https://www.zscaler.com/solutions/cloud-security
Why cloud security?
Security for everyone on the network
Traditional network security made sense when all your applications were hosted in the data center and users were all on the network. But with apps moving to the cloud, and users increasingly mobile, the stacks of appliances sitting in the data center are increasingly irrelevant. This model forces all traffic through the centralized data center for security and access controls—a complex configuration that results in a terrible user experience.
Cloud applications like Office 365 were designed to be accessed directly through local internet breakouts. Zscaler cloud security enables local breakouts with full security controls.
Zscaler delivers the DMZ as a service, with AV inspection, Next-Gen Firewall, Sandbox, Advanced Threat Protection, URL Filters, SSL Inspection, and more —all in a unified platform service. It’s airtight security without the cost and complexity of stacks of appliances, and it delivers a fast, secure user experience, whether users connect from an office, coffee shop, or airport, at home or abroad.
Gartner on public cloud spending in 2020
How does cloud security differ from “traditional” network security?
Digital transformation has changed the way people work
The corporate network that once sat behind a security perimeter is now the internet, and the only way to provide comprehensive protection for users, no matter where they connect, is by moving security and access controls to the cloud.
The Zscaler cloud is always current with the latest security updates to keep you protected from rapidly evolving malware. With tens of thousands of new phishing sites arriving every day, appliances can’t keep up. And Zscaler minimizes costs and eliminates the complexity of patching, updating, and maintaining hardware and software.
Zscaler security controls are built into a unified platform, so they communicate with each other to give you a cohesive picture of all the traffic that’s moving across your network. Through a single interface, you can gain insight into every request — by user, location, and device around the world — in seconds.
UBIQUITOUS
The cloud is always reachable from anywhere, any time, from any device.
SCALABLE
You can add new features and thousands of users without breaking a sweat.
INTEGRATED
Security and other services talk to each other so you get full visibility.
COMPREHENSIVE
The cloud scans every byte coming and going, including SSL and
CDN traffic.
INTELLIGENT
The cloud learns from every user and connection; any new threat is blocked for all.
Aren’t my cloud apps and data already secure?
Yes and no. Cloud services — like Amazon Web Services or Microsoft Office 365 — are responsible for safeguarding your data within their cloud environments, but not all cloud providers offer the same protections. You need full security and access controls to protect your users from risky applications and prevent data exfiltration. A Cloud Application Security Broker (CASB) provides risk scoring for many cloud applications, which can be used to create access policies. And, CASB can augment a cloud security platform by extending data leakage prevention. But CASB on its own does not provide protection against security breaches, ransomware, or other internet threats.
Cloud apps and data security
What about “hybrid” solutions?
As organizations increase their use of cloud-based apps, like Salesforce, Box, and Office 365, and move to infrastructures services like Microsoft Azure and Amazon Web Services (AWS), it makes sense to have traffic secured in the cloud as well. For legacy vendors who have been — and largely still are — selling on-premises hardware appliances, this reality poses a problem, because their bottom lines, and their duty to shareholders, involves moving boxes. This is why they’ve begun promoting so-called “hybrid solutions,” with data center security being handled by appliances, and mobile or branch security being handled by similar security stacks housed in cloud environments.
The problem with such a strategy is that it complicates, rather than simplifies, enterprise security, and cloud users and administrators get none of the benefits of a true cloud service — speed, scale, global visibility, and threat intelligence — benefits that can only be provided through a multi-tenant global architecture.