Hi [[ session.user.profile.firstName ]]

Real Clouds, Fake Clouds And Appliances

The Facts, Myths & FUD's for Enterprise Security

Many incumbent security vendors offer old, appliance-based technology and fake clouds – all touting to deliver the true benefits of an authentic cloud based enterprise security solution. Facts have been distorted, myths created, and the truth "clouded" in fantasy.

The reality is:

- Appliance-based security was relevant a decade ago, when 90% of employees were centrally located and most applications and resources ran in the corporate datacenter.

- "Fake" security clouds are an attempt to jump on the "cloud" bandwagon - in reality it's still old technology pretending to address a paradigm shift.

This webinar will bust the myths, expose the facts and fiction, comparing authentic 100% cloud security solution, with "fake" security clouds and hardware appliances. This webinar will focus on 5 key pain-points to drive home the clear differentiators including:

1. Security
2. Cloud design
3. Visibility and Reporting
4. Total Cost of Ownership
5. User Experience
Recorded Jan 13 2015 51 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Patrick Foxhoven, VP and CTO of Emerging Technologies, Zscaler Inc.
Presentation preview: Real Clouds, Fake Clouds And Appliances

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Secure access to applications on Microsoft Azure Recorded: Oct 18 2017 40 mins
    Microsoft Azure, VPN, Azure
    Today 34% of enterprises are running applications within Azure Cloud. That's up 14% from last year! The problem is that Enterprise Networking and Security teams still rely on the VPN to provide remote access to the network for their mobile users. The VPN, famous for giving users a poor user experience, breaks the cloud experience, exposes the network to employees while driving costs and complexity when migrating apps to Azure.

    It's time for enterprises to rethink the way they provide remote access. It's time for them to retire their VPN.

    Please join Patrick Foxhoven, CIO and VP of Emerging Technologies, Zscaler, Inc., as he explains how enterprises use Zscaler Private Access (ZPA) for Azure solution provide faster, secure remote access to internal applications for their remote employees. We'll discuss how ZPA:

    - Provides direct to cloud access for a better user experience
    - Provides secure remote access without the use of VPN
    - Reduces costs and complexity due to no need for inbound VPN gateways
  • Cloud-Delivered SD-WAN and Security: Best Practices for Branch Transformation Recorded: Oct 17 2017 59 mins
    Dhawal Sharma, Director of Product Management, Zscaler, Inc., Rachna Srivastava, Sr. Director of Product Marketing, VeloCloud
    Cloud technology is the key enabler to new business opportunities, improved efficiency, and a sustainable competitive edge. IT requires new ways to rapidly deliver business applications and services in the cloud reliably and securely. This can be achieved by adopting a new approach that allows for agility and security in the cloud-era.

    Attend this webinar to learn about a holistic transformation strategy that brings cloud security and SD-WAN from Zscaler and VeloCloud together for secure, efficient, and cost-effective access to cloud applications and services, over the Internet and beyond.
  • Telekom Security Congress: Customer Success Story Recorded: Jul 16 2017 28 mins
    Ja Chaundhry
    See how companies make their digital transformation into the cloud securely explained by Jay Chaudhry of Zscaler with Thomas Vavra from the Mondi Group at the Telekom Security Congress.
  • Cloud vs. On-Premises Security: Can you afford not to switch? Recorded: Jun 17 2017 60 mins
    Jason Georgi Director of the Transformation Office Zscaler, Inc.
    As the cloud transforms enterprise IT, it brings a lot more savings than cold hard cash. No question, reducing infrastructure costs is the #1 attraction to cloud. But there are two other cost dimensions with huge impact on security that must not be ignored. The payoffs depend on whether you approach security with a cloud vs. on-premises model. An organization’s choices are crucial – both for enterprise security and for the roles of its stakeholders.
  • How to Optimize your Office 365 deployment Recorded: Jun 17 2017 67 mins
    Dr. Manoj Apte, Chief Strategy Officer Zscaler Inc. & Gerry Festa, VP of Product Marketing Zscaler Inc.
    A proper Microsoft Office 365 deployment needs direct access to the Internet. This requirement was underscored by Microsoft at the 2016 Ignite conference. Attempting to run Office 365 in a traditional hub-and-spoke network environment will quickly lead to delayed deployments, unplanned outages and users frustrated with subpar performance. Check out this webcast to hear how Zscaler can help you accelerate deployment, deliver a vastly improved user experience and simplify day to day management of Office 365.
  • Lessons for thriving - not just surviving - in the cloud Recorded: Jun 17 2017 59 mins
    Jay Chaudhry CEO, Chairman & Founder Zscaler Inc.& Frederik Janssen Global Head of Portfolio & Lifecycle Managem Siemens,
    The world that IT departments have been building for the past 30 years is struggling to remain relevant. Today, your applications are moving to the cloud — Office 365, Salesforce, AWS, and Azure — and your users are mobile, but your security appliances are still at the gateways, protecting your corporate network.

