Visibility & Control Are The Keys To Combating Data Breaches
If Target Corporation, Neiman Marcus, Google and Yahoo can fall victim to security breaches – no organization is immune to being hacked. And the stakes are high – often involving:
- Consumer privacy issues
- Company reputation
- Financial loss
- Intellectual property theft
Today's cyber attacks are sophisticated, often combining social engineering and zero-day exploits for infection. The key to combating advanced persistent threats is having "real-time visibility" and "intelligent insight" into your corporate infrastructure. This also includes the ability to track employee traffic across your corporate infrastructure in real time and derive meaningful data for fast corrective action.
This webinar will discuss the latest challenges, trends and critical requirements to combat advanced cyber threats. A specific focus will be on how timely visibility drives Detection, Remediation and Protection.
RecordedFeb 9 201539 mins
Your place is confirmed, we'll send you email reminders
Dan Shelton, Director of Product Management, Zscaler Inc
Software-defined perimeter security represents the future for remote access
The software defined perimeter (SDP) is a new approach to securing access to internal applications. It relies on software, not VPN hardware appliances, to deliver zero trust access for remote users. This method allows enterprises to use a single solution to standardize remote access security for all users (employees of third party) and platforms, scale them more economically while reducing the potential attack surface.Now users can receive a cloud-like user experience, and admins remain in control of their environment.
Please join Zscaler Director of Product Management (and former customer), Dan Shelton as he discusses the software-defined perimeter as a replacement for remote access VPN. You’ll learn how you can:
Standardize security across all platforms (cloud & datacenter)
Provide granular application access, without network access
Use software to reduce appliance footprint
Deliver a world-class remote user experience
Dan Shelton, Director of Product Management, Zscaler, Inc.
Hear what it takes to deploy Office 365.
Deploying Microsoft Office 365 is unlike any other SaaS application you’ve rolled out before. Even with careful planning, things can easily go sideways. That’s why hearing firsthand what it takes to successfully deploy Office 365 in a global organization from someone who has done it is an invaluable opportunity. Join this webcast to hear all the real-life tips and tricks needed to avoid common Office 365 pitfalls within your IT organization.
In this session, Zscaler Director of Product Management, Dan Shelton, will share lessons learned from supporting an Office 365 deployment for a large global organization with more than 10,000 users across 900 locations in 22 countries.
You will learn:
The due diligence required to validate that your current network and security architecture can support Office 365
What your IT teams can expect in terms of support and the cultural changes required within organizations to leverage Office 365 effectively without compromising security posture.
Challenges common to Office 365 deployments within large global organizations and how to best mitigate the risk of them happening.
What happens to the end-user experience and the best ways to communicate the benefits of the project to the business.
Approaches to best follow Microsoft's guidance on connecting end-users to the Office 365 service
Deepen Desai, Senior Director of Security Research Zscaler
The occurrence of SSL-based threats are continuing to rise. Hackers are getting more and more creative in how they deliver threats, which creates new inspection challenges. Attend this webcast to discuss the latest attack trends, and best practices you can employ within your Zscaler installation to bolster your security.
Please join Deepen Desai, Senior Director of Security Research for Zscaler ThreatLabz as he discusses all the current trends in ransomware and malware. You’ll get to see inside the latest threats, so you can learn how to mitigate risk better and keep your users safe.
You will learn:
- The recent attack trends Zscaler Threatlabz has been tracking across the Zscaler Cloud.
- What Innovative techniques hackers are using in today’s threat landscape.
- Why inspecting SSL is an important step in finding the latest malware strains.
- The best practices and security recommendations to you can use to defend against multi-stage attacks.
Denzil Wessels, Senior Director Product Management, Zscaler, Inc.
Despite its notoriously poor user experience for both users and admins, the remote access VPN has remained the standard for remote access to internally managed applications. The tool, which dates back to the 1990s, extends the corporate network to users and exposes it to malware that may be running on mobile devices.
