InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

How to Extend the Zscaler Platform to Secure Workloads in a Public Cloud

Presented by

Sakthi Chandra, Sr. Director, Product Marketing & Mrigank Singh, Director, Product Management at Zscaler

About this talk

Interested in extending the Zscaler platform to secure your workloads in the public cloud? Looking for best practices? Where do you start and what do you implement to enable zero trust? VMs, Serverless, VDI, Containers—struggling to secure their ingress and egress traffic? How can you transition your cloud security to a modern architecture that is based on least-privileged access? Zero trust presents an opportunity for IT organizations to resist the temptations to extend their WAN architecture that is used on-premises to the cloud. Existing firewall- and VPN-based approaches put enormous responsibility on IT teams to configure policies and enforce remediations locally at each trust zone. This approach creates routable networks a panacea for firewall bloat and untenable policy management. Join this webinar with product and technical experts from Zscaler, the industry leader in zero trust, as they discuss how you can implement zero trust in five simple steps. Topics will include product demonstrations and best practices to: • Implement advanced threat prevention using Zscaler zero trust • Enable proxy-based SSL decryption for all workloads • Activate data protection for cloud • Configure workload segmentation between different public clouds based on policy profiles • Enable log streaming from the public cloud to your SIEM for compliance & regulatory and SecOps requirements
Zscaler

Zscaler

33161 subscribers250 talks
Zero Trust + AI: Protecting What Firewalls Can't
Traditional firewalls, VPNs, and public point solutions for data security are failing in the AI era, because they expand your attack surface and allow lateral threat movement. The Zero Trust Exchange delivers a new approach that eliminates the concept of implicit trust, operating on the principle: Never trust, always verify. It delivers zero trust architecture as a service from a resilient, cloud-native AI cybersecurity platform. Acting as an intelligent switchboard to enable Zero Trust Everywhere, it provides secure, any-to-any, zero trust communication that uses business policies, not networks, for all of your workforces, branches, and clouds. The platform, built upon the Zero Trust Architecture and AI foundation, provides five integrated solutions: Cyberthreat Protection, Data Security, Zero Trust Branch and Cloud, and Security Operations.
Related topics