Microsoft and Zscaler - Powering Fast and Secure Access to All Apps
Your users expect fast, seamless access to all applications from any device and any location. Your business expects you to drive productivity, securely and at scale. And of course, they want all of it yesterday.
Learn how Microsoft Azure Active Directory and Zscaler combine authentication and identity management with adaptive, zero-trust access across all your apps—in the cloud and on premises. This integrated solution enables you to offer:
- Password-less authentication with single sign-on
- Secure, adaptive application access without placing users on the corporate network
- Simplified management at scale
- Join us as we discuss securing users’ access to all apps and take a dive deep into the integrations between Microsoft Azure Active Directory and Zscaler. You can also see the solution in action!
RecordedJan 24 202054 mins
Your place is confirmed, we'll send you email reminders
Nathan Howe, Director Transformation Strategy at Zscaler, and Tony Fergusson, Managing Director at Cloud Security Zero
The new way of work is remote, mobile-first, and cloud-based. Employees expect instant, secure access to applications, information, and resources. Meanwhile, threats proliferate, VPNs lag, hardware costs rise, and little is truly secure. Hub-and-spoke networks employing castle-and-moat security are no longer tenable, and technology leaders that cling to legacy architectures put enterprises at risk. Secure Cloud Transformation is a practical cyber security approach that prioritises security and user performance to align with today’s way of working.
The session will be hosted by Nathan Howe, Director Transformation Strategy at Zscaler, and Tony Fergusson, who will share experiences from his time at a manufacturing and transportation services company with 12,000 users in over 100 locations and 70 countries
They will discuss how enterprise IT leaders can:
• Improve customer digital experience while safeguarding sensitive information
• Increase user performance while minimising risk
• Drive revenue and scalability while controlling costs
Are you ready for a secure cloud transformation? Sign up for this webinar today!
Using more than one cloud provider is becoming the norm for enterprise architectures.
But how will you provide unified access to them in a secure and reliable way?
Learn how you can avoid the 3 common pitfalls of setting up a multi-cloud architecture. Furthermore, we will discuss ways you can provide access to multiple cloud environments, as well as the services in your own data center.
Tony Fergusson, IT Infrastructure Architect, MAN Energy Solutions | Deepen Desai, VP of Security Research, Zscaler
Ransomware is now using popular remote access VPNs as a Trojan horse to gain access to enterprise networks. This is frustrating for IT teams that are being asked to enable mobility for their users. Unfortunately, the technology they invested in to protect their business has been rendered obsolete.
We understand. We’ve helped hundreds of companies embrace a new approach to remote access. In this session join our customer Tony Fergusson, IT Infrastructure Architect at MAN Energy Solutions, and the Zscaler team to learn:
- How cyber criminals are exploiting remote access VPNs with ransomware
- Why Gartner is recommending ZTNA (zero trust network access) to protect sensitive data
- About best practices and hear real-world stories
What does safely exposing your internal applications to the Internet really mean? Why protect against SQLi, XSS, brute force, or credential stuffing from the open internet if you could just completely close every open door to it? The best breach prevention is to reduce your attack surface.
Join Zscaler as we discuss zero trust application access and transparently protecting your work from anywhere users while inspecting their encrypted traffic.
Manoj Apte, Chief Strategy Officer, Zscaler & Dan Shelton, Director Transformation Strategy, Zscaler
Doing business has significantly changed during the past decade. New digital business models empower companies to engage with customers and employees in ways that consistently deliver access to applications and services no matter where they are or what device they are using to access it.
The traditional approaches of perimeter-based security no longer align with today’s business models. Instead, they increase cost and complexity while delivering a poor user experience. To address this ongoing challenge, Gartner has developed a new model of networking and security that matches these new requirements, called Secure Access Service Edge (SASE).
In this webinar, we’ll discuss why Gartner has defined this new SASE architecture and how it will change IT.
Learn about:
How SASE evolved to its current definition and the challenges it addresses
The benefits of SASE deployments and how to get the most out of it
The key benefits and pitfalls to be aware of when deploying a SASE solution
Thomas Quinlan, Director of Solution Architecture, EMEA, Zscaler
As users leave offices, and applications leave the data centre, the internet is becoming the new corporate network. Learn how you can utilise Gartner's SASE architecture to protect your users' access to the Internet and SaaS applications, wherever they may be - even when they're roaming.