In this session, Zscaler Senior Director of Product Management, Denzil Wessels, will discuss a new approach for enabling secure remote access to internally managed applications. Instead of relying on appliances anchored to the data center, this revolutionary approach leverages the cloud to deliver the performance users demand and the security IT requires. All without the cost and complexity of static VPN gateway appliances.
In this session, you will learn about the new software-defined approach to secure remote access built upon four key tenets:
Use the internet as the new secure network
Connect users to applications without bringing users on the network
Enable remote access without exposing applications to unauthorized users
Segment access to applications without network segmentation
Dhawal Sharma,Director Product Management,Zscaler, Inc.
Microsoft Office 365 is unlike any other SaaS applications and, even with careful planning, it’s fair to say that deployments don’t always go as planned. The Zscaler cloud processes over 1.3 billion office requests daily for more than 700 customers. In working with customers and Microsoft, we’ve learned a lot of best practices and common pitfalls companies make when fully deploying Office 365.
In this session, Zscaler Director of Product Management, Dhawal Sharma, will discuss Microsoft’s latest connectivity guidance for optimizing your Office 365 deployment and how to avoid the most common pitfalls that can quickly result in user complaints and a delayed deployment.
You will learn:
-How to optimize connectivity to Microsoft
-How to manage tenant restrictions
-How to overcome latency issues – upgrading your infrastructure may not be the solution
-How to provide a fast user experience and avoid random connection issues
-How to stay current with Office 365 IP and URL updates (hint: there’s a new way)
Deepen Desai, Sr. Director, Security Research & Operations,Zscaler, Inc.
A new strain of the Petya ransomware called "Bad Rabbit" is impacting business and sweeping across Russia and Ukraine, among other Eastern European countries. Like many of the other ransomware outbreaks, understanding fact from fiction is the first step in staying safe. Zscaler has been monitoring the outbreak and has pulled together all the latest information about the attack.
Join our webinar to hear Deepen Desai, Sr. Director, Security Research & Operations discuss his evidence-based findings, so you can discern the truth about this evolving threat. You'll learn:
What Bad Rabbit’s attack vector looks like
What trends we're seeing about this attack in the Zscaler Cloud
What proactive actions you can take to keep safe
New ways you can protect your users from threats like Bad Rabbit
Dr. Amit Sinha, Chief Technology Officer, Zscaler Inc
Your applications are moving to the cloud, and your firewall is sure to follow. The concept of only protecting your network no longer makes sense. But, can a virtualized firewall adequately secure organizations as they become more and more distributed? What are your options to determine where your firewalls will reside? How can you evaluate which solution is best for your enterprise?
Join this engaging webinar with Zscaler Executive Vice President of Engineering and Cloud Operations, Chief Technology Officer, Dr. Amit Sinha as he discusses:
Access and security challenges of distributed enterprises
Challenges and limitations of a virtualized firewall approach
Understanding and evaluating the options so you can make an informed decision you feel good about
Today 34% of enterprises are running applications within Azure Cloud. That's up 14% from last year! The problem is that Enterprise Networking and Security teams still rely on the VPN to provide remote access to the network for their mobile users. The VPN, famous for giving users a poor user experience, breaks the cloud experience, exposes the network to employees while driving costs and complexity when migrating apps to Azure.
It's time for enterprises to rethink the way they provide remote access. It's time for them to retire their VPN.
Please join Patrick Foxhoven, CIO and VP of Emerging Technologies, Zscaler, Inc., as he explains how enterprises use Zscaler Private Access (ZPA) for Azure solution provide faster, secure remote access to internal applications for their remote employees. We'll discuss how ZPA:
- Provides direct to cloud access for a better user experience
- Provides secure remote access without the use of VPN
- Reduces costs and complexity due to no need for inbound VPN gateways
Dhawal Sharma, Director of Product Management, Zscaler, Inc., Rachna Srivastava, Sr. Director of Product Marketing, VeloCloud
Cloud technology is the key enabler to new business opportunities, improved efficiency, and a sustainable competitive edge. IT requires new ways to rapidly deliver business applications and services in the cloud reliably and securely. This can be achieved by adopting a new approach that allows for agility and security in the cloud-era.