    In this session, Frederik Janssen, the Siemens Global Head of Service Portfolio & Lifecycle Management, IT Infrastructure, and Jay Chaudhry, Zscaler CEO, Chairman, and Founder, will share their experiences and insights into the transformation from the old world of IT into cloud enablement.
  • Deconstructing WannaCry Recorded: Jun 17 2017 55 mins
    Deepen Desai Senior Director, Security Research & Operations, Zscaler.& Patrick Foxhoven Chief Information Officer Zscaler
    There are many theories about WannaCry and your inbox is probably full of emails explaining why you need to buy yet another security product. They’re essentially saying, “What you’ve got isn’t working, so get more of it.”

    But we believe that WannaCry is a clear indication of how the world has changed. To protect our organizations against such modern threats, we need to rethink the way we connect users to their assets and to each other — without bringing them onto the network.

    What makes WannaCry a game-changer? Let our security experts show you. Deepen Desai and Patrick Foxhoven will present evidence-based information about WannaCry, so you can discern the truth about this evolving threat. They’ll present details on the initial attack vector, new strains that are emerging and those we are seeing in the Zscaler cloud, and protective actions you can take now. Finally, they’ll discuss how we can more effectively protect against modern threats like WannaCry by rethinking the way we apply security and access controls.
  • RANSOMWARE: Your Money or Your Data Protecting the Public Sector from Ransomware Recorded: Apr 27 2017 61 mins
    Bil Harmer, Strategist, Office of the CISO, Zscaler
    Cyber extortion is on the rise, and the public sector is particularly vulnerable. A study conducted by a leading cybersecurity threat management firm reported that state and local government networks are twice as likely as their commercial counterparts to be infected with either ransomware or malware.
    Why are ransomware perpetrators increasingly setting their sights on the public sector? First, many agencies and public institutions rely on legacy systems that are challenged to meet all of today’s cybersecurity threats. Second, the proliferation of devices and technology platforms, including smartphones, tablets and mobile apps, are giving hackers more points of entry into public sector networks. Are you prepared for such an attack?

    Join Bil Harmer, Strategist, Office of the CISO, Zscaler Inc., for a compelling webcast highlighting how ransomware can impact your organization and steps you can take to secure your network and systems.

    Bil will also cover:

    - How ransomware has evolved
    - Lessons learned from recent attacks
    - Why cloud sandboxing is so important
    - Tips for mitigating ransomware

    For more information about Zscaler, go to www.zscaler.com

    Bil Harmer leads Zscaler’s Office of the CISO for the Americas, where he advises organizations on best practices for implementing cloud-based cybersecurity solutions. A veteran of the IT industry, he has helped startups, governments, and financial institutions design and implement security programs. Bil pioneered the use of the SAS70 coupled with ISO, to create a trusted security audit methodology used by the SaaS industry. A highly sought-after speaker, Bil frequently presents on security and privacy-related topics at conferences such as RSA, ISSA, GrrCon and the Cloud Security Alliance.
  • Security Predictions for 2017 Recorded: Feb 27 2017 54 mins
    Michael Sutton, CISO, Zscaler
    The world is undergoing a fundamental change in 2017, much of it driven by fear and uncertainty. Alliances are being reassessed, borders are being redrawn and companies are rethinking their approach to security. What are the new looming threats out there? Who are the biggest perpetrators of cybercrime? And how best should we be protecting our companies? Join Michael Sutton, CISO at Zscaler as he discusses our top 10 security predictions for 2017.
  • Dissecting the latest security attacks Recorded: Feb 27 2017 42 mins
    Deepen Desai, Senior Director Security Research, Zscaler & Gerard Festa, Senior Director Product Marketing, Zscaler
    This webcast will cover recent attacks and a discussion on what you need to know to mitigate the risk and protect your users. It will highlight the innovative techniques hackers are using in today’s threat landscape along with the best practices and security recommendations to defend against multi-stage attacks.
  • Office 365 is all the rage - but is your network ready? Recorded: Jul 27 2016 62 mins
    Manoj Apte, Senior Vice President of Product Management, Zscaler, Inc.
    Microsoft Office 365 has taken the market by storm and has been Microsoft’s fastest selling product for a while now. However, amidst all this excitement, there are significant impacts to network and security architecture. Enterprises need to be prepared to manage 6 key issues:

