ZSCALER WEB SECURITY CLOUD FOR LARGE & MEDIUM ENTERPRISE



Similar documents
How To Secure Your Employees Online With Zscaler.Com And Your Website From Being Infected With Spyware Or Malware

ZSCALER SECURITY CLOUD FOR LARGE AND MEDIUM ENTERPRISE

Top 10 Reasons Enterprises are Moving Security to the Cloud

BT Assure Managed Cloud (Zscaler)

Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media

ZSCALER CLOUD SERVICES AND INFRASTRUCTURE: A TECHNICAL OVERVIEW

A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway

11 THINGS YOUR FIREWALL SHOULD DO. a publication of 2012 INVENIO IT A SMALL BUSINESS WHITEPAPER

Cloud-Based Content Security Service (CSS)

Unified Threat Management, Managed Security, and the Cloud Services Model

Web Security Gateway Anywhere

Zscaler Internet Security Frequently Asked Questions

Why Cloud Security? FIVE WAYS CLOUD SECURITY IS BETTER AT PROTECTING AND ENABLING YOUR BUSINESS. Why Cloud Security?

SSL Encryption and Traffic Inspection ADDRESSING THE INCREASED 2048-BIT PERFORMANCE DEMANDS OF 2048-BIT SSL CERTIFICATES

How To Control Your Network With A Firewall On A Network With An Internet Security Policy On A Pc Or Ipad (For A Web Browser)

+ web + DLP. Secure 1, 2, or all 3 with one powerful solution. The best security you can get for one or for all.

Secure Web Gateways Buyer s Guide >

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security

Web Security Update. A Radicati Group, Inc. Webconference. The Radicati Group, Inc. Copyright March 2010, Reproduction Prohibited

ADVANCED SECURITY How Zscaler Tackles Emerging Web Threats with High Speed, Real- Time Content Inspection in the Cloud

V1.4. Spambrella Continuity SaaS. August 2

Key Findings. Websense Triton Security Gateway Anywhere

Cisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.]

INTRODUCING isheriff CLOUD SECURITY

1110 Cool Things Your Firewall Should Do. Extending beyond blocking network threats to protect, manage and control application traffic

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Trend Micro Encryption (TMEE) Delivering Secure . Veli-Pekka Kusmin Pre-Sales Engineer

White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for

Trend Micro Healthcare Compliance Solutions

Securing the Borderless Enterprise

Threat Containment for Facebook

Mobile Security Solution BYOD

Replacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP. Dennis de Leest Sr. Systems Engineer Netherlands

Buyers Guide to Web Protection

Stallioni Sügisseminar

Protecting Your Network Against Risky SSL Traffic ABSTRACT

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security

Protect your internal users on the Internet with Secure Web Gateway. Richard Bible EMEA Security Solution Architect

isheriff CLOUD SECURITY

Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

Websense Web Security Solutions

4 Steps to Effective Mobile Application Security

AVG AntiVirus. How does this benefit you?

WildFire. Preparing for Modern Network Attacks

Comprehensive real-time protection against Advanced Threats and data theft

CLOUD NETWORK DEFENSE

End-user Security Analytics Strengthens Protection with ArcSight

What Do You Mean My Cloud Data Isn t Secure?

Building A Secure Microsoft Exchange Continuity Appliance

On and off premises technologies Which is best for you?

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

Protecting the Infrastructure: Symantec Web Gateway

Symantec Protection Suite Add-On for Hosted and Web Security

Cyan Networks Secure Web vs. Websense Security Gateway Battle card

Sophistication of attacks will keep improving, especially APT and zero-day exploits

TRITON AP-WEB COMPREHENSIVE REAL-TIME PROTECTION AGAINST ADVANCED THREATS & DATA THEFT

The Direct-to-Cloud Network

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS

INSTANT MESSAGING SECURITY

Guest Speaker. Michael Sutton Chief Information Security Officer Zscaler, Inc.

Executive Brief on Enterprise Next-Generation Firewalls

Did you know your security solution can help with PCI compliance too?

Content Security Gateway Series Real-time Gateway Web Security Against Spyware and Viruses

HIPAA DATA SECURITY & PRIVACY COMPLIANCE

SECURE ICAP Gateway. Blue Coat Implementation Guide. Technical note. Version /12/13. Product Information. Version & Platform SGOS 6.

Web Security Gateway Solutions

How Web Security Improves Productivity and Compliance

Applications erode the secure network How can malware be stopped?

