Users want to WORK anywhere on any device You want to let them without drowning in complexity or compromising security, reliability and affordability. YesterdayCorp deployed enterprise devices desktop, laptop, handsets, scannersWLAN overlay coverage, convenience, HQ orientatedNetwork centric policy based on rigid, port/VLAN & SSIDMonolithic “Build it and they will come” scalabilityTodayCorp / BYOD enterprise / consumer devices laptop, smart phone, tablet, Apple TVs, “AirPrint” PrintersUbiquitous Wi-Fi Access capacity, performance, mission-critical, extended enterpriseUser Centric Consistent policy based on identity, role, contextElasticPay for what you need - leverage the cloudAerohive gives you the ability to achieve this simpli-fi-ing enterprise networking by delivering a self organizing, service aware, identity based infrastructure.
Le soluzioni tecnologiche per il nuovoecosistema Mobile:Aerohive Networks e ZScalerMartedì, 28 Maggio 2013
Miriade Spa, società di consulenza informatica con sede a Thiene (VI),pone al centro della propria attività il patrimonio informativo delleimprese, fornendo soluzioni per la protezione, lintegrazione e lanalisi deidati aziendali. Lazienda fondata nel 2000 ha un organico di 35dipendenti.La geometria aziendale è articolata in 6 aree tecniche: Architecture,Intelligence +, Database, Development, Cloud, Mobility. Tra le diverserealtà con le quali collaboriamo segnaliamo: Diesel, Benetton,Calzedonia, Tecnica, Lotto.
Enabling Business Beyond the Corporate Network.Secure solutions for mobility, cloud and social media.
The Cloud Security Company3 Trends Transforming IT90% - Users work fromhome or on-the-go50% - Users who BYODSmartphones are nowthe worlds dominantcomputing device.74% of companies areusing cloud apps1 in 5 execs havepurchased cloud appswithout IT’s knowledgeSaaS applicationsgrowing 5x fasterthan software75% employees useFacebook at work178: average # of socialaccounts in theenterprise30 billion pieces ofcontent shared eachmonth on Facebook.New IT world requires cloud-based protectionMobility Cloud Apps Social Media &streamingIT transformation has turned traditional security (appliances) upside down.Mobile users bypasses appliances to access cloud apps and create policy issues.
The Cloud Security CompanyGlobal Protection by World’s Largest Security CloudPurpose-Built Architecture - Multi-tenant, DistributedBrain/Nervous system, Policy, Real-time threat updates1Onramp to Internet,Executes policy2Logs consolidated & correlated in real-time4Policy follows the user tothe nearest ZEN3NanoLog ClustersZEN (N)ZEN2ZscalerEnforcement NodeZEN1Central AuthoritySame policy & protection, near-zero latency for a user anywhereMulti-tenantUse any Data CenterShadowPolicyTMPolicy follows the userUltra-fastLittle processing latencyHigh AvailabilityFailover across DCs
The Cloud Security Company No HW, no SW, no client-side agent Traffic forwarding– from the infrastructure – GRE Tunnels, PBR, Proxy chaining– from the workstations – explicit proxy or PAC file (hosted in cloud)– Various ways to enforce Cloud usage Authentication– Users & groups have to be known by Zscaler for policies & reporting– Hosted User Database or Sync. With AD / LDAP– Registration phase usually requires username & password – only once» Authentication then is transparent– SAML / ADFS as an elegant SSO solution for transparent auth.Deployment considerations
The Cloud Security CompanyWhy Global 2000 Trust Zscaler Security CloudUnparalleled Privacy Guaranteed regional log storageto meet country or region’sprivacy requirements Data Obfuscation SAS 70 II certified DCsSecure By Design 100% secure and encryptedcommunication cloud-wide 55+ Patents Governing Zscaler’sDeveloped Cloud ArchitectureData Privacy & SecurityComplete Visibility into CloudOperations Public dashboard of real-time status– trust.zscaler.com 300+ Monitors, Every Node, EverySecondService ExcellenceCommitments Real-time Logging, Latency,Availability Service Level AgreementsVisibility & TransparencyRedundancy at Every Layer Within Datacenter: Clustered Between Datacenters: 90+Datacenters Globally withAutomatic Traffic Re-Routing Cloud Wide: Multiple WorldClass Datacenter and InternetService Providers Massive Scale: 150 billiontransactions per monthAvailability & ScalePurpose-built architecture for 100% Availability, backed by strong SLAs
The Cloud Security CompanyPricing Overview: Web SuitesZscaler PlatformDLPBWWeb 2.0URL FilteringBrowserPolicyAdvThreatsAV/ASZscaler PlatformURL FilteringAV/ASPolicy andReportingAnti-Virus and Anti-Spyware• Inline ultra-low latency Virus/Spyware protection• Any file size including multilevel archivesURL Filtering• User, Group or Location level granularity for Policy• 6 Classes, 30 Super Categories and 90 Categories• Dynamic Content Classification of Unknown Sites• Ability to modify categories or add new categoriesPackage FeaturesAdvancedPremiumBenefits CostStandard Benefits• Complete Inbound/Outbound protection• Enforce Acceptable Usage Policy• Minimize Productivity and Bandwidth Loss• Real-Time Reporting of Internet Usage byUsers, Departments or Locations• Protect all users in office or on the roadStandard Bundle +:Advanced Threats• Zero Day Attacks, Browser Vulnerabilities and Bots• Web 2.0 threats: XSS, Cookie Stealing, Phishing• Block Anonymizers, P2P, Skype, BitTorrentsWeb 2.0 Control• Granular control of 100 popular Web2.0 apps:• Facebook, Gmail, YouTube, etcBenefits• Protect against latest Web 2.0 threats• Protect employees’ personal information• Detect and block proxy-avoidance tools• Minimize Risk by blocking uncontrolled apps• Minimize Risk of Infection by enforcing safebrowsers and plugins.• Limit risk without affecting productivity:•Allow only HR to post on LinkedIn•Allow Gmail, but block attachmentAdvanced Bundle +:Data Leakage Prevention• Scan all web traffic leaving the organization• Log or Block transactions with confidential data• Scan Microsoft documents, PDFs and Zipped files• Predefined dictionaries for:Credit Cards, SSN, Source Code, Financial orMedical Statements, Salesforce docs etc.• Predefined Engines for HIPPA, PCI, etc.Bandwidth optimization for specific web appsWeb Access Control• Warn against use of vulnerable browsers/ pluginsBenefits• Minimize risk due to new Web 2.0 apps• Scan all webmails, IM attachments, blog posts• Add another layer towards compliance toindustry or government regulation• DLP policy at user, department, location level• Real-Time transaction level reports•Ensure Webex is not affected by YoutubePolicy andReportingPolicy andReportingZscaler PlatformWeb 2.0URL FilteringAdvThreatsAV/AS