<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1">
<url>
           <loc>https://www.zscaler.com/resources/videos/2024-bhu-convocation-address-jay-chaudhry</loc>
           <video:video>
            <video:title>2024 BHU Convocation Address by Jay Chaudhry</video:title>
            <video:description>Jay Chaudhry, BHU alumnus and Founder, CEO, and Chairman of Zscaler, was the Chief Guest at the 104th Convocation of Banaras Hindu University. Watch his address to hear his inspiring journey from a humble farming background to becoming a global tech leader, urging students to make an impact rather than chase wealth.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/2024%20Convocation%20Address%20by%20Jay%20Chaudhry.jpg.png</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/3-step-guide-integrating-zdx-and-splunk</loc>
           <video:video>
            <video:title>The 3-Step Guide to Integrating ZDX and Splunk</video:title>
            <video:description>In this video, Vikas Srivastava, Principal Technical Product Specialist at Zscaler, shows you three simple steps for integrating ZDX™ with Splunk.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/DEMO_2301_-_Zscaler__Splunk_Posture_Control_Integration_ZPC_V1_850x499_1_850x499.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/4-stages-ransomware-attack</loc>
           <video:video>
            <video:title>The 4 Stages of a Ransomware Attack</video:title>
            <video:description>Watch this video to learn the four stages of a ransomware attack and how Zscaler prevents such attacks at each stage.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/4%20Stages%20of%20a%20Ransomware%20Attack.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/accelerating-it-m-integration-zscaler</loc>
           <video:video>
            <video:title>Accelerating IT M&amp;A Integration with Zscaler</video:title>
            <video:description>Watch this video featuring Zscaler Chief Technology Evangelist Brian Deitch as he dives into M&amp;amp;A IT integration, powered by Zscaler.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Accelerating_IT_MampA_Integration_with_Zscaler_650x366.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/accelerating-m-zscaler-zero-trust-exchange</loc>
           <video:video>
            <video:title>Accelerating M&amp;A with the Zscaler Zero Trust Exchange</video:title>
            <video:description>In this video, learn how the cloud-based Zscaler Zero Trust Exchange helps you maximize M&amp;amp;A deal value with effective risk mitigation and seamless IT integration, enabling you to accelerate time-to-value by 50%.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/M_and_A_Overview_650x366.png</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/accelerating-private-equity-value-creation-zscaler</loc>
           <video:video>
            <video:title>Accelerating Private Equity Value Creation with Zscaler </video:title>
            <video:description>Watch this video to learn how Zscaler helps private equity firms mitigate the risk of breaches and data loss while remaining totally compliant with federal regulations.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Accelerating_Private_Equity_value_creation_with_Zscaler_850x499-min.png</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/adapting-curveballs-leading-open-mind-zscaler-cto-syam-nair</loc>
           <video:video>
            <video:title>Adapting to Curveballs, Leading With an Open Mind: Zscaler CTO Syam Nair </video:title>
            <video:description>Syam Nair had dreams of a military career but an unexpected development changed the course of his life. After establishing a career at Microsoft, he would again make a major career change, joining cloud-centric Salesforce and ultimately becoming the CTO of Zscaler. Syam’s journey has taught him the value of keeping an open mind, revisiting his preconceptions, and listening to opposing voices. These skills, which helped him overcome professional obstacles, are invaluable for his current role as the CTO for the largest inline cloud security provider on earth.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_106.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:57:35+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/adaptive-access-control-zia-crowdstrike-zero-trust-assessment</loc>
           <video:video>
            <video:title>Adaptive Access Control with ZIA + CrowdStrike Zero Trust Assessment</video:title>
            <video:description>Zscaler and CrowdStrike work together to implement zero trust access control based on an endpoint device&apos;s real-time security posture. Zscaler Internet Access™ provides access to internet and SaaS applications based on device posture calculated by CrowdStrike&apos;s Zero Trust Assessment. This video showcases how Zscaler ZIA applies gradual lockdown policies adaptively based on low, medium, and high trust device posture scenarios.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_52.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/adopting-zero-trust-it-separations-divestitures-carve-outs-and-spinoffs</loc>
           <video:video>
            <video:title> Adopting Zero Trust for IT Separations (Divestitures, Carve-outs, and Spinoffs)</video:title>
            <video:description>&amp;nbsp;Adopting Zero Trust for IT Separations (Divestitures, Carve-outs, and Spinoffs)
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/ensuring-cyber-integrity-throughout-a-divestiture-or-carveout.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/advanced-zscaler-sandbox-innovations-quarantine-and-isolate</loc>
           <video:video>
            <video:title>Advanced Zscaler Sandbox Innovations: Quarantine and Isolate</video:title>
            <video:description>Zscaler has the industry&apos;s first AI powered inline cloud sandbox, which allows them to hold a file and inspect it. This video will highlight the enhanced quarantine and isolate capabilities available today on the Zscaler for Users platform.&amp;nbsp;</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_76.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/architectural-approach-multicloud-networking</loc>
           <video:video>
            <video:title>An Architectural Approach to Multicloud Networking</video:title>
            <video:description>Watch our on-demand webinar to explore some of the challenges businesses face when connecting their network to a multicloud environment as well as Zscaler&apos;s solution to these challenges.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/An-Architectural-Approach-to-Multicloud-Networking%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/autonation-customer-video</loc>
           <video:video>
            <video:title>AutoNation&apos;s Drive to the Cloud Secured by Zscaler </video:title>
            <video:description>See how AutoNation put an end to deploying costly appliances by adopting Zscaler.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/AutoNations_drive_to_the_cloud-_secured_by_Zscaler_850x499.jpeg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/aws-and-zscaler-fast-secure-access-aws-cloud</loc>
           <video:video>
            <video:title>AWS and Zscaler for fast, secure access to the AWS cloud</video:title>
            <video:description>Zscaler is an AWS Advanced Technology Partner, with Security Competency, Public Sector, and FedRAMP Authority to Operate (ATO) distinctions.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/aws-and-zscaler-for-fast-secure-access-to-the-aws-cloud.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/beginners-guide-to-cybersecurity</loc>
           <video:video>
            <video:title>What is Cybersecurity? A Beginner’s Guide to Threats, Tools, and Zero Trust</video:title>
            <video:description>Get started with cybersecurity in 2025 with this comprehensive beginner&apos;s guide. Learn about modern threats, essential tools like firewalls and encryption, and discover how the Zero Trust framework is setting the new standard for keeping users, data, and devices safe. Designed for IT leaders and decision-makers, this guide equips you to protect your organization in an evolving digital landscape.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Thumnail%20-%20Beginners%20Guide%20to%20Cybersecurity%20%282%29.png</video:thumbnail_loc>
            <video:lastmod>2025-12-12T15:22:11+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/beyond-misconfigurations-correlating-threats-truly-understand-your-cloud-risk</loc>
           <video:video>
            <video:title>Beyond Misconfigurations Correlating Threats to Truly Understand Your Cloud Risk </video:title>
            <video:description>Watch our on-demand webinar, &quot;Beyond Misconfigurations: Correlating Threats to Truly Understand Your Cloud Risk&quot;, to learn how real-world attacks can exploit your security weaknesses—and how risk correlation with a CNAPP can stop them.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Beyond%20Misconfigurations%20Correlating-Threats-to-Truly-Understand-Your-Cloud-Risk%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-06-09T12:59:01+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/boost-end-user-productivity-zscaler-digital-experience</loc>
           <video:video>
            <video:title>Boost end user productivity with Zscaler Digital Experience</video:title>
            <video:description>In the quest for reliable performance of devices, networks, and applications, Zscaler&apos;s Digital Experience (ZDX) emerges as a vital solution for IT teams. It addresses the challenges of slow applications and connectivity issues that hinder employee productivity, especially in diverse working environments. By leveraging AI-powered insights, ZDX enables proactive troubleshooting and enhances visibility across the network, allowing for quicker resolutions and improved device health monitoring. Built on the Zscaler Zero Trust Exchange platform, it ensures secure connections and optimal performance for users.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/zscaler-Internet-access-aiz-overview-video.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/breaking-down-zero-trust-security-strategies-leading-minds-cybersecurity</loc>
           <video:video>
            <video:title>Breaking Down Zero Trust Security Strategies with Leading Minds in Cybersecurity</video:title>
            <video:description>This session with Zscaler, Splunk, Okta, and AWS looks at security beyond the traditional perimeter, and how to protect data with a zero trust strategy.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/suggested-resource-green_15.png</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/british-american-tobacco-customer-video</loc>
           <video:video>
            <video:title>British American Tobacco Enables Business Through Security with Zscaler</video:title>
            <video:description>John Taylor, Global Head of IT Security and Service Continuity at British American Tobacco, talks about how Zscaler allowed IT security to become a key business enabler.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/zscaler-customer-video-british-american-tobacco.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/carrier-accelerates-secure-digital-transformation-zscaler</loc>
           <video:video>
            <video:title>Carrier Accelerates Secure Digital Transformation with Zscaler</video:title>
            <video:description>See how Zscaler helped Carrier deploy zero trust security to 56,000 employees in 160 countries in just nine days.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/carrier-digital-transformation-journey-with-zscaler%401x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:57:35+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/cio-panel-ams-using-zt-achieve-business-goals</loc>
           <video:video>
            <video:title>CIO Panel AMS - Using ZT to Achieve Business Goals</video:title>
            <video:description>This CIO panel covers the tactics being employed to support widespread hybrid work in AMS and how zero trust helps you achieve your business goals.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/CIO%20Panel%20AMS%20-%20Using%20ZT%20to%20Achieve%20Business%20Goals_%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/cio-panel-emea-supporting-new-hybrid-workforce</loc>
           <video:video>
            <video:title>CIO Panel EMEA - Supporting the New Hybrid Workforce</video:title>
            <video:description>This CIO panel covers the tactics being employed to support widespread hybrid work in EMEA and how zero trust helps you achieve your business goals.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/CIO%20Panel%20EMEA%20-%20Supporting%20the%20new%20hybrid%20workforce_%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/ciso-panel-ams-seamlessly-securing-change</loc>
           <video:video>
            <video:title>CISO Panel AMS - Seamlessly Securing Change</video:title>
            <video:description>With hybrid work now mainstream, CISOs have more on their plates than ever before. How are these leaders helping their organizations stay secure while adapting to work-from-anywhere? View this panel discussion to understand the shift in CISO responsibilities in AMS and how to seamlessly secure organizational change.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/CISO%20Panel%20AMS%20-%20Seamlessly%20Securing%20Change_%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/ciso-panel-emea-seamlessly-securing-org-change</loc>
           <video:video>
            <video:title>CISO Panel EMEA - Seamlessly Securing Org Change</video:title>
            <video:description>With hybrid work now mainstream, CISOs have more on their plates than ever before. How are these leaders helping their organizations stay secure while adapting to work-from-anywhere? View this panel discussion to understand the shift in CISO responsibilities in EMEA and how to seamlessly secure organizational change.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/CISO%20Panel%20EMEA%20-%20Seamlessly%20Securing%20Org%20Change%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/cloud-security-driver-digital-transformation-financial-sector</loc>
           <video:video>
            <video:title>Cloud Security as a Driver for Digital Transformation in the Financial Sector</video:title>
            <video:description>Watch this webinar featuring Suparna Goswami, Associate Editor at Information Security Media Group, as she discusses with Zscaler experts how financial services companies can build solid risk management programs for digital transformation journeys.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_35.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:57:35+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/cnbc-mad-money-q3-2024-earnings-interview</loc>
           <video:video>
            <video:title>CNBC Mad Money Q3 2024 Earnings Interview</video:title>
            <video:description>Zscaler Chairman and CEO, Jay Chaudhry, on CNBC’s Mad Money to discuss our stellar Q3 results and cybersecurity advancements. &amp;nbsp;Zscaler is delivering innovative AI and Zero Trust architecture solutions to a growing set of enterprise customers which provides better security and user experience, while saving on capital and operational costs. Legacy cybersecurity vendors are on the defensive worried about cannibalizing their firewall and VPN revenue. Zscaler continues to perform for our customers and our investors.Also discussed the mission for us to protect over 40% of the Fortune 500 and federal agencies, like the DoD. Check out the full interview.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/CNBC-Mad-Money-Q3-2024-Earnings-Interview.png</video:thumbnail_loc>
            <video:lastmod>2025-05-15T16:06:06+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/continuous-threat-exposure-management-zscaler-launch-event</loc>
           <video:video>
            <video:title>Continuous Threat Exposure Management | Zscaler Launch Event</video:title>
            <video:description>-</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/zscaler-aem-breakout-video-resource.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-14T20:21:59+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/continuous-threat-exposure-management-zscaler-launch-event-uvm-breakout</loc>
           <video:video>
            <video:title>Continuous Threat Exposure Management | Zscaler Launch Event: UVM Breakout</video:title>
            <video:description>The heart of managing risk is an effective risk-based vulnerability management program. Watch this video to learn about Zscaler&apos;s Unified Vulnerability Management, built on our Data Fabric for Security, to prioritize your biggest risks, automate remediation workflows, and showcase your security posture improvements.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_10.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-04T15:09:18+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/create-tomorrow-s-legacy-right-way-medtronic-cio-rashmi-kumar</loc>
           <video:video>
            <video:title>Create Tomorrow’s Legacy the Right Way: Medtronic CIO Rashmi Kumar</video:title>
            <video:description>As CIO of a 95,000-employee global producer of medical devices and therapies, tech leader Rashmi Kumar consistently challenges herself to “unlearn” and challenge the status quo to reach the highest levels of leadership success. In this interview, she explains her slogan when approaching new tech projects, “You&apos;re creating tomorrow&apos;s legacy,” to ensure systems are always adaptable and integrate with what&apos;s next to drive business value.&amp;nbsp;
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_103.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:57:35+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/csc-customer-video</loc>
           <video:video>
            <video:title>CSC Protects Retirement Data for 700,000 Members with the Zscaler Zero Trust Exchange</video:title>
            <video:description>Discover why CSC chose the Zscaler Zero Trust Exchange with Zscaler Digital Experience to secure their network, applications, users, and customer retirement data.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/CSC_0.jpeg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/csm-bakery-relies-zscaler-private-access</loc>
           <video:video>
            <video:title>CSM Bakery Relies On Zscaler Private Access</video:title>
            <video:description>Watch this video to learn why thousands of CSM Bakery employees trust Zscaler Private Access to access private applications.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_110.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/csr-customer-video</loc>
           <video:video>
            <video:title>CSR Protects 4,000+ Employees from Malware with Zscaler</video:title>
            <video:description>In this video, hear from Dave Edge, Security Architect at CSR Limited, on why he and his team chose Zscaler to provide consistent security regardless of where employees are located.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/CSR_on_Why_Zscaler_850x499.png</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/cto-panel-ams-how-zt-creates-adaptability-hybrid-work</loc>
           <video:video>
            <video:title>CTO Panel AMS - How ZT Creates Adaptability for Hybrid Work</video:title>
            <video:description>Hybrid work has seen users work from anywhere and everywhere, making security a much greater challenge. Watch this panel discussion featuring AMS CTOs on how a zero trust framework gives you the adaptability to face this challenge head-on.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/CTO%20Panel%20AMS%20-%20New%20Hybrid%20How%20ZT%20Creates%20Adaptability%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/cto-panel-emea-how-zero-trust-creates-adaptability</loc>
           <video:video>
            <video:title>CTO Panel EMEA - How Zero Trust Creates Adaptability</video:title>
            <video:description>Hybrid work has seen users work from anywhere and everywhere, making security a much greater challenge. Watch this panel discussion featuring EMEA CTOs on how a zero trust framework gives you the adaptability to face this challenge head-on.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/CTO%20Panel%20EMEA%20How%20Zero%20Trust%20Creates%20Adaptability%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/cushman-and-wakefield-leverage-zscaler-and-crowdstrike-integration</loc>
           <video:video>
            <video:title>Cushman and Wakefield leverage the Zscaler and CrowdStrike integration</video:title>
            <video:description>Watch this video to learn why Cushman and Wakefield adopted Zscaler, and CrowdStrike through our partnership, to transform their security model and deploy one-of-a-kind cyberthreat protection.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-red-dark-red-min_26.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/cyber-attack-surface-management-caasm-product-overview</loc>
           <video:video>
            <video:title>Cyber Attack Surface Management (CAASM) Product Overview</video:title>
            <video:description>Discusses the challenges IT and security teams face in maintaining an accurate inventory of digital assets, which is crucial for risk management. It highlights the limitations of traditional CMDBs and the need for a modern approach to cyber asset attack surface management (CAASM).</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/asset-exposure-management.png</video:thumbnail_loc>
            <video:lastmod>2026-01-05T15:39:31+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/cybersecurity-predictions-2025-regulatory-challenges-and-evasive-malware</loc>
           <video:video>
            <video:title>Cybersecurity Predictions in 2025: Regulatory Challenges and Evasive Malware</video:title>
