Enabling business beyond the corporate network.

Slides:



Advertisements
Similar presentations
1/4/2014 Enterprise to Cloud Mobilize, Secure & Accelerate your Business Customer Date `
Advertisements

| Copyright © 2009 Juniper Networks, Inc. | 1 WX Client Rajoo Nagar PLM, WABU.
Govern the Flow of Data: Moving from Chaos to Control
©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Best Practices to Secure the Mobile Enterprise Macy Torrey
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
Palo Alto Networks Jay Flanyak Channel Business Manager
© Blue Coat Systems, Inc All Rights Reserved. APTs Are Not a New Type of Malware 1 Source: BC Labs Report: Advanced Persistent Threats.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Steve Jordan Director. Industry Solutions 05/05/14 Managing Chaos: Data Movement in 2014.
CONFIDENTIAL © Copyright Aruba Networks, Inc. All rights reserved Adaptive Trust Security Policies for Today’s Enterprise Mobility Pete Ryan – ClearPass.
Blue Coat Systems Securing and accelerating the Remote office Matt Bennett.
Unified Logs and Reporting for Hybrid Centralized Management
Citrix Partner Update The Citrix Delivery Centre.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Zscaler Web Security Services Your Name Contact Info August 2009 Zscaler Proprietary & Confidential.
Network Access Management Trends in IT Applications for Management Prepared by: Ahmed Ibrahim S
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
MobileFirst Protect 1. MobileFirst Protect (MaaS360) 2 Mobile Device Management Enable and Manage Apple iOS smartphones, and tablets with Apple DEP Gain.
Data Centers and IP PBXs LAN Structures Private Clouds IP PBX Architecture IP PBX Hosting.
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
DIRECT-TO-CLOUD Issues & Implications Dale McCarty.
Norman SecureSurf Protect your users when surfing the Internet.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
PURE SECURITY Check Point UTM-1 Luděk Hrdina Marketing Manager, Eastern Europe Check Point Software Technologies Kongres bezpečnosti sítí 11. dubna 2007,
1 Monday, June 27, 2011Copyright© 2011 Dragnet Dragnet ® Cloud Service Introduction Matthew McLeod, Managing Director
How STERIS is using Cloud Technology to Protect Web Access Presented By: Ed Pollock, CISSP-ISSMP, CISM CISO STERIS Corporation “Enabling Business”
The Citrix Delivery Center. 2 © 2008 Citrix Systems, Inc. — All rights reserved Every Day, IT Gets More Complex EMPLOYEES PARTNERS CUSTOMERS.
Robbie Upcroft Sales Manager - SMB & Distribution, Asia-Pacific
Dell Connected Security Solutions Simplify & unify.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
Pre-Release Information Aug 17, 2009 Trend Micro Web Gateway Security InterScan Web Security Virtual Appliance v5 Advanced Reporting and Management v1.
The Changing World of Endpoint Protection
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Network security Product Group 2 McAfee Network Security Platform.
Enabling Secure Always-On Connectivity [Name] Microsoft Corporation.
Cloud-based S(ecurity)aaS enables business strategy Jason Georgi Director, Value Management Office.
Copyright © 2014 Juniper Networks, Inc. 1 Juniper Unite Cloud-Enabled Enterprise Juniper’s Innovation in Enterprise Networks.
INNOVATE THROUGH MOTIVATION Mobile Computing & Your Business KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
1Copyright © 2015 Blue Coat Systems Inc. All Rights Reserved. BLUE COAT SYSTEMS CORPORATE OVERVIEW May 2015.
©2014 Cleo. All rights reserved. Company confidential. Managing Chaos: Andy Moir Director, Product Marketing 2 Data Movement in 2015.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Web security | data security | security © 2010 Websense, Inc. All rights reserved. Strategy for Defense Against Web-based Advanced Persistent Threats.
Complete Cloud Security Anyone, anywhere, any app, any device.
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
Blue Coat Cloud Continuum
Best-in-class enterprise backup for the mobile enterprise Prepared for [Insert customer name] [Date}
CAMPUS LAN DESIGN GUIDE Design Considerations for the High-Performance Campus LAN.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
© 2010 Cisco and/or its affiliates. All rights reserved.
Barracuda NG Firewall ™
Direct-to-cloud Issues & Implications Dale McCarty.
The time to address enterprise mobility is now
Barracuda Web Security Flex
Barracuda Firewall The Next-Generation Firewall for Everyone
Barracuda Web Filtering Service
How Smart Networks are Changing Corporate Networks
Advanced Borderless Network Architecture Sales Exam practice-questions.html.
Prevent Costly Data Leaks from Microsoft Office 365
Sizing …today. T: Here’s how. .
Introducing ProxyClient
Check Point Connectra NGX R60
Managing Chaos: Data Movement in 2014 Steve Jordan
Securing the Threats of Tomorrow, Today.
Secure once, run anywhere Simplify your security with Sophos
AT&T Dedicated Internet (ADI)
Utilizing the Network Edge
Presentation transcript:

Enabling business beyond the corporate network. ©2012 Zscaler, Inc. All rights reserved.

