privilege access. This control, combined with ZPA’s ability to make known applications invisible to unauthorized users, minimizes exposure and reduces the attack surface.
Choose application segmentation, not network segmentation
61% of enterprises are concerned about overprivileged access, but network segmentation is difficult. With ZPA, enterprises no longer need to perform complex network segmentation. Admins have the granular control to decide who can access what, even down to the individual application and user level.