3 Trusted By the Most Demanding Brands RetailFinancialConsumer GoodsLEADINGBEVERAGE COMPANYManufacturingHealthcareTechnologyPublic SectorISP & Others
4 3 Trends Transforming Network & Security Business Users go MobileUsers work from home or on-the-goUsers who BYOD50%90%Cloud Apps go MainstreamCloud-based applications used by an enterprise50Social goes Enterpriseemployees use Facebook at work75%— Impact —Mobile, Cloud & Social: Driving business beyond the corporate network (often without policy & protection)This is breaking the traditional appliance-based security.Users are often outside the corporate network accessing cloud-based services.80% of my MLPS traffic use to be for applications at my HQ and 20% was Internet bound. Now it’s just the opposite.” – CIO, Fortune 50 company“
10 Enabling Business Beyond the Corporate Network Secure. Everywhere.Direct to InternetEnable secure Internet access with no new hardware/softwareDynamic vs fixed securityCloud-based vs appliance based modelNo traffic backhaulingMost points of presence Zero latency experienceAlways secureUltra-fast processing power – inspect everythingEnabling MobilityBeyond mobile device managementProtect road warriors & remote officesNo backhauling traffic, No latencyProtect work at home usersSecure direct to Internet connections to business appsEnable BYODConsistent policy for all devicesSecuring Cloud Apps Securely enabling cloud applications and social mediaCloud applicationsProvide secure access to business critical appsProtect data lossBandwidth controlAllocate BW to prioritize business-critical applicationsSocial complianceEnable legitimate use of social media & ensure complianceUnified Policy and ReportingApply one policy for any device, location. Real-time cloud intelligence and interactive analysis.Security that ScalesNo hardware, software. No latency experience. Most points of presence.
12 Enabling Mobility: Why MDM is Not Enough Enable BYOD devicesSecure access from devices to corporate assetsKeep personal use separateProtect road warriors with zero- latency performanceNo backhauling trafficNo latencyProtect work from home users from mobile threatsSecure direct to Internet connections to corporate applications, assetsKeep malware out of corporate networkZscaler Mobile traffic inspectionData traffic policiesURL categorization and App ControlsPrevention of phishing, XSS etc.Mitigating mobile malwareMobile DLPMDMAuthenticationProvisioning of device settings and policiesEnterprise App StoreRemote Lock, Wipe, etcWith Zscaler we now can enforce consistent Internet access policies, whether employees are at our office, on the road, or at home.”“
17 Why Customers Use Zscaler Legacy: All traffic was backhauled to 4 data centersNow: Eliminated dozens of Blue Coat proxiesNo latency; no backhauling of trafficSecurity & Web 2.0 control; Follow-the-User policies120,000 users in130 countries4,000 users in18 locationsLegacy: All locations locally managedNow: Direct-to-Internet thru ZscalerTCO: $500,000 over 3 years17 fewer (full-time) admins requiredReduced PC infections from 2/week to 2 in 6 monthsLegacy: Many disparate point products; URL onlyAdvanced threat protection with SSLIntegrated real-time reportingConsistent policies for office and on-the-goBandwidth cost cut into HALF4,000 users in39 countriesLegacy: 40 point solutions; No Unified PoliciesBotnet protection with full inline inspectionManaged access to Web 2.0 SiteMinimized cost and IT administrationIncrease security, transparency & compliance45,000 users in183 countries