secure. everywhere. ©2012 zscaler, inc. all rights reserved. secure. everywhere. ©2012 zscaler,...

20
Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved. Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved. Enabling business beyond the corporate network.

Upload: fidel-fickling

Post on 31-Mar-2015

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved. Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved. Enabling business beyond the

Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved.©2012 Zscaler, Inc. All rights reserved.

Secure. Everywhere.

Enabling business beyond the corporate network.

Page 2: Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved. Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved. Enabling business beyond the

Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved.

About Zscaler

Mission Enabling business beyond the corporate network:• Secure & policy-based mobility, cloud & social

media — anywhere, on any device

Technology • World’s largest secure cloud gateway• No hardware, no software

Customers • Trusted by 3,500 leading enterprises• Over 20 million users in 188 countries• Largest customer: 1,600,000 users

MarketLeader

• 100% year over year growth• Leader in Gartner’s Magic Quadrant

Zscaler saves bandwidth cost, improves user satisfaction by eliminating latency and performance issues, and reduces IT administration. It’s an IT director’s dream.”

Page 3: Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved. Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved. Enabling business beyond the

Secure. Everywhere.

Trusted By the Most Demanding Brands

Consumer Goods

LEADING BEVERAGE COMPANY

Technology ISP & OthersPublic SectorHealthcare

ManufacturingRetail Financial

Page 4: Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved. Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved. Enabling business beyond the

Secure. Everywhere.

— Impact —

3 Trends Transforming Network & Security

Business Users go Mobile

Users work from home or on-the-go

Users who BYOD50%

90%

Mobile, Cloud & Social: Driving business beyond the corporate network (often without policy & protection)

This is breaking the traditional appliance-based security.Users are often outside the corporate network accessing cloud-based services.

80% of my MLPS traffic use to be for applications at my HQ and 20% was Internet bound. Now it’s just the opposite.” – CIO, Fortune 50 company

Cloud Apps go Mainstream

Cloud-based applications used by an enterprise

50

Social goes Enterprise

employees use Facebook at work

75%

Page 5: Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved. Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved. Enabling business beyond the

Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved.

Old IT – Protect the Corporate Network (Static Perimeter)

Servers, applications & Data at Corp HQ or DC– Internet access was not

critical Protect the perimeter with

firewalls– On-prem firewall/IPS appliances

protect servers from incoming attacks

Gateway proxies to protect Users– On-prem gateway proxies (URL,

AV, DLP) enforced policies for users accessing Internet

MPLS backbone connected various offices– Branch – backhaul traffic to HQ

or regional hub– Road warriors – Require VPN

Regional Gateway Branch

HeadquartersHome / Hotspot

On the Road/Mobile

No policy or protection

VPN Backhaul

MPLS

Branch

Backhaul

90% of the users were in the office. 90% of the access was to on-prem applications. The model worked fine.

Appliances/MPLS backhaul kept life under control for IT

Page 6: Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved. Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved. Enabling business beyond the

Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved.

New IT: Direct to Internet is the New Normal

Perimeter is dynamic Applications & data are

moving to the cloud Users are going direct to

Internet– VPN not a desirable option– 3G/4G traffic does not go

through appliances

Gateway proxies and firewalls get bypassed– MPLS backhauling is too

expensive– Causes latency – unhappy

usersRegional Gateway

Branch

HeadquartersHome/Hotspot

On the Road/Mobile

A few years ago, 90% of my MPLS traffic was for applications in my corporate data center and 10% was Internet bound. Now, it’s just the opposite.” — CIO, Fortune 50 company

Page 7: Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved. Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved. Enabling business beyond the

Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved.

Enabling Requirements

Dynamic Security – Move from limiting access to enabling strategic

business initiatives: mobile, cloud, social

– Consistent set of policies across multiple devices and locations, (including BYOD)

– Reduce complexity: consolidate point products

– Centralized visibility, control and compliance

Lower TCO– Reduce traffic backhaul cost

– No hardware/software. Pure OPEX model

Enhance user experience– Reduce latency, provide transparent experience

– Easy addition of global points-of-presence

– Provide optimal path back to corporate applications

Appliance technology was built for URL filtering and lacks the functionality required in today’s social and mobile world.” — Phil Hochmuth, IDC

Page 8: Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved. Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved. Enabling business beyond the

Secure. Everywhere.

