This document discusses the benefits of using Zscaler's cloud-based network and internet security solution over traditional on-premise appliance solutions. It summarizes that Zscaler provides comprehensive security across multiple threat vectors through a single cloud platform. It is more cost effective than appliance solutions and improves performance and user experience while reducing complexity and management overhead. The document also highlights key capabilities of Zscaler such as real-time inspection of all traffic including SSL, global policy management, and unified reporting and administration.
2. ISSUE #1
Broader, Deeper and More Sophisticated
Than Ever Before
a
LAWSON
TECHNOLOGY
Chart: Threats blocked for typical
Zscaler client, August 2014
Detail:
5 million threats blocked
65 million policy violations
Out of 1+ billion total transactions
Attacks span multiple vectors – only
security platforms can see this
3. ISSUE #2
Appliance Solution Is
Complex, Expensive and Slow
a
LAWSON
TECHNOLOGY
“We [spent] at least 4 days each
month just on malware
remediation and hours
on maintenance of appliances.”
– BIG 4 ACCOUNTING FIRM
Data Loss Prevention
Zero Day
Advanced Persistent Threat
Intrusion Prevention Systems
Anti-Virus
URL Filtering
Caching
Proxies
Rate Limiting
4. ISSUE #2
Appliance Solution Is
Complex, Expensive and Slow
a
LAWSON
TECHNOLOGY
Data Loss Prevention
Zero Day
Advanced Persistent Threat
Intrusion Prevention Systems
Anti-Virus
URL Filtering
Caching
Proxies
Rate LimitingHOW MANY UNITS do you use
to connect, to secure and
to control your data/info, users
and the network?
HOW MUCH TIME do you
spend managing them ?
HOW do you protect your
mobile users ?
HOW do you set up a common
policy across all of them ?
HOW MUCH do you spend for
investing and maintaining the
appliances ?
5. ISSUE #2
Appliance Solution Is
Complex, Expensive and Slow
a
LAWSON
TECHNOLOGY
BlueCoat
Internet
Expensive to purchase and to operate
Complexity introduces security gaps
Slows Internet performance, fails open under load
Often bypassed by mobile devices
Source: Global 1000 network
security diagram, August 2014
6. ISSUE #3
Your Users Are The Primary Attack Vector
a
LAWSON
TECHNOLOGY
The concept of the Corporate Perimeter is rapidly disappearing.
Nowadays, users are not only sitting in the office, also carry mobile
devices that are always on and almost always connected to the
Internet.
APPLIANCE SOLUTION can not protect your users while they are
outside your company
Data: Locations of users on Zscaler’s
network, average day, August 2014
the bad guys know this,
your users are becoming
the primary attack vector
the bad guys know this,
your users are becoming
the primary attack vector
7. ISSUE #4
The ICT Landscape Has Dramatically Shifted
a
LAWSON
TECHNOLOGY
everyone is on the road
and CONNECTED EVERYWHERE
8. fastest growing and
top-rated by analyst
industry-leading
client satisfaction
industry-leading
client satisfaction
used in 185+ countries
12M+ users
12B+ transactions/day
used in 185+ countries
12M+ users
12B+ transactions/day
zscaler is a carrier-grade
Security-as-a-Service
platform
zscaler is a carrier-grade
Security-as-a-Service
platform
Introducing
Revolutioning IP / Internet Security
NICHE PLAYERS VISIONARIES
LEADERSCHALLENGERS
fastest growing and
top-rated by analyst
LAWSON
TECHNOLOGY
9. Is Winning
Recognition & Awards Everywhere
LAWSON
TECHNOLOGY
“Security’s cloud revolution is upon us.”
“Zscaler… is experiencing remarkable growth with its
global security cloud.”
“Zscaler allows… companies in the world to move away from
premises-based to cloud solutions.”
Cloud security appears poised see material uptake going
forward. Web gateways, vulnerability management, identity
management, and antivirus are prime targets.”
“Zscaler is considered the most visionary vendor.”
“A number of high profile cyber security vendors such as
Zscaler… are expected to go public near term.”
