Bestehen Bedenken im Hinblick auf VPN-Sicherheitslücken? Erfahren Sie, wie Sie von unserem VPN-Migrationsangebot inklusive 60 Tagen kostenlosem Service profitieren können.

Zscaler Blog

Erhalten Sie die neuesten Zscaler Blog-Updates in Ihrem Posteingang

Abonnieren
Produkte & Lösungen

Go Beyond the Perimeter: Zero Trust Transformation with CrowdStrike and Zscaler

image
KANISHKA PANDIT
Mai 07, 2021 - 3 Lesezeit: Min

The perimeter has dissolved. The “new normal” of employees working from home has now transformed into working from anywhere, due to the flexibility it has provided over the last year. Because of this shift, there is a need to provide secure access to employees beyond the traditional perimeter of the office. Zero trust has gained traction in the last year for its ability to secure a remote workforce.

Zero trust is based on the principle that no one is granted inherent trust. Instead, authentication and authorization are required to gain access. In addition, security must be applied where the users, data, and applications are. In the new world, where users are working from anywhere and applications are moving the cloud, these fundamentals are imperative. 

Zscaler and CrowdStrike recently hosted an event, Beyond the Perimeter, where zero trust experts shared their views on the current threat landscape and zero trust adoption strategies.

Key takeaways from the event:

  • The network is just the transport: With zero trust, you are protecting the user regardless of their location, while enforcing policy closest to the user and applications
  • The attack surface needs to be reduced: With the internet serving as the new corporate network, it is important to make applications dark, meaning they are invisible and inaccessible to attackers
  • Context is key: Understanding the device posture and user connectivity allows secure access to applications, both private and SaaS

Together, CrowdStrike and Zscaler are simplifying the adoption of zero trust. The integrated solution helps joint customers with adaptive, risk-based access control to private applications, with improved defense for devices connecting from anywhere. 

Nicole Ford from Carrier Enterprise detailed the need for cloud solutions and how Zscaler and CrowdStrike, both cloud-native solutions, are forging the path to innovation. This partnership helps alleviate the pressure on CISOs to tackle zero trust on their own.

Image

The integration between Zscaler and CrowdStrike allows for device posture-based access to private applications and automatically implements access policies. Zero-day malware detection and automatic threat blocking enables rapid response with device quarantine, therefore reducing risk. Threat intelligence sharing between the two platforms enables automated workflow, saving time and resources. This seamless integration provides an additional layer of security and contributes to a great user experience in deployment and usage for end-users.

The benefits from the joint solution are not limited to IT security. As businesses look to enable work-from-anywhere strategies, this joint solution makes it easier to provide users with safe, seamless, and secure access to essential business applications for day-to-day employee activity. All of this can now be achieved on a foundation of zero trust.

If you weren’t able to join the live event, you can still view the sessions on demand: Visit Beyond the Perimeter and register to access the keynote.

Learn more about the Zscaler + CrowdStrike integration

 

form submtited
Danke fürs Lesen

War dieser Beitrag nützlich?

dots pattern

Erhalten Sie die neuesten Zscaler Blog-Updates in Ihrem Posteingang

Mit dem Absenden des Formulars stimmen Sie unserer Datenschutzrichtlinie zu.