Simplifying separations with Zscaler
Divestitures are sensitive, complicated operations that can have far-reaching effects on share value, competitive advantage, and compliance posture. Our cloud-delivered capabilities streamline separation processes.
You’ll be able to logically separate entities, drastically reduce risk, and save significant effort, such as the need for certain transition service agreement (TSA) services, turning them from potentially massive value sinks into elegant business enablers.
The Zscaler Zero Trust Exchange™ brings ease and speed to your IT divestiture playbook, providing:
Manage security and connectivity through policy instead of network access controls and segmentation.
Minimize exposure and grant zero trust access to divested or TSA’d resources while removing divested users from your network.
Demand-based pricing means costs scales to your needs, with no major capex spend or unpredictable costs to worry about.
Hand over security and access controls for divested assets, reducing your TSA burden and easing your timeline.
How Zscaler helps
Maximizing value as you disentangle ecosystems can be difficult. When low-value, high-effort domains—like network and security—block your way forward, they put serious pressure on your timelines. With the Zero Trust Exchange, your way forward is clear.
Zscaler accelerates divestitures to let you separate more quickly, helping your business:
Industry perspectives on obstacles to achieving successful divestitures
Zscaler customers can overcome these challenges
Benefits throughout the integration life cycle
Carve-Out Benefits: Day 1
Separation/Stand-Up Benefits: Day 2 and Beyond
How Zscaler streamlines divestitures
- Create a carve-out Zscaler tenant and deploy the Zscaler client to conveyed employees
- Deploy app connectors to allow conveyed user access to TSA’d applications and resources in a zero trust architecture
- Forgo the need for a "clone-and-go" network by leveraging the Zero Trust Exchange as the intermediary for conveyed applications
- Move conveyed employees to public Wi-Fi, effectively removing conveyed users from the network while staying productive
- Integrate other risk profiling capabilities to provide dynamic policy based on security posture
- Use workload-to-workload zero trust capabilities to further separate conveyed or TSA application traffic
- Close out any network or security service TSA
- Hand over tenant administration to the separated entity’s IT provider
- Remove the divested entity's identity provider, if any, from the carve-out tenant’s policy
- Remove any legacy VPN access or similar to TSA’d or conveyed applications