            <video:description>Discover the impact of new cyber regulations, adversary-in-the-middle attacks that can evade MFA, and encryption-less ransomware. The threat landscape is evolving, but your defenses can evolve too.Global cybersecurity regulations without harmonization will potentially weaken cyber defense. Countries are rolling out their own rules for AI, data privacy, and security controls. Businesses will burn time and money on disparate compliance controls, leaving the actual risk reduction activities on the back burner. To stay ahead, organizations should push for harmonization of global regulatory controls targeting new technologies like GenAI and more.For a comprehensive look at the top cybersecurity predictions for this year, explore our full report Cybersecurity Predictions 2025.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/cyber-prediction-2025-regulatory-challenges.png</video:thumbnail_loc>
            <video:lastmod>2025-08-28T06:21:11+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/cybersecurity-trends-2025-ai-powered-threats-and-insider-risks</loc>
           <video:video>
            <video:title>Cybersecurity trends in 2025: AI-powered threats and insider risks</video:title>
            <video:description>Deepen Desai, Chief Security Officer of Zscaler, weighs in on the rise of AI-powered social engineering, the need to secure GenAI, and the growth of insider threats. See his predictions for 2025 that every security leader needs on their radar. Generative AI is enabling attackers to clone human voices with great accuracy. Think localized accents and dialects that make fake calls feel real. Initial access brokers will increasingly use this to trick employees into handing over their credentials. Phishing will amplify identity compromise, ransomware attacks, and data exfiltration.&amp;nbsp;</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/AI-powered%20threats%20and%20insider%20risks.png</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/cybersecurity-trends-2025-quantum-decryption-and-supply-chain-risks</loc>
           <video:video>
            <video:title>Cybersecurity trends in 2025: Quantum decryption and supply chain risks</video:title>
            <video:description>Zscaler CSO Deepen Desai discusses&amp;nbsp;the importance of adopting quantum-safe cryptography and strengthening third-party risk management. Quantum computing will undoubtedly introduce a new class of security risk. Organizations must begin planning transition to quantum safe cryptography where possible. Supply chain attacks will also remain a top concern with threat actors increasingly targeting third party vendors, contractors, and CICD environment to infiltrate organizations.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/quantum%20decryption%20and%20supply%20chain%20risks.png</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/data-protection-dialogues-data-risk</loc>
           <video:video>
            <video:title>Data Protection Dialogues - Data@Risk</video:title>
            <video:description>How will organizations bolster their data defenses for the future of work? Zscaler’s inaugural Data@Risk Global Survey Report asked 500 Global and security professionals this question and others to assess the global state of data protection readiness.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Data%20Protection%20Dialogues%20-%20Data%40Risk%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/data-protection-dialogues-how-secure-unmanaged-devices</loc>
           <video:video>
            <video:title> Data Protection Dialogues: How to Secure Unmanaged Devices</video:title>
            <video:description>Zscaler Browser Isolation enables organizations to secure unmanaged devices against internet-based threats through an agentless reverse proxy architecture.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-red-purple-min_3.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/data-protection-features-browser-isolation</loc>
           <video:video>
            <video:title>Data Protection Features: Browser Isolation</video:title>
            <video:description>Zscaler Browser Isolation uses an agentless isolation proxy to render app sessions in the Zero Trust Exchange and streams only pixels to the endpoint.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/video-data-protection-features-browser-isolation-resource.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/data-protection-features-shadow-it-discovery</loc>
           <video:video>
            <video:title>Data Protection Features: Shadow IT Discovery</video:title>
            <video:description>Zscaler Shadow IT Discovery quickly identifies unsanctioned applications, scrutinizes them across various risk attributes to determine their trustworthiness, and empowers you to respond.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_89.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/data-protection-transformed-2022-breakout-protect-data-instantly-zero</loc>
           <video:video>
            <video:title> Data Protection Transformed 2022 | Breakout: Protect Data Instantly with Zero Configuration Data Protection</video:title>
            <video:description>See how Zscaler is transforming data visibility. With zero configuration data discovery, organizations get out of the box data classification, so risks and behaviors associated with sensitive data are easily understood and controlled.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_135.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/data-protection-transformed-2022-breakout-secure-data-everywhere-enterprise-dlp</loc>
           <video:video>
            <video:title>Data Protection Transformed 2022 | Breakout: Secure Data Everywhere with Enterprise DLP</video:title>
            <video:description>Learn how Zscaler delivers the industry&apos;s most powerful Enterprise DLP solution. With new protection channels around endpoint, email, and private apps, Zscaler now delivers unified protection from one platform across all risky data loss vectors.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Data_Protection_Transformed_2022___Breakout__Secure_data_everywhere_with_Enterprise_DLP_3_850x499.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/data-protection-transformed-2022-breakout-simplify-operations-workflow-automation</loc>
           <video:video>
            <video:title>Data Protection Transformed 2022 | Breakout: Simplify Operations with Workflow Automation</video:title>
            <video:description>Discover how to streamline your data protection workflows. Via Zscaler’s acquisition of ShiftRight, organizations can now seamlessly automate incident management in order to quickly remediate data protection incidents.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Data_Protection_Transformed_2022___Breakout__Simplify_operations_with_workflow_automation_850x499.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/data-protection-transformed-2022-main-keynote</loc>
           <video:video>
            <video:title>Data Protection Transformed 2022: Main Keynote</video:title>
            <video:description>Watch this event to see Zscaler&apos;s vision for the future of data protection. With industry-first innovations that transform data visibility, cybersecurity efficacy, and operations, you’ll see how we’ve evolved the Zscaler Zero Trust Exchange™️ to solve today’s most difficult data protection challenges.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_80.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/day-life-zscaler-sdr</loc>
           <video:video>
            <video:title>A Day in the Life of a Zscaler SDR</video:title>
            <video:description>Watch this video to learn why our SDRs love working at Zscaler!
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/a-day-in-the-life-of-a-zscaler-sdr.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:57:35+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/defends-against-cyberthreats-zero-trust-exchange</loc>
           <video:video>
            <video:title>Defends Against Cyberthreats with the Zero Trust Exchange </video:title>
            <video:description>Massive attack surfaces and the increasing sophistication of cyberthreats pose a double whammy of risk to businesses. The Zscaler Zero Trust Exchange delivers cyberthreat protection at the edge—the ideal position to shut down attacks inline.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Cyber%20Threat%20Protection%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/demo-how-zscaler-improves-servicenow-secops-workflows</loc>
           <video:video>
            <video:title>Demo: How Zscaler Improves ServiceNow SecOps Workflows </video:title>
            <video:description>Watch this video to learn the four primary use cases supported by the integration of Zscaler Internet Access™ and ServiceNow Security Incident Response.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/See_Zscaler_improve_ServiceNow_SecOps_workflows_850x499.png</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/demo-how-zscaler-secures-servicenow-data</loc>
           <video:video>
            <video:title>Demo: How Zscaler Secures ServiceNow Data</video:title>
            <video:description>In this video, learn how to configure the CASB and DLP capabilities in Zscaler Internet Access™ to protect data in a customer&apos;s ServiceNow deployment.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/See_how_Zscaler_Secures_ServiceNow_Data_850x499.png</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/demo-zscaler-and-vmware-sd-wan-velocloud</loc>
           <video:video>
            <video:title>Demo: Zscaler and VMware SD-WAN by VeloCloud</video:title>
            <video:description>In this video, learn how to set up a joint solution from Zscaler and VMWare SD-WAN by VeloCloud.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Zscaler_and_VMware_SD-WAN_by_VeloCloud_Demo_850x499.png</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/demo-zscaler-aruba-silver-peak-sd-wan</loc>
           <video:video>
            <video:title>Demo: Zscaler + Aruba (Silver Peak) SD-WAN</video:title>
            <video:description>In this video, learn how Silver Peak EdgeConnect SD-WAN and Unity Orchestrator are integrated with Zscaler Internet Access™ (ZIA™) to simplify your SD-WAN transformation to the cloud.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Silver_Peak_Technical_Demo__Integrating_Zscaler_into_the_Unity_EdgeConnectTM_SD-WAN_Fabric_850x499.png</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/demo-zscaler-posture-control-splunk-integration</loc>
           <video:video>
            <video:title>Demo: Zscaler Posture Control + Splunk Integration</video:title>
            <video:description>In this video, learn how Zscaler Posture Control™ (ZPC™) integrates with Splunk to help you build and run secure cloud applications.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/DEMO_2301_-_Zscaler__Splunk_Posture_Control_Integration_ZPC_V1_850x499.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/demo-zscaler-vmware-carbon-black-action</loc>
           <video:video>
            <video:title>Demo: Zscaler + VMWare Carbon Black in Action</video:title>
            <video:description>In this video, learn how Zscaler and VMWare Carbon Black Cloud Platform integrate to share threat intelligence, detect and respond to zero day threats faster, and perform device posture-driven access control to internal applications hosted in the cloud.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Demo_VMWare_Carbon_Black_and_Zscaler_in_Action_850x499.png</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/digital-realty-customer-video</loc>
           <video:video>
            <video:title>Digital Realty | Customer Video</video:title>
            <video:description>In this video, Don Freeze, SVP &amp;amp; Global CISO for Digital Realty, explains why he chose the Zscaler Zero Trust Exchange with Professional Services to extend zero trust to his company&apos;s operational technology (OT) environments.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Digital%20Realty.jpeg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/driving-secure-transformation-through-peer-collaboration</loc>
           <video:video>
            <video:title>Driving Secure Transformation Through Peer Collaboration</video:title>
            <video:description>Our executive panel discusses how technical C-suite leaders can work cross-functionally to securely transform infrastructure and services in a cloud- and mobile-first world, dissect the challenges of enacting large-scale change, and describe effective ways to overcome them.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Driving%20Secure%20Transformation%20Through%20Peer%20Collaboration%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/economics-zero-trust-enhancing-user-productivity</loc>
           <video:video>
            <video:title>The Economics of Zero Trust: Enhancing User Productivity</video:title>
            <video:description>All of advantages, to reduce user wait time by forty percent results in the average customer recovering five point two million dollars worth of production.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/the-economics-of-zero-trust-enhancing-user-productivity.jpg</video:thumbnail_loc>
            <video:lastmod>2025-08-08T18:33:22+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/economics-zero-trust-improving-security-posture</loc>
           <video:video>
            <video:title>The Economics of Zero Trust: Improving Security Posture</video:title>
            <video:description>With zero trust, the security is decoupled from the network, and no entities are trusted by default. They are given access to specific apps and not the network as a whole. Learn how this works and why it is so important.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/the-economics-of-zero-trust-improving-security-posture.jpg</video:thumbnail_loc>
            <video:lastmod>2025-08-08T18:22:53+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/economics-zero-trust-increasing-operational-efficiency</loc>
           <video:video>
            <video:title>The Economics of Zero Trust: Increasing Operational Efficiency</video:title>
            <video:description>Deliver comprehensive security as a service from the cloud to &amp;nbsp;eliminate point products and hardware appliances. Learn how this minimizes administrative time requirements</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/the-economics-of-zero-trust-increasing-operational-efficiency-brian-deitch.jpg</video:thumbnail_loc>
            <video:lastmod>2025-08-08T18:42:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/embrace-modern-workplace-work-anywhere</loc>
           <video:video>
            <video:title>Embrace the Modern Workplace: Work from Anywhere</video:title>
            <video:description>“Modern workplace” is a business strategy that creates the necessary technological, physical, and psychological conditions to help employees, partners and customers thrive while still protecting business data. Key to this is adopting modern, cloud native application access services that work across all locations, motivate employees to get work done, and allow IT to adopt zero trust security.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/resourcePage/Rectangle%203849.png</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/embracing-discomfort-achieve-success-zscaler-evp-punit-minocha</loc>
           <video:video>
            <video:title>Embracing Discomfort to Achieve Success: Zscaler EVP Punit Minocha</video:title>
            <video:description>When Punit Minocha first arrived in the US he had to learn to adapt quickly to a new culture. Today, he replicates the difficult experience by climbing Mount Kilimanjaro and seeking other extreme outdoor adventures. For Punit, facing adversity is key to propelling personal growth. The philosophy of ‘trial by fire’ has been a recurring theme in his career, and guides his role as Zscaler’s EVP of Business and Corporate Development. It has also taught him the value of collaboration and aligning individuals to achieve a common purpose. Hear Punit’s insights on rallying competing forces by creating a vision of shared success.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_107.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:57:35+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/enabling-modern-workplace-technology</loc>
           <video:video>
            <video:title>Enabling the Modern Workplace: Technology</video:title>
            <video:description>IT must enable a modern workplace so employees, partners, and customers can thrive. Zscaler securely connects users to apps from anywhere, improves user experiences, and protects data more effectively.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_34.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/engie-customer-video</loc>
           <video:video>
            <video:title>Engie Empowers Transformation with a Cloud-First IT Strategy</video:title>
            <video:description>Pierre-Antoine Falaux-Bachelot, Group Infrastructure Lead Architect at Engie, describes the company’s decision to partner with Zscaler to enable its cloud migration—simply, securely, and seamlessly.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Engie_Empowers_Transformation_with_a_Cloud-First_IT_Strategy.jpg_850x499.png</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/evolving-cio-mandate-new-responsibilities-and-strategies</loc>
           <video:video>
            <video:title>The Evolving CIO Mandate: New Responsibilities and Strategies</video:title>
            <video:description>Today&apos;s CIOs are at the center of their data-driven orgs, responsible for managing and reporting security and compliance risks that threaten overall business health. This panel delves into the broadening CIO mandate and strategies for managing responsibilities beyond IT.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/The%20Evolving%20CIO%20Mandate%20New%20Responsibilities%20and%20Strategies%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/fairfax-county-expanding-zero-trust-approach-zscaler-workload-segmentation</loc>
           <video:video>
            <video:title>Fairfax County: Expanding a Zero Trust Approach with Zscaler Workload Segmentation</video:title>
            <video:description>Fairfax County: Expanding a Zero Trust Approach with Zscaler Workload Segmentation | Zenith Live &apos;21</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-dark-blue-purple-min_8.jpg</video:thumbnail_loc>
            <video:lastmod>2025-06-09T12:53:47+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/fcc-customer-video</loc>
           <video:video>
            <video:title>FCC Replaces TIC and Strengthens App Security with Zscaler</video:title>
            <video:description>In this video, Tony Summerlin, Senior Strategic Adviser at the Federal Communications Commission, talks about how the FCC is using Zscaler to secure access to its SaaS applications and the open internet.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/FCC___Replacing_TIC_with_Zscaler_850x499.jpeg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/fletcher-building-customer-video</loc>
           <video:video>
            <video:title>Fletcher Building Secures its Cloud Transformation with Zscaler </video:title>
            <video:description>Thomas Willig, Head of Security at Fletcher Building, talks about the company&apos;s massive scale and how Zscaler satisfied their need for scalable, anywhere, anytime security.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Fletcher_Secures_Cloud_Transformation_with_Zscaler.jpg_850x499.png</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/frictionless-zero-trust-crowdstrike-zscaler</loc>
           <video:video>
            <video:title>Frictionless Zero Trust CrowdStrike + Zscaler</video:title>
            <video:description>Amol Kulkarni, chief product and engineering officer at CrowdStrike, explains the fundamental need for zero trust today and how CrowdStrike is partnering with Zscaler to deliver a frictionless zero trust model.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Crowdstrike%20Partner%20Segment%20Amol%20Kulkarni%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/ge-s-transformation-journey</loc>
           <video:video>
            <video:title>GE&apos;s Transformation Journey</video:title>
            <video:description>Watch this video to hear from Chris Drumgoole, CTO of GE, as he discusses his approach to transforming GE&apos;s network and how Zscaler has helped him achieve his vision.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_117.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/global-it-leadership-summit-full-event</loc>
           <video:video>
            <video:title>Global IT Leadership Summit | Full Event</video:title>
            <video:description>Watch the Zscaler Global IT Leadership Summit, featuring inspirational and transformational leaders discussing strategies for successful board engagement and covering the necessary skills for the business-and-tech-balanced future of IT.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Global%20IT%20Leadership%20Summit%20-%20Entire%20Event%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/global-it-leadership-summit-how-zero-trust-architecture-protects-against</loc>
           <video:video>
            <video:title>Global IT Leadership Summit | How Zero Trust Architecture Protects Against Ransomware Threats</video:title>
            <video:description>Ransomware continues to plague companies, supply chains, and society in our increasingly interconnected world. Join Patrick Foxhoven, Amit Sinha, Deepen Desai, and CXO REvolutionary and CISO Ken Athanasiou for an in-depth look at how zero trust can protect against ransomware.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Global%20IT%20Leadership%20Summit%20-%20How%20Zero%20Trust%20Architecture%20Protects%20Against%20Ransomware%20Threats%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/global-it-leadership-summit-lessons-transformational-journey</loc>
           <video:video>
            <video:title>Global IT Leadership Summit | Lessons From a Transformational Journey</video:title>
            <video:description>In this interview, Microsoft chairman and CEO Satya Nadella and Zscaler CEO Jay Chaudhry explore Microsoft&apos;s evolution, including how Nadella&apos;s background helped shape the company&apos;s success. It also covers trends impacting the future of work and valuable lessons for CXOs.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Global%20IT%20Leadership%20Summit%20-%20Lessons%20From%20a%20Transformational%20Journey%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/global-it-leadership-summit-opening-remarks</loc>
