Cloud SecurityIdentity & AccessPress ReleaseThreat Detection & Defense

Zscaler Extends the Power of the Zero Trust Exchange Platform with Breakthrough Cybersecurity Innovations

Zscaler, Inc., the leader in cloud security, debuted four new cybersecurity services and capabilities which further extends the power of its Zscaler Zero Trust Exchange™ cloud security platform. The innovations not only enhance the monitoring and remediation of sophisticated attacks but also deliver a fundamentally new approach to securely connecting branch offices – all while simplifying and streamlining the management process at scale for IT professionals.

Large scale cybersecurity attacks have become increasingly sophisticated and widespread. These attacks can have a devastating impact on an organisation’s reputation, financial stability, and day-to-day operations. To combat these threats, it’s essential for businesses to have a comprehensive cloud security platform that can provide real-time threat detection, automated response, and proactive risk mitigation. Processing over 300 billion transactions per day, the Zscaler platform is a fully integrated, extensible cloud security platform that provides customers with always-on intelligence that allows organisations to take a proactive approach to security, respond to threats efficiently, and optimise their security posture.

At Zenith Live Las Vegas, Zscaler unveiled the following security services and capabilities:

Zscaler Risk360 – A Powerful Risk Quantification and Visualisation Framework
Zscaler Risk360 helps CIOs and CISOs make informed and expedited business decisions that help reduce cyber risk. By leveraging a rich set of signals from internal and external sources within the Zscaler platform. IT and security Leaders gain unparalleled visibility and actionable intelligence from more than 100 data-driven factors to enable the following:

  • Powerful Risk Quantification – Delivers real-time risk scores for all stages of cyber breaches, as well as risk visualised across four entities, including workforce, third parties, applications, and assets.
  • Intuitive Visualisation and Reporting – Filters top drivers for cyber risk and anticipates financial exposure estimates, including financial remediation recommendations, with the ability to create concise board-level presentation materials.
  • Actionable Remediation – Prioritises actionable recommendations with guided workflows to investigate and remediate the most critical issues to keep an organisation secure and operations running non-stop.

Zero Trust Branch Connectivity – Re-defining branch connectivity for superior security and simplified management
Zero Trust Branch Connectivity delivers simplicity, scale, and superior security, dramatically reducing recurring overhead costs associated with MPLS connections for branch locations. This fundamentally new approach to securely connecting branch offices helps eliminate risky site-to-site VPNs over SD-WANs resulting in improved user, application, and data security, lowered costs, and reduced operational complexity, all while being able to significantly accelerate M&A.
A new plug-and-play appliance features zero touch provisioning, making installs effortless. Zero Trust Branch Connectivity enables enterprises to:

  • Replace Site-to-Site VPNs and Costly MPLS Connections with Zero-Trust – Securely connecting users, services, and IoT/OT devices between branches and their application stack.
  • Simplify Branch IT Operations – Providing direct-to-internet connectivity to reach cloud-based applications eliminates the need to maintain complex legacy routing and reduces infrastructure.
  • Significantly accelerate M&A and B2B – Reducing time to productivity for organisations that are bringing people and business applications together.

“Enterprises relying on site-to-site VPNs for their branch locations are experiencing increased volumes of security threats,” said Naresh Kumar, VP, Product Management, Zscaler. “Site-to-site VPNs create an entry point for lateral threat movement and lack the security benefits of a zero-trust architecture. Zscaler has re-imagined branch connectivity by eliminating VPNs and providing secure access via the Zscaler Zero Trust Exchange for users, servers, and devices at branch sites – all you need is a broadband connection”

Zscaler ITDR Solution Mitigating identity attacks with continuous visibility, risk monitoring, and threat detection
Cybercriminals are increasingly targeting users for their identities and credentials. The Zscaler ThreatLabz annual Phishing Report found that most modern phishing attacks rely on stolen credentials. Zscaler ITDR strengthens the business’s security posture with continuous visibility into identity misconfigurations and risky permissions. With Zscaler ITDR, CISOs can:

  • Quantify Identity Risk – Track the posture of the identity attack surface with quantified risks.
  • Find Misconfigurations – Discover risky configurations like GPP password exposure, unconstrained delegation, and stale passwords that open up new attack paths.
  • Real-Time Monitoring – Get alerted to new risks and issues when configurations change.
  • Stop Privilege Escalation – Detect and stop attacks like DCSync, DCShadow, kerberoasting, and more in the event of a compromise.
  • Remediate Issues – Understand the issue, impact, and user affected. Leverage step-by-step remediation guidance along with video tutorials, scripts, and commands.

ZSLogin Feature – Centralised login dashboard with streamlined authentication for IT processes
Zscaler makesIT Administrators’ lives easier while elevating their effectiveness by providing the following:

  • Centralised Entitlement Management – Simple way to review all entitlements across the platform and ensure administrators receive the appropriate permissions.
  • Passwordless Multi-Factor Authentication – Support for passwordless, multi-factor authentication, increasing the strength of admin authentication that is easier to use and phishing resistant.
  • Automated Administrator Identity Management – Administrator identities can be managed using SCIM to automate the creation, entitlement assignment, and revocation of privileges based on the identity data from customer identity providers.

CSA Editorial

Launched in Jan 2018, in partnership with Cyber Security Malaysia (an agency under MOSTI). CSA is a news and content platform focusing on key issues in cybersecurity in the region. CSA is targeted to serve the needs of cybersecurity professionals, IT professionals, Risk professionals and C-Levels who have an obligation to understand the impact of cyber threats.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *