Technologies We Trust

Together with our trusted partners, Security7 Networks delivers the technology that keeps you safe

Zscaler

Zscaler is revolutionizing cloud security with unparalleled protection and performance. Go beyond basic internet security with our 100% cloud solution.

Any user can go to any gateway at any time for policy-based secure Internet access. Zscaler infrastructure comprises three key components: Zscaler Enforcement Nodes (ZENs), Central Authority (CA), and Nanolog Servers.

Why’s it Important

Computing in the cloud is a huge part of the way we do business in today’s world, and that’s not changing anytime soon.

A recent survey of 1,002 professionals compiled by RightScale.com, showed that 85% of the enterprises they talked to use the cloud on a daily basis and 95% of them were experimenting with Infrastructure-as-a-Service (IaaS).

Since the cloud has absorbed so much of computing’s marketshare, it’s probably a good idea to start talking about how important security for the cloud is if you’re looking at implementing a cloud based IT model.

In the past, a company’s private network used to be something like a walled garden. Certain things could come in, certain things could go out.

End-users were limited in what they could do on their machines, but ultimately were still able to do their jobs. Everything was, for the most part, under control.

But that’s no longer the case. With the introduction of the cloud, the walls around the garden started to crumble. You started to see end-users utilizing their own tools in the garden and, as a result potential threats have almost unmitigated access.

What once was green quickly turns to sand the more people play in it and those once high walls are now worn down to almost nothing.

Zscaler understands this.

How Zscaler is Different:

Since its inception in 2008, the company has built on its beliefs that:

  • Perimeter-based security appliances can’t provide real protection, because both users and the apps that they are seeking no longer reside within any perimeter.
  • Point products, even those considered best-of-breed, are not designed to interact with one another for a holistic perspective—IT sees only pixels, not the picture.
  • The majority of unresolved threats come from the Internet, so the most effective place to handle security is in the cloud between the users and the web.
  • Threats evolve constantly, and to catch zero-day exploits before they hit the network, it is impossible to rely on signatures alone.

Zscaler protects more than 15 million users at more than 5,000 of the world’s leading enterprises and government organizations worldwide against cyberattacks and data breaches while staying fully compliant with corporate and regulatory policies.

Global 1000 brands such as GE, Nestlé, ExxonMobil, Schneider Electric, plus government and military organizations like the United States Marines, NATO and the National Health Services of the UK rely on Zscaler to provide a safe and productive Internet experience for all of their users, from any device and from any location around the world.

Zscaler offers a platform that seamlessly integrates multiple security and compliance applications without the need for on-premises hardware, appliances, or software. The platform provides pervasive security for an organization’s users, scanning all inbound and outbound traffic in real time to ensure compliance with corporate policies and protection from the latest threats.

Further, Zscaler’s cloud platform protects users across locations and devices, following users wherever they may be accessing the Internet, and enables access to transaction logs and interactive reports across devices, locations, applications, and platforms to help organizations understand their global security and compliance posture.

Finally, Zscaler’s multi-tenant architecture ensures that organizations benefit from the “network effect.” When a new threat is identified for any one of Zscaler’s more than 5,000 customers, Zscaler immediately updates its signatures, thus protecting all users across its network

Features:

  • Distributed, multi-tenant architecture, built from the ground up for elastic scale while maintaining security and data privacy.
  • 10 Gbps platform, based on a next-gen TCP stack and drivers as well as revolutionary Single Scan Multiple Action technology that enables inspection of every byte of traffic by every service.
  • ByteScan, which provides ultrafast content scanning as well as detection of malicious sites, content, and data loss, removing dependency on signatures.
  • Page Risk Index, which delivers dynamically computed information based on real-time web activities instead of relying on reputation alone.
  • Nanolog, which encrypts and compresses web logs in a 50:1 ratio to enable complete visibility and drill-down in seconds.