“ About Zscaler Mission Enabling business beyond the corporate network: Secure & policy-based mobility, cloud & social media — anywhere, on any device Technology World’s largest secure cloud gateway No hardware, no software Customers Trusted by 3,500 leading enterprises Over 20 million users in 188 countries Largest customer: 1,600,000 users Market Leader 100% year over year growth Leader in Gartner’s Magic Quadrant Zscaler saves bandwidth cost, improves user satisfaction by eliminating latency and performance issues, and reduces IT administration. It’s an IT director’s dream.” “ ©2012 Zscaler, Inc. All rights reserved.

Trusted By the Most Demanding Brands Retail Financial Consumer Goods LEADING BEVERAGE COMPANY Manufacturing Healthcare Technology Public Sector ISP & Others

3 Trends Transforming Network & Security Business Users go Mobile Users work from home or on-the-go Users who BYOD 50% 90% Cloud Apps go Mainstream Cloud-based applications used by an enterprise 50 Social goes Enterprise employees use Facebook at work 75% — Impact — Mobile, Cloud & Social: Driving business beyond the corporate network (often without policy & protection) This is breaking the traditional appliance-based security. Users are often outside the corporate network accessing cloud-based services. 80% of my MLPS traffic use to be for applications at my HQ and 20% was Internet bound. Now it’s just the opposite.” – CIO, Fortune 50 company “

Old IT – Protect the Corporate Network (Static Perimeter) Servers, applications & Data at Corp HQ or DC Internet access was not critical Protect the perimeter with firewalls On-prem firewall/IPS appliances protect servers from incoming attacks Gateway proxies to protect Users On-prem gateway proxies (URL, AV, DLP) enforced policies for users accessing Internet MPLS backbone connected various offices Branch – backhaul traffic to HQ or regional hub Road warriors – Require VPN No policy or protection 90% of the users were in the office. 90% of the access was to on-prem applications. The model worked fine. Backhaul VPN Backhaul MPLS Headquarters On the Road/Mobile Home / Hotspot Regional Gateway Branch Branch Appliances/MPLS backhaul kept life under control for IT ©2012 Zscaler, Inc. All rights reserved.

New IT: Direct to Internet is the New Normal Perimeter is dynamic Applications & data are moving to the cloud Users are going direct to Internet VPN not a desirable option 3G/4G traffic does not go through appliances Gateway proxies and firewalls get bypassed MPLS backhauling is too expensive Causes latency – unhappy users Headquarters On the Road/Mobile Home/Hotspot Regional Gateway Branch A few years ago, 90% of my MPLS traffic was for applications in my corporate data center and 10% was Internet bound. Now, it’s just the opposite.” — CIO, Fortune 50 company “ ©2012 Zscaler, Inc. All rights reserved.

Enabling Requirements Dynamic Security Move from limiting access to enabling strategic business initiatives: mobile, cloud, social Consistent set of policies across multiple devices and locations, (including BYOD) Reduce complexity: consolidate point products Centralized visibility, control and compliance Lower TCO Reduce traffic backhaul cost No hardware/software. Pure OPEX model Enhance user experience Reduce latency, provide transparent experience Easy addition of global points-of-presence Provide optimal path back to corporate applications Appliance technology was built for URL filtering and lacks the functionality required in today’s social and mobile world.” — Phil Hochmuth, IDC “ ©2012 Zscaler, Inc. All rights reserved.

Zscaler Secure Cloud Gateway Mobile & Distributed Workforce Business Applications Web 2.0 and Social On-the-go Nothing good leaks out, nothing bad comes in Enforce Business Policy NO HARDWARE | NO SOFTWARE HQ Cloud Apps Securely Enable Direct to Internet Home or Hotspot Mobil Apps Regional Office Email Services Zscaler was the only one that truly delivered an ultra-low latency experience along with exceptional protection from threats. And best of all, it works exactly as advertised.” “ ©2012 Zscaler, Inc. All rights reserved.

Market Leader and Most Visionary ZScaler …the fastest-growing vendor… …earned the strongest score in Completeness of Vision… …cloud has the largest global footprint… …Zscaler is a very good candidate for most enterprises… Zscaler exhibits the qualities of a market penetration leader.” “ ©2012 Zscaler, Inc. All rights reserved.

Enabling Business Beyond the Corporate Network Secure. Everywhere. Direct to Internet Enable secure Internet access with no new hardware/software Dynamic vs fixed security Cloud-based vs appliance based model No traffic backhauling Most points of presence Zero latency experience Always secure Ultra-fast processing power – inspect everything Enabling Mobility Beyond mobile device management Protect road warriors & remote offices No backhauling traffic, No latency Protect work at home users Secure direct to Internet connections to business apps Enable BYOD Consistent policy for all devices Securing Cloud Apps Securely enabling cloud applications and social media Cloud applications Provide secure access to business critical apps Protect data loss Bandwidth control Allocate BW to prioritize business-critical applications Social compliance Enable legitimate use of social media & ensure compliance Unified Policy and Reporting Apply one policy for any device, location. Real-time cloud intelligence and interactive analysis. Security that Scales No hardware, software. No latency experience. Most points of presence.