Learn how to take advantage of traffic forwarding (directly or with SDWAN) from fixed locations, how to enable roaming users to be secure and how to apply a consistent policy across the enterprise that follows each user.
Zscaler provides Security as a Service to thousands of organisations worldwide, enabling them to leverage the latest in security technology, protecting users when accessing both the internet and their private applications.
Nathan Howe, Director Transformation Strategy at Zscaler, and Tony Fergusson, Managing Director at Cloud Security Zero
The new way of work is remote, mobile-first, and cloud-based. Employees expect instant, secure access to applications, information, and resources. Meanwhile, threats proliferate, VPNs lag, hardware costs rise, and little is truly secure. Hub-and-spoke networks employing castle-and-moat security are no longer tenable, and technology leaders that cling to legacy architectures put enterprises at risk. Secure Cloud Transformation is a practical cyber security approach that prioritises security and user performance to align with today’s way of working.
The session will be hosted by Nathan Howe, Director Transformation Strategy at Zscaler, and Tony Fergusson, who will share experiences from his time at a manufacturing and transportation services company with 12,000 users in over 100 locations and 70 countries
They will discuss how enterprise IT leaders can:
• Improve customer digital experience while safeguarding sensitive information
• Increase user performance while minimising risk
• Drive revenue and scalability while controlling costs
Are you ready for a secure cloud transformation? Sign up for this webinar today!
Stan Lowe, Global Chief Information Security Officer, Zscaler
For some organizations cloud moves can be a complex undertaking, we will discuss how to simplify this effort and leverage it to gain control and visibility into your applications and data.
Threat actors are leveraging fears and concerns around the COVID-19 outbreak to launch new attacks. With VPNs breaking from increased workloads forcing at-home workers to bypass traditional security controls, knowing what’s targeting your users during this critical time is more important than ever.
Join this special Zscaler ThreatLabZ webinar to hear all about the latest COVID-19-related threats, and what you need to know to keep your at-home users safe.
In this session, you’ll learn:
- How threat actors are leveraging the COVID-19 pandemic
- What top COVID-19 threats are targeting your users
- New COVID-19 phishing and malware campaigns
- What you can do to keep your at-home users safe
Andy Brown, Solutions Architect, Zscaler & Simon Pamplin, Director of Technical Sales, Silver Peak
As applications migrate to the cloud and the world becomes increasingly mobile, organisations are embracing SD-WAN and cloud-based security as an alternative to cumbersome router-centric WANs and costly security appliances. Discover how secure SD-WAN can help enterprises achieve the full transformational promise of the cloud.
Join Andy Brown, Solutions Architect, Zscaler & Simon Pamplin, Director of Technical Sales, Silver Peak on the 12th May at 2pm BST to discover:
- The challenges of legacy approaches to networking and security
- Why shifts in traffic patterns and the fundamental nature of apps are forcing organisations to embrace new wide area network and security models
- How the Silver Peak and Zscaler Secure SD-WAN solution delivers lower costs, simplified operations, and the highest quality experience for your IT organisation and end users
Manoj Apte, Chief Strategy Officer, Zscaler & Dan Shelton, Director Transformation Strategy, Zscaler
Doing business has significantly changed during the past decade. New digital business models empower companies to engage with customers and employees in ways that consistently deliver access to applications and services no matter where they are or what device they are using to access it.
The traditional approaches of perimeter-based security no longer align with today’s business models. Instead, they increase cost and complexity while delivering a poor user experience. To address this ongoing challenge, Gartner has developed a new model of networking and security that matches these new requirements, called Secure Access Service Edge (SASE).
In this webinar, we’ll discuss why Gartner has defined this new SASE architecture and how it will change IT.
Learn about:
- How SASE evolved to its current definition and the challenges it addresses
- The benefits of SASE deployments and how to get the most out of it
- The key benefits and pitfalls to be aware of when deploying a SASE solution
Jay Chaudhry, CEO Zscaler, Mike Towers,CISO Takeda Pharmaceuticals and Alex Philips, CIO National Oilwell Varco
Join Jay Chaudhry, CEO and founder of Zscaler and customers Mike Towers, CISO Takeda Pharmaceuticals and Alex Philips, CIO National Oilwell Varco as they share details on how to provide a productive and secure work-from-home experience for their employees:
- How Takeda Pharmaceuticals International and National Oilwell Varco quickly enabled all its employees to work from home while keeping the organization secure.
- How you can be up-and-running in a matter of days.
- Requirements for enabling your team work from home.
- How to apply some of the lessons learned as well as best practices.
Nathan Howe, Director Transformation Strategy at Zscaler, and Tony Fergusson, Managing Director at Cloud Security Zero
The new way of work is remote, mobile-first, and cloud-based. Employees expect instant, secure access to applications, information, and resources. Meanwhile, threats proliferate, VPNs lag, hardware costs rise, and little is truly secure. Hub-and-spoke networks employing castle-and-moat security are no longer tenable, and technology leaders that cling to legacy architectures put enterprises at risk. Secure Cloud Transformation is a practical cyber security approach that prioritises security and user performance to align with today’s way of working.
The session will be hosted by Nathan Howe, Director Transformation Strategy at Zscaler, and Tony Fergusson, who will share experiences from his time at a manufacturing and transportation services company with 12,000 users in over 100 locations and 70 countries
They will discuss how enterprise IT leaders can:
• Improve customer digital experience while safeguarding sensitive information
• Increase user performance while minimising risk
• Drive revenue and scalability while controlling costs
Are you ready for a secure cloud transformation? Sign up for this webinar today!
Threat actors are sneaking malicious content into encrypted traffic, making it difficult for enterprises to detect and prevent against threats.
During this session, our experts will demonstrate on how to inspect encrypted traffic at scale and ensure best practice from a business and legal standpoint.
We'll be featuring a case study from Schneider Electric.
What does safely exposing your internal applications to the Internet really mean? Why protect against SQLi, XSS, brute force, or credential stuffing from the open internet if you could just completely close every open door to it? The best breach prevention is to reduce your attack surface.
Join Zscaler as we discuss zero trust application access and transparently protecting your work from anywhere users while inspecting their encrypted traffic.
Moinul Khan, Zscaler; Chris Morosco, Zscaler; and Brad Moldenhauer, Steptoe & Johnson
The move from applications residing in the data center to a digital business model in the cloud has led to the widespread adoption of SaaS and public cloud applications. Data is now completely distributed and extremely easy to inadvertently expose, as the access to this data becomes distributed as well with more users working outside of the office. These visibility and control factors make ensuring data compliance that much more difficult.
Hear from Moinul Khan, Zscaler Senior Director of Product Management, Chris Morosco, Zscaler Senior Director of Product Marketing, and Brad Moldenhauer, Steptoe & Johnson’s Director of Info Security, as they discuss best practices to secure data in a cloud-first world.
In this webinar, you’ll learn best practices for:
- Preventing employees from accidentally sharing sensitive data, and internal threats from stealing it
- Providing compliance visibility and violation mitigation across SaaS applications and cloud service providers
- Ensuring SaaS and cloud provider deployed application configurations follow industry and organization defined best practices
Diana Kelley | David Sherry | Lee Imrey | Nathan Howe
Remote working has been a growing trend for the last few years, especially in the tech sector. However, the COVID19 outbreak has really pushed businesses to adopt or accelerate their remote integration plans. How has this affected security? What are the steps companies need to take to better protect their remote workforce?
Join this episode as we explore the security challenges in the time of COVID, why a strong security culture is important, and what steps to take today.
- What are the security challenges associated with remote working
- Examples of changes in cyber-attacks during COVID
- Managing patching, VPNs, and backups for large and small remote workforces
- How to maintain auditability and visibility
- How to enable and keep your remote team secure
- Tips for training end users to help themselves
- Why a strong security culture matters now more than ever
Panelists:
- David Sherry, CISO, Princeton University
- Lee Imrey, Cybersecurity Advisor, Splunk
- Nathan Howe, Head of Transformation Strategy, EMEA, Zscaler
This episode is part of The (Security) Balancing Act series with Diana Kelley. Viewers are encouraged to ask questions during the live Q&A.
Alberto Cita - Sales Engineering Manager Iberia & Italy - Zscaler
La forma de hacer negocios ha cambiado significativamente durante la última década. Los nuevos modelos de negocios digitales permiten a las empresas comprometerse con los clientes y los empleados de manera que ofrezcan sistemáticamente acceso a las aplicaciones y los servicios sin importar dónde estén o qué dispositivo utilicen para acceder a ellos.