Zscaler Secure Cloud Gateway

©2012 Zscaler, Inc. All rights reserved.

Zscaler was the only one that truly delivered an ultra-low latency experience along with exceptional protection from threats. And best of all, it works exactly as advertised.”

Mobile & Distributed Workforce

BusinessApplications

Home or Hotspot

Mobil Apps

HQ Cloud Apps

Regional Office

Email Services

Securely Enable Direct to Internet

Nothing good leaks out, nothing bad comes inEnforce Business Policy

NO HARDWARE | NO SOFTWARE

Web 2.0 and SocialOn-the-go

Page 9: Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved. Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved. Enabling business beyond the

Secure. Everywhere.

ZScaler

Market Leader and Most Visionary

©2012 Zscaler, Inc. All rights reserved.

…the fastest-growing vendor…

…earned the strongest score in Completeness of Vision…

…cloud has the largest global footprint…

…Zscaler is a very good candidate for most enterprises…

Zscaler exhibits the qualities of a market penetration leader.” “

Page 10: Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved. Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved. Enabling business beyond the

Secure. Everywhere.

Direct to InternetEnable secure Internet access with no new hardware/software– Dynamic vs fixed security

Cloud-based vs appliance based model

– No traffic backhaulingMost points of presenceZero latency experience

– Always secureUltra-fast processing power – inspect everything

Security that ScalesNo hardware, software. No latency experience. Most points of presence.

Enabling Business Beyond the Corporate Network

Secure. Everywhere.

Enabling MobilityBeyond mobile device management– Protect road warriors &

remote officesNo backhauling traffic, No latency

– Protect work at home usersSecure direct to Internet connections to business apps

– Enable BYODConsistent policy for all devices

Securing Cloud AppsSecurely enabling cloud applications and social media– Cloud applications

Provide secure access to business critical appsProtect data loss

– Bandwidth control Allocate BW to prioritize business-critical applications

– Social complianceEnable legitimate use of social media & ensure compliance

Unified Policy and ReportingApply one policy for any device, location. Real-time cloud intelligence and interactive analysis.

Page 11: Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved. Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved. Enabling business beyond the

Secure. Everywhere.

Internet

Securely Enable Direct to Internet Traffic

©2012 Zscaler, Inc. All rights reserved.

Enforce policy bi-directionally

Dramatically Reduce Costs Policy-follows-the-user

everywhere No traffic backhauling; No VPN

to HQ Transparent user experience

Mobile & Distributed Workforce

Home or Hotspot

HQ

Regional Office

On-the-go

• Define policy at a central portal

• Same policy for users everywhere

ADMIN

ADMIN• Consolidated Real-

time Reporting• Zscaler’s patented

Nanolog technology

Zscaler enables us to very effortlessly manage policy across 100 locations.” “

Forward traffic(Configure FW or router)

Page 12: Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved. Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved. Enabling business beyond the

Secure. Everywhere.

Enabling Mobility: Why MDM is Not Enough

Enable BYOD devices– Secure access from devices to

corporate assets– Keep personal use separate

Protect road warriors with zero-latency performance– No backhauling traffic– No latency

Protect work from home users from mobile threats – Secure direct to Internet

connections to corporate applications, assets

– Keep malware out of corporate network

Zscaler Mobile traffic inspection• Data traffic policies• URL categorization and

App Controls• Prevention of phishing,

XSS etc.• Mitigating mobile

malware • Mobile DLP

MDM• Authentication• Provisioning of device

settings and policies• Enterprise App Store• Remote Lock, Wipe, etc

With Zscaler we now can enforce consistent Internet access policies, whether employees are at our office, on the road, or at home.” “

Page 13: Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved. Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved. Enabling business beyond the

Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved.