WEBSENSE SECURITY SOLUTIONS OVERVIEW

Secure Your Mobile Workplace

Security as a Service: Business Decision Factors

Enterprise Buyer Guide

Uncover security risks on your enterprise network

Providing Secure IT Management & Partnering Solution for Bendigo South East College

Introducing IBM s Advanced Threat Protection Platform

SAAS VS. ON-PREMISE SECURITY. Why Software-as-a-Service Is a Better Choice for and Web Threat Management

How To Secure Your Store Data With Fortinet

Netsweeper Whitepaper

Superior protection from Internet threats and control over unsafe web usage

WEBSENSE TRITON SOLUTIONS

Symantec RuleSpace Data Sheet

Advantages of Managed Security Services

The PA-4000 Series can add visibility and control into your network for webmail applications to stop incoming threats and limit uploaded data.

Top 10 Features: Clearswift SECURE Gateway

DUBEX CUSTOMER MEETING

Cisco Small Business ISA500 Series Integrated Security Appliances

Ensure safe and appropriate web surfing for all users with customizable filtering.

Why it's time to upgrade to a Next Generation Firewall. Dickens Lee Technical Manager

THE EASY WAY TO SECURITY AND SIMPLICITY. Business Suite

SafeNet Content Security Product Overview. Protecting the Network Edge

Attacks from the Inside

Websense: Worldwide Leader in Web Filtering Expands into Web Security

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

UNIFIED PERFORMANCE MANAGEMENT

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

Reduce Your Network's Attack Surface

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

Cisco ASA 5500 Series Content Security Edition for the Enterprise

Transcription:

THE LEADER IN CLOUD SECURITY ZSCALER SECURITY CLOUD FOR LARGE & MEDIUM ENTERPRISE OVERVIEW I have literally thrown away all my hardware and software by moving to the Zscaler Web Security Cloud - IT Director - Global 2000 Company The world of IT security is changing radically. Traditional threats such as viruses, spyware and botnets are becoming more sophisticated. Web 2.0 is opening a whole new source of attack vectors. Companies are faced with having to defend themselves against this onslaught, while also having to find ways to reduce IT cost, boost productivity and simplify their networks. Companies around the world are turning to the Zscaler Web Security Cloud to simplify their increasingly complex web security needs. They are throwing away entire racks of expensive appliances and difficult to manage software. Traditional hardware and software vendors are in shock, as they watch their overpriced revenue streams disappear. Customers, on the other hand, are excited about the power of the Zscaler Web Security Cloud. It is solving some of the most complex security problems facing large enterprises. Companies can now secure their remote offices with no on-site hardware, view worldwide web activity through a single reporting portal, and apply corporate policy to every employee, regardless of whether they are accessing the internet from HQ, a regional office, a coffee shop or a foreign country. No hardware, no software, no latency. Simply a safe web experience for all your employees globally. It s that simple. WORLDS LARGEST CLOUD FOOTPRINT Zscaler Data Center

WHO S ON THE CLOUD TODAY? Millions of users across 140 countries utilize the Zscaler Security Cloud every day. Companies from every sector including; financial services, manufacturing, retail, government and education, have moved all their employees to the Zscaler Security Cloud. ZSCALER CLOUD OVERVIEW URL FILTERING 2.0 CONTROL BANDWIDTH CONTROL BROWSER ACCESS CONTROL DATA LOSS PREVENTION SERVICES IN THE CLOUD ADVANCED THREAT PROTECTION ANTI-VIRUS & ANTI-SPYWARE POLICY & REPORTING ANALYTICS & DATA MINING ENABLING TECHNOLOGIES 10 GBPS 10 GBPS PROXY POLICY FOLLOWS USER NANOLOG USER AUTH TRUSTED INFRASTRUCTURE 40+ DATA CENTERS >99.99% HIGH RELIABILITY AND AVAILABILITY <0.1MS ULTRA LOW LATENCY PRIVACY & SECURITY CLOUD INFRASTRUCTURE 40+ Data Centers - The cloud is deployed across over 40 data centers around the world, providing quick and easy access for employees in the office as well as when they travel to coffee shops, remote offices or foreign countries. In my 30 years of IT, I have never seen such a powerful technology that is so simple to deploy - CTO - Global 2000 Company High Relisability & Availability - The cloud offers carrier grade, four 9s (99.99%) availability. Each ZEN (Zscaler Enforcement Node) across our 40 data centers is N-way redundant. Traffic from any ZEN can fail over to any other ZEN across the world, ensuring high availability, despite any regional failures such as natural disasters. Ultra-Low Latency - Our 40+ data centers around the world allow your traffic to get to us quickly. Once you re there, our 10Gbps proxies, backed by their 30 patents, ensure your traffic is processed quickly. The net result is, the cloud introduces less than 0.1 milliseconds of processing latency, to any Internet transaction from any city in the world. Privacy & Security - Our multi-tenant architecture was built from the ground up to ensure the highest levels of privacy and security. From Fortune 10 companies, to the most demanding government agencies in the world, our cloud has been tested and certified to be ultra-secure. The cloud is compliant with the most demanding data privacy regulations globally. Our data centers are also located in hardened facilities around the world, designed to withstand acts or war, terrorism and natural disasters. 2 3

