Quantcast
Channel: Blogs Feed
Browsing all 1471 articles
Browse latest View live

Future Forward: The Top 5 Takeaways for Partners from Zenith Live

Two weeks, two continents, 600 partners, and the latest in Zscaler innovations and Partner GTM strategy. Zscaler Zenith Live 2023 landed in Las Vegas and Berlin this June, and united cybersecurity...

View Article


Zenith Live ‘23 EMEA Closes with Customer Calls for Action, Quest for Innovation

"Change is uncomfortable. Fear of the unknown leads to inertia. The bold and curious will succeed." – Jay Chaudhry, Zscaler Cybersecurity spending is projected to reach $219 billion in 2023....

View Article


Saving Money with Zero Trust Part 1: Cutting Infrastructure and Hardware Costs

The last few years have been highly challenging for organizations’ finances. Lockdowns from the global pandemic, supply chain issues, rising inflation, and a smorgasbord of other problems have bred...

View Article

Secure Your Cloud Data with Integrated DLP and CNAPP

Learn how DLP and threat intelligence integrations with CNAPP can effectively uncover data security risks in untrusted cloud native environments. It’s no secret that cloud native technologies are...

View Article

The Future of Data Protection is Here - Innovation Updates From Zenith Live '23

Last week the industry converged in Las Vegas at Zscaler’s Zenith Live Cloud Summit for a week of keynotes, breakouts, training, and in-depth industry discussions. While the topic of Generative AI was...

View Article


An Integrated Solution to Distributed Data Protection

When I talk to customers about the IT Initiatives they have in place, most of them point to their ransomware strategy. However, when I ask them what they’re doing for data protection in particular, I...

View Article

The TOITOIN Trojan: Analyzing a New Multi-Stage Attack Targeting LATAM Region

Summary Discover the intricate layers of a new sophisticated and persistent malware campaign targeting businesses in the LATAM region delivering the TOITOIN Trojan. Delve into the multi-stage attack...

View Article

IoT Security Begins with Visibility

The rise of IoT IoT devices are being leveraged by businesses to simplify processes, enhance productivity, and gain a competitive edge. The rapid pace of implementation and the diversity of devices...

View Article


Zscaler Digital Experience Detects Deutsche Telekom ISP Slowness

At 00:40 to 08:25 UTC on June 23, 2023 users connected to the Zscaler DUS1 data center using DT (Deutsche Telekom) as their local ISP reported experiencing slow network performance. The issue quickly...

View Article


How Customers Capture Real Economic Value with the Zero Trust Exchange - Part 2

Saving money is a top priority for many organizations, particularly during periods of economic uncertainty. Today, security, networking, and IT teams are faced with reduced headcount, shrinking...

View Article

New Cybersecurity Innovations: The Zscaler Sandbox Just Got Even Better

As the world’s first inline, AI-powered malware prevention engine, the Zscaler Sandbox is already an extremely popular capability among our security-focused customers. At Zenith Live 2023, we announced...

View Article

AI-powered Cyber Protection to Stay Ahead of Evolving Threats

Zenith Live 2023 was chock full of announcements about new platform features to help our clients address important challenges and use cases, ranging from generative AI and advanced cyberthreat...

View Article

New Cybersecurity Innovations: Analytics and Visibility

Zenith Live 2023 was chock full of announcements about new platform features to help our clients address important challenges and use cases. Around every corner were dizzying numbers of improvements to...

View Article


New Innovations in Intelligent App Segmentation

A compromised machine can cause severe damage if it allows lateral movement inside an organization’s network. To prevent lateral propagation and reduce your attack surface, user-to-app...

View Article

Simplifying Zscaler Administrative Experience with Consolidated Identity...

Overview ZSLogin is a new common identity service for Zscaler that centralizes and simplifies identity management, user authentication, and entitlement assignment for users to services. The initial...

View Article


Introducing Zscaler EASM

In fast-evolving distributed digital environments, staying ahead of the curve is no longer an option: it’s a necessity. With cyberthreats and attack vectors multiplying every day, businesses must...

View Article

Zscaler Private Access: Remote Access to Healthcare-Critical Applications

In the modern healthcare landscape, the ability to securely access critical applications from remote locations is crucial for doctors and other healthcare professionals. With the rise of telemedicine...

View Article


Technical Analysis of CryptNet Ransomware

Key Points CryptNet is a new ransomware-as-a-service that has been advertised in underground forums since at least April 2023 The CryptNet threat group claims to perform double extortion attacks by...

View Article

Exceptional Customer Experiences Begin at Home

By Ash Surti, Executive Vice President, Technology & Security, Colt Technology Services In 1992, a new telecommunications company in London served its first customer with pride. Thirty years later,...

View Article

Dynamic Latency-based ZIA Service Edge Assignment

Zscaler is dedicated to providing an improved end user experience. After many companies started adapting work-from-anywhere and hybrid work environments, and because users have different network...

View Article
Browsing all 1471 articles
Browse latest View live