Attend this webinar to learn about a holistic transformation strategy that brings cloud security and SD-WAN from Zscaler and VeloCloud together for secure, efficient, and cost-effective access to cloud applications and services, over the Internet and beyond.
Jason Georgi Director of the Transformation Office Zscaler, Inc.
As the cloud transforms enterprise IT, it brings a lot more savings than cold hard cash. No question, reducing infrastructure costs is the #1 attraction to cloud. But there are two other cost dimensions with huge impact on security that must not be ignored. The payoffs depend on whether you approach security with a cloud vs. on-premises model. An organization’s choices are crucial – both for enterprise security and for the roles of its stakeholders.
Dr. Manoj Apte, Chief Strategy Officer Zscaler Inc. & Gerry Festa, VP of Product Marketing Zscaler Inc.
A proper Microsoft Office 365 deployment needs direct access to the Internet. This requirement was underscored by Microsoft at the 2016 Ignite conference. Attempting to run Office 365 in a traditional hub-and-spoke network environment will quickly lead to delayed deployments, unplanned outages and users frustrated with subpar performance. Check out this webcast to hear how Zscaler can help you accelerate deployment, deliver a vastly improved user experience and simplify day to day management of Office 365.
Jay Chaudhry CEO, Chairman & Founder Zscaler Inc.& Frederik Janssen Global Head of Portfolio & Lifecycle Managem Siemens,
The world that IT departments have been building for the past 30 years is struggling to remain relevant. Today, your applications are moving to the cloud — Office 365, Salesforce, AWS, and Azure — and your users are mobile, but your security appliances are still at the gateways, protecting your corporate network.
In this session, Frederik Janssen, the Siemens Global Head of Service Portfolio & Lifecycle Management, IT Infrastructure, and Jay Chaudhry, Zscaler CEO, Chairman, and Founder, will share their experiences and insights into the transformation from the old world of IT into cloud enablement.
Deepen Desai Senior Director, Security Research & Operations, Zscaler.& Patrick Foxhoven Chief Information Officer Zscaler
There are many theories about WannaCry and your inbox is probably full of emails explaining why you need to buy yet another security product. They’re essentially saying, “What you’ve got isn’t working, so get more of it.”
But we believe that WannaCry is a clear indication of how the world has changed. To protect our organizations against such modern threats, we need to rethink the way we connect users to their assets and to each other — without bringing them onto the network.
What makes WannaCry a game-changer? Let our security experts show you. Deepen Desai and Patrick Foxhoven will present evidence-based information about WannaCry, so you can discern the truth about this evolving threat. They’ll present details on the initial attack vector, new strains that are emerging and those we are seeing in the Zscaler cloud, and protective actions you can take now. Finally, they’ll discuss how we can more effectively protect against modern threats like WannaCry by rethinking the way we apply security and access controls.
Bil Harmer, Strategist, Office of the CISO, Zscaler
Cyber extortion is on the rise, and the public sector is particularly vulnerable. A study conducted by a leading cybersecurity threat management firm reported that state and local government networks are twice as likely as their commercial counterparts to be infected with either ransomware or malware.
Why are ransomware perpetrators increasingly setting their sights on the public sector? First, many agencies and public institutions rely on legacy systems that are challenged to meet all of today’s cybersecurity threats. Second, the proliferation of devices and technology platforms, including smartphones, tablets and mobile apps, are giving hackers more points of entry into public sector networks. Are you prepared for such an attack?
Join Bil Harmer, Strategist, Office of the CISO, Zscaler Inc., for a compelling webcast highlighting how ransomware can impact your organization and steps you can take to secure your network and systems.
