SlideShare una empresa de Scribd logo
1 de 26
Descargar para leer sin conexión
Streamline & Secure
Your Network & Users
with next generation cloud-enabled solution
LAWSON
TECHNOLOGY
FREDERIK LAWSON
© 2015, Indonesia
ISSUE #1
Broader, Deeper and More Sophisticated
Than Ever Before
a
LAWSON
TECHNOLOGY
Chart: Threats blocked for typical
Zscaler client, August 2014
Detail:
5 million threats blocked
65 million policy violations
Out of 1+ billion total transactions
Attacks span multiple vectors – only
security platforms can see this
ISSUE #2
Appliance Solution Is
Complex, Expensive and Slow
a
LAWSON
TECHNOLOGY
“We [spent] at least 4 days each
month just on malware
remediation and hours
on maintenance of appliances.”
– BIG 4 ACCOUNTING FIRM
Data Loss Prevention
Zero Day
Advanced Persistent Threat
Intrusion Prevention Systems
Anti-Virus
URL Filtering
Caching
Proxies
Rate Limiting
ISSUE #2
Appliance Solution Is
Complex, Expensive and Slow
a
LAWSON
TECHNOLOGY
Data Loss Prevention
Zero Day
Advanced Persistent Threat
Intrusion Prevention Systems
Anti-Virus
URL Filtering
Caching
Proxies
Rate LimitingHOW MANY UNITS do you use
to connect, to secure and
to control your data/info, users
and the network?
HOW MUCH TIME do you
spend managing them ?
HOW do you protect your
mobile users ?
HOW do you set up a common
policy across all of them ?
HOW MUCH do you spend for
investing and maintaining the
appliances ?
ISSUE #2
Appliance Solution Is
Complex, Expensive and Slow
a
LAWSON
TECHNOLOGY
BlueCoat
Internet
Expensive to purchase and to operate
Complexity introduces security gaps
Slows Internet performance, fails open under load
Often bypassed by mobile devices
Source: Global 1000 network
security diagram, August 2014
ISSUE #3
Your Users Are The Primary Attack Vector
a
LAWSON
TECHNOLOGY
The concept of the Corporate Perimeter is rapidly disappearing.
Nowadays, users are not only sitting in the office, also carry mobile
devices that are always on and almost always connected to the
Internet.
APPLIANCE SOLUTION can not protect your users while they are
outside your company
Data: Locations of users on Zscaler’s
network, average day, August 2014
the bad guys know this,
your users are becoming
the primary attack vector
the bad guys know this,
your users are becoming
the primary attack vector
ISSUE #4
The ICT Landscape Has Dramatically Shifted
a
LAWSON
TECHNOLOGY
everyone is on the road
and CONNECTED EVERYWHERE
fastest growing and
top-rated by analyst
industry-leading
client satisfaction
industry-leading
client satisfaction
used in 185+ countries
12M+ users
12B+ transactions/day
used in 185+ countries
12M+ users
12B+ transactions/day
zscaler is a carrier-grade
Security-as-a-Service
platform
zscaler is a carrier-grade
Security-as-a-Service
platform
Introducing
Revolutioning IP / Internet Security
NICHE PLAYERS VISIONARIES
LEADERSCHALLENGERS
fastest growing and
top-rated by analyst
LAWSON
TECHNOLOGY
Is Winning
Recognition & Awards Everywhere
LAWSON
TECHNOLOGY
“Security’s cloud revolution is upon us.”
“Zscaler… is experiencing remarkable growth with its
global security cloud.”
“Zscaler allows… companies in the world to move away from
premises-based to cloud solutions.”
Cloud security appears poised see material uptake going
forward. Web gateways, vulnerability management, identity
management, and antivirus are prime targets.”
“Zscaler is considered the most visionary vendor.”
“A number of high profile cyber security vendors such as
Zscaler… are expected to go public near term.”
Some Of The 5,000+ Organizations
That Have Adopted
LAWSON
TECHNOLOGY
Up-level / extra layer
of security in the cloud
Hardware consolidation,
elimination & avoidance
Protection against
Advanced Persistent Threats
Guest Wifi
security and GRC
Mobile & BYOD
security and compliance
Cloud application
control, visibility & experience
Deploy cloud-enabled
networks
Delivers Unprecedented Scale
12+ million users, 5,000+ organizations, across 185+ countries
LAWSON
TECHNOLOGY
Some Of The 5,000+ Organizations
That Have Adopted
LAWSON
TECHNOLOGY
Strategic Partners Enhance The Value
Proposition
LAWSON
TECHNOLOGY
Exclusive Security as a Service platform provider
Jointly developed out
of the box integration
First to receive vulnerabilities
and implement fixes
SIEM, MDM and Identity
management integration
Located in 100+ global data centers
LAWSON
TECHNOLOGY
100% reliability, complete redundancy, massive bandwidth
Automatic connection to closest node, policy follows the user
