Our goal is to provide you with greater insight into the specific challenges of hybrid work, the functionality and application of Zscaler platform services, as well as security events, trends, and industry observations.
Each ZCast session will run approximately one hour, including Q&A
Episode 1:
Trend & challenges of hybrid workforce in the new normalcy
Today’s employees enjoy the flexibility to work from home, shared workspaces, branch offices, anywhere they’ll have access to the internet. Unfortunately, there’s a host of new security risks that come with the existing technologies and complex IT infrastructure used by this distributed workforce.
In this session you will learn how Zscaler power the next generation of modern hybrid workplace. We will:
Episode 2:
Cloud-gen firewall to fit post-pandemic agile world
As apps shift out of centralized data centers, the model of centralized backhaul becomes problematic — it’s not only expensive, but it adds latency to the user experience. A recent survey commissioned by Zscaler on the effects of Office 365 deployment found that network issues and latency were common. Many organizations upgraded their firewalls prior to deployment, but 69 percent still reported post-deployment latency. Increasing the bandwidth for backhauled traffic didn’t work either. Sixty-nine percent of respondents reported weekly issues and 30 percent reported daily performance problems.
Zscaler Cloud Firewall resolves these challenges in the same way the cloud proxy helps with web-based traffic. It enables fast and secure local internet breakouts for all ports and protocols, without any appliances to upgrade or deploy, all with centralized management.
In this session, you will learn how to get full next-gen firewall capabilities without the cost and complexity of appliances, how to simplify your branch infrastructure and uplift your security portfolio, and how to brings the entire security stack closer to the user to ensure identical protection no matter where they connect.
Episode 3:
As we are in the post pandemic era, information security also faces new challenges. In the past 2 years, by leveraging on Zero Trust technologies, many business successfully transited their operation model to enable remote workers and adopting cloud usage while still keeping security standard at a high level. Now as people coming back to office, are we going back to the castle-and-moat security model with obsoleted and vulnerable security posture?
As the business starts to catch up, we are seeing more and more merge & acquisition happening as a result of consolidation. But is your network and security ready for it?
In this session, you will learn from Zscaler the latest solutions about:
Episode 4:
How to address ransomware challenges and uplevel your game plan
Since Covid, the whole industry has been observing a huge increase in ransomware attack volume - almost doubled in 2021 year-on-year comparing to 2020 and the trend will continue to develop in 2022. Ransomware strategies are also evolving, with double extortion and triple extortion being popular tactics by attackers. All of these require us to uplevel our game plan to address the new challenges.
In this session, you will learn:
Episode 5:
How to boost productivity by proactively providing a great user experience
Performance monitoring of private applications accessed remotely via VPN has always been a challenge. The encrypted tunnel between the user and the data center blocked the ability to truly understand what might have been causing performance issues on those network connections. Without a proper flashlight, this dark tunnel often hid the root cause of persistent problems.
Zero trust architectures such as Zero Trust Exchange are intrinsically better than traditional network security models in securing user-to-app interactions. They make enterprise applications invisible to the internet, allow only authorized users to interact and deny everything else. Continuous and proactive monitoring of end-user experiences and applications requires a unique and holistic approach in zero-trust environments.
In this webinar, you will learn about: