Hi [[ session.user.profile.firstName ]]

Zscaler

  • Date
  • Rating
  • Views
  • Accelerate the Migration to Microsoft Azure with Zscaler Private Access
    Accelerate the Migration to Microsoft Azure with Zscaler Private Access Sean Dastouri, Senior Cloud Architect at Microsoft Azure Recorded: Jun 5 2018 42 mins
    Moving the crown jewels to the cloud requires a trusted cloud provider. This is why almost 40% of enterprises choose to run internal applications on Azure, which was designed to deliver more choice, scalability, and speed. However, this also extends the security perimeter to the Internet - rendering network-centric security methods obsolete.

    Many companies still try to rely on the network-centric methods of the old world (i.e remote access VPN), when apps ran only in the datacenter, to provide user-to-app connectivity. They're now recognizing that the complexity of appliances and the need to manage ACLs and FW policies will actually slow the move to Azure dramatically. It's time for a new approach. One built for the new world.

    Join Sean Dastouri, Senior Cloud Architect at Microsoft Azure and Lisa Lorenzin, Director of Emerging Technology Solutions at Zscaler as they discuss migrating applications to Azure and delivering faster secure application access for remote users with ZPA.

    You’ll learn:
    - Why enterprises are moving applications to Microsoft Azure
    - How the internet has become the new network
    - Reasons why network-centric security services are becoming obsolete
    - The Zscaler solution delivering secure access to private applications on Azure
  • Adopting A Zero-Trust Model. Google Did It, Can You?
    Adopting A Zero-Trust Model. Google Did It, Can You? Ameet Jani, Product Manager Google Beyond Corp at Google Recorded: Apr 24 2018 59 mins
    Based on 6 years of creating zero trust networks at Google, the BeyondCorp framework has led to the popularization of a new network security model within enterprises, called the software-defined perimeter. It takes a fundamentally different approach to providing secure access to applications, doing away with the need for traditional perimeter-based network security like solutions like VPNs.

    So what does this mean for enterprises not named Google, and how can they can adopt a similar security approach within their organization?

    In this webinar hear from Ameet Jani, Product Manager Google Beyond Corp at Google Cloud and Manoj Apte, Chief Strategy Officer at Zscaler as they talk about zero trust security, and how to take a user and application-centric approach to application access. You’ll learn:

    - How cloud and mobility are driving enterprise transformation
    - The challenge of legacy network-centric methods
    - Why a user and application-centric approach strengthens security
    - How to support access to internal apps from any device, anywhere
  • GDPR - are you ready? Key steps to getting GDPR right
    GDPR - are you ready? Key steps to getting GDPR right Chris Hudson, EMEA CISO Recorded: Mar 13 2018 53 mins
    On May 25, 2018, the General Data Protection Regulation (GDPR) will go into effect. Are you properly prepared? According to Gartner, not many will be: “By the end of 2018, over 50% of companies affected by the GDPR will not be in full compliance with its requirements".

    You don’t have to be one of these companies.

    Join Chris Hudson, EMEA CISO and Shaun Ghafouri, Associate General Counsel, as they discuss some suggested steps for compliance with the GDPR (legal, technical, and organisational). We will also discuss:

    One of the first steps is to recognise that GDPR isn't just an IT problem — it affects almost every department — and building a cross-functional team with goals and clear lines of communication is critical.

    Specifically, we will be discussing the legal, technical and organisational challenges and roadblocks to GDPR compliance, addressing questions such as:

    - With May 25, 2018 less than 3 months away, what should the GDPR project plan look like?
    - Who should be on the GDPR team? This isn't just an IT challenge.
    - What should the priorities be? Data flows, reasons for data retention.
    - What security controls should be in place? Encryption, logging, access control, authentication, data mapping.
    - What about Shadow IT? We don't know what we don't know.

    GDPR is a big, important undertaking. Your ability to ensure that all departments and stakeholders are working together with the IT team will be a key element of compliance. We hope you will join us.
  • Why SDP Replaces Remote Access VPN
    Why SDP Replaces Remote Access VPN Dan Shelton, Director of Product Management, Zscaler Inc Recorded: Jan 9 2018 58 mins
    Software-defined perimeter security represents the future for remote access

    The software defined perimeter (SDP) is a new approach to securing access to internal applications. It relies on software, not VPN hardware appliances, to deliver zero trust access for remote users. This method allows enterprises to use a single solution to standardize remote access security for all users (employees of third party) and platforms, scale them more economically while reducing the potential attack surface.Now users can receive a cloud-like user experience, and admins remain in control of their environment.

    Please join Zscaler Director of Product Management (and former customer), Dan Shelton as he discusses the software-defined perimeter as a replacement for remote access VPN. You’ll learn how you can:

    Standardize security across all platforms (cloud & datacenter)
    Provide granular application access, without network access
    Use software to reduce appliance footprint
    Deliver a world-class remote user experience
  • How I survived my Office 365 deployment
    How I survived my Office 365 deployment Dan Shelton, Director of Product Management, Zscaler, Inc. Recorded: Dec 19 2017 56 mins
    Hear what it takes to deploy Office 365.

    Deploying Microsoft Office 365 is unlike any other SaaS application you’ve rolled out before. Even with careful planning, things can easily go sideways. That’s why hearing firsthand what it takes to successfully deploy Office 365 in a global organization from someone who has done it is an invaluable opportunity. Join this webcast to hear all the real-life tips and tricks needed to avoid common Office 365 pitfalls within your IT organization.

