Top 10 Reasons Enterprises are Moving Security to the Cloud

Similar documents
Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

Cisco ASA and Cloud Web Security: Best-in-Class Network Security Combined with Best-in-Class Web Security

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS

Cisco Cloud Web Security

Replacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP. Dennis de Leest Sr. Systems Engineer Netherlands

Cisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.]

Guest Speaker. Michael Sutton Chief Information Security Officer Zscaler, Inc.

Putting Web Threat Protection and Content Filtering in the Cloud

Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments

On and off premises technologies Which is best for you?

Enterprise Buyer Guide

The Direct-to-Cloud Network

Advantages of Managed Security Services

SSL Encryption and Traffic Inspection ADDRESSING THE INCREASED 2048-BIT PERFORMANCE DEMANDS OF 2048-BIT SSL CERTIFICATES

Web Security Gateway Anywhere

ZSCALER WEB SECURITY CLOUD FOR LARGE & MEDIUM ENTERPRISE

How To Secure Your Employees Online With Zscaler.Com And Your Website From Being Infected With Spyware Or Malware

Cisco Cloud Web Security Datasheet

Requirements When Considering a Next- Generation Firewall

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

REVOLUTIONIZING ADVANCED THREAT PROTECTION

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

How To Protect Your Cloud From Attack

The Evolution of the Enterprise And Enterprise Security

Zscaler Internet Security Frequently Asked Questions

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

Enabling Secure BYOD How Fortinet Provides a Secure Environment for BYOD

Meeting the Challenges of Virtualization Security

ARCHITECT S GUIDE: Comply to Connect Using TNC Technology

Unified Threat Management, Managed Security, and the Cloud Services Model

Five Steps For Securing The Data Center: Why Traditional Security May Not Work

The Advantages of Security as a Service versus On-Premise Security

ZSCALER CLOUD SERVICES AND INFRASTRUCTURE: A TECHNICAL OVERVIEW

Safeguarding the cloud with IBM Dynamic Cloud Security

Network Control Meets Endpoint Security

IBM Security IBM Corporation IBM Corporation

Cloud and VM Based Security

The Hillstone and Trend Micro Joint Solution

Uncover security risks on your enterprise network

F5 Identity and Access Management (IAM) Overview. Laurent PETROQUE Manager Field Systems Engineering, France

Cloud-Based Content Security Service (CSS)

Malware and Other Malicious Threats

Introducing IBM s Advanced Threat Protection Platform

Stop advanced targeted attacks, identify high risk users and control Insider Threats

Intelligent, Scalable Web Security

Securing Virtual Applications and Servers

Readiness Assessments: Vital to Secure Mobility

INTRODUCING isheriff CLOUD SECURITY

CASE STUDY. AUSTRIAN AIRLINES Modernizes Network Security for First Class Performance

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

CA Host-Based Intrusion Prevention System r8.1

Sage ERP I White Paper. ERP and the Cloud: What You Need to Know

ZSCALER SECURITY CLOUD FOR LARGE AND MEDIUM ENTERPRISE

Devising a Server Protection Strategy with Trend Micro

ISB13 Web security deployment options - which is really best for you? Duncan Mills, Piero DePaoli, Stuart Jones

Securing the private cloud

Securing Virtualization with Check Point and Consolidation with Virtualized Security

Cisco ISR Web Security with Cisco ScanSafe

Endpoint protection for physical and virtual desktops

Protecting Content and Securing the Organization Through Smarter Endpoint Choices

Devising a Server Protection Strategy with Trend Micro

Zone Labs Integrity Smarter Enterprise Security

The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know

VDI Security for Better Protection and Performance

Global Outsourcing / Infrastructure Management. Instinct 2.0. Bridging the Gap between the Disparate Needs of Organizations and End-Users

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Fight Malware, Malfeasance, and Malingering with F5

DUBEX CUSTOMER MEETING

Moving Beyond Proxies

Secure Web Gateways Buyer s Guide >

Symantec Protection Suite Add-On for Hosted and Web Security

Seven Requirements for Hybrid Web Delivery Getting the best of both on-premises and SaaS

V1.4. Spambrella Continuity SaaS. August 2

NGFWs will be most effective when working in conjunction with other layers of security controls.