           <video:video>
            <video:title>Global IT Leadership Summit | Opening Remarks</video:title>
            <video:description>Hear the opening remarks for the Zscaler Global IT Leadership Summit from company CEO, Jay Chaudhry. He outlines the event&apos;s agenda and explains how each segment will give leaders the confidence and know how to securely transform.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Global%20IT%20Leadership%20Summit%20-%20Opening%20Remarks%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/global-it-leadership-summit-ultimate-perseverance-looking-within-resilience</loc>
           <video:video>
            <video:title>Global IT Leadership Summit | Ultimate Perseverance: Looking Within for Resilience &amp; Strength</video:title>
            <video:description>During times of extraordinary change, leaders must encourage growth mindsets across their teams. In this session, Dr. Malvika Iyer shares learnings on moving on from past mistakes or tragedies and how leaders can improve organizational inclusivity, resilience, and functioning.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Global%20IT%20Leadership%20Summit%20-%20Ultimate%20Perseverance_%20Looking%20Withing%20For%20Resilience%20%26%20Strength%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/global-it-leadership-summit-unlocking-your-competitive-edge-through-digital</loc>
           <video:video>
            <video:title>Global IT Leadership Summit | Unlocking Your Competitive Edge Through Digital Transformation</video:title>
            <video:description>In this panel session, Zscaler CEO Jay Chaudhry taps into the minds of CXOs who have successfully driven digital transformation journeys to reveal best practices, quantified impacts, and lessons learned.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Global%20IT%20Leadership%20Summit%20-%20Unlocking%20Your%20Competitive%20Edge%20Through%20Digital%20Transformation%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/graphic-packaging-international-minimizes-firewall-and-vpn-attack-surface-zero</loc>
           <video:video>
            <video:title>Graphic Packaging International Minimizes Firewall and VPN Attack Surface with Zero Trust</video:title>
            <video:description>Hear how Nikhil Narvekar, CTO at GPI, realized their legacy system was no longer sufficient, and how he approached the challenge of eliminating lateral movement with each new acquisition by adopting a zero trust architecture powered by Zscaler.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/GPI.png</video:thumbnail_loc>
            <video:lastmod>2025-05-12T12:05:13+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/healthcare-cybersecurity-crowdstrike-imprivata-rubrik-zscaler-partnership</loc>
           <video:video>
            <video:title>Healthcare Cybersecurity: CrowdStrike, Imprivata, Rubrik, Zscaler Partnership</video:title>
            <video:description>Learn how CrowdStrike, Imprivata, Rubrik, and Zscaler defend healthcare from ransomware, ensure zero trust access, and protect data and applications.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Healthcare%20Cybersecurity_%20CrowdStrike%2C%20Imprivata%2C%20Rubrik%2C%20Zscaler%20Partnership.png</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/how-ciena-securely-serves-8-000-hybrid-employees</loc>
           <video:video>
            <video:title>How Ciena Securely Serves 8,000 Hybrid Employees</video:title>
            <video:description>Learn how Ciena Corporation secured its hybrid workforce with integrated security and authentication solutions from Zscaler and Okta.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/suggested-resource-purple_9.png</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/how-zero-trust-exchange-protects-your-data</loc>
           <video:video>
            <video:title>How the Zero Trust Exchange Protects Your Data</video:title>
            <video:description>It&apos;s never been more difficult to protect sensitive data from the many ways it can be lost. The Zscaler Zero Trust Exchange is a global cloud native platform that instantly protects data, no matter where it&apos;s located, with a single DLP policy.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Data%20Protection%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/how-zscaler-facilitates-secure-integrations-after-m</loc>
           <video:video>
            <video:title>How Zscaler Facilitates Secure Integrations After M&amp;As</video:title>
            <video:description>In this video, Brian Deitch, Chief Technology Evangelist at Zscaler, demonstrates how Zscaler helps companies who&apos;ve recently carried out a merger or acquisition address four key challenges of secure integration.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/M_amp_A_D_Integrations_850x499.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/how-zscaler-saves-you-money-healthcare</loc>
           <video:video>
            <video:title>How Zscaler Saves You Money: Healthcare</video:title>
            <video:description>The Zscaler Zero Trust Exchange helps healthcare customers around the world overcome the costly challenges of perimeter-based security architectures. In this video, learn the six key ways Zscaler helps thousands of organizations save money so they can navigate today&apos;s economic uncertainty.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_119.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/how-zscaler-secures-it-separation-during-divestitures</loc>
           <video:video>
            <video:title>How Zscaler Secures IT Separation During Divestitures</video:title>
            <video:description>In this video, Brian Deitch, Chief Technology Evangelist at Zscaler, walks you through how Zscaler helps with IT separation during divestitures, carveouts, and spinoffs.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/M_amp_A_D_Divestitures_850x499.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/hydro-aluminum-boosts-ransomware-protection-zscaler-zero</loc>
           <video:video>
            <video:title>Hydro Aluminum Boosts Ransomware Protection with the Zscaler Zero...</video:title>
            <video:description>Hydro Aluminum Boosts Ransomware Protection with the Zscaler Zero...</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/resourcePage/image%201560.png</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/integrating-zscaler-arctic-wolf-s-aurora-platform</loc>
           <video:video>
            <video:title>Integrating Zscaler with Arctic Wolf&apos;s Aurora Platform</video:title>
            <video:description>The video discusses the integration of Zscaler&apos;s services with Arctic Wolf&apos;s Aurora platform, designed to enhance cybersecurity visibility and response. It highlights key integrations, focusing on Zscaler Internet Access (ZIA) and Zscaler Private Access (ZPA). The ZIA integration allows Arctic Wolf&apos;s Security Operations Center to actively respond to threats, while the ZPA integration facilitates zero trust connectivity.&amp;nbsp;</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Screenshot%202025-05-06%20at%203.14.07%E2%80%AFPM.png</video:thumbnail_loc>
            <video:lastmod>2025-05-06T19:17:25+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/introduction-otz-use-cases-zscaler-zero-trust-exchange</loc>
           <video:video>
            <video:title>Introduction: OTZ Use Cases | Zscaler Zero Trust Exchange</video:title>
            <video:description>Watch this video for an introduction to Zscaler&apos;s One True Zero video series on securing your users. Learn why yesterday&apos;s security is not built to support a zero trust strategy and the Zscaler Zero Trust Exchange delivers true zero trust without compromise.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/OTZ_Series_-_Introduction_650x366.png</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/johnson-controls-customer-video</loc>
           <video:video>
            <video:title>Johnson Controls Simplifies Security with Zscaler</video:title>
            <video:description>Learn how Johnson Controls International deployed secure remote WFA access to 25,000 users in two weeks with the Zscaler Zero Trust Exchange.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Johnson_Controls_Simplifies_Security_with_Zscaler.jpg_850x499.png</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/liberty-mutual-lessons-learned-two-secure-transformation-journeys</loc>
           <video:video>
            <video:title>Liberty Mutual: Lessons Learned from Two Secure Transformation Journeys</video:title>
            <video:description>Learn how Liberty Mutual uses Zscaler to help fulfill its promise of protection to customers on a worldwide scale, including what makes a zero trust architecture a key enabler for their business and workforce.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/liberty-mutual-industy-leader-zscaler-resource.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:57:35+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/lifelabs-effectively-manages-exposures-zscaler-drive-impactful-risk-reduction</loc>
           <video:video>
            <video:title>LifeLabs Effectively Manages Exposures with Zscaler to Drive Impactful Risk Reduction</video:title>
            <video:description>Mike Mello, the CISO of LifeLabs, discusses the importance of Zscaler Unified Vulnerability Management in understanding the risk landscape for the largest medical lab diagnostic company in Canada.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_11.jpg</video:thumbnail_loc>
            <video:lastmod>2025-05-09T14:19:29+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/mahindra-group-customer-story-zscaler</loc>
           <video:video>
            <video:title>Mahindra Group Customer Story | Zscaler</video:title>
            <video:description>Learn how the Mahindra Group creates secure digital experiences for customers on both digital and physical transactions with the Zscaler Zero Trust Exchange.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Mahindra.jpeg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/man-energy-customer-video</loc>
           <video:video>
            <video:title>MAN Energy Solutions Makes Zero Trust Possible with Zscaler</video:title>
            <video:description>Learn how MAN Energy enabled strong authentication and granular application access control on global scale with the Zscaler Zero Trust Exchange.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/MAN_Diesel_and_Turbo_Case_Study_850x499.jpeg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/meet-zscaler-s-sdr-academy-team</loc>
           <video:video>
            <video:title>Meet Zscaler&apos;s SDR Academy Team</video:title>
            <video:description>Zscaler&apos;s SDR Academy is one of the most elite programs on the planet.&amp;nbsp;Here, you&apos;ll have the tools, training, and leadership guidance to help you reach your full potential, and achieve your personal and professional dreams.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/top-10-qualities-of-great-sdrs-zscaler_0.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:57:35+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/microsoft-aip-integrations</loc>
           <video:video>
            <video:title>Microsoft AIP Integrations</video:title>
            <video:description>Zscaler AIP Integration enables organizations to leverage their existing Microsoft ecosystem in order to improve data hygiene and tagging while reducing the risk of loss across all users and devices.&amp;nbsp;
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_88.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:57:35+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/microsoft-defender-and-zia-demo</loc>
           <video:video>
            <video:title>Microsoft Defender and ZIA Demo</video:title>
            <video:description>In this demo, we&apos;ll take a look at how Zscaler Sandbox works in tandem with Microsoft Defender to enhance your organization&apos;s security posture.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Microsoft_Defender_and_ZIA_Demo_850x499.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:57:35+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/microsoft-enabling-secure-digital-transformation-our-joint-customers-satya-nadella</loc>
           <video:video>
            <video:title>Microsoft - Enabling Secure Digital Transformation for Our Joint Customers: Satya Nadella, CEO, Microsoft</video:title>
            <video:description>From Zenith Live 2018: Hear from Satya Nadella, CEO of Microsoft, as he discusses his vision of business transformation and how Zscaler and Microsoft are partnering to pioneer it.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Zenith_Live_2018_-_Video_Message_from_Satya_Nadella_CEO_Microsoft_850x499.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/microsoft-evp-enterprise-mobility-and-security</loc>
           <video:video>
            <video:title>Microsoft EVP on Enterprise Mobility and Security</video:title>
            <video:description>From Zenith Live 2018: Scott Guthrie, EVP of the Microsoft Cloud + AI Group, talks about the changing security perimeter and digital transformation.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Zenith_Live_2018_-_Scott_Guthrie_3_minute_video_850x499.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/modern-cyberthreat-protection-zscaler-zero-trust-exchange</loc>
           <video:video>
            <video:title>Modern Cyberthreat Protection with Zscaler Zero Trust Exchange</video:title>
            <video:description>As cyberthreats continue to grow in number and complexity, a modern security approach is essential. The Zscaler Zero Trust Exchange offers a solution by inspecting all traffic with advanced analytics and AI. This proactive method aims to effectively stop threats before they can cause harm.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/cyberthreat-protection-zscaler-video.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/molson-coors-puts-great-user-experiences-tap-zscaler</loc>
           <video:video>
            <video:title>Molson Coors Puts Great User Experiences On Tap with Zscaler</video:title>
            <video:description>Watch this video to learn how Molson Coors ensures secure, fast connectivity and drastically reduces issue resolution times for its 17,000+ employees worldwide with the Zscaler Zero Trust Exchange™. Discover how they replaced their traditional VPN to reduce the attack surface and block millions of threats per day with the combined power or ZIA™, ZPA™, and ZDX™.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-green-min_19.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/mondi-customer-video</loc>
           <video:video>
            <video:title>Mondi Group Enables Secure Digital Transformation with Zscaler</video:title>
            <video:description>Zscaler Internet Access is decentralized, which is well suited for Mondi&apos;s initiative to empower aggressive growth through M&amp;amp;A and digital transformation. Watch this video to learn more.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Mondi_Group_Enables_Secure_Digital_Transformation_with_Zscaler.jpg_850x499%20%281%29.png</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/nab-enables-work-home-zscaler</loc>
           <video:video>
            <video:title>NAB Enables Work-from-Home with Zscaler</video:title>
            <video:description>Watch this video to learn how Zscaler gave National Australia Bank (NAB) the tools to enable work-from-home and cloud services so they can support Australia&apos;s economy.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_111.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/navigating-digital-transformation-resilience-and-security-financial-services</loc>
           <video:video>
            <video:title>Navigating Digital Transformation, Resilience, and Security in Financial Services</video:title>
            <video:description>As financial institutions embrace data sharing and expand via ecosystem partnerships, mastering trust becomes both a cornerstone and a challenge. Trust must be validated, verified, and seamlessly integrated while preserving efficiency. A Zero Trust approach enables partnerships, treats legacy systems strategically, drives business transformation, and mitigates risks to manageable levels.Join us as our expert panel explores how regulatory compliance, advanced data security, and Zero Trust frameworks don’t just mitigate risks—they unlock competitive advantage, enabling financial organizations to innovate securely and thrive in today’s fast-evolving FinServ landscape.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/zscaler-thumbnail.png</video:thumbnail_loc>
            <video:lastmod>2025-11-17T15:14:38+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/new-jersey-judiciary-achieves-cloud-security-model-zscaler-zero-trust-exchange</loc>
           <video:video>
            <video:title>New Jersey Judiciary Achieves a Cloud Security Model with the Zscaler Zero Trust Exchange</video:title>
            <video:description>Watch this video to learn how Zscaler helped New Jersey Judiciary&amp;nbsp;enable securely work from anywhere for 10,000 employees in just six days.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_142.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/new-jersey-judiciary-embraces-security-service-edge-framework-zscaler</loc>
           <video:video>
            <video:title>New Jersey Judiciary Embraces a Security Service Edge Framework with Zscaler</video:title>
            <video:description>New Jersey Judiciary Embraces a Security Service Edge Framework with Zscaler
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-purple-min_3.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/next-generation-zero-trust-public-sector</loc>
           <video:video>
            <video:title>The Next Generation of Zero Trust For the Public Sector</video:title>
            <video:description>Watch this video to hear from Adam Hesch, Lead Architect, Aerospace and Defense, AWS Worldwide Sector, and his take on the next generation of zero trust and how it aims to support public sector organizations.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/008_The%20Next%20Generation%20Of%20Zero%20Trust_V2.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/no-interruptions-zdx-fast-seamless-digital-experiences</loc>
           <video:video>
            <video:title>No Interruptions | ZDX: Fast, Seamless Digital Experiences</video:title>
            <video:description>Watch this event to learn about the Zscaler Digital Experience (ZDX), an innovation in the Zero Trust Exchange that simplifies monitoring for UCaaS solutions and others, helping you enhance collaboration experiences wherever users work.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/No%20Interruptions%20_%20ZDX_%20Fast%2C%20Seamless%20Digital%20Experiences%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/nov-customer-journey</loc>
           <video:video>
            <video:title>NOV Customer Journey</video:title>
            <video:description>Go in-depth with NOV CIO Alex Philips to learn how the company powered its digital transformation journey with The Zscaler Zero Trust Exchange. Discover how secure digital transformation with Zscaler helped NOV become more agile, saved millions of dollars, improved user productivity, and reduced cyber risk.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/NOV%20Customer%20Journey.jpg%20%281%29%20%281%29.png</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/nov-customer-video</loc>
           <video:video>
            <video:title>NOV | Customer Video</video:title>
            <video:description>Hear from Alex Philips, CIO of NOV, how the Zscaler Zero Trust Exchange powers digital transformation for NOV and its 27,000 employees by increasing agility, improving user productivity, and reducing cyber risk.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/NOV.jpeg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/nov-makes-their-company-invisible-attackers</loc>
           <video:video>
            <video:title>NOV Makes Their Company Invisible to Attackers</video:title>
            <video:description>Learn how NOV overhauled their IT security by ditching vulnerable firewalls and VPNs in favor of a zero trust model. Alex Phillips, CIO of NOV, explains how they eliminated their attack surface by removing public IP exposure and adopting the Zscaler Zero Trust Exchange. Discover how this approach makes operations invisible to bad actors and secures users, apps, and systems with advanced conditional access.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/NOV.png</video:thumbnail_loc>
            <video:lastmod>2025-05-12T12:02:46+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/operationalizing-zero-trust-cloud-scale</loc>
           <video:video>
            <video:title>Operationalizing Zero Trust at Cloud Scale</video:title>
            <video:description>Alex Simons, corporate VP of Microsoft Identity Division, shares his real-world perspective on how Microsoft and Zscaler operationalize zero trust at cloud scale, provide secure access to critical business applications, and improve the user experience.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Microsoft%20Partner%20Segment%20Alex%20Simons%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/optimize-your-digital-experiences-zscaler</loc>
           <video:video>
            <video:title>Optimize Your Digital Experiences with Zscaler</video:title>
            <video:description>Zscaler Digital Experience (ZDX) helps IT operations and service desk teams keep office and home-based users productive, by ensuring optimal digital experiences powered by AI. By monitoring performance from within devices, across networks, to SaaS, cloud or datacenter applications, IT teams can proactively optimize performance, rapidly identify, and resolve device, network or application issues that impact end user experience.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_0.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/packaging-corporation-of-america-customer-video</loc>
           <video:video>
            <video:title>Packaging Corporation of America Secures Connectivity with Zscaler</video:title>