24x7x365 follow the sun operations
/
LAWSON
TECHNOLOGY
THE SOLUTION
/
Is Foundational for Cloud-Enabled
Networking
LAWSON
TECHNOLOGY
Provision a commodity Internet
connection at each of your locations
All Internet-bound traffic routes through
Zscaler local policy enforcement points
and then on to the Internet
All data-center and internal bound traffic
routes across your existing WAN
Eliminates the need to backhaul
Internet traffic through a limited number
of secure Internet Gateways
Massive cost savings by reducing MPLS /
WAN bandwidth usage
Greatly improved WAN performance
Greatly improved Internet experience for users
For some firms, more than pays for entire Zscaler
subscription
Is Profoundly Better For Today's World:
Multiple Stacks of Appliances vs Security as a
Service (SaaS)
LAWSON
TECHNOLOGY
Better security, compliance and productivity
Four to ten times more cost effective – pennies per
user per day
Vastly better performance, reliability, superior user
experience
OR
Multiple appliances
at every Internet gateway
One global, unified
cloud platform
Security as a Service (SaaS) Makes
Endusers, IT and Senior Management Happy
LAWSON
TECHNOLOGY
Improved employee productivity and satisfaction
IT can focus on more strategic, value added activities
Avoid audit risk, remediation and reputation damage
Better security with easier
administration and lower cost of
ownership
Headaches of managing stacks of
appliances go away
Internet and Intranet performance
vastly improves for users
IT can safely enable access to Web 2.0 –
making users even happier
CEO and CFO gain visibility into cloud
usage, easing GRC and audit
Testing and deployment is fast and easy – get
started in days, global roll out in weeks
LAWSON
TECHNOLOGY
Improved employee productivity and satisfaction
IT can focus on more strategic, value added activities
Avoid audit risk, remediation and reputation damage
Simple managed configuration – no software or
hardware required on device
– Routers / firewalls
• Configure GRE tunnel or VPN to Zscaler
– Guest WiFi
• Secure DNS
– Mobile laptops
• Secure DNS, PAC file or agent
– Tablets and smart phones
• Apple – Built into iOS 7 or agent
• Android – Built into Samsung KNOX or agent
Easy to test with individual devices, workgroups or
offices
: Network & Internet Security
everywhere --- Delivered Via Cloud Computing
LAWSON
TECHNOLOGY
Is Comprehensive, Unified
Cloud Security And Compliance Platform
LAWSON
TECHNOLOGY
Cloud Security Is Better Security
LAWSON
TECHNOLOGY
How it works: Connect to the Internet through
global Zscaler policy enforcement points
LAWSON
TECHNOLOGY
Is Always In-Line And Real-time
LAWSON
TECHNOLOGY
Better security and compliance
Avoids overloading the security operation center
Does not allow infections to happen in the first place
Missed Alarms and 40 Million
Stolen Credit Card Numbers:
How Target Blew It
Zscaler inspects every byte of traffic in real-time
– Advanced persistent threats / zero-day threats are
additionally processed by our advanced behavioral
analysis engine
By default, all threats and violations are automatically
blocked
– Compare to appliance-based security strategies that
only alert
24
Decrypts and Inspects SSL Traffic
LAWSON
TECHNOLOGY
Complete visibility into all traffic – no blind spots
Granular controls to ensure appropriate employee privacy
25
SSL traffic on
enterprise networks
is growing rapidly &
creating security
blind spots
SSL traffic is becoming pervasive, but most
organizations are blind to it
– 35% percent of Internet traffic is now encrypted with
SSL, growing to more than 50% in 2015
The most sophisticated threats are using SSL
– 16% of all traffic blocked uses SSL
– 54% of advanced persistent threats use SSL
Zscaler automatically decrypts and inspects SSL
traffic, in real-time
– Flexible, granular policies for what to inspect vs. pass
– Zscaler can host your certificates
Uniquely Features Globally Unified
Administration, Policy Management and
Reporting
LAWSON
TECHNOLOGY
Comprehensive global visibility
Eliminates gaps and configuration mistakes
Greatly reduced cost of administration
26
Centralized administration
– Single console can manage all
applications and all locations
Unified policy management
– User, role, department,
company
and location-based
– Set once, enforce everywhere
– Directory service integration
Unified global logging and
reporting
– Near real-time reporting &
analysis
– Regional log storage
– Built-in SIEM integration