Los enfoques tradicionales de la seguridad basada en el perímetro corporativo ya no se alinean con los modelos comerciales actuales. En su lugar, aumentan el costo y la complejidad, al tiempo que ofrecen una experiencia de usuario deficiente.
Para hacer frente a este desafío continuo, Gartner ha desarrollado un nuevo modelo de red y seguridad que se ajusta a estos nuevos requisitos, llamado Secure Access Service Edge (SASE).
En este webinar, discutiremos por qué Gartner ha definido esta nueva arquitectura SASE y cómo cambiará la TI.
Descubra durante la sesión:
- Cómo evolucionó el SASE hasta su definición actual y los desafíos que permite resolver
- Los beneficios de los despliegues de SASE y cómo sacarle el máximo provecho
- Los principales beneficios y dificultades que hay que tener en cuenta al desplegar una solución SASE
Acompáñenos el 25 de junio a las 11:00 para este webinar de 45 minutos presentado por Alberto Cita, Sales Engineering Manager Iberia & Italy
Ivan Rogissart - Sales Engineering Manager Southern Europe - Zscaler
La façon de faire des affaires a considérablement changé au cours de la dernière décennie. Les nouveaux modèles commerciaux numériques permettent aux entreprises de s'engager auprès de leurs clients et de leurs employés de manière à leur fournir un accès constant aux applications et aux services, quel que soit l'endroit où ils se trouvent ou le dispositif qu'ils utilisent pour y accéder.
Les approches traditionnelles de la sécurité basée sur le périmètre du réseau d’entreprise ne sont plus adaptées aux modèles commerciaux actuels. Au contraire, elles augmentent les coûts et la complexité tout en offrant une mauvaise expérience à l'utilisateur.
Pour relever ce défi permanent, Gartner a développé un nouveau modèle de réseau et de sécurité qui répond à ces nouvelles exigences, appelé Secure Access Service Edge (SASE).
Dans ce webinaire, nous verrons pourquoi Gartner a défini cette nouvelle architecture SASE et comment elle va changer l'informatique.
Découvrez :
- Comment le concept SASE a évolué vers sa définition actuelle et les défis auxquels il permet de répondre
- Les avantages des déploiements SASE et comment en tirer le meilleur parti
- Les principaux avantages et pièges à identifier lors du déploiement d'une solution SASE
Retrouvez-nous le 24 juin à 11h00 pour ce webinaire de 45 minutes animé par Ivan Rogissart, Sales Engineering Manager Europe du Sud.
L'attività commerciale è cambiata in modo significativo nell'ultimo decennio. I nuovi modelli di business digitale consentono alle aziende di interagire con i propri clienti e i dipendenti in modo da fornire costantemente l'accesso alle applicazioni e ai servizi, indipendentemente da dove si trovino o da quale dispositivo stiano utilizzando per accedervi.
Gli approcci tradizionali alla sicurezza basata sul perimetro non sono più in linea con i modelli di business odierni. Al contrario, aumentano i costi e la complessità, offrendo al contempo una scarsa esperienza utente.
Per affrontare questa sfida, Gartner ha sviluppato un nuovo modello che soddisfa questi nuovi requisiti, chiamato Secure Access Service Edge (SASE).
In questo webinar discuteremo il motivo per cui Gartner ha definito questa nuova architettura SASE e come cambierà l'IT.
Per saperne di più:
- Come SASE si è evoluto fino alla sua attuale definizione e le sfide che consente di affrontare
- Come riconoscere una soluzione veramente SASE
- I vantaggi delle soluzioni SASE e come trarne il massimo beneficio
-Le insidie principali di cui essere consapevoli quando si implementa una soluzione SASE
Unitevi a noi il 23 Giugno alle 11:00 per questo webinar di 45 minuti condotto da Marco Catino, Sales Engineer Italia
Back in the day when your users were all on the network and your applications resided in your physical data center, it made sense to establish a secure perimeter around your network. But those days are over, the perimeter is gone, and network security is all but irrelevant.
Instead, you need to put your defenses and controls where the connections occur— the internet — so that every connection is fast and secure, no matter how or where users connect or where their applications reside.
By moving applications and infrastructure to the cloud and untethering employees from their desks, you can realize tremendous advantages in productivity, agility, and cost containment. With our 100% cloud built secure platform, Zscaler can help you make the move to the cloud, securely.
Microsoft and Zscaler - Powering Fast and Secure Access to All AppsJairo Cadena, Dhawal Sharma[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]54 mins