Here's how
Enabling the secure transformation to the cloud
It's no longer a question of if. It's a question of how.
Welcome to the era of cloud and mobility
Why is security still sitting on-premises, protecting the corporate network?
The evolution of IT security...
We built gateways for Internet traffic and to provide network access to mobile users network
TM
The Internet is the new corporate network
As threats grew, we deployed more gateway security appliances, but by now users were connecting to apps and to each other in the cloud
We all built a security perimeter to protect the network
To the new
cloud-enabled architecture
To secure this new world of IT, you simply need a new approach
Software-defined policies, not networks, can securely connect the right user to the right app or service
From the old world...
hub-and-spoke architecture
VPN
GATEWAY
Mobile
The Zscaler platform: a new approach to application access and security
HQ/IoT
Zscaler Internet Access
Secure access to the open Internet and SaaS apps.
Branch
The notion of protecting the network is no longer relevant. You need to protect your users and your apps.
Zscaler Private Access
Secure access to internal apps in the data center or cloud without a VPN.
INTERNET
GATEWAY
Zscaler Internet Access: fast, secure access to the Internet and SaaS apps
Zscaler provides all users, everywhere, with identical protection:Full inline content inspectionNative SSL inspection Cloud intelligenceReal-time threat correlation60+ industry threat feedsGlobal visibilityPolicies follows the user
Enabling secure network transformation
File Type Controls
Powered by patented technologies
Nanolog™
50:1 compression of logs with real-time global log consolidation
PolicyNow™
Policies follow the user for the same on-net, off-net protection
Built on a global, multi-tenant cloud architecture
Access Control
SSMA™
All security engines fire with each content scan; only microsecond delay
Eliminates the appliance mess and provides the highest level of security
Threat Prevention
ByteScan™
Each outbound and inbound byte scanned; native SSL scanning
Data Protection
Cloud Firewall
Antivirus
PageRisk™
Risk of each web page element computed dynamically
URL Filtering
DNS Security
Purpose-built, multi-tenant cloud security platform
Bandwidth Control
Zscaler platform with integrated security services
DNS Filtering
Data Loss Prevention
Advanced Protection
Cloud Apps (CASB)
Cloud Sandbox
Connections are stitched together in the Zscaler cloud
User requests access
to an app (SAP)
3
HOW LEADING ORGANIZATIONS ARE USING ZSCALER PRIVATE ACCESS
2
1
SECURE PARTNER ACCESS
4
M&As / DIVESTITURES
Policy determines
if access is permitted
(SAP)
ACCESS TO INTERNAL APPS
VPN REPLACEMENT
WITH ZSCALER PRIVATE ACCESSUsers are never on the corporate networkApps are invisible, never exposed to the InternetThe Internet becomes a secure network without a VPNYou can segment apps without network segmentationInternal apps can easily be moved to Azure or AWS
Z-APP
Zscaler Private Access : fast, secure access to internal apps
Z-CONNECTOR
HOW ZPA™ WORKS
If authorized, the Zscaler cloud initiates outbound connections between Z-App and Z-Connector
A new approach that enables secure application access transformation
How a customer deployed Office 365 across hundreds of locations
5,405 infected emails arrived over six hours11 employees clicked the link0 infections
Before Zscaler
Frederik Janssen, Global Head of IT Infrastructure
Zscaler is trusted by G2000 leaders
After Zscaler
How a bank weathered a CryptoLocker run
Local breakouts for 650 branch officesFast deployment – 25 sites per dayBandwidth controls prioritize Office 365
1,352 infected emails arrived over six hours9 employees clicked the link6,500 file shares destroyed
“We have over 350,000 employees
in 192 countries in 2,200 offices being secured by Zscaler.”
Firewall protection for ports beyond 80/443Simplified administration; automated URL and IP updatesVisibility into all traffic in all branches
1 | Secure
Up-level security now; make Zscaler your next hop to the Internet; no infrastructure changes
2 | Simplify
Phase out point products; reduce costs and management overhead
Three simple steps to IT transformation
3 | Transform
Enable local breakouts for Internet traffic to deliver a better, more secure user experience
Moving to Office 365
Securing an SD-WAN transformation
www.zscaler.com
Contact Zscaler if you're:
Moving apps to Azure or AWS
Securing a distributed and mobile workforce
Looking to replace VPNs
LOCATIONS
PROTECTED 30,000
Born in the cloud, globally distributed
ZSCALER : THE ZENITH OF SCALABILITY
OFFICE 365 TRAFFIC
401TB per MONTH
Zscaler and its engineering team have been granted scores of patents for architectural innovations.
USERS PROTECTED
1.3 MILLION
150+ DATA CENTERS
6 CONTINENTS
120B+ REQUESTS PER DAY
175K+ UNIQUE SECURITY UPDATES PER DAY
TRAFFIC SECURED
185 COUNTRIES