Más contenido relacionado

La actualidad más candente

O365 quick with fast user experience
O365 quick with fast user experienceO365 quick with fast user experience
O365 quick with fast user experienceZscaler
 
Get an office 365 expereience your users will love v8.1
Get an office 365 expereience your users will love v8.1Get an office 365 expereience your users will love v8.1
Get an office 365 expereience your users will love v8.1Zscaler
 
Office 365 kelly services
Office 365 kelly servicesOffice 365 kelly services
Office 365 kelly servicesZscaler
 
Secure access to applications on Microsoft Azure
Secure access to applications on Microsoft AzureSecure access to applications on Microsoft Azure
Secure access to applications on Microsoft AzureZscaler
 
Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18Zscaler
 
What Comes After VPN?
What Comes After VPN?What Comes After VPN?
What Comes After VPN?Zscaler
 
Moving from appliances to cloud security with phoenix children's hospital
Moving from appliances to cloud security with phoenix children's hospitalMoving from appliances to cloud security with phoenix children's hospital
Moving from appliances to cloud security with phoenix children's hospitalZscaler
 
Maximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and ZscalerMaximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and ZscalerAnkit Dua
 
Three Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the CloudThree Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the CloudZscaler
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraZscaler
 
Office 365 deployment
Office 365 deploymentOffice 365 deployment
Office 365 deploymentZscaler
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraZscaler
 
SD-WAN plus cloud security
SD-WAN plus cloud securitySD-WAN plus cloud security
SD-WAN plus cloud securityZscaler
 
Secure remote access to AWS your users will love
Secure remote access to AWS your users will loveSecure remote access to AWS your users will love
Secure remote access to AWS your users will loveZscaler
 
Protect Your Data and Apps in the Public Cloud
Protect Your Data and Apps in the Public CloudProtect Your Data and Apps in the Public Cloud
Protect Your Data and Apps in the Public CloudImperva
 
Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected securityMotty Ben Atia
 
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & InformationDDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Informationjenkoon
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security PresentationSimplex
 
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorKaspersky
 
Panda Cloud Services
Panda Cloud ServicesPanda Cloud Services
Panda Cloud ServicesOzgur Gercek
 

La actualidad más candente (20)

O365 quick with fast user experience
O365 quick with fast user experienceO365 quick with fast user experience
O365 quick with fast user experience
 
Get an office 365 expereience your users will love v8.1
Get an office 365 expereience your users will love v8.1Get an office 365 expereience your users will love v8.1
Get an office 365 expereience your users will love v8.1
 
Office 365 kelly services
Office 365 kelly servicesOffice 365 kelly services
Office 365 kelly services
 
Secure access to applications on Microsoft Azure
Secure access to applications on Microsoft AzureSecure access to applications on Microsoft Azure
Secure access to applications on Microsoft Azure
 
Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18
 
What Comes After VPN?
What Comes After VPN?What Comes After VPN?
What Comes After VPN?
 
Moving from appliances to cloud security with phoenix children's hospital
Moving from appliances to cloud security with phoenix children's hospitalMoving from appliances to cloud security with phoenix children's hospital
Moving from appliances to cloud security with phoenix children's hospital
 
Maximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and ZscalerMaximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and Zscaler
 
Three Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the CloudThree Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the Cloud
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation Era
 
Office 365 deployment
Office 365 deploymentOffice 365 deployment
Office 365 deployment
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation Era
 
SD-WAN plus cloud security
SD-WAN plus cloud securitySD-WAN plus cloud security
SD-WAN plus cloud security
 
Secure remote access to AWS your users will love
Secure remote access to AWS your users will loveSecure remote access to AWS your users will love
Secure remote access to AWS your users will love
 
Protect Your Data and Apps in the Public Cloud
Protect Your Data and Apps in the Public CloudProtect Your Data and Apps in the Public Cloud
Protect Your Data and Apps in the Public Cloud
 
Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected security
 
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & InformationDDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy Sector
 
Panda Cloud Services
Panda Cloud ServicesPanda Cloud Services
Panda Cloud Services
 

Similar a Streamline and Secure Your Network and Users

MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportDell EMC World
 
Introduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile PaymentIntroduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile PaymentJean Ryu
 
Strengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersStrengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersCloudflare
 
Alpha & Omega's Managed Security
Alpha & Omega's Managed SecurityAlpha & Omega's Managed Security
Alpha & Omega's Managed SecurityDarryl Santa
 
Bring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teamsBring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teamsCloudflare
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General InfoAnton Lishchuk
 
Information Security
Information SecurityInformation Security
Information SecurityMohit8780
 
Sangfor's Presentation.pdf
Sangfor's Presentation.pdfSangfor's Presentation.pdf
Sangfor's Presentation.pdfssusera76ea9
 