10. Some Of The 5,000+ Organizations
That Have Adopted
LAWSON
TECHNOLOGY
Up-level / extra layer
of security in the cloud
Hardware consolidation,
elimination & avoidance
Protection against
Advanced Persistent Threats
Guest Wifi
security and GRC
Mobile & BYOD
security and compliance
Cloud application
control, visibility & experience
Deploy cloud-enabled
networks
12. Some Of The 5,000+ Organizations
That Have Adopted
LAWSON
TECHNOLOGY
13. Strategic Partners Enhance The Value
Proposition
LAWSON
TECHNOLOGY
Exclusive Security as a Service platform provider
Jointly developed out
of the box integration
First to receive vulnerabilities
and implement fixes
SIEM, MDM and Identity
management integration
14. Located in 100+ global data centers
LAWSON
TECHNOLOGY
100% reliability, complete redundancy, massive bandwidth
Automatic connection to closest node, policy follows the user
24x7x365 follow the sun operations
16. /
Is Foundational for Cloud-Enabled
Networking
LAWSON
TECHNOLOGY
Provision a commodity Internet
connection at each of your locations
All Internet-bound traffic routes through
Zscaler local policy enforcement points
and then on to the Internet
All data-center and internal bound traffic
routes across your existing WAN
Eliminates the need to backhaul
Internet traffic through a limited number
of secure Internet Gateways
Massive cost savings by reducing MPLS /
WAN bandwidth usage
Greatly improved WAN performance
Greatly improved Internet experience for users
For some firms, more than pays for entire Zscaler
subscription
17. Is Profoundly Better For Today's World:
Multiple Stacks of Appliances vs Security as a
Service (SaaS)
LAWSON
TECHNOLOGY
Better security, compliance and productivity
Four to ten times more cost effective – pennies per
user per day
Vastly better performance, reliability, superior user
experience
OR
Multiple appliances
at every Internet gateway
One global, unified
cloud platform
18. Security as a Service (SaaS) Makes
Endusers, IT and Senior Management Happy
LAWSON
TECHNOLOGY
Improved employee productivity and satisfaction
IT can focus on more strategic, value added activities
Avoid audit risk, remediation and reputation damage
Better security with easier
administration and lower cost of
ownership
Headaches of managing stacks of
appliances go away
Internet and Intranet performance
vastly improves for users
IT can safely enable access to Web 2.0 –
making users even happier
CEO and CFO gain visibility into cloud
usage, easing GRC and audit
19. Testing and deployment is fast and easy – get
started in days, global roll out in weeks
LAWSON
TECHNOLOGY
Improved employee productivity and satisfaction
IT can focus on more strategic, value added activities
Avoid audit risk, remediation and reputation damage
Simple managed configuration – no software or
hardware required on device
– Routers / firewalls
• Configure GRE tunnel or VPN to Zscaler
– Guest WiFi
• Secure DNS
– Mobile laptops
• Secure DNS, PAC file or agent
– Tablets and smart phones
• Apple – Built into iOS 7 or agent
• Android – Built into Samsung KNOX or agent
Easy to test with individual devices, workgroups or
offices
20. : Network & Internet Security
everywhere --- Delivered Via Cloud Computing
LAWSON
TECHNOLOGY
23. How it works: Connect to the Internet through
global Zscaler policy enforcement points
LAWSON
TECHNOLOGY
24. Is Always In-Line And Real-time
LAWSON
TECHNOLOGY
Better security and compliance
Avoids overloading the security operation center
Does not allow infections to happen in the first place
Missed Alarms and 40 Million
Stolen Credit Card Numbers:
How Target Blew It
Zscaler inspects every byte of traffic in real-time
– Advanced persistent threats / zero-day threats are
additionally processed by our advanced behavioral
analysis engine
By default, all threats and violations are automatically
blocked
– Compare to appliance-based security strategies that
only alert
24
25. Decrypts and Inspects SSL Traffic
LAWSON
TECHNOLOGY
Complete visibility into all traffic – no blind spots
Granular controls to ensure appropriate employee privacy
25
SSL traffic on
enterprise networks
is growing rapidly &
creating security
blind spots
SSL traffic is becoming pervasive, but most
organizations are blind to it
– 35% percent of Internet traffic is now encrypted with
SSL, growing to more than 50% in 2015
The most sophisticated threats are using SSL
– 16% of all traffic blocked uses SSL
– 54% of advanced persistent threats use SSL
Zscaler automatically decrypts and inspects SSL
traffic, in real-time
– Flexible, granular policies for what to inspect vs. pass
– Zscaler can host your certificates
26. Uniquely Features Globally Unified
Administration, Policy Management and
Reporting
LAWSON
TECHNOLOGY
Comprehensive global visibility
Eliminates gaps and configuration mistakes
Greatly reduced cost of administration
26
Centralized administration
– Single console can manage all
applications and all locations
Unified policy management
– User, role, department,
company
and location-based
– Set once, enforce everywhere
– Directory service integration
Unified global logging and
reporting
– Near real-time reporting &
analysis
– Regional log storage
– Built-in SIEM integration