SlideShare uma empresa Scribd logo
1 de 14
Presentation title here—edit on Slide Master
©2018 Zscaler, Inc. All rights reserved. Zscaler™, SHIFT™, Direct-to-Cloud™ and ZPA™ are trademarks or registered trademarks of Zscaler, Inc.
in the United States and/or other countries. All other trademarks are the property of their respective owners.
Rethinking Cybersecurity for the
Digital Transformation Era
Dan Shelton – Director, Product
Management
©2018 Zscaler, Inc. All rights reserved.
What is Changing?
The cloud and mobility are creating a megashift for Digital Business
and IT Transformation
Disrupting 30 years of networking and security architectures
Users have moved
off the corporate network and are
connecting from everywhere
Applications have moved
out of the data center and
into the cloud
©2018 Zscaler, Inc. All rights reserved.2
Zscaler enables secure IT transformation to the cloud
Fast and secure policy-based access to applications and services over the Internet
Global load balancing
Distributed denial of service protection
External firewall / intrusion prevention
VPN concentrator
Internal firewall
Internal load balancer
Firewall / intrusion prevention
URL filter
Anti-virus
Data loss prevention
Secure sockets layer inspection
Sandbox
Open internetSaaS Public cloud
Private cloud /
On-premise
data center
Any device, any location, on-network or off-network
EXTERNALLY MANAGED INTERNALLY MANAGED
Securely connects users to externally managed
SaaS applications and internet destinations
Zscaler Internet Access
Securely connects authorized users to
internally managed applications
Zscaler Private Access
HQMOBILE BRANCHIOT
©2018 Zscaler, Inc. All rights reserved.
The Complex Infrastructure of a Large Global Organization
Open internet
MPLS
MPLS MPLS
MPLS
• 9 Data Centers
• 8 internet egress points
managed by 6 different teams
• 8 email systems managed by 6
different teams
900 locations across
22 countries
10,000 Users
3,000 Remote Users on
5 VPN solutions
17 MPLS providers with
various configurations
Unreliable | Difficult to Manage | Lack of Visibility
Poor End-User Experience | Significant CAPEX and OPEX
Fail-Over
EMEA DC
Fail-Over
NA DC
©2018 Zscaler, Inc. All rights reserved.©2017 Zscaler, Inc. All rights reserved.4
Five Phase Journey
Phases 1-3: Network Transformation with Focus on
Consolidation, Enhanced Security Posture, an Architecture
Purpose-Built for Leveraging SaaS, and Cost Savings
©2018 Zscaler, Inc. All rights reserved.
Cloud Transformation Journey – Phase 1
Four initiatives – 9 months
1. WAN vendor consolidation
2. SD WAN at 870 branches
3. Embrace Office 365 and phase-
out local email servers
4. Local internet breakouts with
appliances
30 Country &
Regional HQs
870 Branch
Locations
MPLS
WAN Vendor
9 Data Centers
Open Internet
IPSEC-to-MPLS architecture
(No MPLS at braches)
Branch office users were still complaining their internet experience was poor.
MPLS
WAN Vendor
SaaS
Benefits
• Cost savings
• Better internet experience at
country and regional HQs
• Simplified IT by standardizing
email/SharePoint and
reducing MPLS vendors from
17 to 1
1
4
MPLS
WAN Vendor
2
3
©2018 Zscaler, Inc. All rights reserved.
Cloud Transformation Journey – Phase 2
One initiative – 9 months
1. Implement local internet
breakouts in all branches
30 Country &
Regional HQs
870 Branch
Locations
9 Data Centers
MPLS
WAN Vendor
Open Internet
Option 1: Deploy branch
firewalls in 870 locations.
Option 2: Implement Zscaler
Cloud Security Platform.
XX
Office 365 required more than just traditional proxy ports.
Visibility provided by Zscaler led to courageous conversations on OSI Models Layers 8,9,10.
SaaS
Benefits
• Reduction in branch user internet
complaints (less pushback)
• Avoided the cost and overhead of
deploying 870 security appliances
• 60% reduction in Data Center
bandwidth requirements
• Enhanced Security Posture – SSL
inspection, cloud sandbox, DLP,
and SIEM integration
©2018 Zscaler, Inc. All rights reserved.
Cloud Transformation Journey – Phase 3
Three initiatives
1. Implement Zscaler Cloud Firewall
and Bandwidth Control for O365
2. Reduce security appliance
requirements at country /
regional HQs
3. Protect mobile users
30 Country &
Regional HQs
870 Branch
Locations
9 Data Centers
MPLS
WAN Vendor
Open Internet
Delivered a consistent end-user experience to IaaS and SaaS applications at all branch and HQ locations,
but the mobile user was still struggling
SaaS
Benefits
• Eliminated security appliances in
country & regional HQs
• Better Office 365 user
experiences in all locations
• Reduced risk by providing
identical security controls to
mobile workers
©2018 Zscaler, Inc. All rights reserved.©2017 Zscaler, Inc. All rights reserved.8
Five Phase Journey
Phases 4-5: Updated Application Delivery Strategy with Focus on
IaaS, Consolidation, and Consistent End-User Experience
©2018 Zscaler, Inc. All rights reserved.
9 Data Centers
MPLS
WAN Vendor
Open Internet
SaaS IaaS
5 Data Centers
Cloud Transformation Journey – Phase 4
Three initiatives – 12 months
1. Migrate apps to IaaS – re-
platform critical apps to be
browser accessible
2. Deploy virtual NGFWs and load
balancers to eliminate traffic
tromboning
3. Consolidate data centers
30 Country &
Regional HQs
870 Branch
Locations
VM
Virtual NGFWs and load balancers were expensive, didn’t scale, and micro-segmentation challenges.
User confusion on when to use VPN and when they could use a browser.
Benefits
• Reduced data center costs
• Reference Architecture to provide
users better access re-platformed
apps (No VPN)
©2018 Zscaler, Inc. All rights reserved.
MPLS
WAN Vendor
Open Internet
SaaS
5 Data Centers
IaaS
VM
Cloud Transformation Journey – Phase 5
Two initiatives – 6 months
1. Seamless End-User Experience -
Implement Zscaler Private Access
2. Reference Architecture for a
Zero-Trust Network Model
30 Country &
Regional HQs
870 Branch
Locations
Future-proof app delivery strategy with positive end-user experience.
Benefits
• Simplified access to all
applications
• Eliminated the cost and
complexity of virtual firewalls
and load balancers in IaaS
• Enhanced security posture – app
microsegmentation, reduced
inbound attack surface,
enablement of zero-trust
network model
©2018 Zscaler, Inc. All rights reserved.
Transformation Journey – Summary
Cost Savings
8% of Overall IT Spend
(Optimized Network/Security Arch, DC
Consolidation, O365, etc.)
Cost Avoidance
$2.7M in appliance sprawl
Network transformation – SDWAN at 870 locations and deployment of 30 local breakouts with appliances
Network transformation – ZIA deployed to support local internet breakouts in 870 branch offices
Global collaboration tools – Successfully deployed Office 365 with Cloud FW and Bandwidth Control
Data center transformation – Moved apps to Azure/AWS and consolidated data centers
Application access transformation –Eliminated VPN, zero-trust network model, positive end-user experience
1
2
3
4
5
Benefits
Agile IT environment
Consistent end-user experience
Reduced business risk
12
©2018 Zscaler, Inc. All rights reserved.
©2018 Zscaler, Inc. All rights reserved. Zscaler™, SHIFT™, Direct-to-Cloud™ and ZPA™ are trademarks or registered trademarks of Zscaler, Inc.
in the United States and/or other countries. All other trademarks are the property of their respective owners.