Top reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | SysforeTop reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | SysforeSysfore Technologies
 
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsEmulex Corporation
 
InstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and BenefitsInstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and BenefitsInstaSafe Technologies
 
Level 3 Security solutions
Level 3 Security solutionsLevel 3 Security solutions
Level 3 Security solutionsAlan Rudd
 
Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.AlgoSec
 
CSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the CloudCSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the CloudAlert Logic
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overviewCisco Canada
 
Network Security: A Four Point Analysis of Appliances vs. the Cloud
Network Security: A Four Point Analysis of Appliances vs. the CloudNetwork Security: A Four Point Analysis of Appliances vs. the Cloud
Network Security: A Four Point Analysis of Appliances vs. the CloudOpenDNS
 
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_alCss sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_alAlert Logic
 

Similar a Streamline and Secure Your Network and Users (20)

MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
 
Introduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile PaymentIntroduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile Payment
 
Strengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersStrengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providers
 
Alpha & Omega's Managed Security
Alpha & Omega's Managed SecurityAlpha & Omega's Managed Security
Alpha & Omega's Managed Security
 
Bring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teamsBring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teams
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General Info
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
CloudWALL Profile ENG
CloudWALL Profile ENGCloudWALL Profile ENG
CloudWALL Profile ENG
 
Information Security
Information SecurityInformation Security
Information Security
 
Sangfor's Presentation.pdf
Sangfor's Presentation.pdfSangfor's Presentation.pdf
Sangfor's Presentation.pdf
 
Top reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | SysforeTop reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | Sysfore
 
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
 
InstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and BenefitsInstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and Benefits
 
Level 3 Security solutions
Level 3 Security solutionsLevel 3 Security solutions
Level 3 Security solutions
 
Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.
 
CSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the CloudCSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the Cloud
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
 
Network Security: A Four Point Analysis of Appliances vs. the Cloud
Network Security: A Four Point Analysis of Appliances vs. the CloudNetwork Security: A Four Point Analysis of Appliances vs. the Cloud
Network Security: A Four Point Analysis of Appliances vs. the Cloud
 
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_alCss sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
 

Último

Best VIP Call Girls Noida Sector 24 Call Me: 8700611579
Best VIP Call Girls Noida Sector 24 Call Me: 8700611579Best VIP Call Girls Noida Sector 24 Call Me: 8700611579
Best VIP Call Girls Noida Sector 24 Call Me: 8700611579diyaspanoida
 
Book_ A Project based approach CHAPTER 1 summary.pptx
Book_ A Project based approach CHAPTER 1 summary.pptxBook_ A Project based approach CHAPTER 1 summary.pptx
Book_ A Project based approach CHAPTER 1 summary.pptxssuser8fd809
 
Call Girls In {{Connaught Place Delhi}}96679@38988 Indian Russian High Profil...
Call Girls In {{Connaught Place Delhi}}96679@38988 Indian Russian High Profil...Call Girls In {{Connaught Place Delhi}}96679@38988 Indian Russian High Profil...
Call Girls In {{Connaught Place Delhi}}96679@38988 Indian Russian High Profil...aakahthapa70
 
Indore ❣️Call Girl 97487*63073 Call Girls in Indore Escort service book now
Indore  ❣️Call Girl 97487*63073 Call Girls in Indore Escort service book nowIndore  ❣️Call Girl 97487*63073 Call Girls in Indore Escort service book now
Indore ❣️Call Girl 97487*63073 Call Girls in Indore Escort service book nowapshanarani255
 
Call Now ☎9870417354|| Call Girls in Noida Sector 18 Escort Service Noida N.C.R.
Call Now ☎9870417354|| Call Girls in Noida Sector 18 Escort Service Noida N.C.R.Call Now ☎9870417354|| Call Girls in Noida Sector 18 Escort Service Noida N.C.R.
Call Now ☎9870417354|| Call Girls in Noida Sector 18 Escort Service Noida N.C.R.riyadelhic riyadelhic
 
Call Girls in Luxus Grand Hotel | 💋 03274100048
Call Girls in Luxus Grand Hotel | 💋 03274100048Call Girls in Luxus Grand Hotel | 💋 03274100048
Call Girls in Luxus Grand Hotel | 💋 03274100048Ifra Zohaib
 
Call Girls In {{Laxmi Nagar Delhi}} 9667938988 Indian Russian High Profile Es...
Call Girls In {{Laxmi Nagar Delhi}} 9667938988 Indian Russian High Profile Es...Call Girls In {{Laxmi Nagar Delhi}} 9667938988 Indian Russian High Profile Es...
Call Girls In {{Laxmi Nagar Delhi}} 9667938988 Indian Russian High Profile Es...aakahthapa70
 
