zscaler shift - intelligent routing for streamlined internet security
DESCRIPTION
Zscaler Shift advances internet security with intelligent routing that automatically applies adaptive security and policy to dynamic Internet threats, enabling global protection and visibility in minutes through a cloud based service. For more information, please visit www.zscalershift.comTRANSCRIPT
Everything is about to Shift – take the Intelligent Route.
Key Trend: Consumerization of the “Network”
Enterprise networks are undergoing transformation driven by the proliferation of cloud applications.
Social Media Applications
Facebook, Twitter, LinkedIn
Productivity Applications
Office 365, Google Apps, Salesforce
Collaboration Applications
WebEx, Skype, GTalk
File Sharing Applications
Dropbox, Box, Skydrive
Streaming Media Applications
Youtube, Vimeo, Google Video
Challenge: Traditional Security is Falling Short
Security must undergo transformation to adapt to the new “network”.
Key security objectives:
1. Block malicious sites.
2. Control access to objectionable sites.
3. Provide visibility to management and auditors.
But is Google a “bad” site?
Google Code may contain malicious content.
Google search results may contain salacious content.
Traditional Solution: Block “bad” sites using domain and
URL based filtering methods.
Issue: Reputable sites may also contain malicious or
objectionable material rendering traditional solutions
ineffective.
Adapting Security to the New “Network”
Current approaches to security:
1. Maintain status quo – it won’t happen to me.
2. Post incident analysis.
These approaches are costly and may lead to loss of
brand reputation if an incident occurs for any company,
regardless of their size.
Security needs to be as ubiquitous as connectivity.
Tenants of a new security paradigm:
1. Uniform security and policies across all networks.
2. Real-time visibility across all networks.
3. Ease of deployment.
4. Seamless user experience.
5. Elasticity to add and remove networks on-demand.
Zscaler SHIFT: Secure. Everywhere.
To secure business in the cloud, you need security in the cloud.
It leverages threat intelligence
based on real-time heuristics and
behavioral analysis from its global
network of 100+ data centers to
apply adaptive routing around
dynamic Internet threats.
Zscaler SHIFT enables instant policy
enforcement, security and visibility
for corporate headquarters,
branch offices, and guest access
networks – without the need for
complex and expensive on-premise
security appliances.
World’s Largest Security Cloud 4,500 enterprises. 180 countries. 12 billion
transactions/day.No hardware. No software.
Any Network Security Cloud Cloud Services
Enterprise Networks Productivity Apps
Mobile Apps
Social Media
Intelligent Routing
Zscaler SHIFT is configured in minutes by setting DNS to 8.34.34.34 and 8.35.35.35 - but it’s much more than traditional domain filtering. It combines the best of both worlds -- the simplicity of DNS and the powerful functionality of proxy technology tied together in an intelligent and transparent way. Network traffic is redirected using anycast technology to the nearest Zscaler SHIFT data center. Real-time threat intelligence and corporate policies are applied to route the traffic:
1. Known malicious or unauthorized sites are blocked.
2. Access to reputable or permissible sites is allowed.
3. Potentially malicious or traffic to search platforms like Google is routed through Zscaler’s Global Security Cloud for deep inline content inspection; only good content is retrieved.
Network
Full Content Inspection (Proxy)Destination Filtering
BotnetsMalware
Intelligent RoutingSecurity, Policy, Visibility
Zscaler SHIFT Advances Internet Security
1. Uniform security and policies across all networks are administered through a single pane of glass.
2. Insights based on automatic consolidation and correlation of logs across all networks in real-time.
3. Configuration in minutes through a simple DNS-based deployment; but much more than just domain filtering with proxy technology.
4. Enhancing user experience by seamlessly redirecting traffic to the nearest data centerpreserving geo-localization and eliminating backhaul.
5. Subscription based licensing offers cost elasticity to add and remove networks on-demand.
Join 4,500 global enterprises and shift to security in the cloud.
TRY A RISK-FREE EVALUATION
www.zscalershift.com