04/20/2021 | Press release | Distributed by Public on 04/20/2021 06:05
Zscaler, Inc. (NASDAQ: ZS), the leader in cloud security, today announced innovations for the Zscaler Zero Trust Exchange™ platform and new programs designed to secure digital businesses. New security solutions, resources for IT execs and practitioners, and deployment guides to expedite zero trust adoption are redefining the rules of IT security for today's internet-driven, cloud-first businesses. The combination of these offerings provides digital businesses a holistic approach to securing modern organizations and the pragmatic skills and blueprints needed to be competitive.
Digital transformation has fundamentally changed the way modern businesses innovate and operate. This seismic shift has been accelerated by enterprises' move to cloud-based SaaS models and the internet becoming the new corporate network -- shattering 30 years of IT networking and security principles. While direct-to-internet connectivity for access to cloud applications and workloads has democratized information flow and improved business agility, it has also destroyed the castle-and-moat security architecture exposing businesses to new threat vectors resulting in more large-scale security breaches.
Zero trust starts with validating user identity combined with business policy enforcement based on contextual data from user, device, app and content to deliver authorized direct access to applications and resources. This means that no entity (user or application) is inherently trusted. Built on three fundamental tenets, the Zscaler Zero Trust Exchange makes the cloud safe by securely connecting the right users to the right applications.
Platform: New Security Solutions to Take Advantage of the Most Advanced Zero Trust Platform
Studies show that 77% of IT security teams believe they will move to a hybrid working model resulting in the need for new and advanced security requirements. The introduction of three innovations for theZero Trust Exchange platform helps IT security teams bring zero trust security to every digital business, strengthens safe web access, and dramatically simplifies the adoption of zero trust policies.
People: Elevating the Role of IT Executives and Delivering Advanced Skills for Security Practitioners
Process: Validated Designs and Blueprints to Facilitate Zero Trust Deployments
'The accelerated adoption of digital transformation compounded with more employees working from anywhere has opened the floodgates to targeted cyber attacks. Security teams face challenges everyday posed by managed and unmanaged endpoints and identities, streams of unfiltered data, and the complexity of managing user access to critical business applications,' said Amol Kulkarni, chief product officer at CrowdStrike. 'CrowdStrike's Zero Trust Assessment provides continuous, real-time security device posture assessments and Zscaler's frictionless integration with ZTA provides an identity and data-centric approach for dynamic conditional access to applications. The integration delivers customers a holistic zero trust solution that encompasses data, people, devices, workloads and networks.'
'As enterprises continue to adopt a cloud-first strategy, a cloud-native zero trust security model has become a necessity,' said Sendur Sellakumar, CPO and SVP of Cloud, Splunk. 'Splunk and Zscaler have jointly developed design guides and robust product integrations to help IT security teams prevent and detect attacks, dynamically control policy and risk, and accelerate threat response in alignment with zero trust best practices.'
A complete list of quotes from our supporting partners can be found at https://www.zscaler.com/partners/technology/zero-trust-quotes.
Industry Analyst Quote
'Thanks to cloud and mobility, our infrastructure, applications and data are everywhere, and as a result of the growing work-from-home (WFH) phenomenon, users are now more scattered than ever,' said Eric Hanselman, Principal Research Analyst, 451 Research, part of S&P Global Market Intelligence. 'Perimeter-based controls are thus quickly becoming obsolete, making the zero trust approach of using a cloud-native architecture to disperse security controls for performance and scale the more appealing way to protect businesses.'
Additional Information
To learn more about this announcement see https://www.zscaler.com/zero-trust-moment.