JAMNAGAR CALL GIRLS 92628/71154 JAMNAGAR
JAMNAGAR CALL GIRLS 92628/71154 JAMNAGARJAMNAGAR CALL GIRLS 92628/71154 JAMNAGAR
JAMNAGAR CALL GIRLS 92628/71154 JAMNAGARNiteshKumar82226
 
9891550660 Call Girls In Noida Sector 62 Short 1500 Night 6000
9891550660 Call Girls In Noida Sector 62 Short 1500 Night 60009891550660 Call Girls In Noida Sector 62 Short 1500 Night 6000
9891550660 Call Girls In Noida Sector 62 Short 1500 Night 6000teencall080
 
Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7
Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7
Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7Sana Rajpoot
 
Call Girl Rohini ❤️7065000506 Pooja@ Rohini Call Girls Near Me ❤️♀️@ Sexy Cal...
Call Girl Rohini ❤️7065000506 Pooja@ Rohini Call Girls Near Me ❤️♀️@ Sexy Cal...Call Girl Rohini ❤️7065000506 Pooja@ Rohini Call Girls Near Me ❤️♀️@ Sexy Cal...
Call Girl Rohini ❤️7065000506 Pooja@ Rohini Call Girls Near Me ❤️♀️@ Sexy Cal...Sheetaleventcompany
 
Call Now ☎9870417354|| Call Girls in Dwarka Escort Service Delhi N.C.R.
Call Now ☎9870417354|| Call Girls in Dwarka Escort Service Delhi N.C.R.Call Now ☎9870417354|| Call Girls in Dwarka Escort Service Delhi N.C.R.
Call Now ☎9870417354|| Call Girls in Dwarka Escort Service Delhi N.C.R.riyadelhic riyadelhic
 
Call Girls In Noida Free Ad 24/7 Hours Online Call 9310659962 Shot 2000 Night...
Call Girls In Noida Free Ad 24/7 Hours Online Call 9310659962 Shot 2000 Night...Call Girls In Noida Free Ad 24/7 Hours Online Call 9310659962 Shot 2000 Night...
Call Girls In Noida Free Ad 24/7 Hours Online Call 9310659962 Shot 2000 Night...DelhiMahipalpur
 
Indore Call girl service 6289102337 indore escort service
Indore Call girl service 6289102337 indore escort serviceIndore Call girl service 6289102337 indore escort service
Indore Call girl service 6289102337 indore escort servicemaheshsingh64440
 
Karachi Sexy Girls || 03280288848 || Sex services in Karachi
Karachi Sexy Girls || 03280288848 || Sex services in KarachiKarachi Sexy Girls || 03280288848 || Sex services in Karachi
Karachi Sexy Girls || 03280288848 || Sex services in KarachiAwais Yousaf
 
Call Girls in B-18 Islamabad || 🔝 03274100048
Call Girls in B-18 Islamabad || 🔝 03274100048Call Girls in B-18 Islamabad || 🔝 03274100048
Call Girls in B-18 Islamabad || 🔝 03274100048Ifra Zohaib
 
CALL GIRLS 9999288940 women seeking men Locanto No Advance North Goa
CALL GIRLS 9999288940 women seeking men Locanto No Advance North GoaCALL GIRLS 9999288940 women seeking men Locanto No Advance North Goa
CALL GIRLS 9999288940 women seeking men Locanto No Advance North Goadelhincr993
 
RAJKOT CALL GIRLS 92628/71154 RAJKOT CAL
RAJKOT CALL GIRLS 92628/71154 RAJKOT CALRAJKOT CALL GIRLS 92628/71154 RAJKOT CAL
RAJKOT CALL GIRLS 92628/71154 RAJKOT CALNiteshKumar82226
 

Último (20)

Best VIP Call Girls Noida Sector 24 Call Me: 8700611579
Best VIP Call Girls Noida Sector 24 Call Me: 8700611579Best VIP Call Girls Noida Sector 24 Call Me: 8700611579
Best VIP Call Girls Noida Sector 24 Call Me: 8700611579
 
Book_ A Project based approach CHAPTER 1 summary.pptx
Book_ A Project based approach CHAPTER 1 summary.pptxBook_ A Project based approach CHAPTER 1 summary.pptx
Book_ A Project based approach CHAPTER 1 summary.pptx
 
Call Girls In {{Connaught Place Delhi}}96679@38988 Indian Russian High Profil...
Call Girls In {{Connaught Place Delhi}}96679@38988 Indian Russian High Profil...Call Girls In {{Connaught Place Delhi}}96679@38988 Indian Russian High Profil...
Call Girls In {{Connaught Place Delhi}}96679@38988 Indian Russian High Profil...
 
