If Anthem, Sony, Home Depot, Target and Neiman Marcus can fall victim to security breaches, so can you. The bad news is - no company is immune, no matter how big or small you are. Without a proper understanding of zero-day threats, companies have no way of exposing the gaps of overhyped security solutions. These threats are very sophisticated and often leveraging previously unknown attack techniques and vulnerabilities.
Join us for a compelling webcast that will highlight critical insights combating zero-day threats - including the ability to:
• Track employee traffic at all times, in real time, irrespective of whether they are inside or outside the corporate network
• Derive intelligent insights and meaningful data for fast corrective action
• Avoid a strategy based on "alerting" you about infections - without any guarantees you will notice them
• Implement a comprehensive approach to stopping zero-day threats - based on protection, (inspecting every byte of traffic and automatically blocking threats), detection and remediation
RecordedJul 23 201556 mins
Your place is confirmed, we'll send you email reminders
Sean Dastouri, Senior Cloud Architect at Microsoft Azure
Moving the crown jewels to the cloud requires a trusted cloud provider. This is why almost 40% of enterprises choose to run internal applications on Azure, which was designed to deliver more choice, scalability, and speed. However, this also extends the security perimeter to the Internet - rendering network-centric security methods obsolete.
Many companies still try to rely on the network-centric methods of the old world (i.e remote access VPN), when apps ran only in the datacenter, to provide user-to-app connectivity. They're now recognizing that the complexity of appliances and the need to manage ACLs and FW policies will actually slow the move to Azure dramatically. It's time for a new approach. One built for the new world.
Join Sean Dastouri, Senior Cloud Architect at Microsoft Azure and Lisa Lorenzin, Director of Emerging Technology Solutions at Zscaler as they discuss migrating applications to Azure and delivering faster secure application access for remote users with ZPA.
- Why enterprises are moving applications to Microsoft Azure
- How the internet has become the new network
- Reasons why network-centric security services are becoming obsolete
- The Zscaler solution delivering secure access to private applications on Azure
Ameet Jani, Product Manager Google Beyond Corp at Google
Based on 6 years of creating zero trust networks at Google, the BeyondCorp framework has led to the popularization of a new network security model within enterprises, called the software-defined perimeter. It takes a fundamentally different approach to providing secure access to applications, doing away with the need for traditional perimeter-based network security like solutions like VPNs.
So what does this mean for enterprises not named Google, and how can they can adopt a similar security approach within their organization?
In this webinar hear from Ameet Jani, Product Manager Google Beyond Corp at Google Cloud and Manoj Apte, Chief Strategy Officer at Zscaler as they talk about zero trust security, and how to take a user and application-centric approach to application access. You’ll learn:
- How cloud and mobility are driving enterprise transformation
- The challenge of legacy network-centric methods
- Why a user and application-centric approach strengthens security
- How to support access to internal apps from any device, anywhere
On May 25, 2018, the General Data Protection Regulation (GDPR) will go into effect. Are you properly prepared? According to Gartner, not many will be: “By the end of 2018, over 50% of companies affected by the GDPR will not be in full compliance with its requirements".
You don’t have to be one of these companies.
Join Chris Hudson, EMEA CISO and Shaun Ghafouri, Associate General Counsel, as they discuss some suggested steps for compliance with the GDPR (legal, technical, and organisational). We will also discuss:
One of the first steps is to recognise that GDPR isn't just an IT problem — it affects almost every department — and building a cross-functional team with goals and clear lines of communication is critical.
Specifically, we will be discussing the legal, technical and organisational challenges and roadblocks to GDPR compliance, addressing questions such as:
- With May 25, 2018 less than 3 months away, what should the GDPR project plan look like?
- Who should be on the GDPR team? This isn't just an IT challenge.
- What should the priorities be? Data flows, reasons for data retention.
- What security controls should be in place? Encryption, logging, access control, authentication, data mapping.
- What about Shadow IT? We don't know what we don't know.
GDPR is a big, important undertaking. Your ability to ensure that all departments and stakeholders are working together with the IT team will be a key element of compliance. We hope you will join us.