SECURITY SERVICES IN THE CLOUD Anti-Virus & Anti Spyware - The cloud is constantly kept up to date with the latest signatures to protect against a comprehensive array of spyware and viruses. Companies no longer push signatures to appliances or end user desktops. It s all done in the cloud. Advanced Threats - Our security engineers at our Research Centers work 24x7 to identify and block next generation threats such as malicious active content, botnets, cross site scripting, phishing and a new generation of hostile threats thriving in a Web 2.0 world. Browser Access Control - Older or unpatched browsers create large security holes in enterprise environments. The Cloud validates browsers are fully up to date before employees are allowed to access the Internet. MANAGEMENT SERVICES IN THE CLOUD URL Filtering - A combination of powerful classification engines and our classification teams, based on five continents, categorize millions of URLs. However, traditional URL filtering isn t enough. Additionally, Zscaler s patented Pagerisk technology dynamically analyzes pages as they are accessed, providing a second layer of real-time URL protection. Web 2.0 Control - Blocking all Web 2.0 sites isn t practical. Companies need to keep the good, but filter out the malicious content that rapidly spreads in the Web 2.0 world. The Cloud s high performance scanning engines monitor thousands of Web 2.0 sites. As malicious Web 2.0 content is identified, it is immediately blocked across the entire cloud. Bandwidth Control - Video consumes 20x as much bandwidth as traditional data. The Cloud gives companies the power to control who consumes, how much bandwidth, at what time of day, from which location -- boosting productivity and lowering cost. I can instantly get access to web activity for all my employees and road warriors from a single, easy to use portal - Security Director - Financial Services Company 3

COMPLIANCE & REPORTING SERVICES IN THE CLOUD Data Leakage Protection - The Cloud protects against data leakage through the HTTP/HTTPs channel (including Webmail, IM and attachments) to enable regulatory compliance and secure company sensitive information. Reporting - Large companies can generate 100GBs of web logs per day. Logs need to be aggregated from web server farms across every location -- consuming storage, bandwidth and creating IT complexity. Utilizing our patented Nanolog technology, the Cloud eliminates this complexity. You re left with the power to see any transaction, performed by any user, from any location, within 3 seconds of the transaction taking place. BENEFITS SUMMARY SECURITY Eight fully integrated security modules Granular Web 2.0 controls keep the good, block the bad Traditional and dynamic real-time URL filtering GLOBAL CLOUD FOOTPRINT Largest web security cloud in the world -- customers in 140 countries Five 9s availability local, regional and multi-continennt redundancy No measurable latency It s truly real-time reporting. I can see any web transaction from anywhere in the world, within three seconds - IT Director - Global 2000 Company COST SAVINGS No appliances, no software, no desktop clients No upfront costs, pay as you go No buying excess capacity cloud scales as you need capacity SIMPLICITY Eliminates complex point solutions Global policy manager single policy follows user globally Pointing traffic to the cloud is quick and simple COMPLIANCE & REAL-TIME REPORTING View any transaction, by any user, from any location within three seconds Comprehensice data loss prevention (DLP) across ALL deices ONLY FROM ZSCALER Traditional security vendors will tell you they ve embraced the cloud, but look deeper. Building and running a cloud is complicated. Zscaler is the largest company in the world focused solely on cloud security. Our R&D centers span three continents, our cloud operates at five 9s availability and our cloud specific patents stand at 30 and growing. Join companies from 140 countries, who have thrown away their hardware and software, and moved to the Zscaler Web Security Cloud. Security made simple! 4