Indore ❣️Call Girl 97487*63073 Call Girls in Indore Escort service book now
Indore  ❣️Call Girl 97487*63073 Call Girls in Indore Escort service book nowIndore  ❣️Call Girl 97487*63073 Call Girls in Indore Escort service book now
Indore ❣️Call Girl 97487*63073 Call Girls in Indore Escort service book now
 
9953056974 Call Girls In Ashok Nagar, Escorts (Delhi) NCR.
9953056974 Call Girls In Ashok Nagar, Escorts (Delhi) NCR.9953056974 Call Girls In Ashok Nagar, Escorts (Delhi) NCR.
9953056974 Call Girls In Ashok Nagar, Escorts (Delhi) NCR.
 
Call Now ☎9870417354|| Call Girls in Noida Sector 18 Escort Service Noida N.C.R.
Call Now ☎9870417354|| Call Girls in Noida Sector 18 Escort Service Noida N.C.R.Call Now ☎9870417354|| Call Girls in Noida Sector 18 Escort Service Noida N.C.R.
Call Now ☎9870417354|| Call Girls in Noida Sector 18 Escort Service Noida N.C.R.
 
➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR
➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR
➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR
 
Call Girls in Luxus Grand Hotel | 💋 03274100048
Call Girls in Luxus Grand Hotel | 💋 03274100048Call Girls in Luxus Grand Hotel | 💋 03274100048
Call Girls in Luxus Grand Hotel | 💋 03274100048
 
Call Girls In {{Laxmi Nagar Delhi}} 9667938988 Indian Russian High Profile Es...
Call Girls In {{Laxmi Nagar Delhi}} 9667938988 Indian Russian High Profile Es...Call Girls In {{Laxmi Nagar Delhi}} 9667938988 Indian Russian High Profile Es...
Call Girls In {{Laxmi Nagar Delhi}} 9667938988 Indian Russian High Profile Es...
 
JAMNAGAR CALL GIRLS 92628/71154 JAMNAGAR
JAMNAGAR CALL GIRLS 92628/71154 JAMNAGARJAMNAGAR CALL GIRLS 92628/71154 JAMNAGAR
JAMNAGAR CALL GIRLS 92628/71154 JAMNAGAR
 
9891550660 Call Girls In Noida Sector 62 Short 1500 Night 6000
9891550660 Call Girls In Noida Sector 62 Short 1500 Night 60009891550660 Call Girls In Noida Sector 62 Short 1500 Night 6000
9891550660 Call Girls In Noida Sector 62 Short 1500 Night 6000
 
Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7
Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7
Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7
 
Call Girl Rohini ❤️7065000506 Pooja@ Rohini Call Girls Near Me ❤️♀️@ Sexy Cal...
Call Girl Rohini ❤️7065000506 Pooja@ Rohini Call Girls Near Me ❤️♀️@ Sexy Cal...Call Girl Rohini ❤️7065000506 Pooja@ Rohini Call Girls Near Me ❤️♀️@ Sexy Cal...
Call Girl Rohini ❤️7065000506 Pooja@ Rohini Call Girls Near Me ❤️♀️@ Sexy Cal...
 
Call Now ☎9870417354|| Call Girls in Dwarka Escort Service Delhi N.C.R.
Call Now ☎9870417354|| Call Girls in Dwarka Escort Service Delhi N.C.R.Call Now ☎9870417354|| Call Girls in Dwarka Escort Service Delhi N.C.R.
Call Now ☎9870417354|| Call Girls in Dwarka Escort Service Delhi N.C.R.
 
Call Girls In Noida Free Ad 24/7 Hours Online Call 9310659962 Shot 2000 Night...
Call Girls In Noida Free Ad 24/7 Hours Online Call 9310659962 Shot 2000 Night...Call Girls In Noida Free Ad 24/7 Hours Online Call 9310659962 Shot 2000 Night...
Call Girls In Noida Free Ad 24/7 Hours Online Call 9310659962 Shot 2000 Night...
 
Indore Call girl service 6289102337 indore escort service
Indore Call girl service 6289102337 indore escort serviceIndore Call girl service 6289102337 indore escort service
Indore Call girl service 6289102337 indore escort service
 
Karachi Sexy Girls || 03280288848 || Sex services in Karachi
Karachi Sexy Girls || 03280288848 || Sex services in KarachiKarachi Sexy Girls || 03280288848 || Sex services in Karachi
Karachi Sexy Girls || 03280288848 || Sex services in Karachi
 
Call Girls in B-18 Islamabad || 🔝 03274100048
Call Girls in B-18 Islamabad || 🔝 03274100048Call Girls in B-18 Islamabad || 🔝 03274100048
Call Girls in B-18 Islamabad || 🔝 03274100048
 
