It’s time to rethink network security
Networks were designed to connect users to apps in the data center and we built a secure perimeter around the network to keep those users and apps safe from the outside. But with apps moving to the cloud, and users connecting from everywhere, the perimeter is gone. It’s time to decouple security from the network and use policies that are enforced anywhere apps reside and everywhere users connect.
The world has changed. So why is security still anchored to the data center?
The Old World
One-premises data center
Hub-and-spoke: backhaul traffic to the on-premises data center
Castle-and-moat: to secure the corporate network
The New World
Public cloud, SaaS
Direct-to-cloud traffic routed locally to the internet
Securely connect users and devices to applications regardless of network
To secure the new world, flip the security model
In the past, you had to be on the network to get security protections. But by moving security off the network and into the cloud, you put the full stack of network security engines everywhere your users go. Because security protections are applied consistently, you have the exact same protections in a branch office, at home, or in an airport as you have in the HQ.
Move from a network-centric security model to a user-centric approach for fast, consistent policy enforcement
Why move security to the cloud?
Faster user experience
Users connect directly to the nearest Zscaler data center—one of more than 100 worldwide—taking the shortest path to the application or internet destination.
Zscaler eliminates the cost of buying and managing multiple network security appliances and reduces dedicated WAN costs.
The Zscaler platform provides full inline inspection of internet traffic, including SSL, and correlates threat data in real time.
Zscaler delivers the functions of a traditional internet gateway as a cloud service, reducing the cost and complexity of network security.
Security Cloud by Zscaler ™
The Zscaler Cloud Security Platform provides fast and secure policy-based access to internally and externally managed applications. It’s the complete gateway stack—inbound and outbound—delivered as a cloud service.
Internally Managed Apps
Securely connects authorized users to internally managed applications