Virtual Event: Threat Detection and Incident Response Summit - Watch Sessions
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Compliance

Zscaler Adds Real-time Data Visualization of Employee Internet Activity

San Jose, California-based Zscaler, a provider of cloud-based security solutions, today added new analytics technology to its cloud security suite designed to provide enterprise security teams with real-time visibility into employee Internet activity across web, cloud email, and mobile application platforms.

San Jose, California-based Zscaler, a provider of cloud-based security solutions, today added new analytics technology to its cloud security suite designed to provide enterprise security teams with real-time visibility into employee Internet activity across web, cloud email, and mobile application platforms.

The new data visualization capability utilizes real-time data gained from the processing of more than 10 billion Internet transactions across Zscaler’s network, something the company is pushing under the term “Big Analytics”.

ZscalerWith the visualization tool, enterprise security teams are armed with instant, actionable insight into security threats, user productivity, and compliance violations, no matter where end users may be located or what device they may be using.

In addition to providing visibility into Internet traffic across web, email, and mobile platforms, Zscaler says customers can also benefit from:

• Role-based access control to ensure appropriate policy and data reporting capabilities match the appropriate security level for the administrator.

• Advanced report creation capability leveraging an API layer. Customers and partners can effortlessly back up and duplicate reports;

• Log storage simplification with automatic storage of logs using Nanolog, a Zscaler technology for massive compression of log data for scalable storage along with very fast retrieval methods. According to the company, with Nanolog, there’s also no need for data correlation nor data aggregation from multiple recorders;

• Cross platform, device, and location visibility. Users can now switch devices, locations, or move from web/email/mobile communication platforms, but still be correlated in the Zscaler Security Cloud.

Advertisement. Scroll to continue reading.

Screenshot of the Zscaler Security Dashboard

Zscaler Security Dashboard Screenshot

“The new analytics capability in the Zscaler Security Cloud delivers a number of benefits that really raise the bar for security analytics performance, scope and cost-savings,” Dr. Manoj Apte, senior vice president of product management at Zscaler. 

“For example, Zscaler eliminates reporting across multiple locations, which typically requires coordination of multiple administrators, deployment of additional services to collect log data, and personnel to run scripts and ensure log collection and data visualization are properly done,” Apte explained. “We also eliminate personnel costs related to reporting and forensic investigation, compliance responses (internal and external), and additional hardware and storage for log analysis.” 

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.

Cyberwarfare

Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.