zscaler shift - intelligent routing for streamlined internet security

7
Everything is about to Shift – take the Intelligent Route.

Upload: zscaler

Post on 16-Jun-2015

2.217 views

Category:

Technology


4 download

DESCRIPTION

Zscaler Shift advances internet security with intelligent routing that automatically applies adaptive security and policy to dynamic Internet threats, enabling global protection and visibility in minutes through a cloud based service. For more information, please visit www.zscalershift.com

TRANSCRIPT

Page 1: Zscaler SHIFT - Intelligent Routing for Streamlined Internet Security

Everything is about to Shift – take the Intelligent Route.

Page 2: Zscaler SHIFT - Intelligent Routing for Streamlined Internet Security

Key Trend: Consumerization of the “Network”

Enterprise networks are undergoing transformation driven by the proliferation of cloud applications.

Social Media Applications

Facebook, Twitter, LinkedIn

Productivity Applications

Office 365, Google Apps, Salesforce

Collaboration Applications

WebEx, Skype, GTalk

File Sharing Applications

Dropbox, Box, Skydrive

Streaming Media Applications

Youtube, Vimeo, Google Video

Page 3: Zscaler SHIFT - Intelligent Routing for Streamlined Internet Security

Challenge: Traditional Security is Falling Short

Security must undergo transformation to adapt to the new “network”.

Key security objectives:

1. Block malicious sites.

2. Control access to objectionable sites.

3. Provide visibility to management and auditors.

But is Google a “bad” site?

Google Code may contain malicious content.

Google search results may contain salacious content.

Traditional Solution: Block “bad” sites using domain and

URL based filtering methods.

Issue: Reputable sites may also contain malicious or

objectionable material rendering traditional solutions

ineffective.

Page 4: Zscaler SHIFT - Intelligent Routing for Streamlined Internet Security

Adapting Security to the New “Network”

Current approaches to security:

1. Maintain status quo – it won’t happen to me.

2. Post incident analysis.

These approaches are costly and may lead to loss of

brand reputation if an incident occurs for any company,

regardless of their size.

Security needs to be as ubiquitous as connectivity.

Tenants of a new security paradigm:

1. Uniform security and policies across all networks.

2. Real-time visibility across all networks.

3. Ease of deployment.

4. Seamless user experience.

5. Elasticity to add and remove networks on-demand.

Page 5: Zscaler SHIFT - Intelligent Routing for Streamlined Internet Security

Zscaler SHIFT: Secure. Everywhere.

To secure business in the cloud, you need security in the cloud.

It leverages threat intelligence

based on real-time heuristics and

behavioral analysis from its global

network of 100+ data centers to

apply adaptive routing around

dynamic Internet threats.

Zscaler SHIFT enables instant policy

enforcement, security and visibility

for corporate headquarters,

branch offices, and guest access

networks – without the need for

complex and expensive on-premise

security appliances.

World’s Largest Security Cloud 4,500 enterprises. 180 countries. 12 billion

transactions/day.No hardware. No software.

Any Network Security Cloud Cloud Services

Enterprise Networks Productivity Apps

Mobile Apps

Social Media

Page 6: Zscaler SHIFT - Intelligent Routing for Streamlined Internet Security

Intelligent Routing

Zscaler SHIFT is configured in minutes by setting DNS to 8.34.34.34 and 8.35.35.35 - but it’s much more than traditional domain filtering. It combines the best of both worlds -- the simplicity of DNS and the powerful functionality of proxy technology tied together in an intelligent and transparent way. Network traffic is redirected using anycast technology to the nearest Zscaler SHIFT data center. Real-time threat intelligence and corporate policies are applied to route the traffic:

1. Known malicious or unauthorized sites are blocked.

2. Access to reputable or permissible sites is allowed.

3. Potentially malicious or traffic to search platforms like Google is routed through Zscaler’s Global Security Cloud for deep inline content inspection; only good content is retrieved.

Network

Full Content Inspection (Proxy)Destination Filtering

BotnetsMalware

Intelligent RoutingSecurity, Policy, Visibility

Page 7: Zscaler SHIFT - Intelligent Routing for Streamlined Internet Security

Zscaler SHIFT Advances Internet Security

1. Uniform security and policies across all networks are administered through a single pane of glass.

2. Insights based on automatic consolidation and correlation of logs across all networks in real-time.

3. Configuration in minutes through a simple DNS-based deployment; but much more than just domain filtering with proxy technology.

4. Enhancing user experience by seamlessly redirecting traffic to the nearest data centerpreserving geo-localization and eliminating backhaul.

5. Subscription based licensing offers cost elasticity to add and remove networks on-demand.

Join 4,500 global enterprises and shift to security in the cloud.

TRY A RISK-FREE EVALUATION

www.zscalershift.com