top of page

News & Views

Zscaler protects workloads
​

To deliver the industry’s first Zero Trust for cloud workloads solution that secures cloud-to-internet, cloud-to-cloud, cloud-to-data centre, and intra-cloud communications, Zscaler (www.zscaler.com) announces advancements to its Zero Trust Exchange to help organizations protect workloads and applications hosted in public clouds, and helps IT teams to simplify multi cloud connectivity by moving away from traditional IP-based routing and VPNs between cloud environments to expedite enterprises’ cloud transformation initiatives.

Acting as an intelligent switchboard, traffic is routed to the Zscaler platform where connections are brokered using business policies based on identity and context to connect workloads directly to other workloads, without accessing the corporate network.  Zscaler’s approach eliminates the attack surface by making workloads invisible to the internet, simplifies application connectivity by removing networking bottlenecks, and delivers superior application performance by reducing app-to-app latency.  Collaborating with major cloud providers, such as Amazon Web Service (AWS), Zscaler delivers a network-agnostic Zero Trust fabric to secure cloud workloads and accelerate migration to the cloud.

“To properly secure cloud workloads, three critical areas – security, connectivity, and performance – need to be addressed, which legacy approaches have not been able to solve,” explains Amit Sinha, President, CTO, Zscaler.  “We have solved all three challenges with a new architecture that extends our Zero Trust Exchange, already trusted by thousands of enterprises to secure millions of users, to cloud workloads for stronger security, simpler connectivity, and better performance.  Zscaler’s new architecture eliminates the need for organisations to extend their corporate network to the cloud, which results in a bigger attack surface, operational complexity and performance bottlenecks.”
 
With the deployment of enterprise workloads in multiple regions and cloud providers, legacy mesh networks are becoming costly, hard to implement, scale, and manage.  Attempts by legacy vendors to adapt antiquated, castle-and-moat VPN and firewall architectures to the public cloud have allowed an unprecedented number of cybersecurity attacks, in addition to networking and application performance challenges for enterprises.

As a result, organizations must rethink their approach to securing and connecting cloud-based applications and consider adopting new architecture able to simplify multi-cloud connectivity, elevate application performance, and provide comprehensive protection.  Recent findings from the Zscaler ThreatLabZ research team (www.zscaler.com/threatlabz/cloud-activity-dashboard) underscore these challenges and outline the growing threat from unsecured workloads in the cloud and the need for inspection of all content including encrypted traffic

bottom of page