SOLUTIONS SSL INSPECTION

Stop SSL-encrypted threats flying under the radar. Without going over your budget.

Thwart hackers. Not your CFO.

Talk to us >

With Zscaler, you’ll multiply your security—not the number of your appliances.

A majority of global network Internet traffic is now encrypted with SSL, with some estimates suggesting up to 80% by the end of 2016. This shift is leaving organizations vulnerable to some of the most serious threats. In fact, we found that over 54% of the malware we discovered was hidden behind SSL, which we blocked. Did you? Zscaler sits between users and the Internet, inspecting every byte of traffic—even if it’s encrypted or compressed—so we can catch hidden threats before they get into your network.

Talk to us >

Ironically, increased use of SSL in attempt to make our online lives more secure can create ‘blind spots’ that can actually reduce security…
NSS Labs
NSS labs on how the increased use of SSL can create ‘blind spots’ that can actually reduce security

Can you inspect SSL-encrypted traffic for all users? Hackers are betting you can’t.

As the overall percentage of encrypted traffic explodes, it is becoming vital to do SSL inspection to ensure security. Hackers are increasingly using SSL to conceal device infections, shroud data exfiltration, and hide botnet Command & Control communications. Firewalls were not designed to handle decryption, and performance grinds to a halt when they try. Dedicated appliances are extremely costly. And ignoring the issue is becoming increasingly dangerous.

While the technology is the same for all vendors, only Zscaler’s high-performance architecture enables it at scale, without latency. Zscaler’s cloud security platform is built on a proxy architecture—long understood as the best way to handle SSL inspection. Unlike firewalls, Zscaler SSL inspection is built in, not bolt on, so there’s no hardware to buy, no software to install, and no infrastructure to maintain. Your users won’t see a performance hit, regardless of where they are or what devices they are using. And you’ll get the benefit of Zscaler’s “cloud effect,” which means that once we identify a threat across any of our 15 million users, we propagate protection across all 15 million users. You’ll be able to stop threats before they hit your network, stop botnet connections, and remediate infected devices before they wreak havoc.

Talk to us >

Suggested Resources

Are your appliance-based security solutions ready for 2048-bit SSL certificates?

Watch the webcast 

Zscaler, a Gartner Magic Quadrant leader

Read the report 

IT Transformation to the cloud

Watch the webcast 

Zscaler makes it easy to comply with regulations by inspecting all SSL-encrypted traffic

Prove your compliance to auditors in just a few clicks, while protecting your users’ privacy.


Privacy controls

By location

For all users, including mobile users

Zscaler SSL inspection policy control panel

Use your own PKI for SSL inspection: In addition to the Zscaler root CA, customers can deploy a self-signed Intermediate CA for SSL inspection. Customers can also refresh Intermediate CA at periodic intervals with an API for enhanced certificate security.

Talk to us >

Benefits

  • An elastic solution—you don’t have to worry about growing volume of encryption. Just point your traffic at Zscaler, and we’ll see it all.
  • A constantly updated infrastructure—we’ll take care of ensuring that the solution works with the latest keys and encryption schemes.
  • Transparent to you—and to your users—the only ones who will know you’re using Zscaler are the hackers!.
  • Full SSL inspection for all users across all devices—including mobile and BYOD.

With Zscaler, you will no longer be blind to over 54% of threats.

Talk to us >


The Zscaler difference

  • Zscaler’s high-performance architecture enables
    “man-in-the-middle” SSL inspection at scale, without latency.
  • You can select types of traffic that you do not wish to
    inspect—such as financial or healthcare connections—that you do not inspect, to maintain privacy.

Learn more >

Zscaler’s integrated security functions work together in real time, providing comprehensive protection

Find hidden threats and prevent data loss with SSL inspection.

ACCESS CONTROL
CLOUD FIREWALL
URL FILTERING
BANDWIDTH CONTROL
DNS FILTERING
THREAT PREVENTION
ADVANCED PROTECTION
CLOUD SANDBOX
ANTI-VIRUS
DNS SECURITY
DATA PROTECTION
DATA LOSS PREVENTION
CLOUD APPS (CASB)
FILE TYPE CONTROLS

POWERED BY PATENTED TECHNOLOGIES

SSMATM

All security engines fire with
each content scan – only
microsecond delay

ByteScanTM

Each outbound/inbound
byte scanned, native SSL
scanning

PageRiskTM

Risk of each object
computed inline,
dynamically

NanologTM

50:1 compression,
real-time global log
consolidation

PolicyNowTM

Polices follow the user
for same on-premise, off-premise protection

Learn how Zscaler can protect your organization

Talk to us >