Cloud security platform
Purpose-built (92 patents)
Largest security cloud
30B requests a day
125M threats blocked a day
Enabling the secure transformation to the cloud. EndFragment
Accelerating growth125% renewal rate
Solid financial model
Trusted by G20005K organizations
15M users in 185 countries
Zscaler is a very strong choice for any organization interested in a cloud gateway.
...on-premises web content security can’t protect digital business...
Leading industry analysts agree…
SIMPLY CONFIGURE THE ROUTER ON ENDPOINT DEVICE TO FORWARD TRAFFIC TO ZSCALER
Tunnel - GRE/IPsec
Zscaler built a perimeter around the Internet so you don’t need to put a perimeter around every office.
SINGLE POLICY CONSOLE
Define policies by user, group,
location. Policy follows the user.
CONNECT – CONTROL – SECURE
Nothing bad comes in, nothing good leaks out
Zscaler Internet Access for network transformationEndFragment
Gain visibility into all
applications, users, threats, and
REAL-TIME THREAT CORRELATION
Correlation of risk indicators – destination to content – to predict and block zero-day attacks.
UNIFORM SECURITY FOR EVERYONE
As long as everything is routed through Zscaler, from a security perspective, I’m happy.– John Taylor, Global Head of IT Security, British American Tobacco
Threat sharing partnerships, commercial deals, open source, private working groups.
What sets Zscaler’s security apart?
All bytes, all ports, all protocols, including SSL – no compromises.
Over 125M threats blocked every day – once a new threat is detected, it’s immediately blocked for all users. 120K+ security updates a day.
When the board asks, “Have we been compromised?”
Identify and block botnet-infected machines calling command and control (C&C) servers.
Zscaler applied immediate value during proof-of-concept when we identified botnet infected machines. We’ve easily seen a 60% drop in malware related tickets after rolling out Zscaler.– Seth McCallister, Head of Global Information Security, Beam Suntory
Gain visibility into all of the cloud applications being used.
Define granular access policies to control their usage and reduce your risk.
When the auditor asks, “Which cloud apps are we using?”
A three-step journey to digital transformationEndFragment
Cloud-enable your network
Enable local breakouts for
Internet traffic – no backhaul
Deliver a secure and
better user experience
Up-level your security
Make Zscaler you next
hop to the Internet.
Fast to deploy. No infrastructure changes required.
Remove point products
Phase out gateway appliances
at your own pace.
Reduce cost and
Secure, simplify, and transform
to a digital enterpriseEndFragment
Use arrow button to navigate
Comprehensive security, data protection, visibility, and control —100% in the cloud.
Provide partner app access, not network access
Replace legacy VPNs
Make your private apps act like cloud apps
Zscaler Private Access use casesEndFragment
Migrate private apps to AWS, Azure, Google Cloud Compute
without network infrastucture changes
Unmatched security – Simplified IT – Better user experience
Allow app access for acquisitions and divestitures
Largest security cloud – deployed in 100 data centers worldwideEndFragment
unique security updates
Peering in major
The security market categorized into five segments
Access to the Internet & Apps
How Zscaler complements your security ecosystemEndFragment
REPORTING & ANALYTICS
IDENTITY & ACCESS
DATA CENTER PROTECTION
Real-time Log feeds
BACK TO ZSCALER.COM >
Check your securityEndFragment
CHECK YOUR SECURITY
Run the Zscaler Security Preview to find out how well you’re protected right now. It’s quick, safe, and informative.
Consolidate point products and simplify IT
No CAPEX – elastic subscription fee
Reduced OPEX – no box management
Reduced MPLS cost
Unmatched security – all users, branches, devices
Consistent policy and protection
Always up to date
A TRUSTED AND RELIABLE PARTNER
Commitment to quality and customer success
Technology innovator – Market leader – Financially strong
Fast response time – local breakouts
Users empowered to leverage cloud apps
IT’S A NEW WORLD, AND THE OLD METHODS OF PROTECTING THE PERIMETER NO LONGER WORK
AND, DESPITE BILLIONS OF DOLLARS SPENT ON SECURITY APPLIANCES, BREACHES ARE ON THE RISE
ZSCALER INTERNET ACCESS
ZSCALER PRIVATE ACCESS
ZSCALER = Zenith of Scalability (4 dimensions of scale)
Protecting 15 million users – 200 of the Global 2,000 – leading global brands
More than 5,000 organizations trust Zscaler
Life was good – users and apps were safely inside the security perimeter
Life changed – threats evolved and each new threat spurred more spending on inbound gateway appliancesEndFragment
Ext. FW / IPS
Life got complex – mobility and the use of VPNs brought added cost and complexity to the gateway
The hub-and-spoke architecture drove a significant rise in MPLS spending to backhaul traffic to centralized Internet gatewaysEndFragment
Then, apps moved from the data center to the cloud and the Internet became the new destination – perimeter security was brokenEndFragment
Zscaler built, from scratch, a cloud security platform to secure this new world of IT – no hardware to deploy and manage
SECURE, POLICY BASED ACCESS TO THE INTERNET AND YOUR APPS
ZSCALER INTERNET ACCESS
Inline inspection of all traffic to make surenothing bad comes in and good leaves
The Zscaler cloud security platform consists of two principal elements:
ZSCALER PRIVATE ACCESS
Secure access to private apps without exposing them to the Internet
Zscaler Private Access
POLICIES DEFINE WHICH APPS ARE VISIBLE OR DARK
USER REQUESTS ACCESS TO AN APP (JIRA)
APPS NEVER EXPOSED TO THE INTERNET
POLICY DETERMINES IF ACCESS IS PERMITTED (JIRA)
POLICY-BASED ACCESS CONNECTS THE RIGHT USER TO THE RIGHT APP – NOT THE NETWORK
IF AUTHORIZED, ZSCALER CLOUD INITIATES AN OUTBOUND CONNECTION BETWEEN Z-CONNECTOR AND Z-APP
USERS ARE NEVER ON THE NETWORKS
CONNECTIONS ARE STITCHED TOGETHER IN THE CLOUD
Query connectors to identify apps, users, and usage:
“*.company.com” Use information to define access policies
Gain visibility into internal applications