Security Experts:

Connect with us

Hi, what are you looking for?


Cloud Security

Zscaler Adds New Capabilities to Cloud Security Platform

Zscaler today announced the availability of a new version of the its cloud-based Internet security platform, which now provides protection against advanced persistent threats (APT).

Zscaler today announced the availability of a new version of the its cloud-based Internet security platform, which now provides protection against advanced persistent threats (APT).

In addition to APT protection, Zscaler Fall 2014 provides guest WiFi security, global administration and reporting, instant security risk assessment, and over 100 other new features and upgrades.

The new Advanced Persistent Threat Protection is designed to detect and block zero-day attacks and other sophisticated threats targeting an organization’s headquarters, branch offices, remote locations, and users. According to the company, the solution, which is deployed in-line, is more efficient than appliance-based products because it doesn’t only warn about threats, it also blocks them to prevent infections. Furthermore, it doesn’t require any hardware or software solutions to be installed on premise.

Zscaler APT Protection is designed to automatically quarantine suspicious files to ensure that even the first target of a zero-day attack is protected. And because this is a cloud-based solution, all Zscaler customers are instantly protected against newly discovered threats through real-time updates, the security firm noted.

The APT protection system is also capable of identifying and blocking botnet command and control (C&C) traffic, and preventing sensitive information from being exfiltrated, Zscaler said.  

The new guest WiFi protection system can be used by organizations to easily manage and secure guest wireless connections in a cost-effective manner. According to Zscaler, enterprises can protect their guest WiFi simply by changing DNS settings on access points to route guest traffic through the company’s Internet security platform where it is inspected and secured.

In an effort to make it easier for enterprises to manage security systems, Zscaler Fall 2014 introduces unified Web-based graphical administration and reporting tools that enables IT teams to access policy management, reporting, analytics and forensics from any device connected to the Internet.

The Zscaler Security Preview provides enterprises with an instant risk assessment that measures the effectiveness of current security systems, and makes recommendations on how to address potential issues.

“In a world where cyber-threats have outpaced the ability of organizations to protect themselves, Zscaler Fall 2014 is a major step forward that will help enterprises, governments and militaries around the world improve their Internet security and protect their intellectual property,” commented Daniel Druker, Zscaler chief marketing officer. “As a cloud-based system deployed at massive global scale, we at Zscaler can leverage trillions of transactions to prevent, detect and remediate the most sophisticated zero-day attacks and Advanced Persistent Threats – providing far better security than appliances, coupled with unmatched ease of administration and superior economics.”

Depending on deployment size, options and modules, Zscaler Fall 2014 is priced from $1 to $10 per user per month, based on an annual, per-user subscription. The guest WiFi protection service costs $25 per location per month.

Zscaler has also announced the expansion of its partner ecosystem. As part of the company’s Technology Partner Program, companies can offer their customers solutions that are pre-integrated with Zscaler’s security-as-a-service platform. The list of new partners includes CA Technologies, Centrify, SafeNet, Microsoft, BT Assure, Logrhythm, RSA, Symantec, Ipanema Technologies, and Viptela.

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

Application Security

Many developers and security people admit to having experienced a breach effected through compromised API credentials.

Cloud Security

Orca Security published details on four server-side request forgery (SSRF) vulnerabilities impacting different Azure services.

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...

Cloud Security

Cloud Disaster Recovery - Ingredients for a Recipe that Saves Money and Offers a Safe, More Secure Situation with Greater Accessibility

Application Security

Software maker Adobe on Tuesday released security patches for 29 documented vulnerabilities across multiple enterprise-facing products and warned that hackers could exploit these bugs...