Hi [[ session.user.profile.firstName ]]


  • Date
  • Rating
  • Views
  • Secure access to applications on Microsoft Azure
    Secure access to applications on Microsoft Azure Microsoft Azure, VPN, Azure Recorded: Oct 18 2017 40 mins
    Today 34% of enterprises are running applications within Azure Cloud. That's up 14% from last year! The problem is that Enterprise Networking and Security teams still rely on the VPN to provide remote access to the network for their mobile users. The VPN, famous for giving users a poor user experience, breaks the cloud experience, exposes the network to employees while driving costs and complexity when migrating apps to Azure.

    It's time for enterprises to rethink the way they provide remote access. It's time for them to retire their VPN.

    Please join Patrick Foxhoven, CIO and VP of Emerging Technologies, Zscaler, Inc., as he explains how enterprises use Zscaler Private Access (ZPA) for Azure solution provide faster, secure remote access to internal applications for their remote employees. We'll discuss how ZPA:

    - Provides direct to cloud access for a better user experience
    - Provides secure remote access without the use of VPN
    - Reduces costs and complexity due to no need for inbound VPN gateways
  • Telekom Security Congress: Customer Success Story
    Telekom Security Congress: Customer Success Story Ja Chaundhry Recorded: Jul 16 2017 28 mins
    See how companies make their digital transformation into the cloud securely explained by Jay Chaudhry of Zscaler with Thomas Vavra from the Mondi Group at the Telekom Security Congress.
  • Cloud vs. On-Premises Security: Can you afford not to switch?
    Cloud vs. On-Premises Security: Can you afford not to switch? Jason Georgi Director of the Transformation Office Zscaler, Inc. Recorded: Jun 17 2017 60 mins
    As the cloud transforms enterprise IT, it brings a lot more savings than cold hard cash. No question, reducing infrastructure costs is the #1 attraction to cloud. But there are two other cost dimensions with huge impact on security that must not be ignored. The payoffs depend on whether you approach security with a cloud vs. on-premises model. An organization’s choices are crucial – both for enterprise security and for the roles of its stakeholders.
  • How to Optimize your Office 365 deployment
    How to Optimize your Office 365 deployment Dr. Manoj Apte, Chief Strategy Officer Zscaler Inc. & Gerry Festa, VP of Product Marketing Zscaler Inc. Recorded: Jun 17 2017 67 mins
    A proper Microsoft Office 365 deployment needs direct access to the Internet. This requirement was underscored by Microsoft at the 2016 Ignite conference. Attempting to run Office 365 in a traditional hub-and-spoke network environment will quickly lead to delayed deployments, unplanned outages and users frustrated with subpar performance. Check out this webcast to hear how Zscaler can help you accelerate deployment, deliver a vastly improved user experience and simplify day to day management of Office 365.
  • Lessons for thriving - not just surviving - in the cloud
    Lessons for thriving - not just surviving - in the cloud Jay Chaudhry CEO, Chairman & Founder Zscaler Inc.& Frederik Janssen Global Head of Portfolio & Lifecycle Managem Siemens, Recorded: Jun 17 2017 59 mins
    The world that IT departments have been building for the past 30 years is struggling to remain relevant. Today, your applications are moving to the cloud — Office 365, Salesforce, AWS, and Azure — and your users are mobile, but your security appliances are still at the gateways, protecting your corporate network.

    In this session, Frederik Janssen, the Siemens Global Head of Service Portfolio & Lifecycle Management, IT Infrastructure, and Jay Chaudhry, Zscaler CEO, Chairman, and Founder, will share their experiences and insights into the transformation from the old world of IT into cloud enablement.
  • Deconstructing WannaCry
    Deconstructing WannaCry Deepen Desai Senior Director, Security Research & Operations, Zscaler.& Patrick Foxhoven Chief Information Officer Zscaler Recorded: Jun 17 2017 55 mins
    There are many theories about WannaCry and your inbox is probably full of emails explaining why you need to buy yet another security product. They’re essentially saying, “What you’ve got isn’t working, so get more of it.”

    But we believe that WannaCry is a clear indication of how the world has changed. To protect our organizations against such modern threats, we need to rethink the way we connect users to their assets and to each other — without bringing them onto the network.

