Enabling Business Beyond the Corporate Network Secure solutions for mobility, cloud and social media
3 Trends Transforming Networks and Security Are you dealing with these challenges? Enterprise networks and security are undergoing a transformation, driven by new technologies and trends, including: BUSINESS USERS GO MOBILE More users are going mobile, working from home, and bringing their own devices (BYOD) and apps to work. CLOUD APPLICATIONS GO MAINSTREAM More organizations are using cloud applications like Dropbox, Salesforce.com and more to boost productivity and reduce costs. SOCIAL MEDIA GOES ENTERPRISE Social Media is becoming more strategic to the enterprise, blurring the boundaries between corporate and personal use. Today, over 50% of business is happening beyond the corporate network This is the biggest transformation in IT security in the last 20 years.
Traditional Network Security is Static Network security is about creating a "moat" to protect servers, applications and data inside the corporate network perimeter: With apps & data moving to the cloud & users more mobile, our enterprise network is becoming lonely. Global 2000 CISO Firewalls protect the network perimeter Gateway proxies limit user access to the Internet MPLS backbone connects branch offices. Internet traffic is backhauled to HQ or other locations VPN enables road warriors to access corporate data No Policy Or Protection ON THE ROAD/ MOBILE VPN Backhaul HEADQUARTERS Backhaul MPLS HOME HOTSPOT Servers are targeted by hackers, but most can be stopped at the front door BRANCH REGIONAL GATEWAY BRANCH 90% of users were in the office. 90% of access was to on premise applications. The appliance-based model worked fine.
But, Business Today is Dynamic Data and applications are moving to the cloud, and users are mobile. There is no perimeter. Business happens everywhere. Mobile Users are going direct to Internet, bypassing gateway proxies and firewalls. Mobile devices are outnumbering PCs in the enterprise, and VPNs do not secure 3G/4G mobile traffic. Backhauling internet traffic over MPLS to a few gateways escalates costs and introduces latency to the user experience. ON THE ROAD/ MOBILE HEADQUARTERS HOME HOTSPOT Hackers are increasingly targeting users as a beachhead to attack corporate networks, making it critical to protect users. REGIONAL GATEWAY BRANCH
Zscaler: Secure. Everywhere. Zscaler is transforming IT security with the world's largest Security Cloud built from the ground up to securely enable mobility, cloud applications and social media. With Zscaler, you get a single solution with the industry s most advanced web, mobile and email security, without having to deploy any hardware or software. PC, Tablet, Laptop or Smartphone To secure business in the cloud, you need security in the cloud. Cloud-based Apps Zscaler s Security Cloud is a global checkpost in the cloud between the user and the Internet, inspecting all incoming and outgoing traffic to any device in any location. In addition, Zscaler s ultra-fast proxies make it completely transparent to the user. On-the-Go or In the Office Mobile-based Apps Social Media How do we do it? Any Device - Anywhere Security Cloud Cloud Services
Single, Secure Platform for Mobile, Social, Cloud Zscaler simplifies IT and reduces costs while enabling your business for the challenges of mobility, cloud apps and social media. Zscaler brings together a set of powerful solutions that simplify and streamline your security infrastructure, and consolidates reporting and administration across these capabilities: Web Security: protect users from advanced and emerging threats, and securely enable cloud applications and social media. Direct to Net: secure branch offices and road warriors without backhauling traffic to a central gateway. Mobile Security: enable BYOD with comprehensive protection for smartphones and tablets. Email Security: protect users from viruses and spyware, phishing attacks and more. One solution to securely enable your business, with no hardware or software to deploy or manage. Simply Secure. User Security I n f r a s t r u c t u r e Web Security Unified Policy Global Data Centers Trust.Zscaler.com Privacy & Data Mobile Security Direct To Net Real-time Reporting & Analytics Data Protection Email Security Te c h n o l o g i e s Application Control Ultra Fast Proxy Nanolog Shadow Policy
Protect Users from Advanced Persistent Threats Our motto: inspect everything. Security based on anti-virus signatures can leave your organization exposed to advanced and emerging threats. Zscaler s inline, context-aware security scans every byte of inbound and outbound traffic to secure devices, users, data and applications against Advanced Persistent Threats. Zscaler. Always inline. Always secure. That s right we inspect every byte. Not parts of files. Not headers. Everything. SSL traffic is the blind spot for most companies. Most appliances, including next-generation firewalls, either don't do SSL inspection or do it very poorly. Zscaler detects and blocks threats hidden behind SSL encryption. The result: you get unrivaled protection from threats like botnets, malicious active content, phishing, XSS attacks and more. In addition, Zscaler leverages the power of cloud intelligence, mining billions of daily web transactions from millions of users to identify new and emerging threats as they occur. Zscaler also receives threat intelligence through dozens of partnerships with industry leaders like Google, Microsoft, Tipping Point, Verisign and Qualys.
Go Direct to Internet - Securely Protect remote offices and road warriors with no backhauling and no latency. Until now, organizations had two choices for securing remote offices and business travelers: 1. Backhaul traffic to one or more gateways. 2. Buy more security appliances to distribute locally. Dramatically Reduce MPLS Costs Policy-follows-the-user everywhere No traffic backhauling; No VPN to HQ Transparent user experience Neither option is desirable. Both can quickly send costs spiraling out of control, and introduce latency, making the user experience unsatisfactory. Zscaler enables Direct to Net traffic with no hardware or software, and no backhauling required. With the industry s largest Security Cloud, Zscaler sits between users and the Internet, so no matter what location you are in or device you are using, your company's security and business policy is always enforced. On-the-go HQ Home or Hotspot Regional Office A financial services customer using Zscaler is saving over $1.5 million in backhaul costs every month How much could you save?