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18
 
Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8
 
Cloud vs. On-Premises Security: Can you afford not to switch?
Cloud vs. On-Premises Security:  Can you afford not to switch?Cloud vs. On-Premises Security:  Can you afford not to switch?
Cloud vs. On-Premises Security: Can you afford not to switch?
 
Zscaler ThreatLabz dissects the latest SSL security attacks
Zscaler ThreatLabz dissects the latest SSL security attacksZscaler ThreatLabz dissects the latest SSL security attacks
Zscaler ThreatLabz dissects the latest SSL security attacks
 
Migration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscalerMigration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscaler
 
Get an office 365 expereience your users will love v8.1
Get an office 365 expereience your users will love v8.1Get an office 365 expereience your users will love v8.1
Get an office 365 expereience your users will love v8.1
 
SD-WAN plus cloud security
SD-WAN plus cloud securitySD-WAN plus cloud security
SD-WAN plus cloud security
 
Office 365 kelly services
Office 365 kelly servicesOffice 365 kelly services
Office 365 kelly services
 
Top 5 predictions webinar
Top 5 predictions webinarTop 5 predictions webinar
Top 5 predictions webinar
 
Schneider electric powers security transformation with one simple app copy
Schneider electric powers security transformation with one simple app   copySchneider electric powers security transformation with one simple app   copy
Schneider electric powers security transformation with one simple app copy
 
Three ways-zero-trust-security-redefines-partner-access-ch
Three ways-zero-trust-security-redefines-partner-access-chThree ways-zero-trust-security-redefines-partner-access-ch
Three ways-zero-trust-security-redefines-partner-access-ch
 
Virtualized Firewall: Is it the panacea to secure distributed enterprises?
Virtualized Firewall: Is it the panacea to secure distributed enterprises?Virtualized Firewall: Is it the panacea to secure distributed enterprises?
Virtualized Firewall: Is it the panacea to secure distributed enterprises?
 