Dan Shelton, Director of Product Management, Zscaler Inc
Software-defined perimeter security represents the future for remote access
The software defined perimeter (SDP) is a new approach to securing access to internal applications. It relies on software, not VPN hardware appliances, to deliver zero trust access for remote users. This method allows enterprises to use a single solution to standardize remote access security for all users (employees of third party) and platforms, scale them more economically while reducing the potential attack surface.Now users can receive a cloud-like user experience, and admins remain in control of their environment.
Please join Zscaler Director of Product Management (and former customer), Dan Shelton as he discusses the software-defined perimeter as a replacement for remote access VPN. You’ll learn how you can:
Standardize security across all platforms (cloud & datacenter)
Provide granular application access, without network access
Use software to reduce appliance footprint
Deliver a world-class remote user experience
Dan Shelton, Director of Product Management, Zscaler, Inc.
Hear what it takes to deploy Office 365.
Deploying Microsoft Office 365 is unlike any other SaaS application you’ve rolled out before. Even with careful planning, things can easily go sideways. That’s why hearing firsthand what it takes to successfully deploy Office 365 in a global organization from someone who has done it is an invaluable opportunity. Join this webcast to hear all the real-life tips and tricks needed to avoid common Office 365 pitfalls within your IT organization.
In this session, Zscaler Director of Product Management, Dan Shelton, will share lessons learned from supporting an Office 365 deployment for a large global organization with more than 10,000 users across 900 locations in 22 countries.
You will learn:
The due diligence required to validate that your current network and security architecture can support Office 365
What your IT teams can expect in terms of support and the cultural changes required within organizations to leverage Office 365 effectively without compromising security posture.
Challenges common to Office 365 deployments within large global organizations and how to best mitigate the risk of them happening.
What happens to the end-user experience and the best ways to communicate the benefits of the project to the business.
Approaches to best follow Microsoft's guidance on connecting end-users to the Office 365 service
Deepen Desai, Senior Director of Security Research Zscaler
The occurrence of SSL-based threats are continuing to rise. Hackers are getting more and more creative in how they deliver threats, which creates new inspection challenges. Attend this webcast to discuss the latest attack trends, and best practices you can employ within your Zscaler installation to bolster your security.
Please join Deepen Desai, Senior Director of Security Research for Zscaler ThreatLabz as he discusses all the current trends in ransomware and malware. You’ll get to see inside the latest threats, so you can learn how to mitigate risk better and keep your users safe.
You will learn:
- The recent attack trends Zscaler Threatlabz has been tracking across the Zscaler Cloud.
- What Innovative techniques hackers are using in today’s threat landscape.
- Why inspecting SSL is an important step in finding the latest malware strains.
- The best practices and security recommendations to you can use to defend against multi-stage attacks.
Denzil Wessels, Senior Director Product Management, Zscaler, Inc.
Despite its notoriously poor user experience for both users and admins, the remote access VPN has remained the standard for remote access to internally managed applications. The tool, which dates back to the 1990s, extends the corporate network to users and exposes it to malware that may be running on mobile devices.
In this session, Zscaler Senior Director of Product Management, Denzil Wessels, will discuss a new approach for enabling secure remote access to internally managed applications. Instead of relying on appliances anchored to the data center, this revolutionary approach leverages the cloud to deliver the performance users demand and the security IT requires. All without the cost and complexity of static VPN gateway appliances.
In this session, you will learn about the new software-defined approach to secure remote access built upon four key tenets:
Use the internet as the new secure network
Connect users to applications without bringing users on the network
Enable remote access without exposing applications to unauthorized users
Segment access to applications without network segmentation
Dhawal Sharma,Director Product Management,Zscaler, Inc.
Microsoft Office 365 is unlike any other SaaS applications and, even with careful planning, it’s fair to say that deployments don’t always go as planned. The Zscaler cloud processes over 1.3 billion office requests daily for more than 700 customers. In working with customers and Microsoft, we’ve learned a lot of best practices and common pitfalls companies make when fully deploying Office 365.
In this session, Zscaler Director of Product Management, Dhawal Sharma, will discuss Microsoft’s latest connectivity guidance for optimizing your Office 365 deployment and how to avoid the most common pitfalls that can quickly result in user complaints and a delayed deployment.
