Solutions Cloud Security

Cloud security protects business where it lives

From cubicles to living rooms, airports, cafés, and field offices, business takes place everywhere users go. With the Zscaler cloud, enterprise security goes with them.

What is cloud security?

Security for everyone on the network

Cloud security delivers all the services you need — antivirus, firewalls, sandboxes, URL filters, SSL inspection, and the rest — in a unified platform service from the cloud. It’s airtight security without the cost and complexity of stacks of appliances. Because the security cloud is everywhere, positioned between every user and the Internet, it closes security gaps created by mobility and BYOD. By virtue of its global scale, the cloud can inspect every byte of traffic, coming and going — even if it’s encrypted — to make sure nothing bad comes in and nothing good leaves. And it delivers consistent inline protection, whether users connect from an office, coffee shop, or airport, at home or abroad.

How does cloud security differ from “traditional” network security?

Digital transformation has changed the way people work

Employees connect from everywhere, on multiple devices, to a range of services, many of which their IT teams don’t control. These realities make employees more vulnerable to threats even if they believe they’re connecting from safe locations.

The corporate network that once sat behind a security perimeter, or gateway, is now the Internet, and the only way to provide comprehensive protection for users, no matter where they connect, is through the cloud. With a solution like Zscaler cloud security, you don’t add new appliances as you add users, apps, or traffic — the cloud scales with you.

It minimizes costs and eliminates the complexity of patching, updating, and maintaining hardware and software.

The cloud is always current with the latest security updates to keep you protected from rapidly evolving malware. With tens of thousands of new phishing sites arriving every day, appliances can’t keep up.

Because cloud security services are built into a unified platform, the services communicate with each other, giving you a cohesive picture of all the traffic that’s moving across your network. Through a single interface, you can gain insight into every request — by user, location, and device around the world — in seconds.


Ubiquitous

The cloud is always reachable from anywhere, any time, from any device.

Scalable

You can add new features and thousands of users without breaking a sweat.

Integrated

Security and other services talk to each other so you get full visibility.

Comprehensive

The cloud scans every byte coming and going, including SSL and
CDN traffic.

Intelligent

The cloud learns from every user and connection; any new threat is blocked for all.

Aren’t my cloud apps and data already secure?

Yes and no. Your cloud application providers — like Microsoft in the case of Office 365 — are responsible for safeguarding your data within their environments, but not all cloud apps have the same protections. You need full security and access controls to protect your users from risky applications and prevent data exfiltration. A Cloud Application Security Broker (CASB) provides risk scoring for many cloud applications, which can be used to create access policies. And, CASB can augment a cloud security platform by extending data leakage prevention. But CASB on its own does not provide protection against ransomware and other
Internet threats.

What about “hybrid” solutions?

As organizations increase their use of cloud-based services and apps, like Salesforce, Box, Office 365, and the AWS platform, it makes sense to have your traffic secured in the cloud as well. For legacy security vendors who have been — and largely still are — selling on-premises hardware appliances, this reality poses a problem, because their bottom lines, and their duty to shareholders, involves moving boxes. This is why they’ve begun promoting so-called “hybrid solutions,” with data center security being handled by appliances, and mobile or branch security being handled by a similar security stack housed in the cloud.

The problem with such a strategy is that it complicates, rather than simplifies, enterprise security, and you get none of the benefits of a true cloud solution, benefits that can only be provided through a multi-tenant global architecture.

COULD YOUR COMPANY BE SAFER WITH CLOUD SECURITY?

Take the security preview and find out how well your company is protected against ransomware and other threats. The test is safe, free, and informative.

Learn more about cloud protection for your network

What does the cloud mean to enterprise security?

Read the white paper 

Forrester: The necessity of cloud-delivered integrated security platforms

Download the
white paper 

Why Johnson Controls chose Zscaler

Watch the video 

Ten reasons enterprises are moving security to the cloud

Download the brochure 

The pure-cloud security solution

Download the checklist

Why cloud security offers better protection than appliances

Protecting users with consistent and enforceable policies requires much more than simple URL or web filtering. That’s why thousands of organizations have already switched their IT security from appliances to cloud security. Here are some of the differences between appliance-based security and a cloud-delivered approach.

Enterprise-wide protection

APPLIANCE-BASED SECURITY

Requires security stacks at all egress points or backhauling traffic over costly MPLS links from branch offices and remote sites to DMZs. Mobile users go unprotected.

CLOUD-BASED SECURITY

Every user gets the same protection, whether they’re in the HQ, branch offices, on the road, or at home.


Integrated security

APPLIANCE-BASED SECURITY

Point appliances from different vendors work in isolation, so there’s no simple way to aggregate their data.

CLOUD-BASED SECURITY

Integrated cloud security services correlate information to give you a complete picture of your entire network.


User experience

APPLIANCE-BASED SECURITY

Every appliance between your users and the Internet causes latency. If users have to VPN into the data center, their experience is even worse.

CLOUD-BASED SECURITY

Zscaler provides fast local breakouts, and our single-scan multi-action technology enables our security services to scan simultaneously for faster performance.


IT complexity

APPLIANCE-BASED SECURITY

Deploying and maintaining appliances from multiple security vendors is expensive and difficult, with updates, patches, and hardware upgrades.

CLOUD-BASED SECURITY

Cloud security consolidates point products into an integrated platform; there's no hardware or software to buy or manage.


Intelligence

APPLIANCE-BASED SECURITY

Point products generally apply a single technique to identify threats and pass the data on to the next appliance. Patches are applied as they become available.

CLOUD-BASED SECURITY

Cloud intelligence means that any time a threat is detected anywhere in the cloud, protection is deployed everywhere. Zscaler applies more than 100,000 security updates to its cloud every day.


Value

APPLIANCE-BASED SECURITY

Appliances are expensive to buy and own. And, as threats increase, you are forced to buy more and more of them.

CLOUD-BASED SECURITY

Zscaler moves security from CAPEX to OPEX — for about the price of a cup of coffee per user per month.

Cloud services have experienced a 35% five-year compound annual growth rate, while on-premises appliances have only grown by 6% during the same period.
Gartner

Zscaler Cloud Security Platform

125 MILLION

threats blocked per day

30 BILLION

requests processed per day

120,000+

security updates per day

As the pioneer in cloud-delivered security, Zscaler is the only company that can provide a mature, scalable cloud solution.
Head of Global IT Security, Fortune 500 pharmaceutical company

Zscaler detected

of all malicious threats

In the blocking of malicious content Zscaler achieved a near perfect result.
AV-TEST

The SC Awards’ Winner (2016) — Best Cloud Computing Security protection than appliances

Zscaler Cloud Firewall won the Best Cloud Computing Security Solution award by SC Magazine.

It seems a single day doesn’t pass without some interesting new botnet emerging in the news...it’s reassuring to know that Zscaler for APTs leverages the depth of its behavioral analysis with the breadth of its Security as a Service platform to deliver a uniquely comprehensive solution.
Tony Ferguson, IT Architect, Man Diesel & Turbo
It’s one of those few products that actually does what it says on
the tin.
Tony Rimmer, Chief Security Officer, Fugro
For the cloud and mobile world of IT, security must be delivered from the cloud. We are glad to partner with Zscaler to offer a purpose-built security platform to our customers, relieving them of the need to buy, deploy and manage traditional security
point products.
Dr. Ferri Abolhassan,

Director of T-Systems' IT Division and Telekom Security

Zscaler is proud to be the founding charter member of the Cloud Security Alliance (CSA)

Get the power and scale of Zscaler Cloud Security