CALL GIRLS 9999288940 women seeking men Locanto No Advance North Goa
CALL GIRLS 9999288940 women seeking men Locanto No Advance North GoaCALL GIRLS 9999288940 women seeking men Locanto No Advance North Goa
CALL GIRLS 9999288940 women seeking men Locanto No Advance North Goa
 
RAJKOT CALL GIRLS 92628/71154 RAJKOT CAL
RAJKOT CALL GIRLS 92628/71154 RAJKOT CALRAJKOT CALL GIRLS 92628/71154 RAJKOT CAL
RAJKOT CALL GIRLS 92628/71154 RAJKOT CAL
 

Streamline and Secure Your Network and Users

  • 1. Streamline & Secure Your Network & Users with next generation cloud-enabled solution LAWSON TECHNOLOGY FREDERIK LAWSON © 2015, Indonesia
  • 2. ISSUE #1 Broader, Deeper and More Sophisticated Than Ever Before a LAWSON TECHNOLOGY Chart: Threats blocked for typical Zscaler client, August 2014 Detail: 5 million threats blocked 65 million policy violations Out of 1+ billion total transactions Attacks span multiple vectors – only security platforms can see this
  • 3. ISSUE #2 Appliance Solution Is Complex, Expensive and Slow a LAWSON TECHNOLOGY “We [spent] at least 4 days each month just on malware remediation and hours on maintenance of appliances.” – BIG 4 ACCOUNTING FIRM Data Loss Prevention Zero Day Advanced Persistent Threat Intrusion Prevention Systems Anti-Virus URL Filtering Caching Proxies Rate Limiting
  • 4. ISSUE #2 Appliance Solution Is Complex, Expensive and Slow a LAWSON TECHNOLOGY Data Loss Prevention Zero Day Advanced Persistent Threat Intrusion Prevention Systems Anti-Virus URL Filtering Caching Proxies Rate LimitingHOW MANY UNITS do you use to connect, to secure and to control your data/info, users and the network? HOW MUCH TIME do you spend managing them ? HOW do you protect your mobile users ? HOW do you set up a common policy across all of them ? HOW MUCH do you spend for investing and maintaining the appliances ?
  • 5. ISSUE #2 Appliance Solution Is Complex, Expensive and Slow a LAWSON TECHNOLOGY BlueCoat Internet Expensive to purchase and to operate Complexity introduces security gaps Slows Internet performance, fails open under load Often bypassed by mobile devices Source: Global 1000 network security diagram, August 2014
  • 6. ISSUE #3 Your Users Are The Primary Attack Vector a LAWSON TECHNOLOGY The concept of the Corporate Perimeter is rapidly disappearing. Nowadays, users are not only sitting in the office, also carry mobile devices that are always on and almost always connected to the Internet. APPLIANCE SOLUTION can not protect your users while they are outside your company Data: Locations of users on Zscaler’s network, average day, August 2014 the bad guys know this, your users are becoming the primary attack vector the bad guys know this, your users are becoming the primary attack vector
  • 7. ISSUE #4 The ICT Landscape Has Dramatically Shifted a LAWSON TECHNOLOGY everyone is on the road and CONNECTED EVERYWHERE
  • 8. fastest growing and top-rated by analyst industry-leading client satisfaction industry-leading client satisfaction used in 185+ countries 12M+ users 12B+ transactions/day used in 185+ countries 12M+ users 12B+ transactions/day zscaler is a carrier-grade Security-as-a-Service platform zscaler is a carrier-grade Security-as-a-Service platform Introducing Revolutioning IP / Internet Security NICHE PLAYERS VISIONARIES LEADERSCHALLENGERS fastest growing and top-rated by analyst LAWSON TECHNOLOGY
  • 9. Is Winning Recognition & Awards Everywhere LAWSON TECHNOLOGY “Security’s cloud revolution is upon us.” “Zscaler… is experiencing remarkable growth with its global security cloud.” “Zscaler allows… companies in the world to move away from premises-based to cloud solutions.” Cloud security appears poised see material uptake going forward. Web gateways, vulnerability management, identity management, and antivirus are prime targets.” “Zscaler is considered the most visionary vendor.” “A number of high profile cyber security vendors such as Zscaler… are expected to go public near term.”
  • 10. Some Of The 5,000+ Organizations That Have Adopted LAWSON TECHNOLOGY Up-level / extra layer of security in the cloud Hardware consolidation, elimination & avoidance Protection against Advanced Persistent Threats Guest Wifi security and GRC Mobile & BYOD security and compliance Cloud application control, visibility & experience Deploy cloud-enabled networks
  • 11. Delivers Unprecedented Scale 12+ million users, 5,000+ organizations, across 185+ countries LAWSON TECHNOLOGY
  • 12. Some Of The 5,000+ Organizations That Have Adopted LAWSON TECHNOLOGY
  • 13. Strategic Partners Enhance The Value Proposition LAWSON TECHNOLOGY Exclusive Security as a Service platform provider Jointly developed out of the box integration First to receive vulnerabilities and implement fixes SIEM, MDM and Identity management integration