            <video:description>Learn how the Packing Corporation of America securely distributes network egress and stops malware with Zscaler Internet Access.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Packaging_Corporation_of_America_on_Why_Zscaler.jpg_850x499.png</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/paychex-embraces-zero-trust-and-accelerates-m-zpa</loc>
           <video:video>
            <video:title>Paychex Embraces Zero Trust and Accelerates M&amp;A with ZPA</video:title>
            <video:description>Watch this video to explore how Paychex uses Zscaler Private Access to empower a seamless application experience for users while accelerating and simplifying M&amp;amp;A IT integrations.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Paychex%20Embraces%20Zero%20Trust%20and%20Accelerates%20MA%20with%20ZPA%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/porsche-informatik-customer-story-zscaler</loc>
           <video:video>
            <video:title>Porsche Informatik Customer Story | Zscaler</video:title>
            <video:description>Learn how Porsche Informatik expanded their ability to manage global connectivity by 300%, without adding IT staff, with the Zscaler Zero Trust Exchange.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Porsche%20Informatik.jpeg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/posture-control-hashicorp-terraform-cloud-iac-scanning-v2</loc>
           <video:video>
            <video:title>Posture Control + HashiCorp Terraform Cloud IaC Scanning v2</video:title>
            <video:description>In this video, David Glading, Cloud Protection Architect, CISSP at Zscaler. demonstrates how Posture Control, Zscaler&apos;s CNAPP solution, helps security teams effectively implement security controls earlier in the development process by scanning for issues such as misconfigurations within HashiCorp Terraform templates.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/zscaler-posture-control-terraform-cloud-iac-scanning-v2.jpg</video:thumbnail_loc>
            <video:lastmod>2025-06-09T12:58:35+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/practical-advice-work-anywhere</loc>
           <video:video>
            <video:title>Practical Advice for Work-from-Anywhere</video:title>
            <video:description>Tony Fergusson, director of transformation strategy at Zscaler, discusses the shift from work-from-home to work-from-anywhere and why software-defined, cloud-delivered security is the next step in creating a future-ready workforce.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Tony%20Fergusson%20-%20WFA%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/preparing-what-comes-next-zero-trust-cloud</loc>
           <video:video>
            <video:title>Preparing for what comes next with Zero Trust Cloud</video:title>
            <video:description>The days of data center-centric security are over, and you’re in the cloud. As your cloud deployments evolve, cyberthreats and compliance challenges will do the same. The key to staying two steps ahead of tomorrow’s threats is to leverage zero trust + AI.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Screenshot%202025-07-15%20at%2012.29.04%E2%80%AFPM.png</video:thumbnail_loc>
            <video:lastmod>2025-07-15T16:33:43+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/prevent-cyberattacks-branch-cafe-architecture</loc>
           <video:video>
            <video:title>Prevent cyberattacks with a branch like cafe architecture</video:title>
            <video:description>Cyberattacks often start with a single compromised user and spread fast—especially in legacy network designs like MPLS and SD-WAN. This video shows how adopting a Zero Trust architecture stops lateral movement, secures branch offices like standalone entities, and simplifies cloud and network security.Learn how Zscaler’s AI-powered Zero Trust platform protects users, data, and infrastructure—while enabling secure GenAI adoption and blocking AI-driven threats.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/thumbnail%20%282%29.png</video:thumbnail_loc>
            <video:lastmod>2025-09-08T15:42:26+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/role-zero-trust-branch-security</loc>
           <video:video>
            <video:title>The Role of Zero Trust in Branch Security</video:title>
            <video:description>Learn how legacy hub-and-spoke models with MPLS and SD-WAN create security vulnerabilities because they rely on implicit trust. Zscaler&apos;s Zero Trust Exchange (ZTE) and Zero Trust Branch (ZTB) solutions address these issues by treating all networks as untrusted and implementing micro-segmentation that creates a &apos;network of one&apos; for each device.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/the-role-of-zero-trust-in-branch-security_0.png</video:thumbnail_loc>
            <video:lastmod>2025-11-13T16:30:56+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/s-p-global-lessons-learned-two-secure-transformation-journeys</loc>
           <video:video>
            <video:title>S&amp;P Global: Lessons Learned from Two Secure Transformation Journeys</video:title>
            <video:description>Learn how S&amp;amp;P Global is leveraging Zscaler in its modernization journey, including cyber transformation, business merger integration, and worldwide connectivity for users, applications, and data.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/s-and-p-global-industy-leader-zscaler-resource.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:57:35+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/salesforce-zscaler-data-protection-effective-security-compliance</loc>
           <video:video>
            <video:title>Salesforce with Zscaler Data Protection: Effective Security &amp; Compliance</video:title>
            <video:description>In this video, learn how Zscaler Data Protection secures sensitive data in Salesforce, accessed by any user, regardless of location.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Salesforce_and_Slack_pages_for_Data_Protection_850x499-min.png</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/schneider-electric-customer-video</loc>
           <video:video>
            <video:title>Schneider Electric Enables its Workforce Through Cloud Security </video:title>
            <video:description>Herve Coureil, Chief Digital Officer of Schneider Electric, describes how the company is using Zscaler to embrace digital transformation for securing and enabling a distributed workforce of 140,000.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Schneider_Electric_-_Using_cloud_security_to_enable_a_global_workforce_850x499.jpeg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/sdr-rewards-win-trip-president-s-club</loc>
           <video:video>
            <video:title>SDR Rewards: Win a Trip to President&apos;s Club</video:title>
            <video:description>Watch this video to learn how you can win a trip to President&apos;s Club by being a high performer as a Zscaler SDR!</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/sdr-rewards-win-a-trip-to-presidents-club.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:57:35+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/sdr-spotlight-employee-resource-groups-zscaler</loc>
           <video:video>
            <video:title>SDR Spotlight: Employee Resource Groups at Zscaler</video:title>
            <video:description>Watch this video to hear from our Employee Resource Groups (ERGs) and learn why Zscaler is the perfect place for these groups to thrive and make a difference.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/sdr-spotlight-diversity-resource-groups-at-zscaler.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:57:35+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/secure-east-west-traffic-using-zero-trust-cloud</loc>
           <video:video>
            <video:title>Secure East-West Traffic Using Zero Trust Cloud</video:title>
            <video:description>Arash Shahed introduces a new capability in Zero Trust cloud, focusing on micro segmentation to enhance security for east-west traffic. Zscaler&apos;s solution enforces security between VPCs and intra VPC, minimizing exposure to threats and preventing attacker movement. By using metadata for precise resource identification, Zscaler reduces the attack surface while maintaining efficiency, enabling enterprises to thrive in a cloud-first world. The presentation includes an example of a centralized VPC network and explains the packet flow process, detailing how traffic is inspected by the Zero Trust Gateway based on policy.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/secure-east-west-traffic-vieo.png</video:thumbnail_loc>
            <video:lastmod>2025-11-11T21:41:09+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/secure-sd-wan-cloud-first-enterprise</loc>
           <video:video>
            <video:title>Secure SD-WAN for the Cloud-First Enterprise</video:title>
            <video:description>In this video, David Hughes, Founder and CEO of Aruba (formerly Silver Peak) talks about how Silver Peak SD-WAN seamlessly integrates with Zscaler to enable organizations to embrace cloud transformation and deliver a secure SD-WAN solution that provisions and secures direct-to-cloud connections.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Secure%20SD-WAN%20for%20the%20Cloud-First%20Enterprise_%20David%20Hughes%2C%20Silver%20Peak%20%281%29.png</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/security-and-beyond-zero-trust-business-enabler</loc>
           <video:video>
            <video:title>To Security and Beyond: Zero Trust as a Business Enabler</video:title>
            <video:description>In this panel, our executive speakers welcome customers to outline key elements on the journey to zero trust, highlight critical milestones, and see how real-world zero trust solutions can accelerate time to value during mergers and acquisitions.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/To%20Security%20and%20Beyond%20Zero%20Trust%20as%20a%20Business%20Enabler%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/siemens-customer-video</loc>
           <video:video>
            <video:title>Siemens on Secure Cloud Transformation with Zscaler </video:title>
            <video:description>Frederik Janssen, VP of Global IT Infrastructure at Siemens, talks about why he chose Zscaler to help protect 350,000+ Siemens employees in 192 countries.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Siemens_on_Secure_Cloud_Transformation_with_Zscaler_850x499.jpeg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/siemens-partners-zscaler-secure-digital-transformation</loc>
           <video:video>
            <video:title>Siemens Partners with Zscaler for Secure Digital Transformation</video:title>
            <video:description>Hear from Siemens CIO Hanna Hennig, CIO of Digital Industries Frederik Janssen, Global Head of IoT and Platform Services Markus Holzheimer, and Head of Corporate IT and Cybersecurity Anthony Atherton as they discuss the benefits of extending Zscaler zero trust to Siemens&apos; 300k+ employees, as well as all company plants and customers.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_32.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:57:35+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/soap-chocolate-airplanes-cio-s-journey</loc>
           <video:video>
            <video:title>From Soap to Chocolate to Airplanes: A CIO’s Journey  </video:title>
            <video:description>No stranger to change, Aeromexico CIO Fernando Rocha has been in the enterprise information technology driver’s seat, leading digital transformation across industries. In this discussion with host Ben Fanning, gain perspectives that can help you succeed, like building teams based not on experience but on a willingness to venture into the unknown to learn and develop. A turning point for Rocha was the realization that because he was afraid to fail, he was “playing small games to win” rather than playing big games that came with more risk but had more impact.&amp;nbsp;&amp;nbsp;&amp;nbsp;</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_105.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:57:35+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/sse-insights-how-prevent-data-breaches</loc>
           <video:video>
            <video:title>SSE Insights: How to Prevent Data Breaches</video:title>
            <video:description>With remote work, cloud computing, SaaS apps, and more, the modern enterprise is tasked with securing new, potentially devastating avenues for data leakage. Fortunately, the security service edge (SSE) is perfectly suited to address this data protection challenge.

&amp;nbsp;
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-red-dark-red-min_13.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/sse-insights-how-secure-hybrid-work</loc>
           <video:video>
            <video:title>SSE Insights: How to Secure Hybrid Work</video:title>
            <video:description>The workplace has changed forever, with users working on-premises as well as remotely, from their homes, coffee shops, and pretty much anywhere else. As such, organizations need advanced security that’s capable of enabling and securing modern work—which is exactly what the security service edge (SSE) does
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-green-min_13.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/sse-insights-how-stop-ransomware</loc>
           <video:video>
            <video:title>SSE Insights: How to Stop Ransomware</video:title>
            <video:description>Ransomware is the scourge of the modern enterprise. From web browsers and managed/unmanaged devices to cloud applications, there are plenty of avenues for these threats to infiltrate an organization. Fortunately, the Zscaler security service edge (SSE) is designed to prevent threats like ransomware from breaching an organization and proliferating.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-red-purple-min_7.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/state-oklahoma-consolidates-100-agencies-zero-trust</loc>
           <video:video>
            <video:title>The State of Oklahoma Consolidates 100+ Agencies with Zero Trust</video:title>
            <video:description>Watch this video to learn how Zscaler helps the State of Oklahoma enable secure work from anywhere, keep pace with the cybersecurity landscape, and simplify infrastructure.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_141.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/stop-file-based-zero-day-attacks-otz-use-cases-zscaler-zero-trust-exchange</loc>
           <video:video>
            <video:title>Stop File-Based Zero-Day Attacks: OTZ Use Cases | Zscaler Zero Trust Exchange</video:title>
            <video:description>This video shows how Zscaler&apos;s Zero Trust Exchange platform stops a file-based zero-day attack with one of our Acme users and highlights Zscaler&apos;s AI-driven Pre-scan and Quarantine systems, their Advanced Inline Sandboxing and their highly customizable Admin interface.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/OTZ-UseCases_StopZero_Thumbnail_650x366.png</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/stop-phishing-attacks-otz-use-cases-zscaler-zero-trust-exchange</loc>
           <video:video>
            <video:title>Stop Phishing Attacks: OTZ Use Cases | Zscaler Zero Trust Exchange</video:title>
            <video:description>Watch this video from our One True Zero: Secure Your Users series to learn how the Zscaler Zero Trust Exchange stops phishing attacks using data from the world&apos;s largest security cloud.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Stop_Phishing_Attacks_with_Remote_Rob_650x366.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/stopping-ransomware-attacks-zero-trust-ai</loc>
           <video:video>
            <video:title>Stopping Ransomware Attacks with Zero Trust AI</video:title>
            <video:description>Zscaler CEO Jay Chaudhry explains, in simple terms, why ransomware attacks remain on the rise—and how embracing zero trust AI can help. By eliminating the attack surface, halting compromise, preventing lateral movement, and blocking data loss, zero trust AI secures all four steps of an attack, stopping ransomware in its tracks.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/stop-ransomware-with-zero-trust-ai.png</video:thumbnail_loc>
            <video:lastmod>2025-05-12T12:13:19+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/tales-tech-disruption-zscaler-chief-ai-officer-claudionor-coelho</loc>
           <video:video>
            <video:title>Tales of Tech Disruption with Zscaler Chief AI Officer Claudionor Coelho</video:title>
            <video:description>Through the power of stories and divergent thinking, Stanford PhD Claudionor Coelho channels his technical knowhow to win over customers and teams. For him, virtually no idea is too complex or technical for a layperson once simplified through storytelling. In this interview, learn why Coelho hires people with viewpoints different than his, where AI and cybersecurity is headed (ready to be superhuman?), and to always remember, “customers pay your bills.”&amp;nbsp;
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_108.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:57:35+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/targeted-ransomware-attacks-deepen-desai</loc>
           <video:video>
            <video:title>Targeted Ransomware Attacks with Deepen Desai</video:title>
            <video:description>Watch this video featuring Deepen Desai, CISO at Zscaler, as he covers the three stages of targeted ransomware, some of the most prevalent families, and how Zscaler helps you prevent such attacks.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/ZL21_Deepen_Preso_Edit_V01AB_650x366.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/threat-landscape-today-where-we-are-and-where-we-re-headed</loc>
           <video:video>
            <video:title>The Threat Landscape Today: Where We Are and Where We’re Headed</video:title>
            <video:description>In this session, CISOs who&apos;ve made a career out of understanding the threat landscape discuss the current topography. They&apos;ll cover APTs, supply chain attacks, prominent ransomware groups like Conti, recently surfaced vulnerabilities, and more.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/The%20Threat%20Landscape%20Today%20Where%20We%20Are%20and%20Where%20We%E2%80%99re%20Headed%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/thrive-multicloud-world-look-zero-trust-and-sse</loc>
           <video:video>
            <video:title>To Thrive in a Multicloud World, Look to Zero Trust and SSE</video:title>
            <video:description>New complexities with cloud-specific tooling and orchestration often result in misconfigurations—which analysts say are the leading cause of cloud breaches. This CISO panel discusses how zero trust and SSE mitigate security risks in multicloud architectures.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/To%20Thrive%20in%20a%20Multicloud%20World%2C%20Look%20to%20Zero%20Trust%20and%20SSE%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/tiecon-2024-keynote-jay-chaudhry</loc>
           <video:video>
            <video:title>Jay Chaudhry | Grand Keynote at TiECon 2024</video:title>
            <video:description>Jay Chaudhry delivering the Grand Keynote at TiECon2024, an event hosted by TiE Silicon Valley. With the theme &quot;AI Ubiquity: Envision the Future,&quot; Jay spoke about navigating the intersection of cybersecurity and AI and his key predictions for 2024. Watch the full keynote.&amp;nbsp;</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/TiECon2024-Jay-Keynote.png</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/top-5-threats-hybrid-workforce-and-how-zero-trust-stops-them</loc>
           <video:video>
            <video:title>Top 5 Threats to the Hybrid Workforce—and How Zero Trust Stops Them</video:title>
            <video:description>As hybrid work becomes the norm, organizations face significant security threats from various cloud services and unmanaged devices. Data spread across private clouds and SaaS applications increases the risk of exposure, especially when employees access potentially dangerous websites. To combat these threats, Zero Trust architecture is essential, providing constant protection and visibility into internet and SaaS applications. By implementing measures like phishing protection and browser isolation, organizations can secure their hybrid workforce effectively. Ultimately, a Zero Trust Exchange ensures that user identity and traffic are monitored, preventing unauthorized access.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Top%20Cybersecurity%20Threats%20Thumbnail.png</video:thumbnail_loc>
            <video:lastmod>2025-10-31T16:53:59+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/transforming-cloud-security-zero-trust</loc>
           <video:video>
            <video:title>Transforming cloud security with zero trust</video:title>
            <video:description>As enterprises shift their applications from traditional data centers to the cloud, they face new security challenges in hybrid and multi-cloud environments. Zscaler has reimagined network and security architecture through a zero trust approach, which treats clouds as destinations rather than resources, enhancing security by making applications non-discoverable. This method eliminates the need for public IPs, ensuring that what cannot be seen cannot be attacked. Zscaler&apos;s proxy architecture provides advanced cyber threat protection and simplifies communication between different cloud environments, effectively segmenting workloads and avoiding the complexities of legacy solutions.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Transforming%20cloud%20security%20with%20zero%20trust.png</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:56:31+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/transforming-secure-access-zscaler-private-access-zpa</loc>
           <video:video>
            <video:title>Transforming secure access with Zscaler Private Access (ZPA)</video:title>
