Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Compliance

Zscaler Adds Real-time Data Visualization of Employee Internet Activity

San Jose, California-based Zscaler, a provider of cloud-based security solutions, today added new analytics technology to its cloud security suite designed to provide enterprise security teams with real-time visibility into employee Internet activity across web, cloud email, and mobile application platforms.

San Jose, California-based Zscaler, a provider of cloud-based security solutions, today added new analytics technology to its cloud security suite designed to provide enterprise security teams with real-time visibility into employee Internet activity across web, cloud email, and mobile application platforms.

The new data visualization capability utilizes real-time data gained from the processing of more than 10 billion Internet transactions across Zscaler’s network, something the company is pushing under the term “Big Analytics”.

ZscalerWith the visualization tool, enterprise security teams are armed with instant, actionable insight into security threats, user productivity, and compliance violations, no matter where end users may be located or what device they may be using.

In addition to providing visibility into Internet traffic across web, email, and mobile platforms, Zscaler says customers can also benefit from:

• Role-based access control to ensure appropriate policy and data reporting capabilities match the appropriate security level for the administrator.

• Advanced report creation capability leveraging an API layer. Customers and partners can effortlessly back up and duplicate reports;

• Log storage simplification with automatic storage of logs using Nanolog, a Zscaler technology for massive compression of log data for scalable storage along with very fast retrieval methods. According to the company, with Nanolog, there’s also no need for data correlation nor data aggregation from multiple recorders;

• Cross platform, device, and location visibility. Users can now switch devices, locations, or move from web/email/mobile communication platforms, but still be correlated in the Zscaler Security Cloud.

Screenshot of the Zscaler Security Dashboard

Advertisement. Scroll to continue reading.

Zscaler Security Dashboard Screenshot

“The new analytics capability in the Zscaler Security Cloud delivers a number of benefits that really raise the bar for security analytics performance, scope and cost-savings,” Dr. Manoj Apte, senior vice president of product management at Zscaler. 

“For example, Zscaler eliminates reporting across multiple locations, which typically requires coordination of multiple administrators, deployment of additional services to collect log data, and personnel to run scripts and ensure log collection and data visualization are properly done,” Apte explained. “We also eliminate personnel costs related to reporting and forensic investigation, compliance responses (internal and external), and additional hardware and storage for log analysis.” 

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Compliance

Government agencies in the United States have made progress in the implementation of the DMARC standard in response to a Department of Homeland Security...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...