Dissecting ssl threats
Dissecting ssl threatsDissecting ssl threats
Dissecting ssl threats
 
O365 quick with fast user experience
O365 quick with fast user experienceO365 quick with fast user experience
O365 quick with fast user experience
 
What Comes After VPN?
What Comes After VPN?What Comes After VPN?
What Comes After VPN?
 
Secure access to applications on Microsoft Azure
Secure access to applications on Microsoft AzureSecure access to applications on Microsoft Azure
Secure access to applications on Microsoft Azure
 
Moving from appliances to cloud security with phoenix children's hospital
Moving from appliances to cloud security with phoenix children's hospitalMoving from appliances to cloud security with phoenix children's hospital
Moving from appliances to cloud security with phoenix children's hospital
 
Zscaler mondi webinar
Zscaler mondi webinarZscaler mondi webinar
Zscaler mondi webinar
 
How sdp delivers_zero_trust
How sdp delivers_zero_trustHow sdp delivers_zero_trust
How sdp delivers_zero_trust
 
Office 365 deployment
Office 365 deploymentOffice 365 deployment
Office 365 deployment
 

Semelhante a Rethinking Cybersecurity for the Digital Transformation Era

1cloudstar cloud connect azure
1cloudstar cloud connect azure1cloudstar cloud connect azure
1cloudstar cloud connect azure
1CloudStar
 
Making Money in the Cloud
Making Money in the CloudMaking Money in the Cloud
Making Money in the Cloud
Gravitant, Inc.
 

Semelhante a Rethinking Cybersecurity for the Digital Transformation Era (20)

PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...
PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...
PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...
 
A New Approach to Continuous Monitoring in the Cloud
A New Approach to Continuous Monitoring in the CloudA New Approach to Continuous Monitoring in the Cloud
A New Approach to Continuous Monitoring in the Cloud
 
A new way to connect and protect retail networks with secure enterprise SD-WA...
A new way to connect and protect retail networks with secure enterprise SD-WA...A new way to connect and protect retail networks with secure enterprise SD-WA...
A new way to connect and protect retail networks with secure enterprise SD-WA...
 
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...
 
Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)
 
1cloudstar cloud connect azure
1cloudstar cloud connect azure1cloudstar cloud connect azure
1cloudstar cloud connect azure
 
ciscothousandeyesusecase
ciscothousandeyesusecaseciscothousandeyesusecase
ciscothousandeyesusecase
 
AWS re:Invent 2016: Future-Proofing the WAN and Simplifying Security On Your ...
AWS re:Invent 2016: Future-Proofing the WAN and Simplifying Security On Your ...AWS re:Invent 2016: Future-Proofing the WAN and Simplifying Security On Your ...
AWS re:Invent 2016: Future-Proofing the WAN and Simplifying Security On Your ...
 
SP 5G: Unified Enablement Platform
SP 5G: Unified Enablement Platform  SP 5G: Unified Enablement Platform
SP 5G: Unified Enablement Platform
 
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
 
Trending: Convergence of networking and security in stores and branches
Trending: Convergence of networking and security in stores and branchesTrending: Convergence of networking and security in stores and branches
Trending: Convergence of networking and security in stores and branches
 
Transformation As A Service
Transformation As A ServiceTransformation As A Service
Transformation As A Service
 
Orange Business Live 2013 cloud breakout
Orange Business Live 2013 cloud breakoutOrange Business Live 2013 cloud breakout
Orange Business Live 2013 cloud breakout
 
Making Money in the Cloud
Making Money in the CloudMaking Money in the Cloud
Making Money in the Cloud
 
The Changing Data Center Landscape
The Changing Data Center LandscapeThe Changing Data Center Landscape
The Changing Data Center Landscape
 
How to Evaluate, Rollout and Operationalize Your SD-WAN Projects
How to Evaluate, Rollout and Operationalize Your SD-WAN ProjectsHow to Evaluate, Rollout and Operationalize Your SD-WAN Projects
How to Evaluate, Rollout and Operationalize Your SD-WAN Projects
 