            <video:description>&amp;nbsp;In a world where employees work from various locations, traditional security solutions like VPNs are proving inadequate against modern cyber threats. Zscaler Private Access (ZPA) offers a modern approach by providing secure access to private applications without exposing networks to the public Internet. By utilizing the Zero Trust Exchange, ZPA minimizes the attack surface and prevents lateral movement of attackers through AI-powered segmentation. This solution not only enhances security but also simplifies operations and improves user experience for hybrid workers. Ultimately, ZPA transforms the way secure access is managed, ensuring fast and reliable app access.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/zscaler-private-access-apz-product-overview-video.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/transforming-security-hub-international-customer-stories</loc>
           <video:video>
            <video:title>Transforming Security at Hub International | Customer Stories</video:title>
            <video:description>Jeremy Embalabala, vice president of information security at Hub International, shares some insights and perspectives on how Hub International accelerated cloud transformation with Zscaler.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Transforming%20Security%20at%20Hub%20International%20Customer%20Stories%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/transforming-security-zero-trust-branch</loc>
           <video:video>
            <video:title>Transforming Security with Zero Trust Branch</video:title>
            <video:description>This video discusses the limitations of traditional networking architectures that rely on MPLS and SD-WAN, which create security vulnerabilities and poor user experiences. As applications migrate to the cloud, the need for a more secure communication method arises. Zscaler&apos;s zero trust branch approach transforms branch offices into secure environments by eliminating firewalls and allowing traffic to flow directly to the zero trust Exchange.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_9.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/transparent-zero-trust-access-applications-aws-and-zscaler</loc>
           <video:video>
            <video:title>Transparent, Zero Trust Access to Applications with AWS and Zscaler</video:title>
            <video:description>In this Partner Segment, Sandy Carter, former VP of Amazon Web Services, covers how they&apos;re partnering with Zscaler to accelerate digital transformation and enable work-from-home at scale with zero trust application access.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/AWS%20Partner%20Segment%20Sandy%20Carter_%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/understanding-data-security-posture-management-dspm</loc>
           <video:video>
            <video:title>Understanding Data Security Posture Management (DSPM)</video:title>
            <video:description>In the face of increasing cloud data breaches, security teams are challenged with securing sensitive data across multiple cloud platforms. The need for visibility and control over data locations, access, and vulnerabilities has never been more critical. Zscaler introduces Data Security Posture Management (DSPM), a comprehensive solution that scans, classifies, and inventories cloud data, ensuring compliance and reducing risks. By leveraging AI, DSPM addresses misconfigurations and exposures while simplifying data security management. This innovative approach allows businesses to scale confidently without compromising data safety.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/dspm-product-overview-zscaler-video.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:57:10+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/understanding-resilience-business-continuity-zscaler</loc>
           <video:video>
            <video:title>Understanding Resilience in Business Continuity with Zscaler</video:title>
            <video:description>&amp;nbsp;In today&apos;s fast-paced, on-demand world, businesses face numerous challenges to maintain continuity, including vulnerabilities in critical infrastructure and potential breaches. Zscaler offers a modern approach to business continuity with its resilient cloud security services. With more than sixteen years of experience, Zscaler ensures that users, devices, and applications remain connected, even during outages or sophisticated attacks. Their customer-hosted and fully managed solutions are designed to minimize disruptions and protect brand reputation. Ultimately, Zscaler emphasizes the importance of preparedness in navigating the complexities of modern security.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/zscaler-resilience-overview-video.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/understanding-zero-trust-architecture</loc>
           <video:video>
            <video:title>Understanding Zero Trust Architecture</video:title>
            <video:description>In a world where traditional firewalls and VPNs can expose data to cyber threats, Zscaler&apos;s Zero Trust architecture offers a modern solution to enhance cybersecurity. This approach significantly reduces the attack surface, effectively prevents phishing and malware attacks, and stops lateral movement and data loss. Additionally, it provides real-time visibility into emerging threats, making it a proactive choice for security. By leveraging AI, Zscaler&apos;s Zero Trust Architecture redefines how organizations protect their data.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/zero-trust-architecture-overview-zscaler-video-1_0.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/understanding-zero-trust-cloud-security</loc>
           <video:video>
            <video:title>Understanding Zero Trust in Cloud Security</video:title>
            <video:description>Emphasize the vulnerabilities of workloads exposed to the Internet without adequate protection. That&apos;s where the Zero Trust Exchange (ZTE) comes in.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/the-economics-of-zero-trust-increasing-operational-efficiency-brian-deitch_0.jpg</video:thumbnail_loc>
            <video:lastmod>2025-08-08T18:51:48+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/understanding-zscaler-s-asset-exposure-management</loc>
           <video:video>
            <video:title>Understanding Zscaler&apos;s Asset Exposure Management</video:title>
            <video:description>Dive into how Asset Exposure Management integrates and correlates data from hundreds of sources to provide organisations with a comprehensive and accurate inventory of their assets, an understanding of their coverage gaps, and automated workflows to mitigate asset risk.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/zscaler-asset-exposure-management-video.jpg</video:thumbnail_loc>
            <video:lastmod>2025-08-15T06:52:34+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/understanding-zscaler-s-zero-trust-exchange</loc>
           <video:video>
            <video:title>Understanding Zscaler&apos;s Zero Trust Exchange</video:title>
            <video:description>Zscaler&apos;s Zero Trust Exchange is a modern architecture designed to eliminate implicit trust and vulnerabilities associated with traditional network-centric models. It emphasizes the importance of minimizing attack surfaces, preventing compromises, eliminating lateral movement, and stopping data loss. Zscaler offers four integrated solutions that assist numerous organizations in enhancing their security posture.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/zscaler-zero-trust-exchange-platform-overview-video_0.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/understanding-zscaler-s-zero-trust-exchange-platform</loc>
           <video:video>
            <video:title>Understanding Zscaler&apos;s Zero Trust Exchange Platform</video:title>
            <video:description>In a landscape where security breaches are on the rise, traditional solutions like VPNs and firewalls are proving inadequate against modern threats. Zscaler&apos;s Zero Trust Exchange offers a revolutionary approach by eliminating implicit trust and connecting users directly to the applications they need without extending network access. This intelligent platform minimizes the attack surface and prevents data loss while delivering zero trust architecture as a service. With its AI-powered capabilities, Zscaler secures vast amounts of traffic and extends zero trust principles to cloud workloads. Ultimately, Zscaler transforms organizations by reducing the cost and complexity of traditional security measures.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/zscaler-zero-trust-exchange-platform-overview-video.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/understanding-zscaler-zero-trust-architecture</loc>
           <video:video>
            <video:title>Understanding Zscaler Zero Trust Architecture</video:title>
            <video:description>In a world where bad actors exploit data, traditional firewalls and VPNs have become inadequate, leading to increased breaches despite significant spending on legacy solutions. Zscaler&apos;s architecture addresses modern cybersecurity challenges by eliminating reliance on outdated products and offering a robust inline security cloud. This system inspects traffic and verifies user identity through a zero trust exchange, which connects users, devices, and applications securely while minimizing the attack surface. By employing multiple verification factors, Zscaler enhances security and provides real-time threat visibility. It&apos;s a call to action for organizations to adopt Zscaler&apos;s AI-powered Zero Trust Architecture to effectively combat cyber threats.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/zero-trust-architecture-overview-zscaler-video.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/unified-vulnerability-management-overview</loc>
           <video:video>
            <video:title>Unified Vulnerability Management: Understand &amp; Address Exposures</video:title>
            <video:description>In this video, we discuss how Zscaler Unified Vulnerability Management is used to help organizations identify their vulnerable applications and what to fix first.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Screenshot%202025-08-06%20at%209.20.18%E2%80%AFAM.png</video:thumbnail_loc>
            <video:lastmod>2025-08-06T13:25:09+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/united-airlines-security-transformation-journey-powered-zscaler</loc>
           <video:video>
            <video:title>United Airlines&apos; Security Transformation Journey, Powered By Zscaler</video:title>
            <video:description>In this video, Deneen DeFiore, VP &amp;amp; CISO at United Airlines, details the company&apos;s journey to a more secure IT environment and ecosystem powered by the Zscaler Zero Trust Exchange™. Learn United&apos;s four-phase approach to improved cyberthreat protection and experiences for its 80,000+ employees worldwide.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/united-airlines-detects-blocks-threats-with-zscaler-resource.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:57:35+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/user-risk-based-access-control-demo-trend-micro-zscaler</loc>
           <video:video>
            <video:title> User Risk-Based Access Control Demo | Trend Micro &amp; Zscaler</video:title>
            <video:description>Real-time user risk-based access control with zero trust enforcement from Trend Micro and Zscaler is a powerful way to enforce dynamic security policies that protect against evolving threats while ensuring users maintain secure access to resources. This approach is crucial in modern hybrid cloud environments, where traditional static security methods may fail against advanced threats. However, proper planning, implementation, and ongoing maintenance are required to achieve its full potential. In this video, watch a demo of how to use these tools in conjunction for the most effective security.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_13.jpg</video:thumbnail_loc>
            <video:lastmod>2025-07-28T20:05:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/vf-corp-adopts-coffee-shop-architecture-prevent-ransomware-attacks</loc>
           <video:video>
            <video:title>VF Corp Adopts a Coffee Shop Architecture to Prevent Ransomware Attacks</video:title>
            <video:description>Growing your business while protecting it has always been a challenge. VF Corporation found the solution in Zscaler&apos;s zero trust architecture, which enables them to scale securely and quickly without compromising productivity. Hear from Kenneth Athanasiou, CISO of VF Corporation, as he shares how zero trust:Allowed new acquisitions and locations to go live fasterEnabled segmentation for critical apps like PoS systems and OT devices in distribution centerMinimized the blast radius of threats and brought unmatched ransomware protection</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/VFC.png</video:thumbnail_loc>
            <video:lastmod>2025-05-12T12:05:33+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/viewing-zdx-dashboard</loc>
           <video:video>
            <video:title>Viewing the ZDX Dashboard</video:title>
            <video:description>Watch this video to learn how Zscaler Digital Experience™ gives your team a unified view of user experiences so you can quickly and efficiently remediate and resolve issues.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_132.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/walkthrough-zscaler-app-splunk</loc>
           <video:video>
            <video:title>Walkthrough: Zscaler App for Splunk</video:title>
            <video:description>In this video, learn how to program Zscaler App to work in conjunction with Splunk instances, whether they exist on-premises or in the cloud.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/DEMO___Zscaler_App_for_Splunk_Walkthrough_850x499.jpg</video:thumbnail_loc>
            <video:lastmod>2025-06-09T12:56:46+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/we-re-not-done-future-zscaler-innovation</loc>
           <video:video>
            <video:title>We’re Not Done: The Future of Zscaler Innovation</video:title>
            <video:description>Zscaler Chief Innovation Officer Patrick Foxhoven chats with Will Townsend, VP and Principal Analyst at Moor Insights &amp;amp; Strategy, about his ongoing mission to bring new technologies and capabilities to the Zscaler platform.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Zscaler_15_Years_of_Innovation_with_Will_Townsend_amp_Patrick_Foxhoven_850x499.png</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/west-fraser-customer-video</loc>
           <video:video>
            <video:title>West Fraser | Customer Video</video:title>
            <video:description>Michael Dobson, director of information security at West Fraser, explains why Zscaler was the ideal solution to help his company provide its internal applications and network services to more than 8,000 employees in the most agile way.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/West%20Fraser-%20a%20zero%20trust%20transformation%2C%20enabled_%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-07-03T08:13:16+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/why-firewalls-can-t-deliver-zero-trust-lateral-threat-movement</loc>
           <video:video>
            <video:title>Why Firewalls Can’t Deliver Zero Trust: Lateral Threat Movement</video:title>
            <video:description>Firewalls give attackers and threats an open door to move laterally and incapacitate your business. To prevent this from happening, you need a new approach to security based on zero trust that connects users only to the applications for which they&apos;re authorized.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Why%20Firewalls%20Can%E2%80%99t%20Deliver%20Zero%20Trust_%20Lateral%20Threat%20Movement%402x_0.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/why-firewalls-can-t-deliver-zero-trust-poor-user-experience</loc>
           <video:video>
            <video:title>Why Firewalls Can’t Deliver Zero Trust: Poor User Experience</video:title>
            <video:description>Firewalls were once able to secure the network perimeter. Today, that perimeter has disappeared, and organizations are turning to a new security approach based on zero trust, which firewalls can&apos;t deliver.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Why%20Firewalls%20Can%E2%80%99t%20Deliver%20Zero%20Trust_%20Poor%20User%20Experience%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/why-firewalls-cannot-do-zero-trust</loc>
           <video:video>
            <video:title>Why Firewalls Cannot Do Zero Trust</video:title>
            <video:description>Implementing zero trust has become essential to securing users and applications effectively, but firewalls, VPNs and other legacy security solutions cannot deliver true zero trust. This webinar covers why zero trust is necessary for today&apos;s security challenges, why firewalls and other legacy solutions are failing, and what it takes to correctly implement zero trust.&amp;nbsp;</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/resourcePage/image%201257.png</video:thumbnail_loc>
            <video:lastmod>2025-06-09T12:56:42+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/why-should-you-turn-zscaler-deception</loc>
           <video:video>
            <video:title>Why Should You Turn On Zscaler Deception?</video:title>
            <video:description>Did you know that your organization has a license for Zscaler Deception? Deception plants decoys in your environment that look like your real servers, users, computers, databases, etc. These decoys act like bait for sophisticated adversaries and intercept attacks early in the kill chain to contain the breach. They&apos;re incredibly easy to deploy so take a look at this short video to see how you can get started using this innovative solution.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Product%20Demo%20_%202%20min%201Click%20video.jpg.png</video:thumbnail_loc>
            <video:lastmod>2025-11-14T06:46:47+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/why-switch-zscaler</loc>
           <video:video>
            <video:title>Why Switch to Zscaler?</video:title>
            <video:description>With&amp;nbsp;Zscaler,&amp;nbsp;you&amp;nbsp;can&amp;nbsp;modernize&amp;nbsp;your&amp;nbsp;infrastructure&amp;nbsp;and&amp;nbsp;become&amp;nbsp;a&amp;nbsp;fully&amp;nbsp;cloud-enabled&amp;nbsp;organization&amp;nbsp;free&amp;nbsp;from&amp;nbsp;the&amp;nbsp;limitations&amp;nbsp;of&amp;nbsp;slow,&amp;nbsp;cumbersome gateway&amp;nbsp;appliances.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_120.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/why-work-anywhere-needs-zero-trust</loc>
           <video:video>
            <video:title>Why Work-from-Anywhere Needs Zero Trust</video:title>
            <video:description>Pam Kubiatowski, senior director of transformation strategy at Zscaler, covers the challenges being faced by IT and security departments and why organizations must consider a zero trust network architecture to transform networking and security for a work-from-anywhere world.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Pam%20Kubiatowski%20-%20WFA%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/work-anywhere-zscaler</loc>
           <video:video>
            <video:title>Work from Anywhere with Zscaler</video:title>
            <video:description>Your workforce isn&apos;t anchored in any single location, so why are your connectivity services anchored in a data center? Zscaler enables a seamless experience for your employees from anywhere, all while protecting them from cyberthreats.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Work-from-Anywhere-with-Zscaler_0.jpeg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/workflow-automation-notifications</loc>
           <video:video>
            <video:title>Workflow Automation Notifications</video:title>
            <video:description>Watch this video to learn how to automate user justifications when they trigger a DLP incident, and engage them with user coaching.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_3.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zdx-demo-ai-powered-root-cause-analysis-zscaler-digital-experience</loc>
           <video:video>
            <video:title>ZDX Demo: AI-Powered Root Cause Analysis with Zscaler Digital Experience</video:title>
            <video:description>Watch this short demo to see how to quickly isolate root causes in devices, Wi-Fi, security services, networks, or apps with Zscaler Digital Experience.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/suggested-resource-purple_4.png</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zdx-demo-endpoint-performance-insights-microsoft-intune-and-software-inventory</loc>
           <video:video>
            <video:title>ZDX Demo: Endpoint Performance Insights with Microsoft Intune and Software Inventory using ZDX</video:title>
            <video:description>Watch this demo to see how you can review crash statistics and startup times, with factors impacting them, across Microsoft devices though Zscaler Digital Experience.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/suggested-resource-purple_5.png</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zdx-demo-endpoint-performance-insights-process-level-monitoring-using-zscaler</loc>
           <video:video>
            <video:title>ZDX Demo: Endpoint Performance Insights with Process Level Monitoring using Zscaler Digital Experience</video:title>
            <video:description>See how Zscaler Digital Experience gives you instant access to device health metrics like CPU, memory, disk I/O and Wi-Fi, active processes, and more for troubleshooting.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/suggested-resource-green_11.png</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zdx-demo-microsoft-teams-call-quality-metrics-zscaler-digital-experience</loc>
           <video:video>
            <video:title>ZDX Demo: Microsoft Teams Call Quality Metrics with Zscaler Digital Experience</video:title>
            <video:description>Watch this demo to see how ZDX monitors user experiences for every Microsoft Teams, Zoom, and Webex meeting to identify root causes of poor call quality.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/suggested-resource-green_10.png</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zenith-live-2022-zero-trust-competitive-advantage-microsoft-demo</loc>
           <video:video>
            <video:title>Zenith Live 2022 | Zero Trust as a Competitive Advantage | Microsoft Demo</video:title>
            <video:description>&amp;nbsp;

Learn how Microsoft and Zscaler are teaming up to help customers achieve true zero trust security with a live integrated demo.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/microsoft-and-zscaler-zero-trust-a-competitive-advantage-demo.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zenith-live-23-cxo-chat-securing-digital-future-together-hyatt-and-zscaler</loc>
           <video:video>
            <video:title>Zenith Live &apos;23 CXO Chat: Securing the Digital Future Together with Hyatt and Zscaler</video:title>
            <video:description>Watch this video to find out how Hyatt partnered with Zscaler to transform to a cloud-first zero trust architecture that improves security, data protection, and user experience while driving down costs across 1,150+ hotels and 130,000+ employees worldwide.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/hyatt-industy-leader-zscaler-resource.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zenith-live-23-keynote-carmax-delivers-business-outcomes-phased-transformation</loc>
           <video:video>
            <video:title>Zenith Live &apos;23 Keynote: Carmax Delivers Business Outcomes with Phased Transformation</video:title>
            <video:description>&amp;nbsp;

Learn how CarMax successfully navigated secure digital transformation, including best practices and lessons learned around architecture, technology, and change management, to help accelerate your own zero trust journey.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/carmax-industy-leader-zscaler-resource.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:57:35+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zero-trust-5-minutes-zscaler-cloud</loc>
           <video:video>
            <video:title>Zero Trust in 5 Minutes | The Zscaler Cloud</video:title>
            <video:description>With Zscaler, friends don&apos;t let friends deploy VPNs. Leverage identity, posture, things to connect using these inside out connections for the Zscaler Zero Trust Exchange.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/zero-trust-in-5-minutes.jpg</video:thumbnail_loc>
            <video:lastmod>2025-08-19T20:55:53+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zero-trust-ai-make-your-organization-invisible-hackers</loc>
           <video:video>
            <video:title>Zero Trust AI: Make Your Organization Invisible to Hackers</video:title>
            <video:description>Zero Trust AI makes users, branches, and private apps invisible to the internet, shrinking the attack surface and stopping discovery, scanning, and lateral movement. Through the Zero Trust Exchange—replacing firewalls and VPNs—you reduce breach risk, simplify architecture, and lower cost while maintaining least‑privilege access.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/zero-trust-ai-video.png</video:thumbnail_loc>
            <video:lastmod>2025-10-14T18:04:47+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zero-trust-and-sase-trends-2025</loc>
           <video:video>
            <video:title>Zero Trust and SASE trends for 2025</video:title>
            <video:description>Dhaval Sharma, EVP and Head of Product Strategy shares his predictions on the rapidly evolving landscape of cybersecurity with Zero Trust set to become the foundational security architecture by 2025. As organizations adapt to hybrid work environments and insider threats, outdated VPNs will be replaced by Zero Trust solutions, with predictions indicating that 70% of new remote access deployments will utilize ZTNA. The security market is expected to consolidate, emphasizing the need for a well-integrated ecosystem of security partners rather than relying on a single vendor.&amp;nbsp;</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Zero%20Trust%20and%20SASE%20trends%20for%202025.png</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zero-trust-cloud-lightboard</loc>
           <video:video>
            <video:title>Zero Trust for Cloud Lightboard</video:title>
            <video:description>Get a high-level view of how Zscaler can segment workloads across multiple clouds, cloud regions, and VPCs/VNETs, and our host-based approach to segmenting workloads across processes.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/zero-trust-for-the-cloud-lightboard-resource.jpg</video:thumbnail_loc>
            <video:lastmod>2025-11-12T15:28:25+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zero-trust-device-segmentation-lightboard</loc>
           <video:video>
            <video:title>Zero Trust Device Segmentation Lightboard</video:title>
            <video:description>In this technical light board video, learn how Zscaler device segmentation can isolate every IP device inside the branch, factory, and campus – without agents, firewalls, or NAC.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/zero-trust-for-device-segmentation-lightboard-resource.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zero-trust-exchange-secure-work-anywhere</loc>
           <video:video>
            <video:title>The Zero Trust Exchange: Secure Work from Anywhere</video:title>
            <video:description>Today&apos;s hybrid workforces expect unprecedented flexibility when it comes to where and how they work. Watch this video to learn how the Zscaler Zero Trust Exchange delivers on this requirement while maintaining sharp security throughout your entire enterprise.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Secure%20Work%20From%20Anywhere%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zero-trust-factories-lightboard-video</loc>
           <video:video>
            <video:title>Zero Trust Factories | Lightboard Video</video:title>
            <video:description>Traditional factories are weighed down by legacy technologies such as firewalls, VPNs, and SD-WAN that rely on implicit trust and create unnecessary complexity. These outdated approaches make it difficult to protect industrial control systems (ICS), operational technology (OT), and critical infrastructure from lateral movement and ransomware attacks. Zscaler’s Zero Trust for Factories eliminates implicit trust, secures OT/IT communications, and enables safer, more resilient operations with faster detection and containment of threats</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Screenshot%202025-10-16%20at%202.56.27%E2%80%AFPM%20%281%29.png</video:thumbnail_loc>
            <video:lastmod>2025-10-16T18:59:59+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zero-trust-live-2022-breakout-adopting-extended-zero-trust-ecosystem</loc>
           <video:video>
            <video:title>Zero Trust Live 2022 | Breakout: Adopting an Extended Zero Trust Ecosystem</video:title>
            <video:description>Zero trust is a team sport, so we&apos;ve brought together leaders from CrowdStrike and Okta to help you build an extended zero trust ecosystem across our platforms. Watch to get a look at key integrations and a demo that seamlessly integrates the best of each vendor’s offerings.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Zero%20Trust%20Live%202022%20__%20Breakout-%20Adopting%20an%20Extended%20Zero%20Trust%20Ecosystem%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zero-trust-live-2022-breakout-next-gen-ztna-innovations</loc>
           <video:video>
            <video:title>Zero Trust Live 2022 | Breakout: Next-gen ZTNA Innovations</video:title>
            <video:description>Discover how we’ve evolved Zscaler Private Access into the industry’s only next-gen ZTNA platform, leapfrogging first-gen offerings that focus solely on connectivity. See hands-on demos that showcase how our platform’s new security innovations stop breaches and reduce risk.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Zero%20Trust%20Live%202022%20__%20Breakout-%20Next-gen%20ZTNA%20Innovations%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zero-trust-live-2022-breakout-sessions</loc>
           <video:video>
            <video:title>Zero Trust Live 2022 | Breakout Sessions</video:title>
            <video:description>Watch this recap of the Zero Trust Live 2022 breakout sessions, featuring a fireside chat with security and trust leadership, an introduction to the updated Zscaler Private Access—the industry&apos;s only next-gen ZTNA platform—and an industry panel on zero trust transformation.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Zero%20Trust%20Live%202022%20__%20Keynote%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zero-trust-live-2022-breakout-zero-trust-adoption-best-practices</loc>
           <video:video>
            <video:title>Zero Trust Live 2022 | Breakout: Zero Trust Adoption Best Practices</video:title>
            <video:description>Get an actionable zero trust transformation playbook that will help you avoid common pitfalls and speed up your zero trust journey. Our field CISO and CTO experts will offer insights and best practices from helping hundreds of customers transform with zero trust.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Zero%20Trust%20Live%20__%20Breakout-%20Zero%20Trust%20Adoption%20Best%20Practices%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zero-trust-live-2022-full-event</loc>
           <video:video>
            <video:title>Zero Trust Live 2022 | Full Event</video:title>
            <video:description>Zero Trust Live 2022 features a keynote speech from Zscaler CEO Jay Chaudhry as well as three breakout sessions that cover zero trust security in detail and introduce the newly updated Zscaler Private Access, the industry&apos;s only next-gen ZTNA platform.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Full%20Event%20Video%20%28Keynote%20%2B%203%20Breakouts%29%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zero-trust-numbers-why-firewalls-and-vpns-don-t-make-cut</loc>
           <video:video>
            <video:title>Zero Trust by the Numbers: Why Firewalls and VPNs Don’t Make the Cut</video:title>
            <video:description>Protecting the network perimeter with firewalls worked well when everything was onsite. But with users, data, and applications spread everywhere, 92% of organizations believe they need to upgrade their security to protect their hybrid workforce—and they are turning to zero trust. Unfortunately, firewalls and VPNs were not designed for zero trust. Zero trust requires a modern architecture based on the principle of least-privileged access and the idea that no user should be inherently trusted: the Zscaler Zero Trust Exchange.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Why%20Firewalls%20Can%E2%80%99t%20Deliver%20Zero%20Trust_%20Lateral%20Threat%20Movement%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zero-trust-ot</loc>
           <video:video>
            <video:title>Zero Trust for OT</video:title>
            <video:description>As cyberattacks get more sophisticated and severe, manufacturers are more focused than ever on improving uptime as well as people and plant safety. Connected factories increase the risk of downtime, potentially costing millions in losses, reputational damage, and supply chain disruption. Find out how customers are deploying Zscaler solutions in the OT/IoT environments for privileged remote access and device to private application access, improving plant &amp;amp; people safety and plant uptime.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/resourcePage/image%201376.png</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zero-trust-sase-2024-full-keynote</loc>
           <video:video>
            <video:title>Zero Trust SASE 2024 | Full Keynote</video:title>
            <video:description>&amp;nbsp;Watch our full keynote to learn how AI-powered Zero Trust SASE connects organizations more securely than SASE based on traditional SD-WAN.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_126.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zero-trust-sase-2024-full-session</loc>
           <video:video>
            <video:title>Zero Trust SASE 2024 | Full Session</video:title>
            <video:description>Watch the full Zero Trust SASE 2024 launch event, hosted by Zscaler CMO Joyce Kim, announcing new zero trust AI innovations across SASE and SD-WAN.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_129.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zero-trust-sase-2024-full-session-japanese-subtitles</loc>
           <video:video>
            <video:title>Zero Trust SASE 2024 | Full Session | Japanese Subtitles</video:title>
            <video:description>Watch our Zero Trust SASE 2024 launch event to hear from Zscaler experts as they discuss how we&apos;re using the power of zero trust AI to transform SASE and SD-WAN, providing greater security and radically simplified networking across your organization.&amp;nbsp;</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_131.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zero-trust-sase-2024-technical-breakout-designing-zero-trust-branch</loc>
           <video:video>
            <video:title>Zero Trust SASE 2024 | Technical Breakout: Designing a Zero Trust Branch</video:title>
            <video:description>Learn how Zero Trust SD-WAN connects your sites without extending your WAN while ensuring zero trust access between users, IoT/OT devices, and applications based on business policies.&amp;nbsp;</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_127.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zero-trust-security-zscaler-and-microsoft</loc>
           <video:video>
            <video:title>Zero Trust Security with Zscaler and Microsoft</video:title>
            <video:description>As employees work remotely, and as applications are moved from data centers to the cloud, organizations face new security challenges. Watch this video to explore how Zscaler and Microsoft partner to deliver a cloud-based zero trust architecture built to protect your users and applications from threats.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/zero-trust-security-with-zscaler-and-microsoft-video.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zero-trust-starts-zscaler</loc>
           <video:video>
            <video:title>Zero Trust Starts with Zscaler</video:title>
            <video:description>In a cloud- and mobile-first world, organizations are turning to zero trust security to protect their data and applications. Watch this video to learn why zero trust starts with Zscaler.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Zero%20Trust%20Starts%20With%20Zscaler%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zero-trust-users-modern-security-modern-workforce</loc>
           <video:video>
            <video:title>Zero Trust for Users: Modern Security For A Modern Workforce</video:title>
            <video:description>Zscaler&apos;s Zero Trust for Users is a modern solution to combat an ever evolving threat landscape.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_17.jpg</video:thumbnail_loc>
            <video:lastmod>2026-02-06T12:31:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zero-trust-your-cloud-workloads-animated-promo-speaker-info</loc>
           <video:video>
            <video:title>Zero Trust Your Cloud Workloads Animated Promo with Speaker Info</video:title>
            <video:description>Want to implement zero trust for your cloud workloads without compromising security and performance? Learn how through our on-demand event.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Zero%20Trust%20Your%20Cloud%20Workloads%20Animated%20Promo%20with%20Speaker%20Info%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zero-trust-your-cloud-workloads-full-event</loc>
           <video:video>
            <video:title>Zero Trust Your Cloud Workloads | Full Event</video:title>
            <video:description>Zscaler Workload Communications, part of the Zscaler Zero Trust Exchange, extends zero trust security to public cloud workloads and apps. It&apos;s the industry’s first zero trust solution for securing cloud-to-internet, cloud-to-cloud and cloud-to-data center communications.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Zero%20Trust%20Your%20Cloud%20Workloads%20_%20Full%20Event%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zia-tm-crowdstrike-zero-day-threat-detection-and-response</loc>
           <video:video>
            <video:title>ZIA™ + CrowdStrike: Zero Day Threat Detection and Response</video:title>
            <video:description>In this demo, learn how Zscaler Sandbox™ works in tandem with CrowdStrike to enhance your organization&apos;s security posture.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/ZIA_integration_with_CrowdStrike_-_Zero-day_threat_detection_and_response_850x499.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zoom-zscaler-optimized-and-secure-digital-experience</loc>
           <video:video>
            <video:title>Zoom + Zscaler: An Optimized and Secure Digital Experience </video:title>
            <video:description>Learn how Zscaler is helping companies improve collaboration and productivity by enhancing Zoom connectivity and performance.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/zoom-zscaler-an-optimized-and-secure-digital-experience.jpg</video:thumbnail_loc>
            <video:lastmod>2025-06-09T12:58:47+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zpa-tm-and-crowdstrike-zero-trust-assessment</loc>
           <video:video>
            <video:title>ZPA™ and CrowdStrike Zero Trust Assessment</video:title>
            <video:description>In this video, learn how Zscaler Private Access™ and CrowdStrike work together to provide zero trust access control based on the real-time security posture of an endpoint device.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Adaptive_zero_trust_access_to_private_apps_with_ZPA__CrowdStrike_Zero_Trust_Assessment_850x499.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-15-years-innovation-will-townsend-kavitha-mariappan</loc>
           <video:video>
            <video:title>Zscaler: 15 Years of Innovation with Will Townsend &amp; Kavitha Mariappan </video:title>
            <video:description>In this video, Will Townsend,&amp;nbsp;VP and Principal Analyst at Moor Insights and Strategy, sits down with&amp;nbsp;Kavitha Mariappan, SVP of Customer Experience and Transformation at Zscaler, to discuss how she approaches the customer experience journey and how Zscaler has led CX innovation in its 15 years as a company.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Zscaler_15_Years_of_Innovation_with_Will_Townsend_amp_Kavitha_Mariappan_850x499.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-ai-powered-app-segmentation-demo</loc>
           <video:video>
            <video:title>Zscaler AI-Powered App Segmentation Demo</video:title>
            <video:description>Get automatically generated recommendations on app segments and policies, based on machine learning models, to quickly minimize the attack surface and prevent lateral threat movement.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-and-aruba-integration</loc>
           <video:video>
            <video:title>Zscaler integrates with leading SD-WAN vendors</video:title>
            <video:description>Zscaler integrates with leading networking vendors to deliver zero trust SD-WAN designed to modernize and secure branch connectivity.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/SKO_Zscaler_and_Aruba_Demo_with_Subtitles_650x366.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-and-crowdstrike-integration</loc>
           <video:video>
            <video:title>Zscaler integrates with leading endpoint security solutions</video:title>
            <video:description>Zscaler integrates with leading endpoint security solutions to help security teams configure granular access control policies.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/SKO_CrowdStrike_Demo_with_Subtitles_650x366.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-and-crowdstrike-threat-intelligence-sharing</loc>
           <video:video>
            <video:title>Zscaler and CrowdStrike Threat Intelligence Sharing</video:title>
            <video:description>Watch this video featuring Josh Lang, Solutions Architect at CrowdStrike, as he explains and demonstrates the Zscaler Threat Intelligence Sharing integration.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Threat_intelligence_sharing_from_CrowdStrike_with_Zscaler_850x499.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-and-hashicorp-integration</loc>
           <video:video>
            <video:title>Zscaler integrates with leading DevOps vendors</video:title>
            <video:description>Zscaler integrates with leading DevOps vendors to enable faster and more secure application development in a multicloud environment.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_61.jpg</video:thumbnail_loc>
            <video:lastmod>2025-06-09T11:35:18+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-and-okta-integration</loc>
           <video:video>
            <video:title>Zscaler integrates with leading identity providers</video:title>
            <video:description>Zscaler integrates with leading identity providers to deliver a zero trust solution that simplifies authentication and automates provisioning.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/SKO_Zscaler_and_Okta_Demo_with_Subtitles_650x366.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-and-riverbed-steelconnect-one-click-integration</loc>
           <video:video>
            <video:title>Zscaler and Riverbed SteelConnect One-Click Integration</video:title>
            <video:description>In this video, learn how Zscaler integrates with Riverbed SteelConnect to deliver secure branch connectivity.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Riverbed_SteelConnect_and_Zscaler___One-Click_Integration_850x499.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-and-servicenow-integration-demo</loc>
           <video:video>
            <video:title>Zscaler and ServiceNow Integration Demo</video:title>
            <video:description>In this video, we will showcase the latest integration between Zscaler Digital Experience™ (ZDX™) and ServiceNow IT Service Management (ITSM).
