Future Forward: The Top 5 Takeaways for Partners from Zenith Live
Two weeks, two continents, 600 partners, and the latest in Zscaler innovations and Partner GTM strategy. Zscaler Zenith Live 2023 landed in Las Vegas and Berlin this June, and united cybersecurity...
View ArticleZenith Live ‘23 EMEA Closes with Customer Calls for Action, Quest for Innovation
"Change is uncomfortable. Fear of the unknown leads to inertia. The bold and curious will succeed." – Jay Chaudhry, Zscaler Cybersecurity spending is projected to reach $219 billion in 2023....
View ArticleSaving Money with Zero Trust Part 1: Cutting Infrastructure and Hardware Costs
The last few years have been highly challenging for organizations’ finances. Lockdowns from the global pandemic, supply chain issues, rising inflation, and a smorgasbord of other problems have bred...
View ArticleSecure Your Cloud Data with Integrated DLP and CNAPP
Learn how DLP and threat intelligence integrations with CNAPP can effectively uncover data security risks in untrusted cloud native environments. It’s no secret that cloud native technologies are...
View ArticleThe Future of Data Protection is Here - Innovation Updates From Zenith Live '23
Last week the industry converged in Las Vegas at Zscaler’s Zenith Live Cloud Summit for a week of keynotes, breakouts, training, and in-depth industry discussions. While the topic of Generative AI was...
View ArticleAn Integrated Solution to Distributed Data Protection
When I talk to customers about the IT Initiatives they have in place, most of them point to their ransomware strategy. However, when I ask them what they’re doing for data protection in particular, I...
View ArticleThe TOITOIN Trojan: Analyzing a New Multi-Stage Attack Targeting LATAM Region
Summary Discover the intricate layers of a new sophisticated and persistent malware campaign targeting businesses in the LATAM region delivering the TOITOIN Trojan. Delve into the multi-stage attack...
View ArticleIoT Security Begins with Visibility
The rise of IoT IoT devices are being leveraged by businesses to simplify processes, enhance productivity, and gain a competitive edge. The rapid pace of implementation and the diversity of devices...
View ArticleZscaler Digital Experience Detects Deutsche Telekom ISP Slowness
At 00:40 to 08:25 UTC on June 23, 2023 users connected to the Zscaler DUS1 data center using DT (Deutsche Telekom) as their local ISP reported experiencing slow network performance. The issue quickly...
View ArticleHow Customers Capture Real Economic Value with the Zero Trust Exchange - Part 2
Saving money is a top priority for many organizations, particularly during periods of economic uncertainty. Today, security, networking, and IT teams are faced with reduced headcount, shrinking...
View ArticleNew Cybersecurity Innovations: The Zscaler Sandbox Just Got Even Better
As the world’s first inline, AI-powered malware prevention engine, the Zscaler Sandbox is already an extremely popular capability among our security-focused customers. At Zenith Live 2023, we announced...
View ArticleAI-powered Cyber Protection to Stay Ahead of Evolving Threats
Zenith Live 2023 was chock full of announcements about new platform features to help our clients address important challenges and use cases, ranging from generative AI and advanced cyberthreat...
View ArticleNew Cybersecurity Innovations: Analytics and Visibility
Zenith Live 2023 was chock full of announcements about new platform features to help our clients address important challenges and use cases. Around every corner were dizzying numbers of improvements to...
View ArticleNew Innovations in Intelligent App Segmentation
A compromised machine can cause severe damage if it allows lateral movement inside an organization’s network. To prevent lateral propagation and reduce your attack surface, user-to-app...
View ArticleSimplifying Zscaler Administrative Experience with Consolidated Identity...
Overview ZSLogin is a new common identity service for Zscaler that centralizes and simplifies identity management, user authentication, and entitlement assignment for users to services. The initial...
View ArticleIntroducing Zscaler EASM
In fast-evolving distributed digital environments, staying ahead of the curve is no longer an option: it’s a necessity. With cyberthreats and attack vectors multiplying every day, businesses must...
View ArticleZscaler Private Access: Remote Access to Healthcare-Critical Applications
In the modern healthcare landscape, the ability to securely access critical applications from remote locations is crucial for doctors and other healthcare professionals. With the rise of telemedicine...
View ArticleTechnical Analysis of CryptNet Ransomware
Key Points CryptNet is a new ransomware-as-a-service that has been advertised in underground forums since at least April 2023 The CryptNet threat group claims to perform double extortion attacks by...
View ArticleExceptional Customer Experiences Begin at Home
By Ash Surti, Executive Vice President, Technology & Security, Colt Technology Services In 1992, a new telecommunications company in London served its first customer with pride. Thirty years later,...
View ArticleDynamic Latency-based ZIA Service Edge Assignment
Zscaler is dedicated to providing an improved end user experience. After many companies started adapting work-from-anywhere and hybrid work environments, and because users have different network...
View Article