Go Beyond MDM with Zscaler s Mobile Security Enjoy the same protection and policy on your laptop or mobile device. Employees are bringing their own devices to work, and accessing corporate data from their laptops, smartphones and tablets. Many IT organizations have already implemented mobile device management (MDM) to configure and provision these devices. No matter where you are in the world, or what device you are using, Zscaler s got you covered. MDM is a good start. But, MDM does not inspect content, a critical capability required to secure mobile devices from the sophisticated attacks being mounted against users today. Zscaler s Mobile Security Solution inspects all content to and from mobile devices such as smartphones, tablets and laptops. We make sure nothing bad reaches your corporate resources, and nothing good leaks out. Even on BYOD and unsupported devices.
Secure Cloud Applications and Social Media Get visibility and control of your business in the cloud. Companies are embracing cloud applications and social media to improve business productivity and reduce costs. However, securing these applications for business use can pose significant challenges. Zscaler s Web Security solution helps companies answer critical questions, such as: How many cloud applications does your company own? Which employees can download data from these apps? How many corporate social media accounts do you own? Who is allowed to post to your company s Twitter and Facebook accounts? How do you control what kind of content is being posted? How much of your bandwidth is allocated to business applications, and how much to recreational use? With Zscaler, you won t have to guess. You ll know.
Unified Business Policies that Follow the User One, consistent policy applies across multiple devices and goes with you everywhere. Every business has policies that define how users access applications, data and assets. Today, these policies work well in controlled environments like your corporate network. But, what happens when you re in New York today, and London tomorrow, and you re using a smartphone instead of your laptop? With Zscaler, you define a user s policy once, and it follows the user across: Locations: from New York to London to Singapore, your policy goes with you. Devices: whether you re on your laptop, tablet or smartphone, the same policy applies. Products: policies like data protection can apply across web, email, cloud and mobile security products. Policy administration made simple. What will you do with the extra time? Zscaler s Context-Aware Policy Adapts to: Users Applications Devices Locations Content
Real-time, Interactive Reporting & Analysis Clear visibility into every transaction, at your fingertips. In a world of Big Data, Zscaler understands that knowledge is power. A typical Fortune 500 company generates over 100 million transaction logs every day. Mining that data with conventional reporting tools would take days, even weeks. For example, if you need to investigate which webmail messages John Smith sent six months ago over a 2-day period, how long would it take? With Zscaler, the answer is less than 10 seconds. Reporting Console Consolidated, Real-time Reporting Interactive Analysis At your fingertips in seconds Our patented Nanolog technology is a non-relational data store that uses advanced compression and indexing techniques to let you: Consolidate logs from various locations around the globe in a central repository within seconds Correlate secure transaction data across devices (laptops, smartphones and tablets) and applications (security, DLP and application control) Zscaler gives you the information you need, when you need it.
The World s Largest Security Cloud What it Takes: Zscaler s Security Cloud is built from the ground up with key capabilities designed to deliver on these challenges, including: World s Largest Secure Cloud Infrastructure: with over 100+ data centers worldwide that delivers global coverage with near-zero latency. We process more than 8 billion transactions per day from over 10 million users in 180 countries worldwide. All with no hardware or software to purchase, install or maintain. Total Transparency: you get up to the second visibility into the Zscaler cloud operations at trust.zscaler.com, where you can view uptime, incidents and service levels. Data Privacy and Security: with Zscaler, protecting your data privacy is our priority. Your content is never stored in the cloud, and all transaction logs are encrypted. Context-aware Security: with full, inline content inspection and SSL scanning to ensure users are always protected against advanced and emerging threats. World s Largest Security Cloud 10-million users. 180 countries. 8 billion transactions/day. No hardware. No software.
Trusted by the World s Most Demanding Brands Zscaler is the choice of more than 3,500 enterprises worldwide. We are recognized as a market disruptor, and a visionary leader. But we re no startup. Over 10 million users rely on Zscaler. We generate more than 8 billion transactions every day. Our customers span the globe in 180 countries. Our largest customer uses Zscaler to secure over 1.6 million users worldwide. Leading analyst firms like Gartner name Zscaler a market leader, and a visionary. You don t have to take our word for it. Visit our customers page to see how companies like yours are using Zscaler today.
The Benefits Add Up Zscaler s Security Cloud enables you to go beyond basic network security to enable business beyond the corporate network. The forces of mobility, cloud apps and social media are challenging traditional notions of enterprise network security. In the new world, business is dynamic, users are mobile, and protecting your network perimeter is only the beginning. Zscaler s Security Cloud delivers practical, measurable benefits today: Massively reduced costs, with no hardware or software to deploy or manage, and no traffic backhauling required. Reduced complexity with a single solution that eliminates point products. Unrivaled, inline protection from advanced persistent threats. Enhanced experience with near-zero latency, so users don t bypass security measures. Real-time visibility and control across locations, applications and devices. Proven solution in the world s most demanding environments. Future-proof security that is purpose built to meet the challenges of mobile, social, cloud. TRY A RISK-FREE EVALUATION TODAY and see the difference Zscaler can make in your business