sb-au logo
Story image

Gartner names Zscaler leader in secure web gateways

03 Dec 2018

Cloud security company Zscaler has announced it was named a Leader in the Gartner Magic Quadrant for Secure Web Gateways for the eighth year in a row.

The report, which measures companies on their ability to execute as well as their completeness of vision, also positioned Zscaler furthest to the right for completeness of vision.     According to Gartner, “The market for cloud-based secure web gateway (SWG) services continues to grow more quickly than the market for appliance-based SWGs.”

Gartner states, “The primary driver for the growth of SWG cloud services is the rapid adoption of software as a service (SaaS) applications, particularly the dominant ones (e.g., Office 365 and Salesforce).

“Rather than backhaul web traffic over expensive Multiprotocol Label Switching (MPLS) connections, enterprises are implementing local internet breakouts from remote offices, and sending web traffic directly to the internet. This approach mandates a change to the enterprise’s security architecture, and most are choosing to adopt a cloud-based SWG service.”   Born in the cloud, Zscaler aims to secure cloud services by moving security off the network and close to the users, providing fast, secure connections regardless of location.  “We’re thrilled to be recognised as a Leader for the eighth consecutive year and feel this recognition reaffirms the disruption that purpose-built cloud solutions are bringing to enterprise security,” says Zscaler founder and CEO Jay Chaudhry.

“By moving security to the cloud, organisations can fully realise the benefits of network and application transformation.”  Zscaler serves more than 3,250 customers across major industries and currently counts over 300 of the Forbes Global 2000 as customers.

The Zscaler cloud platform processes more than 55 billion transactions and detects 100 million threats per day from users across 185 countries.

Earlier this year, Zscaler expanded its SD-WAN partner ecosystem with the addition of Aruba, a Hewlett Packard Enterprise company, CloudGenix, LANCOM Systems, and 128 Technology.

In addition to the aforementioned companies, Zscaler has SD-WAN partnerships with Aryaka, Cisco SD-WAN (Viptela), Citrix, FatPipe Networks, InfoVista, Nuage Networks from Nokia, Talari Networks, and VeloCloud, now part of VMware (NSX SD-WAN).

Several security partners have launched API integrations with Zscaler to provide advanced security automation.

Phantom, now a part of Splunk and a leader in Security Orchestration, Automation and Response (SOAR), and Anomali, a leading Threat Intelligence Platform (TIP), were new to the Zscaler security partner program.

Story image
Trend Micro launches cloud native security solution for modern applications and APIs
“Application security is an invaluable part of the Cloud One platform, integrating technology to provide superior protection for customers deploying applications wherever it makes the most sense for them."More
Story image
Ivanti extends ESM automation capabilities with latest additions
Ivanti has made additions to its Enterprise Service Management (ESM) portfolio, with greater automation capabilities between service management and SecOps. More
Story image
Video: 10 Minute IT Jams - SonicWall VP on the benefits of Boundless Cybersecurity
Today's interviewee will discuss the ins and outs of the company's Boundless Cybersecurity solution and how it can help APAC organisations adjust to the new normal, as well as explaining the 'cybersecurity business gap'.More
Story image
Data leakage concerns dominate cloud security perceptions - Bitglass report
How secure is the public cloud? That’s what many IT and security professionals are asking as data leakage becomes a pressing concern for organisations and their data protection strategies.More
Link image
The definitive checklist to distinguish a broken authentication system
An improper or insecure implementation of authentication is a critical web application security risk. This checklist will discern the good from the bad.More
Story image
How a vantage point sees threats before they impact
When the focus has been on adversaries that develop increasingly complex and sophisticated attacks, tried and true techniques such as compromised credentials continue to be amongst the most potent weapons.More