ENABLING FAST RESPONSES THREAT MONITORING

Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services

Moving Virtual Desktops to the Cloud

Security Considerations for DirectAccess Deployments. Whitepaper

ForeScout CounterACT. Continuous Monitoring and Mitigation

Web Security Gateway Solutions

Transcription:

ZSCALER EBOOK Top 10 Reasons Enterprises are Moving Security to the Cloud A better approach to security Albert Einstein defined insanity as doing the same thing over and over again and expecting different results. Perhaps throwing appliances at a network to make IT security headaches go away fits this definition. Cloud computing is rapidly changing enterprise IT by reducing the cost and simplifying the deployment of applications such as customer relationship management (e.g., salesforce.com) and email (e.g., Gmail). Now, enterprise organizations are discovering those same economic and technology advantages can be achieved by migrating their IT security to the cloud. In fact, Gartner s 2012 Magic Quadrant Report acknowledges that cloud-delivered gateways are growing at 35% annually, almost three times as fast as appliances. There are plenty of reasons why

companies are transitioning their security strategies from appliance-based security to the cloud. One key reason that favors the Security Cloud approach is its superior architecture for handling threats. Enterprise security has traditionally been delivered either as; A host based solution In this model, endpoint agents are installed on the users PCs. The endpoint agent may provide antivirus and malware protection, firewall capabilities or IDS/IPS functionality. However there are two primary challenges facing this model; o In a global environment, with hundreds or thousands of machines distributed across multiple locations, it is simply not cost effective to manage and maintain these disparate machines with agents. o Endpoint agents are not generally available on mobile devices. This poses significant challenges, especially with the proliferation of mobile devices within the enterprise, coupled with the increasing popularity of social media. What Companies are Saying about Zscaler Immediately upon deployment, Zscaler gave my team instant visibility into what computers where already infected and sending data out to command and control servers, and the information we needed to fix them. Zscaler provided true visibility and security on day one. CHARLES JACKS PRINCIPAL ARCHITECT o The agent itself needs constant updates to keep up with evolving new web threats, often meaning significant latency between the time a security event is discovered, when protection is made available, and cumbersome time taken to distribute and update and user machines 2

ZSCALER EBOOK An appliance-based security model This model also faces significant challenges in global enterprise organizations. In this model, a box is typically deployed at each office location. As the number of offices increase, more boxes need to be deployed and managed. The appliance management problem gets compounded at smaller branch offices which may not have IT resources on-site. Add telecommuters that work from home offices, and the appliance based model quickly becomes untenable. As such, enterprises frequently force users to VPN to headquarter locations to leverage on-premise security appliances. This leads to unnecessary traffic backhaul with increased bandwidth cost for the organization and added latency for users. Further, as users adopt mobile devices that go straight to the Internet, appliances that enforce security and policy compliance are often circumvented completely. A Security Cloud is superior in several dimensions: A. It s always up-to-date. Cloud based security eliminates the gap between threat discovery and protection being available. Since the cloud sees traffic from a variety of sources, it has real-time and granular visibility of new security outbreaks. As new vulnerabilities are discovered, a single update to the cloud offers instant protection to all users seamlessly. If one user uncovers a new vulnerability, all others are instantly protected against it. B. The user gets the benefit of real-time cloud intelligence and collaborative sharing of threat information. 3

C. Inline inspection is performed in the Cloud for all traffic. In addition, a scalable Security Cloud can perform SSL inspection without materially degrading the user experience. Today, an increasing volume of web based traffic leverages SSL, rendering security solutions blind if they aren t SSL capable. D. The Security Cloud protects any device at any time. Mobile devices, typically operating on their own 3G or 4G network, bypass appliances. Without inspection and policy enforcement, there is simply no comparison between appliances and the Security Cloud. E. Additionally, the Security Cloud is robust enough to act as an infrastructure capable of supporting multiple services. It can integrate a comprehensive suite of services and apply consistent policies to each user regardless of device or location. By doing so, it eliminates the need for multiple point products. It s global footprint in the cloud provides security against blended threats. Thus, the Security Cloud provides infrastructure as a service that allows the enterprise to implement the security that meets the need of the organization. 4

