Hi [[ session.user.profile.firstName ]]

Zero Trust Security with Zscaler - ZPA

Old world access and security models, still allow anyone to knock on doors & rattle the windows of your environment. You’ve tried to fix this by puting fences, gates, hedges, bars on windows around your building to protect them. Sure this made it harder for bad people to get in, but it still meant people could see your building, gates and doors. This never stopped anyone from still trying to pick your locks or smash over your gates.
Thus learn how Zero Trust Security with ZPA will make your ecosystem and solutions go completely dark & thus ensure only those who have been allowed can get access.
Recorded Dec 6 2018 57 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Nathan Howe and Ian Perry
Presentation preview: Zero Trust Security with Zscaler - ZPA

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Cyber security for a cloud first enterprise Jan 8 2019 10:00 am UTC 60 mins
    Stan Lowe - Global Chief Information Security Officer, Zscaler
    As digital transformation and cloud adoption gathers pace, organisations are placing more and more applications and data into the cloud. Users are increasing mobile and are accessing rich cloud applications whilst on the move, going straight to the internet, often by-passing the corporate VPN. This new reality is leading organisations to rethink their approach to security, essentially doing away with the idea of a trusted corporate network — a shift in thinking that affects every level of IT. The traditional security model of 'castle and moat', placing security technology in the corporate data centre is no longer effective in a cloud first world. During this live webcast, experts from KMPG and Zscaler will examine the impact of cloud adoption and mobility on security strategy, network structure, legal & regulatory and user connectivity. They will highlight the business impact digital transformation has on IT and provide real examples of how some large and complex organisations are successfully moving to the cloud and dealing with mobility - securely
  • Zscaler's wealth of capabilities Recorded: Dec 13 2018 54 mins
    Yogi Chandiramani
    Zscaler constantly innovates its offering and capabilities with the objective to provide best security protection and user experience. Zscaler 5.6 was released in October 2018 and brings a wealth of new capabilities. During this session, you will learn how to best leverage the investment you have made int he Zscaler platform. Our experts will be covering all new security features such as Company Risk Score, Threat Insights Plugin, Threat Library, SCIM authentication and many more.
  • Zero Trust Security with Zscaler - ZPA Recorded: Dec 6 2018 57 mins
    Nathan Howe and Ian Perry
    Old world access and security models, still allow anyone to knock on doors & rattle the windows of your environment. You’ve tried to fix this by puting fences, gates, hedges, bars on windows around your building to protect them. Sure this made it harder for bad people to get in, but it still meant people could see your building, gates and doors. This never stopped anyone from still trying to pick your locks or smash over your gates.
    Thus learn how Zero Trust Security with ZPA will make your ecosystem and solutions go completely dark & thus ensure only those who have been allowed can get access.
  • How Can Zscaler help you to define and accelerate a Zero Trust Model? Recorded: Oct 25 2018 42 mins
    Ian Perry, Zscaler
    We have surpassed the market demand for BYOD and 3rd Party access, as user behaviour and cloud adoption challenge the suitability of network services.

    Innovation and identity driven security solutions are helping our customers to realise a move to zero trust. Unlike many other industry trends the adoption of zero trust brings immediate benefits associated with business and operational agility, user experience and identity driven security.

    IT teams have begun to leverage a zero trust security strategy that builds a framework to accommodate private application and 3rd party access; Accomplished without placing users on the network and in many cases without the need for a mobile client. Transition to this model is low impact and provides immediate value to both IT and business outcomes.

    Join Zscaler in a discussion of how Zscaler Private Access (ZPA) enables you to deliver the experience users want, with the zero trust security you need.

    Gain an insight into:

    - Key concepts of zero trust security.

    - Best practices for private application access.

    - ZPA’s new Browser Based access solution.

    - How our customers are already deploying and benefiting from our Zscaler Private Access service.
  • Be More Avocado Recorded: Oct 9 2018 49 mins
    Yogi Chandiramani
    Most security gateways are like a coconut, once you're through the hard shell, you have access to everything.
    Zscaler is different. We give you security all the way through the stacks for known and unknown threats, on all devices.
    Like an Avocado
  • Overcoming the Challenges of Architecting for the Cloud Recorded: Jun 28 2018 36 mins
    Neels Scheepers - Sales Engineer Zscaler
    5 key requirements for securely routing branch traffic direct to the cloud

    The concept of backhauling traffic to a centralized datacenter worked when both users and applications resided there. But, the migration of applications from the data center to the cloud requires organizations to rethink their branch and network architectures. What is the best approach to manage costs, reduce risk, and deliver the best user experience for all your users?

    Join this webcast with Zscaler Sales Engineer, Neels Scheepers to uncover the five key requirements to overcome these challenges and securely route your branch traffic direct to the cloud.

    You will explore:

    - How cloud applications are driving branch and network transformation
    - Challenges of local breakouts and the hybrid branch
    - 5 key requirements for securely moving your branch workloads to the cloud
  • GDPR - are you ready? Recorded: May 17 2018 41 mins
    Chris Hodson, EMEA CISO, Zscaler
    On May 25, 2018, the General Data Protection Regulation (GDPR) will go into effect. Are you properly prepared? According to Gartner, not many will be: “By the end of 2018, over 50% of companies affected by the GDPR will not be in full compliance with its requirements".

    You don’t have to be one of these companies.

    Join Chris Hudson, EMEA CISO, as he discusses some suggested steps for compliance with the GDPR (legal, technical, and organisational). We will also discuss:

    One of the first steps is to recognise that GDPR isn't just an IT problem — it affects almost every department — and building a cross-functional team with goals and clear lines of communication is critical.

    Specifically, we will be discussing the legal, technical and organisational challenges and roadblocks to GDPR compliance, addressing questions such as:

    With May 25, 2018 not far away, what should the GDPR project plan look like?
    Who should be on the GDPR team? This isn't just an IT challenge.
    What should the priorities be? Data flows, reasons for data retention.
    What security controls should be in place? Encryption, logging, access control, authentication, data mapping.
    What about Shadow IT? We don't know what we don't know.
    GDPR is a big, important undertaking. Your ability to ensure that all departments and stakeholders are working together with the IT team will be a key element of compliance. We hope you will join us.
Revolutionising cloud security
Back in the day when your users were all on the network and your applications resided in your physical data center, it made sense to establish a secure perimeter around your network. But those days are over, the perimeter is gone, and network security is all but irrelevant.

Instead, you need to put your defenses and controls where the connections occur— the internet — so that every connection is fast and secure, no matter how or where users connect or where their applications reside.

By moving applications and infrastructure to the cloud and untethering employees from their desks, you can realize tremendous advantages in productivity, agility, and cost containment. With our 100% cloud built secure platform, Zscaler can help you make the move to the cloud, securely.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Zero Trust Security with Zscaler - ZPA
  • Live at: Dec 6 2018 10:00 am
  • Presented by: Nathan Howe and Ian Perry
  • From:
Your email has been sent.
or close