To Zscaler, mobile devices are just another endpoint—our traffic inspection remains exactly the same. Zscaler sits in the cloud between all your users—regardless of endpoint or connection type—seamlessly scanning every byte of inbound and outbound traffic to ensure that any malicious content or attacks targeted to mobile devices don’t lead to security blind spots. We even handle SSL inspection—the same way we do for PCs.
Zscaler interacts smoothly with existing MDM vendor solutions. We extend your security capabilities to cover mobile apps, including mobile app fingerprinting, app store access control, and blocking of malicious apps. Like all Zscaler policies, you can deploy mobile protection in minutes.
Zscaler's Web Security suite is providing Lawter with extensive scanning functionality against modern malware threats. Along with the installed firewall at Lawter, Zscaler adds an additional security layer to cover the mobile workforce.Antony Poppe, Global Network and Security Manager at Lawter
The proliferation of mobile and BYO devices, connecting via 3G/4G/LTE and Wi-Fi, has been a network security concern for years. Users can instantly download unvetted apps from the cloud, opening you to a variety of brand new threat vectors. The issue puts IT in the awkward position of balancing personal privacy with corporate security across platforms that you not only don’t own, but may not even be aware of. And to make matters worse, these platforms change constantly, opening vulnerabilities that you may be completely unaware of. Every time mobile devices connect to the Internet, they may be exfiltrating data, connecting to a botnet, or downloading malware from the cloud along with what they think they are getting.
The solutions to this problem are limited. You can count on Mobile Device Management such as Airwatch or MobileIron, which offer basic security such as the allowed applications. But the issue remains that mobile apps are sophisticated, and require scanning of inbound and outbound traffic. You can try to VPN all traffic back to your data center firewall, but good luck trying that with a phone on a 3G connection…and what if the content is encrypted? Or you can just get Zscaler.