Zscaler, the cloud security provider, has unveiled four new cybersecurity services and capabilities which further extend the power of its Zscaler Zero Trust Exchange cloud security platform.
“The innovations not only enhance the monitoring and remediation of sophisticated attacks but also deliver a fundamentally new approach to securely connecting branch offices, all while simplifying and streamlining the management process at scale for IT professionals,” says the company.
Large-scale cybersecurity attacks have become increasingly sophisticated and widespread. These attacks can devastate an organisation's reputation, financial stability, and day-to-day operations.
To combat these threats, businesses must have a comprehensive cloud security platform providing real-time threat detection, automated response, and proactive risk mitigation. Processing over 300 billion transactions daily, the Zscaler platform is a fully integrated, extensible cloud security platform that provides customers with always-on intelligence that allows organisations to take a proactive approach to security, respond to threats efficiently, and optimise their security posture.
At Zenith Live Las Vegas, Zscaler unveiled the following security services and capabilities.
Zscaler Risk360 helps CIOs and CISOs make informed and expedited business decisions that help reduce cyber risk. By leveraging a rich set of signals from internal and external sources within the Zscaler platform, IT and security leaders gain unparalleled visibility and actionable intelligence from more than 100 data-driven factors to enable robust risk quantification. It delivers real-time risk scores for all stages of cyber breaches and visualises risk across four entities, including the workforce, third parties, applications, and assets.
The intuitive visualisation and reporting filter top drivers for cyber risk and anticipates financial exposure estimates, including financial remediation recommendations, with the ability to create concise board-level presentation materials.
Actionable remediation prioritises actionable recommendations with guided workflows to investigate and remediate the most critical issues to keep an organisation secure and operations running non-stop.
Zero Trust Branch Connectivity delivers simplicity, scale, and superior security, dramatically reducing recurring overhead costs associated with MPLS connections for branch locations. This fundamentally new approach to securely connecting branch offices helps eliminate risky site-to-site VPNs over SD-WANs, resulting in improved user, application, and data security, lowered costs, and reduced operational complexity, all while significantly accelerating M&A.
A new plug-and-play appliance features zero-touch provisioning, making installs effortless. Zero Trust Branch Connectivity enables enterprises to replace site-to-site VPNs and costly MPLS connections with Zero Trust, simplify branch IT operations, and accelerate M&A and B2B.
“Enterprises relying on site-to-site VPNs for their branch locations are experiencing increased volumes of security threats,” says Naresh Kumar, vice president of product management at Zscaler.
“Site-to-site VPNs create an entry point for lateral threat movement and lack the security benefits of a zero trust architecture. Zscaler has reimagined branch connectivity by eliminating VPNs and providing secure access via the Zscaler Zero Trust Exchange for users, servers, and devices at branch sites. All you need is a broadband connection.”
Cybercriminals are increasingly targeting users for their identities and credentials. The Zscaler ThreatLabz annual Phishing Report found that most modern phishing attacks rely on stolen credentials. Zscaler ITDR strengthens the business’s security posture with continuous visibility into identity misconfigurations and risky permissions.
“With Zscaler ITDR, CISOs can quantify identity risk, find misconfigurations, real-time monitoring, stop privilege escalation, and remediate issues. ZSLogin feature, which is the centralised login dashboard with streamlined authentication for IT processes, makes IT Administrators' lives easier while elevating their effectiveness by providing centralised entitlement management, passwordless multifactor authentication, and automated administrator identity management,” concludes Kumar.