You will learn:
-How to optimize connectivity to Microsoft
-How to manage tenant restrictions
-How to overcome latency issues – upgrading your infrastructure may not be the solution
-How to provide a fast user experience and avoid random connection issues
-How to stay current with Office 365 IP and URL updates (hint: there’s a new way)
Deepen Desai, Sr. Director, Security Research & Operations,Zscaler, Inc.
A new strain of the Petya ransomware called "Bad Rabbit" is impacting business and sweeping across Russia and Ukraine, among other Eastern European countries. Like many of the other ransomware outbreaks, understanding fact from fiction is the first step in staying safe. Zscaler has been monitoring the outbreak and has pulled together all the latest information about the attack.
Join our webinar to hear Deepen Desai, Sr. Director, Security Research & Operations discuss his evidence-based findings, so you can discern the truth about this evolving threat. You'll learn:
What Bad Rabbit’s attack vector looks like
What trends we're seeing about this attack in the Zscaler Cloud
What proactive actions you can take to keep safe
New ways you can protect your users from threats like Bad Rabbit
Dr. Amit Sinha, Chief Technology Officer, Zscaler Inc
Your applications are moving to the cloud, and your firewall is sure to follow. The concept of only protecting your network no longer makes sense. But, can a virtualized firewall adequately secure organizations as they become more and more distributed? What are your options to determine where your firewalls will reside? How can you evaluate which solution is best for your enterprise?
Join this engaging webinar with Zscaler Executive Vice President of Engineering and Cloud Operations, Chief Technology Officer, Dr. Amit Sinha as he discusses:
Access and security challenges of distributed enterprises
Challenges and limitations of a virtualized firewall approach
Understanding and evaluating the options so you can make an informed decision you feel good about
Today 34% of enterprises are running applications within Azure Cloud. That's up 14% from last year! The problem is that Enterprise Networking and Security teams still rely on the VPN to provide remote access to the network for their mobile users. The VPN, famous for giving users a poor user experience, breaks the cloud experience, exposes the network to employees while driving costs and complexity when migrating apps to Azure.
It's time for enterprises to rethink the way they provide remote access. It's time for them to retire their VPN.
Please join Patrick Foxhoven, CIO and VP of Emerging Technologies, Zscaler, Inc., as he explains how enterprises use Zscaler Private Access (ZPA) for Azure solution provide faster, secure remote access to internal applications for their remote employees. We'll discuss how ZPA:
- Provides direct to cloud access for a better user experience
- Provides secure remote access without the use of VPN
- Reduces costs and complexity due to no need for inbound VPN gateways
Dhawal Sharma, Director of Product Management, Zscaler, Inc., Rachna Srivastava, Sr. Director of Product Marketing, VeloCloud
Cloud technology is the key enabler to new business opportunities, improved efficiency, and a sustainable competitive edge. IT requires new ways to rapidly deliver business applications and services in the cloud reliably and securely. This can be achieved by adopting a new approach that allows for agility and security in the cloud-era.
Attend this webinar to learn about a holistic transformation strategy that brings cloud security and SD-WAN from Zscaler and VeloCloud together for secure, efficient, and cost-effective access to cloud applications and services, over the Internet and beyond.
Jason Georgi Director of the Transformation Office Zscaler, Inc.
As the cloud transforms enterprise IT, it brings a lot more savings than cold hard cash. No question, reducing infrastructure costs is the #1 attraction to cloud. But there are two other cost dimensions with huge impact on security that must not be ignored. The payoffs depend on whether you approach security with a cloud vs. on-premises model. An organization’s choices are crucial – both for enterprise security and for the roles of its stakeholders.
Dr. Manoj Apte, Chief Strategy Officer Zscaler Inc. & Gerry Festa, VP of Product Marketing Zscaler Inc.
A proper Microsoft Office 365 deployment needs direct access to the Internet. This requirement was underscored by Microsoft at the 2016 Ignite conference. Attempting to run Office 365 in a traditional hub-and-spoke network environment will quickly lead to delayed deployments, unplanned outages and users frustrated with subpar performance. Check out this webcast to hear how Zscaler can help you accelerate deployment, deliver a vastly improved user experience and simplify day to day management of Office 365.