  • 14. Located in 100+ global data centers LAWSON TECHNOLOGY 100% reliability, complete redundancy, massive bandwidth Automatic connection to closest node, policy follows the user 24x7x365 follow the sun operations
  • 16. / Is Foundational for Cloud-Enabled Networking LAWSON TECHNOLOGY Provision a commodity Internet connection at each of your locations All Internet-bound traffic routes through Zscaler local policy enforcement points and then on to the Internet All data-center and internal bound traffic routes across your existing WAN Eliminates the need to backhaul Internet traffic through a limited number of secure Internet Gateways Massive cost savings by reducing MPLS / WAN bandwidth usage Greatly improved WAN performance Greatly improved Internet experience for users For some firms, more than pays for entire Zscaler subscription
  • 17. Is Profoundly Better For Today's World: Multiple Stacks of Appliances vs Security as a Service (SaaS) LAWSON TECHNOLOGY Better security, compliance and productivity Four to ten times more cost effective – pennies per user per day Vastly better performance, reliability, superior user experience OR Multiple appliances at every Internet gateway One global, unified cloud platform
  • 18. Security as a Service (SaaS) Makes Endusers, IT and Senior Management Happy LAWSON TECHNOLOGY Improved employee productivity and satisfaction IT can focus on more strategic, value added activities Avoid audit risk, remediation and reputation damage Better security with easier administration and lower cost of ownership Headaches of managing stacks of appliances go away Internet and Intranet performance vastly improves for users IT can safely enable access to Web 2.0 – making users even happier CEO and CFO gain visibility into cloud usage, easing GRC and audit
  • 19. Testing and deployment is fast and easy – get started in days, global roll out in weeks LAWSON TECHNOLOGY Improved employee productivity and satisfaction IT can focus on more strategic, value added activities Avoid audit risk, remediation and reputation damage Simple managed configuration – no software or hardware required on device – Routers / firewalls • Configure GRE tunnel or VPN to Zscaler – Guest WiFi • Secure DNS – Mobile laptops • Secure DNS, PAC file or agent – Tablets and smart phones • Apple – Built into iOS 7 or agent • Android – Built into Samsung KNOX or agent Easy to test with individual devices, workgroups or offices
  • 20. : Network & Internet Security everywhere --- Delivered Via Cloud Computing LAWSON TECHNOLOGY
  • 21. Is Comprehensive, Unified Cloud Security And Compliance Platform LAWSON TECHNOLOGY
  • 22. Cloud Security Is Better Security LAWSON TECHNOLOGY
  • 23. How it works: Connect to the Internet through global Zscaler policy enforcement points LAWSON TECHNOLOGY
  • 24. Is Always In-Line And Real-time LAWSON TECHNOLOGY Better security and compliance Avoids overloading the security operation center Does not allow infections to happen in the first place Missed Alarms and 40 Million Stolen Credit Card Numbers: How Target Blew It Zscaler inspects every byte of traffic in real-time – Advanced persistent threats / zero-day threats are additionally processed by our advanced behavioral analysis engine By default, all threats and violations are automatically blocked – Compare to appliance-based security strategies that only alert 24
  • 25. Decrypts and Inspects SSL Traffic LAWSON TECHNOLOGY Complete visibility into all traffic – no blind spots Granular controls to ensure appropriate employee privacy 25 SSL traffic on enterprise networks is growing rapidly & creating security blind spots SSL traffic is becoming pervasive, but most organizations are blind to it – 35% percent of Internet traffic is now encrypted with SSL, growing to more than 50% in 2015 The most sophisticated threats are using SSL – 16% of all traffic blocked uses SSL – 54% of advanced persistent threats use SSL Zscaler automatically decrypts and inspects SSL traffic, in real-time – Flexible, granular policies for what to inspect vs. pass – Zscaler can host your certificates
  • 26. Uniquely Features Globally Unified Administration, Policy Management and Reporting LAWSON TECHNOLOGY Comprehensive global visibility Eliminates gaps and configuration mistakes Greatly reduced cost of administration 26 Centralized administration – Single console can manage all applications and all locations Unified policy management – User, role, department, company and location-based – Set once, enforce everywhere – Directory service integration Unified global logging and reporting – Near real-time reporting & analysis – Regional log storage – Built-in SIEM integration