FEATURES & BUNDLE OVERVIEW FILTERING SECURITY ADVANCED PREMIUM CLOUD PLATFORM Access to Zscaler's cloud based data centers globally High Availability - 99.99% Near-Zero latency - less than 1 milliseconds Fully cloud based - no onsite hardware or software Protect users at HQ, remote offices, on laptops and mobile phones Full Active Directory and LDAP Integration Full SSL Inspection REPORTING Real-Time reporting - Any transaction within seconds 2 years summary + 6 months transaction logs (extensible to 7 years) URL FILTERING Filter across 6 classes, 30 super-categories and 90 categories Flexibility to override predefined URL classification Dynamic content classification for unknown URLs Granular policy by users, groups, locations, time and quota ADVANCED THREATS PROTECTION Block malicious code, adware, spyware, viruses from infected sites Real-time feeds of Phishing, Botnets, and other malicious sites PageRisk to stop botnets, XSS, XSRF, malicious active content Block Anonymizer, ToR, P2P, Skype, Gtalk and Gizmo IN-LINE ANTI-VIRUS & ANTI-SPYWARE Signature based anti-malware protection for any file size Full inbound and outbound file inspection with near zero-latency True file type control by users, groups and destinations 2.0 CONTROL Granular controls of Web 2.0 (i.e. allow viweing / block uploads) Streaming/Media - YouTube, Hulu, Google Video, etc Social Networking/Blogs - Facebook, Twitter, Orkut, etc. Webmail - Gmail, Yahoo mail, Hotmail, etc. Web based IM - Facebook chat, Googe chat, Yahoo IM, etc. BANDWIDTH MANAGEMENT Protect bandwidth for web applications by location, or time of day Limit bandwidth consumed by non-productive web traffic BROWSER VERSION CONTROL Ensure outdated versions of browsers are forced to upgrade Ensure known browser vulnerabilities are patched DATA LEAKAGE PROTECTION Inline scanning of all web traffic leaving the organization Log or block transactions with confidential data Inspect Office, Adobe and multi layered zip files Customized phrease dictionary with fuzzy matching Predefined engines (HIPPA, PCI) + dictionaries (credit cards, SSN) 5

CUSTOMER TESTIMONIALS Louis Vuitton Moët Hennessy is one of the most respected luxury retailers in the world Dealing with numerous point solutions and appliances was costly and unproductive LVMH wanted a high-quality solution to protect employees, remote offices and stores LVMH felt a cloud solution would be easy to manage and could provide global protection LVMH felt Zscaler s combination of security and simplicity made it the easy choice ING is one of the leading financial services companies in the world Old solution was multiple point products; URL & Anti Virus filtering handled separately Backhauling traffic to HQ was expensive and complicated their network architecture Wanted a no appliance solution with centralized administration and reporting Zscaler offered seamless deployment, comprehensive functionality, all at a lower TCO Blue Cross Blue Shield is one of the leading Healthcare providers in the world. BCBS was using traditional software and appliance URL filtering solutions They were constantly re-imaging machines as users continously got infected Traditional security solutions were ineffective against next generation Web 2.0 threats BCBS quickly deployed Zscaler and saw better security and increased IT productivity British Telecom is one of the largest telecommunications companies in the world Their customers were complaining about ineffective security and complex deployments BT offered the Zscaler Cloud to customers across numerous industry verticals Customers moved to the cloud, reduced network complexity and enjoyed better security Customers could now protect any employee, anywhere, with no hardware or software ALD Automotive is the auto-lending division of Societe Generale Bank Legacy point products were difficult to manage across offices in 39 countries Management complexity increased with proliferation of Web 2.0 applications Looking for a trusted SaaS security solution, with rich features and global reach Zscaler provided powerful global solution, with extensive real-time reporting MORE INFORMATION USA & Canada +1-408-533-0288 usc-info@zscaler.com +52-1811-2551670 latam-info@zscaler.com Middle East & Africa +33-1-4561-3272 mea-info@zscaler.com Japan +81-3-6206-8535 jp-info@zscaler.com Northern Europe +44(0)845 009 9531 neur-info@zscaler.com Central Europe +49-89-954499820 ceur-info@zscaler.com Southern Europe +33-1-4561-3272 seur-info@zscaler.com Eastern Europe +7-495-287-13-61 eeur-info@zscaler.com South East Asia +65-9796-5851 sea-info@zscaler.com Australia & New Zealand +613-9653-9088 anz-info@zscaler.com India +91-80-26672127 india-info@zscaler.com Greater China +65 9796 5851 china-info@zscaler.com 6 Rev: 070110