    In this session, Zscaler Director of Product Management, Dan Shelton, will share lessons learned from supporting an Office 365 deployment for a large global organization with more than 10,000 users across 900 locations in 22 countries.

    You will learn:

    The due diligence required to validate that your current network and security architecture can support Office 365
    What your IT teams can expect in terms of support and the cultural changes required within organizations to leverage Office 365 effectively without compromising security posture.
    Challenges common to Office 365 deployments within large global organizations and how to best mitigate the risk of them happening.
    What happens to the end-user experience and the best ways to communicate the benefits of the project to the business.
    Approaches to best follow Microsoft's guidance on connecting end-users to the Office 365 service
  • Zscaler ThreatLabz dissects the latest SSL security attacks
    Zscaler ThreatLabz dissects the latest SSL security attacks Deepen Desai, Senior Director of Security Research Zscaler Recorded: Dec 5 2017 50 mins
    The occurrence of SSL-based threats are continuing to rise. Hackers are getting more and more creative in how they deliver threats, which creates new inspection challenges. Attend this webcast to discuss the latest attack trends, and best practices you can employ within your Zscaler installation to bolster your security.

    Please join Deepen Desai, Senior Director of Security Research for Zscaler ThreatLabz as he discusses all the current trends in ransomware and malware. You’ll get to see inside the latest threats, so you can learn how to mitigate risk better and keep your users safe.

    You will learn:

    - The recent attack trends Zscaler Threatlabz has been tracking across the Zscaler Cloud.
    - What Innovative techniques hackers are using in today’s threat landscape.
    - Why inspecting SSL is an important step in finding the latest malware strains.
    - The best practices and security recommendations to you can use to defend against multi-stage attacks.
  • Secure remote access without the pitfalls of VPNs
    Secure remote access without the pitfalls of VPNs Denzil Wessels, Senior Director Product Management, Zscaler, Inc. Recorded: Nov 16 2017 59 mins
    Despite its notoriously poor user experience for both users and admins, the remote access VPN has remained the standard for remote access to internally managed applications. The tool, which dates back to the 1990s, extends the corporate network to users and exposes it to malware that may be running on mobile devices.

    In this session, Zscaler Senior Director of Product Management, Denzil Wessels, will discuss a new approach for enabling secure remote access to internally managed applications. Instead of relying on appliances anchored to the data center, this revolutionary approach leverages the cloud to deliver the performance users demand and the security IT requires. All without the cost and complexity of static VPN gateway appliances.

    In this session, you will learn about the new software-defined approach to secure remote access built upon four key tenets:

    Use the internet as the new secure network
    Connect users to applications without bringing users on the network
    Enable remote access without exposing applications to unauthorized users
    Segment access to applications without network segmentation
  • Pitfalls to avoid when deploying Office 365
    Pitfalls to avoid when deploying Office 365 Dhawal Sharma,Director Product Management,Zscaler, Inc. Recorded: Nov 7 2017 56 mins
    Microsoft Office 365 is unlike any other SaaS applications and, even with careful planning, it’s fair to say that deployments don’t always go as planned. The Zscaler cloud processes over 1.3 billion office requests daily for more than 700 customers. In working with customers and Microsoft, we’ve learned a lot of best practices and common pitfalls companies make when fully deploying Office 365.

    In this session, Zscaler Director of Product Management, Dhawal Sharma, will discuss Microsoft’s latest connectivity guidance for optimizing your Office 365 deployment and how to avoid the most common pitfalls that can quickly result in user complaints and a delayed deployment.

    You will learn:

    -How to optimize connectivity to Microsoft
    -How to manage tenant restrictions
    -How to overcome latency issues – upgrading your infrastructure may not be the solution
    -How to provide a fast user experience and avoid random connection issues
    -How to stay current with Office 365 IP and URL updates (hint: there’s a new way)
  • Bad Rabbit Ransomware: What you need to know to stay safe
    Bad Rabbit Ransomware: What you need to know to stay safe Deepen Desai, Sr. Director, Security Research & Operations,Zscaler, Inc. Recorded: Oct 26 2017 30 mins
    A new strain of the Petya ransomware called "Bad Rabbit" is impacting business and sweeping across Russia and Ukraine, among other Eastern European countries. Like many of the other ransomware outbreaks, understanding fact from fiction is the first step in staying safe. Zscaler has been monitoring the outbreak and has pulled together all the latest information about the attack.

    Join our webinar to hear Deepen Desai, Sr. Director, Security Research & Operations discuss his evidence-based findings, so you can discern the truth about this evolving threat. You'll learn:

    What Bad Rabbit’s attack vector looks like
    What trends we're seeing about this attack in the Zscaler Cloud
    What proactive actions you can take to keep safe
    New ways you can protect your users from threats like Bad Rabbit
  • Virtualized Firewall: Is it the panacea to secure distributed enterprises?
    Virtualized Firewall: Is it the panacea to secure distributed enterprises? Dr. Amit Sinha, Chief Technology Officer, Zscaler Inc Recorded: Oct 25 2017 59 mins
    Your applications are moving to the cloud, and your firewall is sure to follow. The concept of only protecting your network no longer makes sense. But, can a virtualized firewall adequately secure organizations as they become more and more distributed? What are your options to determine where your firewalls will reside? How can you evaluate which solution is best for your enterprise?

    Join this engaging webinar with Zscaler Executive Vice President of Engineering and Cloud Operations, Chief Technology Officer, Dr. Amit Sinha as he discusses:

    Access and security challenges of distributed enterprises
    Challenges and limitations of a virtualized firewall approach
    Understanding and evaluating the options so you can make an informed decision you feel good about

Embed in website or blog