Securely Enable Direct to Internet Traffic Dramatically Reduce Costs Policy-follows-the-user everywhere No traffic backhauling; No VPN to HQ Transparent user experience POLICY REPORTING Define policy at a central portal Same policy for users everywhere ADMIN Consolidated Real- time Reporting Zscaler’s patented Nanolog technology Mobile & Distributed Workforce Home or Hotspot HQ Regional Office On-the-go Forward traffic (Configure FW or router) Internet Enforce policy bi-directionally Zscaler enables us to very effortlessly manage policy across 100 locations.” “ ©2012 Zscaler, Inc. All rights reserved.

Enabling Mobility: Why MDM is Not Enough Enable BYOD devices Secure access from devices to corporate assets Keep personal use separate Protect road warriors with zero- latency performance No backhauling traffic No latency Protect work from home users from mobile threats Secure direct to Internet connections to corporate applications, assets Keep malware out of corporate network Zscaler Mobile traffic inspection Data traffic policies URL categorization and App Controls Prevention of phishing, XSS etc. Mitigating mobile malware Mobile DLP MDM Authentication Provisioning of device settings and policies Enterprise App Store Remote Lock, Wipe, etc With Zscaler we now can enforce consistent Internet access policies, whether employees are at our office, on the road, or at home.” “

Securing Cloud Apps & Social Media Securely enable cloud applications Protect data loss Prevent accidental exposure to threats Social media controls Enable legitimate use of corporate media Inspect both incoming and outgoing content Ensure social media posts adhere to corporate policies Bandwidth control Easily and efficiently allocate bandwidth to prioritize business — critical web applications over recreational usage. Zscaler’s well-designed in-the-cloud service with integrated functionality provides high security and granular control al low TCO.” “ ©2012 Zscaler, Inc. All rights reserved.

Purpose-Built for Direct to Internet Challenges World’s Largest Security Cloud No hardware, no software Global reach: 20 million users High-performance: 10 B Transactions/Day Zscaler allows us to consolidate point products, simplify IT administration and reduce cost, while offering rich functionality and ultra-low latency.” “ ©2012 Zscaler, Inc. All rights reserved.

Unified Policy Management & Reporting Define once and apply consistent policy across devices, locations Policy follows the user Cloud Intelligence Dashboard Detailed reports on every transaction Intuitive and easy to use NanoLog™ for real-time analytics: Real-time interactive analysis of billions of transactions Unified reporting for email, web, social, mobile, etc. Zscaler enables us to effortlessly secure traffic across 39 countries, with consolidated real-time visibility.” “ ©2012 Zscaler, Inc. All rights reserved.

Zscaler Benefits Reduce Costs Simplify IT Always Secure No hardware/software Eliminate traffic backhauling Simplify IT Consolidate point products Streamline policy administration Unified reporting Enhance User Experience Near-zero latency Transparent – no bypassing security Always Secure Business Enabler Proven Solution 3,500 industry leading enterprises use Zscaler 20 million users, 188 countries Future Proof Purpose-built to enable mobile, social, cloud Cloud-delivered solution always up to date No Surprises Protection against advanced and emerging threats Real-time cloud intelligence & reporting ©2012 Zscaler, Inc. All rights reserved.

Why Customers Use Zscaler Legacy: All traffic was backhauled to 4 data centers Now: Eliminated dozens of Blue Coat proxies No latency; no backhauling of traffic Security & Web 2.0 control; Follow-the-User policies 120,000 users in 130 countries 4,000 users in 18 locations Legacy: All locations locally managed Now: Direct-to-Internet thru Zscaler TCO: $500,000 over 3 years 17 fewer (full-time) admins required Reduced PC infections from 2/week to 2 in 6 months Legacy: Many disparate point products; URL only Advanced threat protection with SSL Integrated real-time reporting Consistent policies for office and on-the-go Bandwidth cost cut into HALF 4,000 users in 39 countries Legacy: 40 point solutions; No Unified Policies Botnet protection with full inline inspection Managed access to Web 2.0 Site Minimized cost and IT administration Increase security, transparency & compliance 45,000 users in 183 countries

Zscaler in the News “Just Like Everything Else in the Enterprise Space, Security is About to be Disrupted” “Security companies that have historically owned the lion’s share of the enterprise market are losing deals to newer players like Zscaler.” - TechCrunch ©2012 Zscaler, Inc. All rights reserved.

“ Key Takeaways Three trends transforming IT: mobile, social, cloud Business is moving beyond the corporate network New, dynamic solution is needed: secure cloud gateway Requirements: Dynamic security, reduced costs, enhanced user experience Zscaler Secure Cloud Gateway: goes beyond static appliances to safely enable direct to Internet, mobility, social web Trusted by Industry Leaders: 3,000+ enterprises use Zscaler Market Leader: leader and most visionary in Gartner magic quadrant Zscaler saves bandwidth cost, improves user satisfaction by eliminating latency and performance issues, and reduces IT administration. It’s an IT directors dream.” “ ©2012 Zscaler, Inc. All rights reserved.

Enabling business beyond the corporate network. ©2012 Zscaler, Inc. All rights reserved.