Jay Chaudhry CEO, Chairman & Founder Zscaler Inc.& Frederik Janssen Global Head of Portfolio & Lifecycle Managem Siemens,
The world that IT departments have been building for the past 30 years is struggling to remain relevant. Today, your applications are moving to the cloud — Office 365, Salesforce, AWS, and Azure — and your users are mobile, but your security appliances are still at the gateways, protecting your corporate network.
In this session, Frederik Janssen, the Siemens Global Head of Service Portfolio & Lifecycle Management, IT Infrastructure, and Jay Chaudhry, Zscaler CEO, Chairman, and Founder, will share their experiences and insights into the transformation from the old world of IT into cloud enablement.
Deepen Desai Senior Director, Security Research & Operations, Zscaler.& Patrick Foxhoven Chief Information Officer Zscaler
There are many theories about WannaCry and your inbox is probably full of emails explaining why you need to buy yet another security product. They’re essentially saying, “What you’ve got isn’t working, so get more of it.”
But we believe that WannaCry is a clear indication of how the world has changed. To protect our organizations against such modern threats, we need to rethink the way we connect users to their assets and to each other — without bringing them onto the network.
What makes WannaCry a game-changer? Let our security experts show you. Deepen Desai and Patrick Foxhoven will present evidence-based information about WannaCry, so you can discern the truth about this evolving threat. They’ll present details on the initial attack vector, new strains that are emerging and those we are seeing in the Zscaler cloud, and protective actions you can take now. Finally, they’ll discuss how we can more effectively protect against modern threats like WannaCry by rethinking the way we apply security and access controls.
Bil Harmer, Strategist, Office of the CISO, Zscaler
Cyber extortion is on the rise, and the public sector is particularly vulnerable. A study conducted by a leading cybersecurity threat management firm reported that state and local government networks are twice as likely as their commercial counterparts to be infected with either ransomware or malware.
Why are ransomware perpetrators increasingly setting their sights on the public sector? First, many agencies and public institutions rely on legacy systems that are challenged to meet all of today’s cybersecurity threats. Second, the proliferation of devices and technology platforms, including smartphones, tablets and mobile apps, are giving hackers more points of entry into public sector networks. Are you prepared for such an attack?
Join Bil Harmer, Strategist, Office of the CISO, Zscaler Inc., for a compelling webcast highlighting how ransomware can impact your organization and steps you can take to secure your network and systems.
Bil will also cover:
- How ransomware has evolved
- Lessons learned from recent attacks
- Why cloud sandboxing is so important
- Tips for mitigating ransomware
For more information about Zscaler, go to www.zscaler.com
Bil Harmer leads Zscaler’s Office of the CISO for the Americas, where he advises organizations on best practices for implementing cloud-based cybersecurity solutions. A veteran of the IT industry, he has helped startups, governments, and financial institutions design and implement security programs. Bil pioneered the use of the SAS70 coupled with ISO, to create a trusted security audit methodology used by the SaaS industry. A highly sought-after speaker, Bil frequently presents on security and privacy-related topics at conferences such as RSA, ISSA, GrrCon and the Cloud Security Alliance.
The world is undergoing a fundamental change in 2017, much of it driven by fear and uncertainty. Alliances are being reassessed, borders are being redrawn and companies are rethinking their approach to security. What are the new looming threats out there? Who are the biggest perpetrators of cybercrime? And how best should we be protecting our companies? Join Michael Sutton, CISO at Zscaler as he discusses our top 10 security predictions for 2017.
Deepen Desai, Senior Director Security Research, Zscaler & Gerard Festa, Senior Director Product Marketing, Zscaler
This webcast will cover recent attacks and a discussion on what you need to know to mitigate the risk and protect your users. It will highlight the innovative techniques hackers are using in today’s threat landscape along with the best practices and security recommendations to defend against multi-stage attacks.
Revolutionizing Internet Security through the magic of cloud computing
Zscaler ensures that more than 13 million employees at more than 5,000 enterprise and government organizations worldwide are protected against cyber attacks and data breaches while staying fully compliant with corporate and regulatory policies. Zscaler’s award-winning Security-as-a-Service platform delivers a safe and productive Internet experience for every user, from any device and from any location.
Zscaler delivers unified, carrier-grade Internet security, advanced persistent threat (APT) protection, data loss prevention, SSL decryption, traffic shaping, policy management and threat intelligence–all without the need for on-premise hardware, appliances or software.