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/DEMO_2305_-_Zscaler__ServiceNow_ZDX_Integration_Demo_1_650x366.png</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-and-splunk-threat-hunting</loc>
           <video:video>
            <video:title>Zscaler and Splunk Threat Hunting</video:title>
            <video:description>This video shows how Zscaler and Splunk integrate to reduce the load on your SecOps team through automation and orchestration.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Splunk_Zscaler_Threat_Hunting_850x499.png</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-appprotection-demo</loc>
           <video:video>
            <video:title>Zscaler AppProtection Demo</video:title>
            <video:description>AppProtection is an inline security inspection service built into Zscaler Private Access (ZPA). It detects potentially malicious traffic destined for private applications and prevents attempts to exploit vulnerabilities or abuse application logic.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_0.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-b2b-secure-partner-access</loc>
           <video:video>
            <video:title>Zscaler B2B: Secure Partner Access</video:title>
            <video:description>See how Zscaler B2B provides secure access for trusted third parties - such as contractors, vendors, or customers - to sensitive business applications. Users access authorized applications without being connected to your network; the attack surface exposed by publicly-accessible customer-facing applications is eliminated; and your data is never unnecessarily exposed.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/zscaler-b2b-secure-partner-access.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-brand-story-90-second-overview</loc>
           <video:video>
            <video:title>Zscaler Brand Story (90 second overview)</video:title>
            <video:description>The story of Zscaler started with a simple premise—build security for the cloud, in the cloud. Watch this short video to learn more.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Zscaler%20Brand%20Story%20%2890%20second%20overview%29%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-brand-story-full</loc>
           <video:video>
            <video:title>Zscaler Brand Story (Full)</video:title>
            <video:description>To build security for the cloud, in the cloud, you need to do things differently. This is how the Zscaler Zero Trust Exchange was born. Watch this video to learn our story.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Zscaler%20Brand%20Story%20%28Full%29%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-casb-collaboration-management</loc>
           <video:video>
            <video:title>Zscaler CASB Collaboration Management</video:title>
            <video:description>The ease with which files can be shared within today&apos;s SaaS apps can translate to data leakage without proper security measures in place. The Zscaler CASB scans cloud apps&apos; contents in search of sensitive data and risky shares and automatically remediates according to policy.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/CASB%20Collaboration%20Management%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-cellular-secure-iot-and-mobile-device-traffic-seamless-global-connectivity</loc>
           <video:video>
            <video:title>Zscaler Cellular: Secure IoT and Mobile Device Traffic with Seamless Global Connectivity, Visibility, &amp; Control</video:title>
            <video:description>In this lightboard video, Nathan Howe discusses Zscaler&apos;s advancements in cellular connectivity, Zscaler Cellular, focusing on the role of SIM cards in providing identity and access rules for both mobile phones and IoT devices. He explains how Zscaler Cellular enhances security by integrating with zero trust principles, allowing seamless global connectivity and full visibility of traffic.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Zscaler%20Website%20Thumbnail%20-%20Zscaler%20Cellular.png</video:thumbnail_loc>
            <video:lastmod>2025-10-03T19:44:16+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-cloud-based-browser-isolation</loc>
           <video:video>
            <video:title>Zscaler Cloud-Based Browser Isolation</video:title>
            <video:description>Watch this video featuring Brian Deitch, Chief Technology Evangelist at Zscaler, as he covers Zscaler&apos;s cloud native browser isolation capability on the Zscaler Zero Trust Exchange, powered by the world&apos;s largest security cloud.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Cloud%20Browser%20Isolation%20%281%29.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:57:35+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-cloud-dlp-dictionaries-and-policies</loc>
           <video:video>
            <video:title>Zscaler Cloud DLP Dictionaries and Policies</video:title>
            <video:description>Zscaler DLP provides the dictionaries and SSL inspection needed to protect data wherever it goes and allows admins to configure a single policy that is enforced consistently across all cloud data channels.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Cloud%20DLP%20Dictionaries%20and%20Policies%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-cloud-nss-splunk-cloud-integration</loc>
           <video:video>
            <video:title>Zscaler Cloud NSS Splunk Cloud Integration</video:title>
            <video:description>Getting Zscaler&apos;s high-resolution logs into Splunk has never been easier. Watch this video to learn why.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Zscaler_Cloud_NSS_Splunk_Cloud_Integration_850x499.png</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-cloud-sandbox-and-zero-day-protection</loc>
           <video:video>
            <video:title>Zscaler Cloud Sandbox and Zero-Day Protection</video:title>
            <video:description>Zscaler Cloud Sandbox is cloud-delivered advanced threat protection, integrated into the Zscaler Zero Trust Exchange, to secure all your users wherever they connect.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/suggested-resource-green_14.png</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-cloud-security-cisco-sd-wan-formerly-viptela</loc>
           <video:video>
            <video:title>Zscaler Cloud Security for Cisco SD-WAN (Formerly Viptela)</video:title>
            <video:description>Zscaler Cloud Security for Cisco SD-WAN (Formerly Viptela)</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/suggested-resource-purple_12.png</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-corporate-video-part-1-legacy-architectures-are-not-capable-zero-trust</loc>
           <video:video>
            <video:title>Zscaler Corporate Video - Part 1: Legacy Architectures are Not Capable of Zero Trust</video:title>
            <video:description>This short video demonstrates how legacy hub-and-spoke architectures increase the risk of cyberattacks and why they&apos;re incapable of a scalable zero trust framework.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Zscaler%20Corporate%20Video%20-%20Part%201%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-corporate-video-part-2-need-zero-trust</loc>
           <video:video>
            <video:title>Zscaler Corporate Video - Part 2: The Need for Zero Trust</video:title>
            <video:description>Discover why enterprises are choosing the Zscaler Zero Trust Exchange to keep their data and applications secure.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Zscaler%20Corporate%20Video%20-%20Part%202%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-corporate-video-part-3-benefits-zscaler-zero-trust-exchange</loc>
           <video:video>
            <video:title>Zscaler Corporate Video - Part 3: The Benefits of the Zscaler Zero Trust Exchange</video:title>
            <video:description>The Zscaler Zero Trust Exchange is the world&apos;s largest inline security cloud, helping businesses secure their digital transformation. Watch this video to learn how.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Zscaler%20Corporate%20Video%20-%20Part%203%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-crowdstrike-xdr-enabled-detection-response</loc>
           <video:video>
            <video:title>Zscaler + CrowdStrike: XDR-Enabled Detection &amp; Response</video:title>
            <video:description>This video demonstrates how Zscaler and CrowdStrike leverage XDR (extended detection and response) to stop cyberthreats more quickly and effectively.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/XDR-enabled_Threat_Detection_and_Response_850x499.jpeg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-data-protection-brian-deitch</loc>
           <video:video>
            <video:title>Zscaler Data Protection with Brian Deitch</video:title>
            <video:description>Get ready to explore the future of data protection, where we embrace&amp;nbsp;a cloud native approach&amp;nbsp;enhanced by the capabilities of machine learning. Completely managed efficiently&amp;nbsp;through a single DLP policy, enforcing security in motion, at rest, and at&amp;nbsp;the&amp;nbsp;endpoint.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-dark-blue-purple-min_13.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-data-protection-dlp-user-notifications</loc>
           <video:video>
            <video:title>Zscaler Data Protection: DLP User Notifications</video:title>
            <video:description>Zscaler DLP is complete with user notifications, giving users opportunities to provide feedback on policies.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_137.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-data-protection-exact-data-match</loc>
           <video:video>
            <video:title>Zscaler Data Protection: Exact Data Match</video:title>
            <video:description>Zscaler Exact Data Match enhances DLP detection accuracy to prevent false positives.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_139.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-data-protection-indexed-document-matching</loc>
           <video:video>
            <video:title>Zscaler Data Protection: Indexed Document Matching</video:title>
            <video:description>Zscaler Indexed Document Matching allows admins to fingerprint forms so that any documents built upon them can be identified both in motion and at rest.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_140.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-data-protection-optical-character-recognition</loc>
           <video:video>
            <video:title>Zscaler Data Protection: Optical Character Recognition</video:title>
            <video:description>Zscaler Optical Character Recognition extracts text from images and inspects it with leading DLP so that company data can stay safe in motion to the cloud and at rest within it.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_138.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-data-protection-shadow-it-control</loc>
           <video:video>
            <video:title>Zscaler Data Protection: Shadow IT Control</video:title>
            <video:description>Zscaler provides shadow IT control, which leverages granular, customizable cloud app risk profiles to apply automated policies that remediate shadow IT.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_134.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-deception-tm-integrates-crowdstrike-detect-threats</loc>
           <video:video>
            <video:title>Zscaler Deception™ integrates with CrowdStrike to detect threats</video:title>
            <video:description>In conjunction with CrowdStrike, Zscaler Deception™ is able to generate high-confidence alerts and threat intelligence to stop lateral movement, defend against malicious insiders, and perform threat hunting and rapid containment.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_70.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-digital-experience-lightboard</loc>
           <video:video>
            <video:title>Zscaler Digital Experience Lightboard </video:title>
            <video:description>In this video, join Brian Deitch, Solutions Architect at Zscaler, as he discusses how Zscaler Digital Experience gives your organization and its employees a unique advantage.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/zscaler-digital-experience-lightboard.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-digital-experience-zdx-product-overview</loc>
           <video:video>
            <video:title>Zscaler Digital Experience (ZDX) Product Overview</video:title>
            <video:description>See how Zscaler Digital Experience (ZDX) delivers AI-powered end-to-end visibility across devices, networks, and apps to keep users productive and secure everywhere. Built on the Zscaler Zero Trust Exchange, ZDX correlates telemetry from the world’s largest inline cloud to quickly pinpoint issues across Wi‑Fi, ISPs, SaaS, cloud, and data center apps—so network ops can remediate proactively, service desks can resolve tickets faster, and IT can improve device health monitoring. Unlock better digital performance, stronger security, and greater agility with modern digital experience management.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/ZDX-Product-Overview.png</video:thumbnail_loc>
            <video:lastmod>2025-10-23T14:53:13+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-digital-experience-zdx-updates-lightboard-video</loc>
           <video:video>
            <video:title>Zscaler Digital Experience (ZDX) Updates | Lightboard Video</video:title>
            <video:description>In this video, we discuss the latest updates to ZDX. Highlighting three top areas of innovation: Device performance, network ISPs and application monitoring.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/%28Compressed%29%20DGEN_2510%20-%202025%20ZDX%20Launch%20Thumbnail.png</video:thumbnail_loc>
            <video:lastmod>2025-10-28T18:45:10+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-endpoint-dlp-demo</loc>
           <video:video>
            <video:title>Zscaler Endpoint DLP Demo</video:title>
            <video:description>Watch this video to see Zscaler Endpoint DLP in action.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_136.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-imprivata-and-crowdstrike-partner-protect-healthcare</loc>
           <video:video>
            <video:title>Zscaler, Imprivata, and CrowdStrike Partner to Protect Healthcare</video:title>
            <video:description>Together, Zscaler, Imprivata, and CrowdStrike provide the industry’s first end-to-end, best-of-breed zero trust security solution that helps healthcare organizations enhance the user experience, stay compliant, reduce the attack surface, and achieve zero trust.&amp;nbsp;
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Zscaler__CrowdStrike_Imprivata_Healthcare_Video_with_Subtitles_650x366.png</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-imprivata-zero-trust-healthcare-shared-workstations</loc>
           <video:video>
            <video:title>Zscaler + Imprivata: Zero Trust for Healthcare Shared Workstations</video:title>
            <video:description>The integration between Zscaler and Imprivata brings zero trust access to healthcare environments&apos; shared workstations, a primary ransomware attack vector.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/zscaler-resource-option-2-blue-purple_0.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-integrates-crowdstrike-supercharged-threat-intelligence-and-remediation</loc>
           <video:video>
            <video:title>Zscaler integrates with CrowdStrike for supercharged threat intelligence and remediation</video:title>
            <video:description>Zscaler and CrowdStrike have integrated their cloud-delivered platforms to offer holistic protection and visibility from endpoint to application, giving security professionals the power to quickly identify, report, and respond to threats.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-red-dark-red-min_25.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-integrates-leading-it-ops-solutions</loc>
           <video:video>
            <video:title>Zscaler integrates with leading IT Ops solutions</video:title>
            <video:description>Zscaler integrates with leading IT Ops solutions to help IT and service desk teans rapidly identify device, network, or application issues.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/SKO_Zscaler_and_ServiceNow_Demo_with_Subtitles_650x366.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-integrates-leading-secops-solutions</loc>
           <video:video>
            <video:title>Zscaler integrates with leading SecOps solutions</video:title>
            <video:description>Zscaler integrates with leading SIEM, SOAR, and NDR vendors to provide unmatched security for the cloud-first enterprise.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/SKO_Zscaler_and_Splunk_Demo_with_Subtitles_650x366.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-internet-access-action</loc>
           <video:video>
            <video:title>Zscaler Internet Access in Action</video:title>
            <video:description>See how Zscaler Internet Access provides a full security stack with all the in-depth protection you’ll ever need.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_116.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-internet-access-zia-cloud-native-security-solution</loc>
           <video:video>
            <video:title>Zscaler Internet Access (ZIA): A cloud-native security solution</video:title>
            <video:description>Zscaler Internet Access (ZIA) introduces a cloud-native, Zero Trust security model that inspects traffic at scale, enhancing productivity while reducing complexity. With capabilities like AI-powered threat protection and full SSL inspection, ZIA addresses contemporary security challenges effectively. This innovative approach positions ZIA as a vital solution for organizations seeking to safeguard their digital environments.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/zscaler-Internet-access-zia-overview-video.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-lightboard-healthcare-emr-and-ehr</loc>
           <video:video>
            <video:title>Zscaler Lightboard: Healthcare EMR and EHR</video:title>
            <video:description>Watch this video featuring Brian Deitch, Chief Technology Evangelist at Zscaler, as he discusses healthcare, EHR and EMR, and zero trust.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/zscaler-resource-option-2-blue%20%281%29.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-lightboard-remote-radiology</loc>
           <video:video>
            <video:title>Zscaler Lightboard: Remote Radiology</video:title>
            <video:description>Watch this video featuring Brian Deitch, Chief Technology Evangelist at Zscaler, as he discusses healthcare, remote radiology, and zero trust.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/securing-remote-radiology-with-zero-trust-exchange.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-lightboard-unified-vulnerability-management</loc>
           <video:video>
            <video:title>Zscaler Lightboard: Unified Vulnerability Management</video:title>
            <video:description>In this video, we discuss what is data fabric for security, how we leverages this data fabric, and how it effects our unified vulnerability management solutions.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_8.jpg</video:thumbnail_loc>
            <video:lastmod>2025-08-15T06:40:15+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-lightboard-zero-trust-5-minutes</loc>
           <video:video>
            <video:title>Zscaler Lightboard: Zero Trust in 5 Minutes</video:title>
            <video:description>VPNs can never be zero trust because they typically grant broad network access to users, and well, users on the network are a recipe for disaster. Watch Marc Battigan, Senior Sales Engineer at Zscaler explain why Zscaler&apos;s inside-out zero trust married to identity helps enforce true user-to-application zero trust without exposing an attack surface and keeping the users off the network.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_6.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-lightboard-zero-trust-branch-cafe</loc>
           <video:video>
            <video:title>Zscaler Lightboard: Zero Trust Branch Like a Cafe</video:title>
            <video:description>The Zero Trust Branch helps eliminate all the challenges that legacy architecture leaves behind. Find out how Zscaler does just that.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Branch%20Like%20a%20Cafe%20%20-%20Youtube%20Thumbnail.png</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-lightboard-zero-trust-digital-experience-brief</loc>
           <video:video>
            <video:title>Zscaler Lightboard: Zero Trust Digital Experience in Brief</video:title>