ZSCALER EBOOK Why Enterprises are Making the Switch to the Cloud Organizations today understand that protecting users with a consistent and enforceable policy requires much more than simple URL or web-filtering. Millions of users from thousands of companies have already switched their IT security from appliances to experience the benefits of the Security Cloud. Whether you are considering adding a user-focused security service to complement an existing web filtering solution, or are building your web security from scratch, the largest Security Cloud is the best path for you. Here s why Zscaler makes the most sense for today s world of enterprise security. 1 2 Move beyond point solutions to complete security. Point solutions, cannot effectively support disparate, multiple locations, branch offices, or telecommuters. Zscaler provides the best defense against today s sophisticated threats including botnets, malicious websites, scripting attacks and much more. With appliances, HQ users. Protect road warriors. Appliance-based solutions simply can t keep up with today s enterprise workforce. Employees are in airports, hotels, coffee shops and anyplace where a hot spot promises Internet connectivity. In an appliance world, you have to establish a secure connection with a VPN back to headquarters or to some regional hub 5

where a security appliance is deployed. This deteriorates the user experience and creates unnecessary back haul costs, encouraging some users to access the Internet directly, getting infected and then introducing malware to the corporate network once connected. With Zscaler, no matter where the worker is, the nearest data center is accessed, policy is enforced and only then is the Internet accessed with full protection and low latency. The user gets the same policy and the same protection whether sitting at headquarters, in a hotel in London or in a coffee shop in Chicago. Protect mobile device users. Every enterprise is adopting smartphones and tablets. Users get great productivity benefits from these devices as they access corporate services like email or SaaS applications. These devices typically operate on a 3G or 4G network and go directly to the Internet, making them a challenge to secure. This traffic does not go through an appliance, and users are often compromised. With Zscaler, you get the same policy and the same protection whether your users are on a PC, a laptop, a smart phone or a tablet. What Companies are Saying about Zscaler Before, 800 locations were back- hauled through a couple of data centers. Securing that traffic with the cloud led to millions of dollars in savings annually for bandwidth. 6

ZSCALER EBOOK 4 5 Protect your distributed enterprise. Today s companies do not operate out of a single facility. A typical company has multiple offices in many cities, in countries around the world. A security appliance requires you to either backhaul traffic to headquarters or to a regional hub facility. Either way, you wind up paying twice for bandwidth. One Zscaler customer is protecting thousands of users at offices all over the world and is saving $1.6 million per month by avoiding backhauling costs alone. Avoid network latency and improve the user experience. Zscaler provides a rich and fast Internet experience for the user. Avoiding the need to backhaul traffic does more than save money; it improves network performance. Zscaler can do this because its fundamental innovation lies in its ability to create a giant global network that acts as a single virtual proxy, so that any user can go to any gateway at any time for policy-based secure Internet access. The typical appliance overhead is simply no match. Simplification of IT. No hardware. No software. No clients. No complications. Appliance vendors can t say that. By consolidating multiple point products and not having to worry about large-scale deployments in multiple locations, the Zscaler Security Cloud frees valuable IT resources to focus on strategic and architectural challenges, not patching and managing boxes. 7

Get real-time reporting that s interactive and consolidated. With Zscaler you are not limited to batch reporting. Whether you have 500 employees or 50,000, you can view transaction level logs for any employee at any location from any destination within seconds. And, that s backed by a Zscaler SLA. Appliance vendors typically require you to buy and maintain reporting servers, and still rely on batch reporting with no SLA. Best Total Cost of Ownership (TCO). With Zscaler, there is no CapEx. You are not buying and deploying hardware. Deployment costs are minimal. Ongoing management costs are minimal. There are no patches or upgrades to worry about. You enjoy lower bandwidth costs. You get better security and fewer infected devices, meaning less time reimaging your hardware assets. What Companies are Saying about Zscaler 12,000 locations backhauled to corporate headquarters. Saved 70% on bandwidth costs by adopting cloud- delivered security. 8

ZSCALER EBOOK 9 Integration and consolidation of point products. Today, your DMZ most likely has several point products: a web proxy; a zero-day security product; a DLP appliance and more. Each product requires integration with Active Directory for user and group policy settings. That carries a burden in terms of actual cost and IT overhead. With Zscaler, integrated functionality gives you better security, a consistent user interface and consolidated policy and reporting. Benefit from the largest security cloud in the industry. According to Gartner, Zscaler already has the largest global footprint of data centers among all security vendors. With data centers in over 100 locations around the world, the Zscaler Security Cloud processes over 10 billion transaction per day. One of our larger customers protects over 1.6 million users in over 180 countries. Reliability and availability SLAs are clearly published. That means you get proven scalability and reliability, and your employees get the same policy-based protection on any device in any location. 9

About Zscaler Zscaler is transforming enterprise security with the world s largest Security Cloud built from the ground up to safely enable users doing business beyond the corporate network. See why global enterprises are using Zscaler today to simplify their IT operations, consolidate point security products, and securely enable their business for mobility, cloud and social media. For more information, visit www.zscaler.com 10