Spidercloud Wireless - Small Cell enterprise deployment
Spidercloud Wireless  - Small Cell enterprise deploymentSpidercloud Wireless  - Small Cell enterprise deployment
Spidercloud Wireless - Small Cell enterprise deployment
 
iWAN - Cisco Application Experience Solution
iWAN - Cisco Application Experience SolutioniWAN - Cisco Application Experience Solution
iWAN - Cisco Application Experience Solution
 
Cognizant Cloud for Utilities
Cognizant Cloud for UtilitiesCognizant Cloud for Utilities
Cognizant Cloud for Utilities
 
SDWAN.pdf
SDWAN.pdfSDWAN.pdf
SDWAN.pdf
 

Mais de Zscaler

Mais de Zscaler (8)

Top 5 mistakes deploying o365
Top 5 mistakes deploying o365Top 5 mistakes deploying o365
Top 5 mistakes deploying o365
 
Zenith Live - Security Lab - Phantom
Zenith Live - Security Lab - PhantomZenith Live - Security Lab - Phantom
Zenith Live - Security Lab - Phantom
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
 
Top reasons o365 deployments fail
Top reasons o365 deployments failTop reasons o365 deployments fail
Top reasons o365 deployments fail
 
GDPR - are you ready?
GDPR - are you ready?GDPR - are you ready?
GDPR - are you ready?
 
Maximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and ZscalerMaximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and Zscaler
 
DNS Security, is it enough?
DNS Security, is it enough? DNS Security, is it enough?
DNS Security, is it enough?
 
Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudOvercoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the Cloud
 

Último

Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Monica Sydney
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
F
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
ydyuyu
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
pxcywzqs
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
gajnagarg
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Monica Sydney
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
JOHNBEBONYAP1
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
ydyuyu
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Monica Sydney
 

Último (20)

APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
 

Rethinking Cybersecurity for the Digital Transformation Era

  • 1. Presentation title here—edit on Slide Master ©2018 Zscaler, Inc. All rights reserved. Zscaler™, SHIFT™, Direct-to-Cloud™ and ZPA™ are trademarks or registered trademarks of Zscaler, Inc. in the United States and/or other countries. All other trademarks are the property of their respective owners. Rethinking Cybersecurity for the Digital Transformation Era Dan Shelton – Director, Product Management
  • 2. ©2018 Zscaler, Inc. All rights reserved. What is Changing? The cloud and mobility are creating a megashift for Digital Business and IT Transformation Disrupting 30 years of networking and security architectures Users have moved off the corporate network and are connecting from everywhere Applications have moved out of the data center and into the cloud
  • 3. ©2018 Zscaler, Inc. All rights reserved.2 Zscaler enables secure IT transformation to the cloud Fast and secure policy-based access to applications and services over the Internet Global load balancing Distributed denial of service protection External firewall / intrusion prevention VPN concentrator Internal firewall Internal load balancer Firewall / intrusion prevention URL filter Anti-virus Data loss prevention Secure sockets layer inspection Sandbox Open internetSaaS Public cloud Private cloud / On-premise data center Any device, any location, on-network or off-network EXTERNALLY MANAGED INTERNALLY MANAGED Securely connects users to externally managed SaaS applications and internet destinations Zscaler Internet Access Securely connects authorized users to internally managed applications Zscaler Private Access HQMOBILE BRANCHIOT
  • 4. ©2018 Zscaler, Inc. All rights reserved. The Complex Infrastructure of a Large Global Organization Open internet MPLS MPLS MPLS MPLS • 9 Data Centers • 8 internet egress points managed by 6 different teams • 8 email systems managed by 6 different teams 900 locations across 22 countries 10,000 Users 3,000 Remote Users on 5 VPN solutions 17 MPLS providers with various configurations Unreliable | Difficult to Manage | Lack of Visibility Poor End-User Experience | Significant CAPEX and OPEX Fail-Over EMEA DC Fail-Over NA DC
  • 5. ©2018 Zscaler, Inc. All rights reserved.©2017 Zscaler, Inc. All rights reserved.4 Five Phase Journey Phases 1-3: Network Transformation with Focus on Consolidation, Enhanced Security Posture, an Architecture Purpose-Built for Leveraging SaaS, and Cost Savings
  • 6. ©2018 Zscaler, Inc. All rights reserved. Cloud Transformation Journey – Phase 1 Four initiatives – 9 months 1. WAN vendor consolidation 2. SD WAN at 870 branches 3. Embrace Office 365 and phase- out local email servers 4. Local internet breakouts with appliances 30 Country & Regional HQs 870 Branch Locations MPLS WAN Vendor 9 Data Centers Open Internet IPSEC-to-MPLS architecture (No MPLS at braches) Branch office users were still complaining their internet experience was poor. MPLS WAN Vendor SaaS Benefits • Cost savings • Better internet experience at country and regional HQs • Simplified IT by standardizing email/SharePoint and reducing MPLS vendors from 17 to 1 1 4 MPLS WAN Vendor 2 3
  • 7. ©2018 Zscaler, Inc. All rights reserved. Cloud Transformation Journey – Phase 2 One initiative – 9 months 1. Implement local internet breakouts in all branches 30 Country & Regional HQs 870 Branch Locations 9 Data Centers MPLS WAN Vendor Open Internet Option 1: Deploy branch firewalls in 870 locations. Option 2: Implement Zscaler Cloud Security Platform. XX Office 365 required more than just traditional proxy ports. Visibility provided by Zscaler led to courageous conversations on OSI Models Layers 8,9,10. SaaS Benefits • Reduction in branch user internet complaints (less pushback) • Avoided the cost and overhead of deploying 870 security appliances • 60% reduction in Data Center bandwidth requirements • Enhanced Security Posture – SSL inspection, cloud sandbox, DLP, and SIEM integration
  • 8. ©2018 Zscaler, Inc. All rights reserved. Cloud Transformation Journey – Phase 3 Three initiatives 1. Implement Zscaler Cloud Firewall and Bandwidth Control for O365 2. Reduce security appliance requirements at country / regional HQs 3. Protect mobile users 30 Country & Regional HQs 870 Branch Locations 9 Data Centers MPLS WAN Vendor Open Internet Delivered a consistent end-user experience to IaaS and SaaS applications at all branch and HQ locations, but the mobile user was still struggling SaaS Benefits • Eliminated security appliances in country & regional HQs • Better Office 365 user experiences in all locations • Reduced risk by providing identical security controls to mobile workers
  • 9. ©2018 Zscaler, Inc. All rights reserved.©2017 Zscaler, Inc. All rights reserved.8 Five Phase Journey Phases 4-5: Updated Application Delivery Strategy with Focus on IaaS, Consolidation, and Consistent End-User Experience
  • 10. ©2018 Zscaler, Inc. All rights reserved. 9 Data Centers MPLS WAN Vendor Open Internet SaaS IaaS 5 Data Centers Cloud Transformation Journey – Phase 4 Three initiatives – 12 months 1. Migrate apps to IaaS – re- platform critical apps to be browser accessible 2. Deploy virtual NGFWs and load balancers to eliminate traffic tromboning 3. Consolidate data centers 30 Country & Regional HQs 870 Branch Locations VM Virtual NGFWs and load balancers were expensive, didn’t scale, and micro-segmentation challenges. User confusion on when to use VPN and when they could use a browser. Benefits • Reduced data center costs • Reference Architecture to provide users better access re-platformed apps (No VPN)
  • 11. ©2018 Zscaler, Inc. All rights reserved. MPLS WAN Vendor Open Internet SaaS 5 Data Centers IaaS VM Cloud Transformation Journey – Phase 5 Two initiatives – 6 months 1. Seamless End-User Experience - Implement Zscaler Private Access 2. Reference Architecture for a Zero-Trust Network Model 30 Country & Regional HQs 870 Branch Locations Future-proof app delivery strategy with positive end-user experience. Benefits • Simplified access to all applications • Eliminated the cost and complexity of virtual firewalls and load balancers in IaaS • Enhanced security posture – app microsegmentation, reduced inbound attack surface, enablement of zero-trust network model
  • 12. ©2018 Zscaler, Inc. All rights reserved. Transformation Journey – Summary Cost Savings 8% of Overall IT Spend (Optimized Network/Security Arch, DC Consolidation, O365, etc.) Cost Avoidance $2.7M in appliance sprawl Network transformation – SDWAN at 870 locations and deployment of 30 local breakouts with appliances Network transformation – ZIA deployed to support local internet breakouts in 870 branch offices Global collaboration tools – Successfully deployed Office 365 with Cloud FW and Bandwidth Control Data center transformation – Moved apps to Azure/AWS and consolidated data centers Application access transformation –Eliminated VPN, zero-trust network model, positive end-user experience 1 2 3 4 5 Benefits Agile IT environment Consistent end-user experience Reduced business risk
  • 13. 12
  • 14. ©2018 Zscaler, Inc. All rights reserved. ©2018 Zscaler, Inc. All rights reserved. Zscaler™, SHIFT™, Direct-to-Cloud™ and ZPA™ are trademarks or registered trademarks of Zscaler, Inc. in the United States and/or other countries. All other trademarks are the property of their respective owners.