Zscaler extends its Zero Trust ExchangeTM Platform with breakthrough cybersecurity innovations

0

Zscaler debuted four new cybersecurity services and capabilities which further extend the power of its Zscaler Zero Trust Exchange cloud security platform. The innovations not only enhance the monitoring and remediation of sophisticated attacks but also deliver a fundamentally new approach to securely connecting branch offices – all while simplifying and streamlining the management process at scale for IT professionals.

Large-scale cybersecurity attacks have become increasingly sophisticated and widespread. These attacks can have a devastating impact on an organization’s reputation, financial stability, and day-to-day operations. To combat these threats, it’s essential for businesses to have a comprehensive cloud security platform that can provide real-time threat detection, automated response, and proactive risk mitigation. Processing over 300 billion transactions per day, the Zscaler platform is a fully integrated, extensible cloud security platform that provides customers with always-on intelligence that allows organizations to take a proactive approach to security, respond to threats efficiently, and optimize their security posture.

At Zenith Live Las Vegas, Zscaler unveiled the following security services and capabilities:

Zscaler Risk360 – A powerful risk quantification and visualization framework

Zscaler Risk360 helps CIOs and CISOs make informed and expedited business decisions that help reduce cyber risk. By leveraging a rich set of signals from internal and external sources within the Zscaler platform, IT and security leaders gain unparalleled visibility and actionable intelligence from more than 100 data-driven factors to enable the following:

  • Powerful Risk Quantification – Delivers real-time risk scores for all stages of cyber breaches, as well as risk visualized across four entities, including workforce, third parties, applications, and assets.
  • Intuitive Visualization and Reporting – Filters top drivers for cyber risk and anticipates financial exposure estimates, including financial remediation recommendations, with the ability to create concise board-level presentation materials.
  • Actionable Remediation – Prioritizes actionable recommendations with guided workflows to investigate and remediate the most critical issues to keep an organization secure and operations running non-stop.

Zero Trust Branch Connectivity – Redefining branch connectivity for superior security and simplified management

Zero Trust Branch Connectivity delivers simplicity, scale, and superior security, dramatically reducing recurring overhead costs associated with MPLS connections for branch locations. This fundamentally new approach to securely connecting branch offices helps eliminate risky site-to-site VPNs over SD-WANs resulting in improved user, application, and data security, lowered costs, and reduced operational complexity, all while being able to significantly accelerate M&A.

A new plug-and-play appliance features zero touch provisioning, making installs effortless. Zero Trust Branch Connectivity enables enterprises to:

  • Replace Site-to-Site VPNs and Costly MPLS Connections with Zero Trust – Securely connecting users, services, and IoT/OT devices between branches and their application stack.
  • Simplify Branch IT Operations – Providing direct-to-internet connectivity to reach cloud-based applications eliminates the need to maintain complex legacy routing and reduces infrastructure.
  • Significantly accelerate M&A and B2B – Reducing time to productivity for organizations that are bringing people and business applications together.

“Enterprises relying on site-to-site VPNs for their branch locations are experiencing increased volumes of security threats,” said Naresh Kumar, VP, Product Management, Zscaler. “Site-to-site VPNs create an entry point for lateral threat movement and lack the security benefits of a zero trust architecture. Zscaler has reimagined branch connectivity by eliminating VPNs and providing secure access via the Zscaler Zero Trust Exchange for users, servers, and devices at branch sites – all you need is a broadband connection.”

Zscaler ITDR Solution   Mitigating identity attacks with continuous visibility, risk monitoring, and threat detection

Cybercriminals are increasingly targeting users for their identities and credentials. The Zscaler ThreatLabz annual Phishing Report found that most modern phishing attacks rely on stolen credentials. Zscaler ITDR strengthens the business’s security posture with continuous visibility into identity misconfigurations and risky permissions. With Zscaler ITDR, CISOs can:

  • Quantify Identity Risk – Track the posture of the identity attack surface with quantified risks.
  • Find Misconfigurations – Discover risky configurations like GPP password exposure, unconstrained delegation, and stale passwords that open up new attack paths.
  • Real-Time Monitoring – Get alerted to new risks and issues when configurations change.
  • Stop Privilege Escalation – Detect and stop attacks like DCSync, DCShadow, kerberoasting, and more in the event of a compromise.
  • Remediate Issues – Understand the issue, impact, and user affected. Leverage step-by-step remediation guidance along with video tutorials, scripts, and commands.

ZSLogin Feature – Centralized login dashboard with streamlined authentication for IT processes 

Zscaler makes IT Administrators’ lives easier while elevating their effectiveness by providing the following:

  • Centralized Entitlement Management – Simple way to review all entitlements across the platform and ensure administrators receive the appropriate permissions.
  • Passwordless Multi-Factor Authentication – Support for passwordless, multi-factor authentication, increasing the strength of admin authentication that is easier to use and phishing resistant.
  • Automated Administrator Identity Management – Administrator identities can be managed using SCIM to automate the creation, entitlement assignment, and revocation of privileges based on the identity data from customer identity providers.

LEAVE A REPLY

Please enter your comment!
Please enter your name here