Bil will also cover:
- How ransomware has evolved
- Lessons learned from recent attacks
- Why cloud sandboxing is so important
- Tips for mitigating ransomware
For more information about Zscaler, go to www.zscaler.com
Bil Harmer leads Zscaler’s Office of the CISO for the Americas, where he advises organizations on best practices for implementing cloud-based cybersecurity solutions. A veteran of the IT industry, he has helped startups, governments, and financial institutions design and implement security programs. Bil pioneered the use of the SAS70 coupled with ISO, to create a trusted security audit methodology used by the SaaS industry. A highly sought-after speaker, Bil frequently presents on security and privacy-related topics at conferences such as RSA, ISSA, GrrCon and the Cloud Security Alliance.
The world is undergoing a fundamental change in 2017, much of it driven by fear and uncertainty. Alliances are being reassessed, borders are being redrawn and companies are rethinking their approach to security. What are the new looming threats out there? Who are the biggest perpetrators of cybercrime? And how best should we be protecting our companies? Join Michael Sutton, CISO at Zscaler as he discusses our top 10 security predictions for 2017.
Deepen Desai, Senior Director Security Research, Zscaler & Gerard Festa, Senior Director Product Marketing, Zscaler
This webcast will cover recent attacks and a discussion on what you need to know to mitigate the risk and protect your users. It will highlight the innovative techniques hackers are using in today’s threat landscape along with the best practices and security recommendations to defend against multi-stage attacks.
Manoj Apte, Senior Vice President of Product Management, Zscaler, Inc.
Microsoft Office 365 has taken the market by storm and has been Microsoft’s fastest selling product for a while now. However, amidst all this excitement, there are significant impacts to network and security architecture. Enterprises need to be prepared to manage 6 key issues:
1. Increased network bandwidth usage
2. Slow traffic & poor user experience
3. Increased security headaches
4. Mobile security
5. Visibility & compliance
6. Limitations of traditional on-premise security appliances
Join Dr. Manoj Apte, Senior Vice President of Product Management, Zscaler Inc., for a thought provoking webcast discussing:
Key considerations to be aware of before you deploy Office 365
Why security appliances cannot address these challenges effectively
Best practices for addressing these issues using a cloud based security solution
According to Gartner, cloud-based security is continuing to grow at a significant rate, spiking at a 35% CAGR compared to 6% for on-premise appliances. This webcast provides deep insights into Gartner's findings that are relevant for CISO's and CIO's.
Recent high profile security breaches, coupled with the damage to company brand, reputation and high financial penalties, means that cyber-security is now on the boardroom agenda. This is no longer just an IT issue, it is a corporate risk issue, impacting the role of the CISO, who is now expected to provide meaningful and actionable security intelligence to board members.
According to Forrester, CISO’s need to be able to be able to answer 4 key questions:
1. What are the new and emerging trends?
2. What is the plan and how to progress against it?
3. What is the comparison against peers?
4. What is the gap from the ideal and the consequences?
Forrester also cites that 62% of global businesses decision makers are concerned about their organizations information and security risk.*
Join Michael Sutton, CISO, Zscaler, Inc., for a compelling webcast that will address the evolving role of the CISO, including:
· The emerging trends in cyber-security CISO’s need to be aware of
· As a CISO, how best to address the 4 key questions
· The latest methods cyber-criminals use to infiltrate organizations
· Key qualities the next generation CISO needs to succeed at the board level and in today’s cyber-threat environment
*Forrester Report 2015: Security Leaders, Earn Your Seat At The Table
Revolutionizing Internet Security through the magic of cloud computing
Zscaler ensures that more than 13 million employees at more than 5,000 enterprise and government organizations worldwide are protected against cyber attacks and data breaches while staying fully compliant with corporate and regulatory policies. Zscaler’s award-winning Security-as-a-Service platform delivers a safe and productive Internet experience for every user, from any device and from any location.
Zscaler delivers unified, carrier-grade Internet security, advanced persistent threat (APT) protection, data loss prevention, SSL decryption, traffic shaping, policy management and threat intelligence–all without the need for on-premise hardware, appliances or software.