On-Demand Webinar Series

ZCast - Secure Hybrid Workforce Transformation Series

Our goal is to provide you with greater insight into the specific challenges of hybrid work, the functionality and application of Zscaler platform services, as well as security events, trends, and industry observations.

Each ZCast session will run approximately one hour, including Q&A


Episode 1:

Trend & challenges of hybrid workforce in the new normalcy

Today’s employees enjoy the flexibility to work from home, shared workspaces, branch offices, anywhere they’ll have access to the internet. Unfortunately, there’s a host of new security risks that come with the existing technologies and complex IT infrastructure used by this distributed workforce.

In this session you will learn how Zscaler power the next generation of modern hybrid workplace. We will:

  • Show how to deliver business continuity and hybrid work while ensuring great user experience
  • Share actionable use cases that enable faster access and improved productivity with Microsoft and Zscaler’s integrated solutions
  • Lead a thoughtful discussion on how to embrace and deploy zero trust to protect your business digital assets while enabling modern work

 WATCH ON-DEMAND NOW 


Episode 2:

Cloud-gen firewall to fit post-pandemic agile world

As apps shift out of centralized data centers, the model of centralized backhaul becomes problematic — it’s not only expensive, but it adds latency to the user experience. A recent survey commissioned by Zscaler on the effects of Office 365 deployment found that network issues and latency were common. Many organizations upgraded their firewalls prior to deployment, but 69 percent still reported post-deployment latency. Increasing the bandwidth for backhauled traffic didn’t work either. Sixty-nine percent of respondents reported weekly issues and 30 percent reported daily performance problems.

Zscaler Cloud Firewall resolves these challenges in the same way the cloud proxy helps with web-based traffic. It enables fast and secure local internet breakouts for all ports and protocols, without any appliances to upgrade or deploy, all with centralized management.

In this session, you will learn how to get full next-gen firewall capabilities without the cost and complexity of appliances, how to simplify your branch infrastructure and uplift your security portfolio, and how to brings the entire security stack closer to the user to ensure identical protection no matter where they connect.

 WATCH ON-DEMAND NOW 


Episode 3:

How zero trust continues to fit the post pandemic and cloud native era with enhanced security protection

As we are in the post pandemic era, information security also faces new challenges. In the past 2 years, by leveraging on Zero Trust technologies, many business successfully transited their operation model to enable remote workers and adopting cloud usage while still keeping security standard at a high level. Now as people coming back to office, are we going back to the castle-and-moat security model with obsoleted and vulnerable security posture?

As the business starts to catch up, we are seeing more and more merge & acquisition happening as a result of consolidation. But is your network and security ready for it?

In this session, you will learn from Zscaler the latest solutions about:

  • how to enable a “full zero trust” environment, regardless of people sitting in office or working remotely.
  • why cloud native zero trust solution is especially important for post-pandemic travelling
  • fast and smooth M&A approach by leveraging zero trust from Zscaler
  • improving user experience and enhancing their productivity

 WATCH ON-DEMAND NOW 



Episode 4:

How to address ransomware challenges and uplevel your game plan

Since Covid, the whole industry has been observing a huge increase in ransomware attack volume - almost doubled in 2021 year-on-year comparing to 2020 and the trend will continue to develop in 2022. Ransomware strategies are also evolving, with double extortion and triple extortion being popular tactics by attackers. All of these require us to uplevel our game plan to address the new challenges.

In this session, you will learn:

  • The modern ransomware attack lifecycle
  • What are the critical capabilities to defend against ransomware attacks
  • Policy best practices to minimize risk without disrupting the business

 WATCH ON-DEMAND NOW 



Episode 5:

How to boost productivity by proactively providing a great user experience

Performance monitoring of private applications accessed remotely via VPN has always been a challenge. The encrypted tunnel between the user and the data center blocked the ability to truly understand what might have been causing performance issues on those network connections. Without a proper flashlight, this dark tunnel often hid the root cause of persistent problems.

Zero trust architectures such as Zero Trust Exchange are intrinsically better than traditional network security models in securing user-to-app interactions. They make enterprise applications invisible to the internet, allow only authorized users to interact and deny everything else. Continuous and proactive monitoring of end-user experiences and applications requires a unique and holistic approach in zero-trust environments.

In this webinar, you will learn about:

  • Different approaches to digital experience monitoring in zero-trust environments
  • Key metrics to measure and quantify end-user experiences in a zero-trust world

 WATCH ON-DEMAND NOW 

Please Select the On-Demand Version You Would Like To Watch From The List On The Left