Securing Cloud Apps & Social Media

Securely enable cloud applications– Protect data loss– Prevent accidental exposure to threats

Social media controls– Enable legitimate use of corporate media– Inspect both incoming and outgoing content– Ensure social media posts adhere to

corporate policies

Bandwidth control – Easily and efficiently allocate bandwidth to

prioritize business — critical web applications over recreational usage.

Zscaler’s well-designed in-the-cloud service with integrated functionality provides high security and granular control al low TCO.” “

Page 14: Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved. Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved. Enabling business beyond the

Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved.

Purpose-Built for Direct to Internet Challenges

World’s Largest Security Cloud• No hardware, no software• Global reach: 20 million users• High-performance: 10 B Transactions/Day

Zscaler allows us to consolidate point products, simplify IT administration and reduce cost, while offering rich functionality and ultra-low latency.”

Page 15: Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved. Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved. Enabling business beyond the

Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved.

Unified Policy Management & Reporting

Define once and apply consistent policy across devices, locations– Policy follows the user

Cloud Intelligence Dashboard– Detailed reports on every

transaction

– Intuitive and easy to use

NanoLog™ for real-time analytics: – Real-time interactive analysis

of billions of transactions

Unified reporting for email, web, social, mobile, etc.

Zscaler enables us to effortlessly secure traffic across 39 countries, with consolidated real-time visibility.” “

Page 16: Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved. Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved. Enabling business beyond the

Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved.

No Surprises• Protection against

advanced and emerging threats

• Real-time cloud intelligence & reporting

Enhance User Experience

• Near-zero latency• Transparent – no

bypassing security

Reduce Costs• No hardware/software• Eliminate traffic

backhauling

Zscaler Benefits

Proven Solution• 3,500 industry leading

enterprises use Zscaler• 20 million users, 188

countries

Simplify IT• Consolidate point

products• Streamline policy

administration• Unified reporting

Future Proof• Purpose-built to enable

mobile, social, cloud• Cloud-delivered solution

always up to date

Always Secure

Business Enabler

Page 17: Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved. Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved. Enabling business beyond the

Secure. Everywhere.

Why Customers Use Zscaler

Legacy: All traffic was backhauled to 4 data centers

Now: Eliminated dozens of Blue Coat proxies No latency; no backhauling of traffic Security & Web 2.0 control; Follow-the-User

policies

120,000 users in 130 countries

Legacy: All locations locally managed Now: Direct-to-Internet thru Zscaler TCO: $500,000 over 3 years 17 fewer (full-time) admins required Reduced PC infections from 2/week to 2 in 6

months

4,000 users in 18 locations

Legacy: Many disparate point products; URL only Advanced threat protection with SSL Integrated real-time reporting Consistent policies for office and on-the-go Bandwidth cost cut into HALF

4,000 users in 39 countries

Legacy: 40 point solutions; No Unified Policies Botnet protection with full inline inspection Managed access to Web 2.0 Site Minimized cost and IT administration Increase security, transparency & compliance

45,000 users in 183 countries

Page 18: Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved. Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved. Enabling business beyond the

Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved.

Zscaler in the News

“Just Like Everything Else in the Enterprise Space, Security is

About to be Disrupted”“Security companies that have

historically owned the lion’s share of the enterprise market are losing deals to

newer players like Zscaler.” - TechCrunch

Page 19: Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved. Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved. Enabling business beyond the

Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved.

Three trends transforming IT: mobile, social, cloud– Business is moving beyond the corporate network

New, dynamic solution is needed: secure cloud gateway Requirements: Dynamic security, reduced costs, enhanced user

experience Zscaler Secure Cloud Gateway: goes beyond static appliances to

safely enable direct to Internet, mobility, social web Trusted by Industry Leaders: 3,000+ enterprises use Zscaler Market Leader: leader and most visionary in Gartner magic

quadrant

Key Takeaways

Zscaler saves bandwidth cost, improves user satisfaction by eliminating latency and performance issues, and reduces IT administration. It’s an IT directors dream.”

Page 20: Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved. Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved. Enabling business beyond the

Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved.©2012 Zscaler, Inc. All rights reserved.

Secure. Everywhere.

Enabling business beyond the corporate network.