            <video:description>Watch Marc Battigan, Senior Sales Engineer at Zscaler, as he explores end-to-end visibility, improved user experience, and reduced operational cost with Zscaler Digital Experience.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_5.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-lightboard-zero-trust-exchange-overview</loc>
           <video:video>
            <video:title>Zscaler Lightboard: Zero Trust Exchange Overview</video:title>
            <video:description>In this video, Christopher Found, Senior Sales Engineer at Zscaler talks about Zscaler&apos;s Zsero Trust Exchange platform. The Zero Trust Exchange is a comprehensive, integrated zero trust platform that enables security and network transformation for all users, workloads, IoT/OT, and B2B partners.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_4.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-lightboard-zero-trust-workloads</loc>
           <video:video>
            <video:title>Zscaler Lightboard: Zero Trust for Workloads</video:title>
            <video:description>Traditional SD-WANs connect sites through site-to-site VPNs or routed overlays, establishing an implicit trust that grants unrestricted access to critical business resources, even for compromised entities. They expand the enterprise attack surface and allow lateral threat movement, undermining the zero trust architecture. Zscaler&apos;s Zero Trust SD-WAN adheres to the zero trust principles and securely connects branches, factories, data centers without the complexity of VPNs, ensuring zero trust access for users, IoT/OT devices and applications.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_2.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-microsegmentation-action</loc>
           <video:video>
            <video:title>Zscaler Microsegmentation in Action</video:title>
            <video:description>Dive deeper and learn how Zscaler Microsegmentation secures workloads through this walkthrough video.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Screenshot%202026-01-13%20at%2010.50.52%E2%80%AFAM.png</video:thumbnail_loc>
            <video:lastmod>2026-01-13T15:58:44+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-office-365</loc>
           <video:video>
            <video:title>Zscaler for Office 365</video:title>
            <video:description>Watch this video to learn how the Zscaler security cloud, the world&apos;s largest, lets your users safely access Office 365 applications without hampering the user experience.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Zscaler_for_Office_365_850x499.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-okta-and-crowdstrike-threat-prevention-demo</loc>
           <video:video>
            <video:title>Zscaler, Okta, and CrowdStrike Threat Prevention Demo</video:title>
            <video:description>Watch this video to learn how&amp;nbsp;Okta, CrowdStrike,&amp;nbsp;and&amp;nbsp;Zscaler&amp;nbsp;integrate&amp;nbsp;with&amp;nbsp;each&amp;nbsp;other&amp;nbsp;to&amp;nbsp;deliver&amp;nbsp;end-to-end&amp;nbsp;zero&amp;nbsp;trust&amp;nbsp;access&amp;nbsp;control&amp;nbsp;to&amp;nbsp;applications.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_133.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-okta-crowdstrike-threat-containment-demo</loc>
           <video:video>
            <video:title>Zscaler + Okta + CrowdStrike Threat Containment Demo</video:title>
            <video:description>Learn how Zscaler, Okta, and CrowdStrike help contain threats in real time with through their integrations.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-green-min_28.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-okta-demo</loc>
           <video:video>
            <video:title>Zscaler + Okta Demonstration</video:title>
            <video:description>Zscaler and Okta deliver a cloud-based zero trust solution that provides authenticated users fast, secure access to the internet, SaaS, and private applications over any network at any location and on any device.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/DEMO_2206_-_Zscaler__Okta_Demo_w_Subtitles_650x366.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-okta-demo-how-configure-okta-identity-provider-idp-zpa</loc>
           <video:video>
            <video:title>Zscaler Okta Demo (How to Configure Okta as an Identity Provider (IdP) for ZPA)</video:title>
            <video:description>Watch this video to learn how to configure Okta an identity provider (IdP) for Zscaler Private Access.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/zscaler-okta-demo.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-okta-demo-how-configure-okta-saml-authentication-and-scim-provisioning</loc>
           <video:video>
            <video:title>Zscaler Okta Demo (How to Configure Okta SAML Authentication and SCIM Provisioning with Zscaler) </video:title>
            <video:description>Watch this video to learn how to configure Okta SAML authentication and SCIM provisioning with Zscaler.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/how-to-configure-okta-saml-authentication-and-scim-provisioning-with-zscaler%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-private-access-3-minute-overview</loc>
           <video:video>
            <video:title>Zscaler Private Access | The 3-Minute Overview</video:title>
            <video:description>&amp;nbsp;Meet Zscaler Private Access or ZPA, a VPN replacement solution that gives users seamless and secure access to private applications whenever, wherever.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/resourcePage/Group%2023723.png</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-privileged-remote-access-demo</loc>
           <video:video>
            <video:title>Zscaler Privileged Remote Access Demo</video:title>
            <video:description>Whether you&apos;re an enterprise user, a third party provider, or a remote employee, Zscaler makes secure access to critical systems fast and simple. In this demo, we&apos;ll explore how Zscaler Privileged Remote Access, or PRA, ensures secure third party access to critical assets.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_12.jpg</video:thumbnail_loc>
            <video:lastmod>2026-02-02T14:45:31+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-risk360-lightboard-video-zscaler-videos</loc>
           <video:video>
            <video:title>Zscaler Risk360 Lightboard Video | Zscaler | Videos</video:title>
            <video:description>Risk360 is streamlined Cyber Risk Quantification solution that simplifies assessing potential financial losses and adverse impacts from cyberthreats. With RIsk360, evaluate the likelihood of cyber incidents, their potential organizational impact, and the effectiveness of existing cybersecurity measures effortlessly. Prioritize investments and make informed decisions to manage and mitigate cyber risks effectively.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_7.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-rubrik-demo-video</loc>
           <video:video>
            <video:title>Zscaler + Rubrik Demo Video</video:title>
            <video:description>Zscaler and Rubrik have partnered up to secure customer data.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Zscaler__Rubrik_Demo_Video_850x499.png</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-s-15-years-innovation-jay-chaudhry</loc>
           <video:video>
            <video:title>Zscaler’s 15 Years of Innovation with Jay Chaudhry</video:title>
            <video:description>Zscaler Founder and CEO Jay Chaudhry speaks with Will Townsend, VP and Principal Analyst at Moor Insights &amp;amp; Strategy, about Zscaler&apos;s early years and the company&apos;s rapid pace of innovation since its founding in 2007.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Zscaler_15_Years_of_Innovation_with_Will_Townsend_amp_Jay_Chaudhry_850x499.png</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-s-15-years-innovation-will-townsend-partha-chakraborty</loc>
           <video:video>
            <video:title>Zscaler&apos;s 15 Years of Innovation with Will Townsend &amp; Partha Chakraborty</video:title>
            <video:description>Will Townsend, VP and Principal Analyst at Moor Insights &amp;amp; Strategy, speaks with Partha Chakraborty, Head of Enterprise Security Architecture, Engineering, and Innovation at Humana, who have been a Zscaler customer since 2010.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Zscaler_15_Years_of_Innovation_with_Will_Townsend_amp_Partha_Chakraborty_850x499.png</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-saas-security-posture-management</loc>
           <video:video>
            <video:title>Zscaler SaaS Security Posture Management</video:title>
            <video:description>Where SaaS misconfigurations exist, data breaches typically follow. Zscaler SaaS Security Posture Management (SSPM) scans SaaS instances for issues that may otherwise go unnoticed and empowers you to respond quickly, enhancing your organization&apos;s security posture.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/SaaS%20Security%20Posture%20Management%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-06-09T12:59:12+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-secures-b2b-applications-zero-trust</loc>
           <video:video>
            <video:title>Zscaler Secures B2B Applications with Zero Trust</video:title>
            <video:description>With Zscaler for B2B, organizations can minimize the attack surface by hiding IT resources behind the Zero Trust Exchange. They can prevent lateral movement by granting direct to app access instead of network access, and they can reduce cost and complexity through a comprehensive cloud platform that eliminates network based architectures and point product appliances.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_1.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-secures-sap-access-growmark-case-study-clip</loc>
           <video:video>
            <video:title>Case Study Clip: Zscaler Secures SAP Access for GROWMARK</video:title>
            <video:description>Hear how Zscaler helped GROWMARK deliver secure access to SAP for its distributed user base.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/suggested-resource-green_36.png</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-sentinelone-integration-demo</loc>
           <video:video>
            <video:title>Zscaler | SentinelOne Integration Demo</video:title>
            <video:description>This video demonstrates how Zscaler ZIA and SentinelOne Singularity XDR integrate to provide you the tools to deal with advanced threats.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Zscaler%20_%20SentinelOne%20Integration%20Demo%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-tech-sessions-seven-elements-zero-trust</loc>
           <video:video>
            <video:title>The Zscaler Tech Sessions: Seven Elements of Zero Trust</video:title>
            <video:description>Nathan Howe, VP of Emerging Technologies at Zscaler, provides a high-level view of an effective, successful zero trust architecture, based on seven key elements. He&apos;ll help you understand where to begin your zero trust journey and how to stop being anchored to a network.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/thumbnail-seven-elements-of-zero-trust.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-tech-sessions-seven-elements-zero-trust-control</loc>
           <video:video>
            <video:title>The Zscaler Tech Sessions: Seven Elements of Zero Trust—Control</video:title>
            <video:description>Nathan Howe, VP of Emerging Technologies at Zscaler, breaks down the &quot;Control&quot; bucket of a successful zero trust architecture, from granular inspection through application of security controls and risk assessment, to protect your environment against compromise and data loss.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/thumbnail-seven-elements-of-zero-trust-control.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-tech-sessions-seven-elements-zero-trust-enforce</loc>
           <video:video>
            <video:title>The Zscaler Tech Sessions: Seven Elements of Zero Trust—Enforce</video:title>
            <video:description>Nathan Howe, VP of Emerging Technologies at Zscaler, looks at the final level of the model—Enforce—to help you understand how a successful zero trust architecture applies conditional policy and establishes connections on a per-session, per-request basis, not a static path.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/thumbnail-seven-elements-of-zero-trust-enforce.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-tech-sessions-seven-elements-zero-trust-verify</loc>
           <video:video>
            <video:title>The Zscaler Tech Sessions: Seven Elements of Zero Trust—Verify</video:title>
            <video:description>Nathan Howe, VP of Emerging Technologies at Zscaler, dives deeper into verification of users and devices, IoT/OT, and workloads in the context of a zero trust architecture, and how an effective architecture determines the identity, context, and content of every connection.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/thumbnail-seven-elements-of-zero-trust-verify.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:08+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-tenancy-restrictions</loc>
           <video:video>
            <video:title>Zscaler Tenancy Restrictions</video:title>
            <video:description>Zscaler tenancy restrictions can distinguish non-corporate SaaS tenants from those belonging to the enterprise, allowing organizations to prevent uploads or block access altogether.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Zscaler%20Tenancy%20Restrictions%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-uvm-aws-integration-demo</loc>
           <video:video>
            <video:title>Zscaler UVM + AWS Integration Demo</video:title>
            <video:description>This video demonstrates how Zscaler Unified Vulnerability Management and the Data Fabric for Security integrate with AWS.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/zscaler-aws-demo-video.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-uvm-crowdstrike-integration-demo</loc>
           <video:video>
            <video:title>Zscaler UVM + CrowdStrike Integration Demo</video:title>
            <video:description>This video demonstrates how Zscaler Unified Vulnerability Management and the Data Fabric for Security integrate with the CrowdStrike Falcon platform.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/crowdStrike-falcon-and-UVM-demo_0.jpg</video:thumbnail_loc>
            <video:lastmod>2025-11-12T15:30:29+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-uvm-okta-integration-demo</loc>
           <video:video>
            <video:title>Zscaler UVM + Okta Integration Demo</video:title>
            <video:description>This video demonstrates how Zscaler Unified Vulnerability Management and the Data Fabric for Security integrate with Okta.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Zscaler-UVM-%20Okta-Integration-Demo.png</video:thumbnail_loc>
            <video:lastmod>2025-11-12T15:32:14+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-uvm-sentinelone-integration-demo</loc>
           <video:video>
            <video:title>Zscaler UVM + SentinelOne Integration Demo</video:title>
            <video:description>This video demonstrates how Zscaler Unified Vulnerability Management and the Data Fabric for Security integrate with the SentinelOne Singularity platform.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/DEMO_2410%20-%20SentinelOne%20One.Con%20Conference%20Demo%20Video%20%28Short%20Version%29.jpg.png</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-uvm-servicenow-integration-demo</loc>
           <video:video>
            <video:title>Zscaler UVM + ServiceNow Integration Demo</video:title>
            <video:description>This video demonstrates how Zscaler Unified Vulnerability Management and the Data Fabric for Security integrate with ServiceNow.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/zscaler-servicenow-uvm-demo-video.jpg</video:thumbnail_loc>
            <video:lastmod>2025-11-12T15:34:53+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-vf-corporation-customer-testimonial</loc>
           <video:video>
            <video:title>Zscaler: VF Corporation Customer Testimonial</video:title>
            <video:description>Watch this short video to hear from Ken Athanasiou, VP and CISO of VF Corporation, as he discusses how Zscaler helped the company undergo a massive digital transformation.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_118.jpg</video:thumbnail_loc>
            <video:lastmod>2025-05-12T12:04:01+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-workload-communications</loc>
           <video:video>
            <video:title>Zscaler Workload Communications</video:title>
            <video:description>Establish fast and secure cloud connectivity without the cost and complexity of network security appliances. Built on top of the Zscaler Zero Trust Exchange, Workload Communications provides secure internet access and zero trust connectivity between cloud applications.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Workload%20Communications%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-workload-communications-aws-auto-scale-group-demo</loc>
           <video:video>
            <video:title>Zscaler Workload Communications: AWS Auto Scale Group Demo</video:title>
            <video:description>In this video, a Zscaler Principal Technical Product Specialist demonstrates how AWS&apos; Auto Scale functionality can enhance Zscaler Workload Communications.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_75.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-workload-communications-aws-tagging-demonstration</loc>
           <video:video>
            <video:title>Zscaler Workload Communications: AWS Tagging Demonstration</video:title>
            <video:description>In this video, a Zscaler Principal Product Specialist shows you how to use AWS Tagging for Zscaler Workload Communications to implement policy.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_73.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-workload-communications-vdi-agent-demonstration</loc>
           <video:video>
            <video:title>Zscaler Workload Communications: VDI Agent Demonstration</video:title>
            <video:description>In this video, a Zscaler Principal Technical Product Specialist demonstrates the VDI Agent for Zscaler Workload Communications.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_74.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-zero-trust-cloud-ingress-traffic-support-demonstration</loc>
           <video:video>
            <video:title>Zscaler Zero Trust Cloud ingress traffic support demonstration</video:title>
            <video:description>This video demonstrates Zscaler&apos;s Zero Trust Cloud new ingress traffic capability for securing public-facing AWS applications. The demonstration covers the network topology using an AWS load balancer and private subnets, shows how traffic is routed through Zero Trust Cloud for policy inspection, and includes a live test comparing allowed versus blocked traffic based on IP address whitelisting. The video illustrates how this solution provides secure traffic control while keeping all data within AWS cloud boundaries.</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/secure-ingress-traffic-for-AWS-video.png</video:thumbnail_loc>
            <video:lastmod>2025-11-12T15:33:59+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-zero-trust-exchange</loc>
           <video:video>
            <video:title>The Zscaler Zero Trust Exchange.</video:title>
            <video:description>The Zscaler Zero Trust Exchange gives organizations the ability to connect and secure their users from anywhere without affecting user experience, making it the clear choice for the generation of hybrid work and beyond.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/Zero%20Trust%20Exchange%402x.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:48:37+00:00</video:lastmod>
           </video:video>
         </url>
<url>
           <loc>https://www.zscaler.com/resources/videos/zscaler-zero-trust-sd-wan-light-board</loc>
           <video:video>
            <video:title>Zscaler Zero Trust SD-WAN Light Board</video:title>
            <video:description>In this Zscaler Light Board video, hear from Brian Deitch, Chief Technology Evangelist at Zscaler, as he discusses and illustrates why legacy, bolted-on SD-WAN solutions aren&apos;t enough to protect your business and how Zscaler Zero Trust SD-WAN can help your enterprise not only improve security but deliver exceptional experiences, too.
</video:description>
            <video:thumbnail_loc>https://www.zscaler.com/sites/default/files/images/video/resource-blue-dark-blue-min_109.jpg</video:thumbnail_loc>
            <video:lastmod>2025-04-03T05:47:41+00:00</video:lastmod>
           </video:video>
         </url>
</urlset>