Virtual Event Today: Ransomware Resilience & Recovery Summit - Login to Live Event
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

Zscaler Adds New Capabilities to Cloud Security Platform

Zscaler today announced the availability of a new version of the its cloud-based Internet security platform, which now provides protection against advanced persistent threats (APT).

Zscaler today announced the availability of a new version of the its cloud-based Internet security platform, which now provides protection against advanced persistent threats (APT).

In addition to APT protection, Zscaler Fall 2014 provides guest WiFi security, global administration and reporting, instant security risk assessment, and over 100 other new features and upgrades.

The new Advanced Persistent Threat Protection is designed to detect and block zero-day attacks and other sophisticated threats targeting an organization’s headquarters, branch offices, remote locations, and users. According to the company, the solution, which is deployed in-line, is more efficient than appliance-based products because it doesn’t only warn about threats, it also blocks them to prevent infections. Furthermore, it doesn’t require any hardware or software solutions to be installed on premise.

Zscaler APT Protection is designed to automatically quarantine suspicious files to ensure that even the first target of a zero-day attack is protected. And because this is a cloud-based solution, all Zscaler customers are instantly protected against newly discovered threats through real-time updates, the security firm noted.

The APT protection system is also capable of identifying and blocking botnet command and control (C&C) traffic, and preventing sensitive information from being exfiltrated, Zscaler said.  

The new guest WiFi protection system can be used by organizations to easily manage and secure guest wireless connections in a cost-effective manner. According to Zscaler, enterprises can protect their guest WiFi simply by changing DNS settings on access points to route guest traffic through the company’s Internet security platform where it is inspected and secured.

In an effort to make it easier for enterprises to manage security systems, Zscaler Fall 2014 introduces unified Web-based graphical administration and reporting tools that enables IT teams to access policy management, reporting, analytics and forensics from any device connected to the Internet.

The Zscaler Security Preview provides enterprises with an instant risk assessment that measures the effectiveness of current security systems, and makes recommendations on how to address potential issues.

Advertisement. Scroll to continue reading.

“In a world where cyber-threats have outpaced the ability of organizations to protect themselves, Zscaler Fall 2014 is a major step forward that will help enterprises, governments and militaries around the world improve their Internet security and protect their intellectual property,” commented Daniel Druker, Zscaler chief marketing officer. “As a cloud-based system deployed at massive global scale, we at Zscaler can leverage trillions of transactions to prevent, detect and remediate the most sophisticated zero-day attacks and Advanced Persistent Threats – providing far better security than appliances, coupled with unmatched ease of administration and superior economics.”

Depending on deployment size, options and modules, Zscaler Fall 2014 is priced from $1 to $10 per user per month, based on an annual, per-user subscription. The guest WiFi protection service costs $25 per location per month.

Zscaler has also announced the expansion of its partner ecosystem. As part of the company’s Technology Partner Program, companies can offer their customers solutions that are pre-integrated with Zscaler’s security-as-a-service platform. The list of new partners includes CA Technologies, Centrify, SafeNet, Microsoft, BT Assure, Logrhythm, RSA, Symantec, Ipanema Technologies, and Viptela.

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

Allied Universal announced that Deanna Steele has joined the company as CIO for North America.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online.

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

Cloud Security

Microsoft and Proofpoint are warning organizations that use cloud services about a recent consent phishing attack that abused Microsoft’s ‘verified publisher’ status.