Zscaler Service

SECURITY STACK AS A SERVICE

 

WHAT ARE YOU PROTECTING?

Traditional network security made sense when all corporate applications were hosted in the data center and users were all on the network. But with apps moving to the cloud, and users increasingly mobile, reality has changed. Architectures back-hauling traffic to a centralized location, just for security, are costly and complex, just like spreading security stacks in every location for a Hub and Spoke architecture, all are increasingly ineffective, costly and irrelevant. These models force all traffic through centralized data center stacks for security and access controls—a complex configuration that results in a terrible user experience.

                    

As applications move more and more to the cloud, the center of gravity moved with it. User traffic often goes straight to the cloud, bypassing the security perimeter and creating a great challenge for IT managers and CSOs. Security is required around users, not networks.

 

WHAT ARE YOU PROTECTING FROM?

Today’s complex threats, malwares and infected websites, all triggered an explosion of new security appliances, all finding their way into your overworked gateway. Administrators are in a constant battle to keep up with required security updates for their appliances. The complexity of deploying and managing all these appliances — and their associated costs — are out of control. Furthermore, it is all associated with what is now an outdated architecture.

IMPROVE PERFORMANCE, REDUCE COST AND COMPLEXITY

Security stack as a service eliminates the cost and complexity of traditional secure web gateway approaches. By moving security to a globally distributed cloud, it brings the Internet gateway closer to the user for a faster experience. Organizations can easily scale protection to all offices or users, regardless of location, and minimize network and appliance infrastructure.

FIT YOU ECOSYSTEM

With multiple systems spread around organization, it is crucial to integrate systems for ease of management as well as for completing business ecosystem to maximize benefit from each system. This refers to Identify Providers, Mobile Device Management systems, SIEM servers etc.

PROVIDE UP-TO-DATE SECURITY

With the security stack threat intelligence being in the cloud, it benefits from millions of users working for you. Updates can go over 100K updates a day, so that any threat detected anywhere in the cloud is immediately blocked for all nodes.

 

OUR SOLUTION

Internet Binat, Zscaler partner in israel, provides organizations with a Secure Internet Service – Zscaler Internet Access. All you do is make us your next hop to the Internet. No matter where users connect — a coffee shop in Milan, a hotel in Hong Kong, or the office — they get identical protection.

 

 

The service sits between your users and the Internet, inspecting every byte of traffic inline across multiple security techniques, even within encrypted, SSL/HTTPS traffic. You get full protection from web and Internet threats. And with a cloud platform that supports Cloud Sandboxing, Next-Generation Firewall, Data Loss Prevention (DLP), and Cloud Application Visibility and Control, you can start with the services you need today and activate others as your needs grow.

 

 

 

DELIVERED FROM THE WORLD’S LARGEST SECURITY CLOUD

Our cloud is deployed in 100 data centers across 5 continents. So for instance, your employees sitting in Brazil go through the Brazil data center and employees sitting in India who go to Mumbai connect to the local data

center. The number of threats and level of innovation and sophistication is increasing rapidly, so you must be able to evolve your cloud to handle more frequent updates. Appliances were never designed for this frequency of updates. We do about a120,000 unique security updates every day. Imagine trying to update an appliance 120,000 times day.

 

We also peer with all leading Internet exchanges and leading apps, ranging from Office 365, to Azure, AWS, Box and Salesforce. This helps you get the fastest performance because our data center sitting in Chicago and New York are peered with the content, giving you fastest connection from our cloud.

 

 

ZSCALER – NAMED LEADER FOR THE 8TH YEAR IN A RAW

For now 9 years in a raw, Gartner named Zscaler as a world leader in the Magic Quadrant for Secure Web Gateways.

Download the 2018 Gartner Magic Quadrant for Secure Web Gateways here.

 


How good is YOUR Internet Security?

 

Get a quick assessment of the strength of your Internet security. You will see how well your security infrastructure can stop threats, protect your users, and safeguard your company data. It will also provide recommendations on how to close any gaps that are found.