    What makes WannaCry a game-changer? Let our security experts show you. Deepen Desai and Patrick Foxhoven will present evidence-based information about WannaCry, so you can discern the truth about this evolving threat. They’ll present details on the initial attack vector, new strains that are emerging and those we are seeing in the Zscaler cloud, and protective actions you can take now. Finally, they’ll discuss how we can more effectively protect against modern threats like WannaCry by rethinking the way we apply security and access controls.
  • RANSOMWARE: Your Money or Your Data Protecting the Public Sector from Ransomware
    RANSOMWARE: Your Money or Your Data Protecting the Public Sector from Ransomware Bil Harmer, Strategist, Office of the CISO, Zscaler Recorded: Apr 27 2017 61 mins
    Cyber extortion is on the rise, and the public sector is particularly vulnerable. A study conducted by a leading cybersecurity threat management firm reported that state and local government networks are twice as likely as their commercial counterparts to be infected with either ransomware or malware.
    Why are ransomware perpetrators increasingly setting their sights on the public sector? First, many agencies and public institutions rely on legacy systems that are challenged to meet all of today’s cybersecurity threats. Second, the proliferation of devices and technology platforms, including smartphones, tablets and mobile apps, are giving hackers more points of entry into public sector networks. Are you prepared for such an attack?

    Join Bil Harmer, Strategist, Office of the CISO, Zscaler Inc., for a compelling webcast highlighting how ransomware can impact your organization and steps you can take to secure your network and systems.

    Bil will also cover:

    - How ransomware has evolved
    - Lessons learned from recent attacks
    - Why cloud sandboxing is so important
    - Tips for mitigating ransomware

    For more information about Zscaler, go to www.zscaler.com

    Bil Harmer leads Zscaler’s Office of the CISO for the Americas, where he advises organizations on best practices for implementing cloud-based cybersecurity solutions. A veteran of the IT industry, he has helped startups, governments, and financial institutions design and implement security programs. Bil pioneered the use of the SAS70 coupled with ISO, to create a trusted security audit methodology used by the SaaS industry. A highly sought-after speaker, Bil frequently presents on security and privacy-related topics at conferences such as RSA, ISSA, GrrCon and the Cloud Security Alliance.
  • Security Predictions for 2017
    Security Predictions for 2017 Michael Sutton, CISO, Zscaler Recorded: Feb 27 2017 54 mins
    The world is undergoing a fundamental change in 2017, much of it driven by fear and uncertainty. Alliances are being reassessed, borders are being redrawn and companies are rethinking their approach to security. What are the new looming threats out there? Who are the biggest perpetrators of cybercrime? And how best should we be protecting our companies? Join Michael Sutton, CISO at Zscaler as he discusses our top 10 security predictions for 2017.
  • Dissecting the latest security attacks
    Dissecting the latest security attacks Deepen Desai, Senior Director Security Research, Zscaler & Gerard Festa, Senior Director Product Marketing, Zscaler Recorded: Feb 27 2017 42 mins
    This webcast will cover recent attacks and a discussion on what you need to know to mitigate the risk and protect your users. It will highlight the innovative techniques hackers are using in today’s threat landscape along with the best practices and security recommendations to defend against multi-stage attacks.
  • Office 365 is all the rage - but is your network ready?
    Office 365 is all the rage - but is your network ready? Manoj Apte, Senior Vice President of Product Management, Zscaler, Inc. Recorded: Jul 27 2016 62 mins
    Microsoft Office 365 has taken the market by storm and has been Microsoft’s fastest selling product for a while now. However, amidst all this excitement, there are significant impacts to network and security architecture. Enterprises need to be prepared to manage 6 key issues:

    1. Increased network bandwidth usage
    2. Slow traffic & poor user experience
    3. Increased security headaches
    4. Mobile security
    5. Visibility & compliance
    6. Limitations of traditional on-premise security appliances

    Join Dr. Manoj Apte, Senior Vice President of Product Management, Zscaler Inc., for a thought provoking webcast discussing:

    Key considerations to be aware of before you deploy Office 365
    Why security appliances cannot address these challenges effectively
    Best practices for addressing these issues using a cloud based security solution

Embed in website or blog