CyberOne Blog | Cyber Security Trends, Microsoft Security Updates, Advice

Zscaler Introduction to Secure Cloud Transformation

Written by Mark Terry | Apr 9, 2019 12:00:00 AM

We all remember when cyber security was simple, when firewalls and Anti-Virus provided effective perimeter security controls. But how things have changed.

Cloud and mobility have created a massive shift, disrupting everyone’s network and security infrastructure. How do you deliver secure transformation to the cloud in today's cloud-enabled world?

Here, we’ll see how the traditional network has changed, how security architecture needs to adapt in a cloud-first world, and ultimately, why Zscaler became the market leader in cloud security.

The Era of Cloud and Mobility

Today, your applications are moving to the cloud - Salesforce, Office 365, AWS and Azure. However, most network and security appliances were built for an ‘on-premise’ business... to protect your corporate network.

Legacy IT security methods which focus on protecting the perimeter are inadequate. The security perimeter has moved... to the internet.

When applications & services resided in your ‘on-prem’ data centre, it made sense to backhaul traffic from branch offices over the network. However, as internet services increased, security appliances needed to be added to branch offices to allow secure internet access.

So the centre of gravity shifted, with more and more applications moving to the cloud.

Restrictions of Legacy Infrastructures

Traditional network architectures were not built for a cloud-first, mobile-first world... meaning there are some very obvious restrictions to contend with:

  • The network secures users and apps
  • So, access to internal apps requires network access
  • Therefore, all users must be on the network for protection
  • And all traffic must be backhauled to maintain protection for all users

Bypassing Traditional Security Controls

Today’s traffic often goes straight to the cloud, bypassing traditional perimeter security. Mobile and remote workers connect directly to the internet with multiple devices. Internally, today’s complex threats have triggered an explosion of new security appliances, all finding their way into your overworked gateway.

The Result?

  • Time and complexity—Administrators are constantly fighting to keep up with the required security controls. The complexity and cost of maintaining and managing a dated architecture are out of control.
  • Cost & latency—Users demand a fast connection to the cloud. Backhauling traffic adds latency and costs.
  • Security threats - Internet-based threats are everywhere, posing a constant threat to secure every user, on multiple devices in multiple locations.

Secure Network Transformation

Every enterprise prioritises secure network transformation. Applications are moving to SaaS and public clouds, and users are no longer confined to the office. However, security is still anchored to the data centre.

So What Does a Secure It Transformation Look Like?

Today, software-defined policies (not networks) securely connect the right user to the right app or service. Users connect to the Internet via a cloud security platform, ensuring a fast, secure user experience.

  • Redefined Perimeter Security
    The internet is the new security perimeter. The Internet is moving security to the cloud, and all users and locations are protected, regardless of location or device. Your perimeter and security policy follow the user, wherever they go.
  • A Cloud-Ready Network Platform
    Enabling direct internet connections via a cloud security platform ensures a fast, secure user experience. It also reduces the cost/need for additional appliances or to backhaul traffic via HQ. Direct internet connectivity also simplifies network administration.
  • Cloud Security Stack
    Moving the security stack to the cloud allows you to rely on multiple protection technologies, working in unison to stop threats. A cloud service enables unlimited inspection capacity, so you can easily scale users and services when needed.

This new approach to security transforms the way applications are accessed and security controls are enforced.

  • Software-defined policies connect users to apps (not networks)
  • Access policies determine which apps are visible
  • Security protection is driven by policy, so it is tied to the user, regardless of location or device
  • Secure local Internet breakouts enable a fast user experience

3 Steps to Secure IT Transformation

It is not a question of if, but when. Cloud services are the norm, but there are simple, practical steps to secure cloud transformation.

  1. Cloud security platform —First, make a cloud security platform the first hop to the Internet —an infrastructure required!
  2. Phase out point products - Reduce costs and management overhead by phasing out legacy appliances.
  3. Transform - Enable local internet breakouts and deliver a better, more secure user experience.

Zscaler - The World’s Largest Cloud Security Platform

There is a good reason why Zscaler has become the market leader in cloud security: Zscaler was built in the cloud, for the cloud, enabling secure network transformation from legacy architectures to cloud-enabled with local Internet breakouts.

Enabling Secure Network Transformation

Zscaler Internet Access moves the entire security stack to the cloud with integrated security services that instantly correlate data for the highest protection level.

By making Zscaler the default route to the Internet, all users receive Internet protection, regardless of device or location. Zscaler sits between your users and the Internet, inspecting every byte of Internet, applying multiple security technologies for the highest level of protection, regardless of location.

Zscaler optimises traffic flows by allowing secure, direct connections to the Internet over broadband, while reusing Internet MPLS for data centre traffic.

What Sets Zscaler Apart?

  • Built from the ground up in the cloud, for the cloud, Zscaler elastically scales to your traffic demands.
  • You can set up direct internet connections in minutes with no hardware or software to deploy.
  • With 100 data centres globally, every user gets a fast, local connection no matter where they connect from.
  • If a threat is detected anywhere, every Zscaler customer is immediately protected, with 120,000 unique security updates performed daily.
  • The Zscaler architecture is the best approach for secure SD-WAN and Office 365 deployments.

What’s in the Security Stack?

Zscaler Internet Access moves the entire security stack to the cloud with integrated security services that instantly correlate data for the highest security protection level.

A Trusted, Independent Review of Zscaler

Although CyberOne has been one of the most trusted Zscaler partners for many years, we only selected Zscaler after comprehensively evaluating all the available technologies.

To this day, we always provide trusted, independent advice to customers and the most competitive Zscaler pricing.