 

Despite costly on-premises security appliances (such as Cisco, Symantec/Blue Coat, Websense/Forecepoint, McAfee, Check Point, FireEye, Fortinet, Palo Alto Networks) many enterprise networks still remain vulnerable due to functionality, performance, or misconfiguration issues. With a global security cloud that processes billions of security requests every day, Zscaler instantly scans and pinpoints security gaps other security solutions often miss and can help you take corrective action today.

Security preview runs in your browser, and won’t access your data, change any settings, or introduce malware. You might see alerts in your security system.

 

Want to hear more about our security solutions? Use the contact form, and we will contact you soon.

 

INFORMATION SECURITY IN THE CLOUD

Businesses can now enjoy the most advanced security in the world for mobile and stationary internet communication, with Zscaler’s global cloud security.

Zscaler provides an international cloud based security service (Secure Web Gateway). Zscaler’s security network encompasses 100 sites around the world, creating the largest Cloud Security Infrstructure in the world today, a security cloud through which companies and mobile users can access the internet from anywhere in the world. This international security cloud is provided by Zscaler as a service (Security as a Service), with all of the advantages of a service: the most advanced security applications, without the need to purchase security equipment, update or manage policies.

In addition, Zscaler provides information security at a level of cover, updating and granularity that is impossible for security products. For example, an IT manager may protect an organization from Web 2.0 threats, without blocking applications such as SalesForce or Facebook. QoS is possible between Web 2.0 applications, so that the use of SalesForce is not blocked, but the use of movie download software is.

ZSCALER VS. TRADITIONAL SECURITY APPLIANCES

CHALLENGE – SECURITY IN THE GLOBAL AGE

IT managers today have to deal with the fact that many employees are mobile employees, as well as with the fact that internet access is also available through smartphones.

The result is an increasing difficulty to implement internet use policies for employees – because of both mobility and the increasing use of Web 2.0 applications such as SalesForce and Facebook. Many IT managers today face a dilemma: on the one hand, protecting the organization from the potential threats of Web 2.0 applications, on the other, responding to the demands of employees to use such applications, sometimes required for their work.

TRADITIONAL SECURITY LIMITATIONS

Anyone who is familiar with the field of information security knows how difficult it is to protect a dynamic organization completely open to the internet, all the more so if the organization has multiple sites, as well as sites abroad. Traditional information security, based on local tools such as Firewall, Anti-Virus, SSL Decryption and others, has several important limits:

  • Requires a high level of understanding of information security and expertise in the implementation of information security tools: what products to purchase, how to integrate them and, most importantly, how to calibrate them so that they work properly without interfering with the organization’s operations (For example, the problems with intrusion detection products).
  • Requires regular information security policies management, including security updates, patches, etc. as well as regular management of exposure and internet use policies for employees.
  • Such expertise is required on every new site that is added to the organization, and it is difficult to implement a global information security policy over distant sites.

A common result for companies with multiple sites is that every site has a different information security policy, with different security tools, and, sometimes, even different policies for employees.

THE ANSWER – ZSCALER SECURE WEB GATEWAY

Zscaler’s security network responds to the challenge of protecting the modern organization with an internet communication security service. This service operates through an international cloud over 45 sites around the world, providing a global cloud though which companies and user can access the internet.

Zscaler delivers the highest level and most up-to-date security for internet communication, from the latest operating system patches to the most granular levels of firewalls.

All security services are administered through a convenient and accessible portal for the use of the IT team, providing real time reports.

ZSCALER – THE TECHNOLOGICAL ADVANTAGE

Zscaler has created a SaaS based security system with several unique technological innovations:

  • Every site is a ZEN – Zscaler Enforcement Node – that implements the customer’s security policy. Sites are hardware based and have a unique operating system that ensures fast information processing and E-mail, allowing 90% of the traffic to transfer in less than 90 milliseconds.
  • The Central Authority (CA) is the center that establishes the customer’s security policies. It administers and supervises all the sites to ensure that the customer’s security policies are up-to-date. The CA also refers mobile users to the nearest site to minimize latency.
  • Nanolog™ (Transaction Log) Servers allow all logs from all of the company’s sites to be unified and coordinated, and presented to IT managers at any time.

 

For more about our Web Security Service, Click here.

Want to hear more about our security solutions? Use the contact form, and we will contact you soon.

 

For more information, please contact us in any of the following channels and we will contact you soon:

Fill the form