    1. Increased network bandwidth usage
    2. Slow traffic & poor user experience
    3. Increased security headaches
    4. Mobile security
    5. Visibility & compliance
    6. Limitations of traditional on-premise security appliances

    Join Dr. Manoj Apte, Senior Vice President of Product Management, Zscaler Inc., for a thought provoking webcast discussing:

    Key considerations to be aware of before you deploy Office 365
    Why security appliances cannot address these challenges effectively
    Best practices for addressing these issues using a cloud based security solution
  • Insights from the 2016 Gartner Magic Quadrant for Secure Web Gateways Recorded: Jul 14 2016 55 mins
    Atri Chatterjee
    According to Gartner, cloud-based security is continuing to grow at a significant rate, spiking at a 35% CAGR compared to 6% for on-premise appliances. This webcast provides deep insights into Gartner's findings that are relevant for CISO's and CIO's.
  • The Next Generation CISO Recorded: Dec 16 2015 58 mins
    Michael Sutton, CISO, Zscaler, Inc.
    Recent high profile security breaches, coupled with the damage to company brand, reputation and high financial penalties, means that cyber-security is now on the boardroom agenda. This is no longer just an IT issue, it is a corporate risk issue, impacting the role of the CISO, who is now expected to provide meaningful and actionable security intelligence to board members.

    According to Forrester, CISO’s need to be able to be able to answer 4 key questions:
    1. What are the new and emerging trends?
    2. What is the plan and how to progress against it?
    3. What is the comparison against peers?
    4. What is the gap from the ideal and the consequences?

    Forrester also cites that 62% of global businesses decision makers are concerned about their organizations information and security risk.*

    Join Michael Sutton, CISO, Zscaler, Inc., for a compelling webcast that will address the evolving role of the CISO, including:

    · The emerging trends in cyber-security CISO’s need to be aware of
    · As a CISO, how best to address the 4 key questions
    · The latest methods cyber-criminals use to infiltrate organizations
    · Key qualities the next generation CISO needs to succeed at the board level and in today’s cyber-threat environment

    *Forrester Report 2015: Security Leaders, Earn Your Seat At The Table
  • Cyber Security is now a Boardroom Agenda Recorded: Oct 20 2015 45 mins
    Kevin Peterson, Director of Security & Network Transformation, Zscaler & Mark Stafford, Senior Cyber Consultant, BT Security
    Cyber security is now a topic of discussion at the majority of board meetings, according to a recent NYSE/Veracode survey*. It is no longer just an IT issue, a policy or compliance issue – it is a corporate risk issue. Forrester Inc., states that CEOs are now mainly held responsible for data breaches – a shift from it solely being the responsibility of the CISO. According to them, any lapses will cost executives their job**. The stakes are very high and getting it wrong has significant consequences, including:

    - Brand damage due to customer loss
    - Loss of competitive advantage due to corporate espionage
    - High cost of responding to a breach

    How prepared is your organization to handle a security breach and discuss this in the boardroom?

    This webcast will address cyber security priorities being discussed at the boardroom level, including:

    - Managing security risk in today’s digital world
    - Securely leveraging key technologies such as cloud, mobile and analytics
    - Addressing security gaps across the ecosystem of customers and suppliers
    - Effectively engaging at the boardroom level, reviewing key metrics and aligning strategy with business priorities

    *NYSE/Veracode 2015 Survey: Cybersecurity in the Boardroom
    **Forrester Inc., Report: Security Leaders, Earn Your Seat At The Table
  • Internet Security Best Practices From The Global 1000 Recorded: Jul 30 2015 51 mins
    Daniel Druker, Chief Marketing Officer at Zscaler
    The world of IT security is undergoing tremendous change. The unstoppable momentum of the Internet and cloud computing, the ubiquity of mobile devices and the emergence of Internet of things have together turned the IT security landscape upside down.

    So what can you do today to keep your security ahead of these trends?

    This webcast will discuss actionable best practices gleaned from more than 5,000 leading global organizations - including United Airlines, Humana, Sealed Air, British American Tobacco, the United States Marines and NATO.

    We will also talk about:

    - The latest strategies and techniques cyber-criminals are using today
    - Concrete steps you can take to keep your organization safe
    - What to do about Internet security in today's cloud and mobile first IT landscape
  • Lessons Learned From the Biggest Security Breaches Recorded: Jul 28 2015 58 mins
    Michael Sutton, VP of Security Research at Zscaler,John Kindervag, VP and Principal Analyst at Forrester Research
    The risk of experiencing a security breach is now higher than ever. Over the last 12 months, some of the highest profile companies have been compromised including Anthem, Sony, Home Depot, JPMorgan Chase, Target and more.

    2015 is turning out to be no different. Clearly no organization is immune to a breach and human error continues to play a primary role.

    This webcast will address:
    - Key trends and traits common to high profile security breaches
    - Critical takeaways and lessons learned for a comprehensive security strategy
    - Best practices to reduce the risk of a security breach
  • Stopping Zero-day Threats Recorded: Jul 23 2015 56 mins
    Dan Maier, Senior Director of Product Marketing, Zscaler Inc.
    If Anthem, Sony, Home Depot, Target and Neiman Marcus can fall victim to security breaches, so can you. The bad news is - no company is immune, no matter how big or small you are. Without a proper understanding of zero-day threats, companies have no way of exposing the gaps of overhyped security solutions. These threats are very sophisticated and often leveraging previously unknown attack techniques and vulnerabilities.

    Join us for a compelling webcast that will highlight critical insights combating zero-day threats - including the ability to:

    • Track employee traffic at all times, in real time, irrespective of whether they are inside or outside the corporate network
    • Derive intelligent insights and meaningful data for fast corrective action
    • Avoid a strategy based on "alerting" you about infections - without any guarantees you will notice them
    • Implement a comprehensive approach to stopping zero-day threats - based on protection, (inspecting every byte of traffic and automatically blocking threats), detection and remediation
  • Do you know where your next cyber security threat is likely to come from? Recorded: Jun 18 2015 60 mins
    Patrick Foxhoven, VP & CTO of Emerging Technologies, Zscaler, Inc.
    The biggest threat to an organizations cyber security isn't malware, phishing scams or even hackers - it is its employees. According to Gartner Inc, "people continue to be the weakest link in the security chain, as criminal social engineering ploys reach new levels of deviousness".

    Join this compelling webcast that will address how to protect your employees against your next cyber security threat. This will also tackle key causes for major security attacks:

    - Naive and disgruntled end-users
    - The disappearance of the corporate perimeter
    - Mobile devices becoming ideal entry points
    - Lack of layered defenses
  • Cloud-Based Cyber Threat Protection Recorded: May 28 2015 5 mins
    Jay Chaudhry, CEO and founder, Zscaler, Inc.
    Jay Chaudhry, CEO and founder of Zscaler joins Francine Lacqua on “The Pulse” to discuss his startup that is revolutionizing the world of internet security. Zscaler is currently the only one that protects against cyber threats with a totally cloud-based solution.
  • Zscaler Customer Case Study: United Airlines Recorded: Feb 10 2015 10 mins
    Michael Kennaugh, VP of IT Business Management at United Airlines
    "With Zscaler, we have found a product that is that powerful" -United Airlines

    Learn why United Airlines relies on Zscaler to address some of their toughest security challenges.
Revolutionizing Internet Security through the magic of cloud computing
Zscaler ensures that more than 13 million employees at more than 5,000 enterprise and government organizations worldwide are protected against cyber attacks and data breaches while staying fully compliant with corporate and regulatory policies. Zscaler’s award-winning Security-as-a-Service platform delivers a safe and productive Internet experience for every user, from any device and from any location.

Zscaler delivers unified, carrier-grade Internet security, advanced persistent threat (APT) protection, data loss prevention, SSL decryption, traffic shaping, policy management and threat intelligence–all without the need for on-premise hardware, appliances or software.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Real Clouds, Fake Clouds And Appliances
  • Live at: Jan 13 2015 5:00 pm
  • Presented by: Patrick Foxhoven, VP and CTO of Emerging Technologies, Zscaler Inc.
  • From:
Your email has been sent.
or close