Secure. Everywhere. Direct to Internet Enable secure Internet access with no new hardware/software – Dynamic vs fixed security Cloud-based vs appliance based model – No traffic backhauling Most points of presence Zero latency experience – Always secure Ultra-fast processing power – inspect everything Security that Scales No hardware, software. No latency experience. Most points of presence. Enabling Business Beyond the Corporate Network Secure. Everywhere. Enabling Mobility Beyond mobile device management – Protect road warriors & remote offices No backhauling traffic, No latency – Protect work at home users Secure direct to Internet connections to business apps – Enable BYOD Consistent policy for all devices Securing Cloud Apps Securely enabling cloud applications and social media – Cloud applications Provide secure access to business critical apps Protect data loss – Bandwidth control Allocate BW to prioritize business-critical applications – Social compliance Enable legitimate use of social media & ensure compliance Unified Policy and Reporting Apply one policy for any device, location. Real-time cloud intelligence and interactive analysis.
Secure. Everywhere. Enabling Mobility: Why MDM is Not Enough Enable BYOD devices – Secure access from devices to corporate assets – Keep personal use separate Protect road warriors with zero- latency performance – No backhauling traffic – No latency Protect work from home users from mobile threats – Secure direct to Internet connections to corporate applications, assets – Keep malware out of corporate network Zscaler Mobile traffic inspection Data traffic policies URL categorization and App Controls Prevention of phishing, XSS etc. Mitigating mobile malware Mobile DLP MDM Authentication Provisioning of device settings and policies Enterprise App Store Remote Lock, Wipe, etc
Secure. Everywhere. Why Customers Use Zscaler Legacy: All traffic was backhauled to 4 data centers Now: Eliminated dozens of Blue Coat proxies No latency; no backhauling of traffic Security & Web 2.0 control; Follow-the-User policies 120,000 users in 130 countries Legacy: All locations locally managed Now: Direct-to-Internet thru Zscaler TCO: $500,000 over 3 years 17 fewer (full-time) admins required Reduced PC infections from 2/week to 2 in 6 months 4,000 users in 18 locations Legacy: Many disparate point products; URL only Advanced threat protection with SSL Integrated real-time reporting Consistent policies for office and on-the-go Bandwidth cost cut into HALF 4,000 users in 39 countries Legacy: 40 point solutions; No Unified Policies Botnet protection with full inline inspection Managed access to Web 2.0 Site Minimized cost and IT administration Increase security, transparency & compliance 45,000 users in 183 countries