SlideShare a Scribd company logo
1 of 35
©2018 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION0 ©2018 Zscaler, Inc. All rights reserved.
SD-WAN plus Cloud Security Stack
für optimale Zweigstellen-Anbindung
Schneller Internet-Zugang für jede Zweigstelle
braucht einen Cloud Security Stack mit Firewall
Nils Ullmann – Solutions Architect, Central Europe – nullmann@zscaler.com
Jürgen Strapko – Regional Sales Manager – jstrapko@zscaler.com
Housekeeping
• Type your questions into the chat box in the
WebEx panel
• More questions? We’ll try to get to all
questions during the Q&A session. If we do not
get to your question, we’ll make sure to follow
up afterwards
• Technical issues? Email us at
webcast@zscaler.com
• Your Feedback? At the end of the webcast –
please let us know how we did!
©2017 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION2
Our Mission
Empower organizations to realize the
full potential of the cloud and mobility by
securely connecting users to applications
from any device, anywhere
©2017 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION3
New leaders are born when megashifts take place
Data center and hardware
Applications in the data center
On-Premise security
©2017 Zscaler, Inc. All rights reserved.4
How, when, and where we work is changing
©2018 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION5
Source: Riverbed, SkyHigh Networks, Right-Scale, Cisco
CLOUD
TRANSFORMATION
IS HAPPENING
79%
of workloads now run
in the cloud
80%
of Employees Use
Shadow Cloud
Applications
98%
of IT decision makers
say next-gen
networks are required
320%
Increase in O365
Enterprise Adoption
©2017 Zscaler, Inc. All rights reserved.6 ©2017 Zscaler, Inc. All rights reserved.6
A quick recap of networking history
©2017 Zscaler, Inc. All rights reserved.7
1990’s
private WANs
MPLS
Remote and Branch Office Remote and Branch OfficeRegional Hub and Campus
Data Center
©2017 Zscaler, Inc. All rights reserved.8
App. teams
Disaster Recovery Site
Private
WAN
Remote and Branch Office Remote and Branch OfficeRegional Hub and Campus
Data Center
2000’s
©2017 Zscaler, Inc. All rights reserved.9
2010’s
App. teams IT Ops
Disaster Recovery Site
Private
WAN
Remote and Branch Office Remote and Branch OfficeRegional Hub and Campus
Data Center
©2017 Zscaler, Inc. All rights reserved.10 ©2017 Zscaler, Inc. All rights reserved.10
… and now SD-WAN
©2017 Zscaler, Inc. All rights reserved.11
2010’s
App. teams IT Ops
Disaster Recovery Site
Private
WAN
Remote and Branch Office Remote and Branch OfficeRegional Hub and Campus
Data Center
©2017 Zscaler, Inc. All rights reserved.12
Bandwidth Problems Everywhere
Global Dev Ops
Disaster Recovery Site MPLS
Remote and Branch OfficeRegional Hub and Campus
Data Center
Regional Hub and Campus
Internet
©2017 Zscaler, Inc. All rights reserved.13
Add More Links
Global Dev Ops
Disaster Recovery Site MPLS
Remote and Branch OfficeRegional Hub and Campus
Data Center
Regional Hub and Campus
Internet
©2017 Zscaler, Inc. All rights reserved.14
MPLS + Local Internet = Overlay
Global Dev Ops
Disaster Recovery Site MPLS
Remote and Branch OfficeRegional Hub and Campus
Data Center
Regional Hub and Campus
Internet
©2017 Zscaler, Inc. All rights reserved.15
MPLS
Remote and Branch Office
Data Center
Internet
Let’s dig into the details
©2017 Zscaler, Inc. All rights reserved.16
Remote & Branch Offices
Data Centers
Internet
MPLS CE RouterPE RouterUnderlay - Network
BGP (OSPF)
OSPF (BGP)
The Details
©2017 Zscaler, Inc. All rights reserved.17 ©2017 Zscaler, Inc. All rights reserved.17
What about Security …
©2017 Zscaler, Inc. All rights reserved.18
Global Dev Ops
Disaster Recovery Site MPLS
Remote and Branch OfficeRegional Hub and Campus
Data Center
Regional Hub and Campus
Internet
SD-WAN – No Change in Security
and not in Internet Performance
©2017 Zscaler, Inc. All rights reserved.19
UTM
Firewall
Restricted Network
Non-Compliant
users
Remediation
Servers
Firewall
Web
Scanners
NAC/NAP
Security
Policy
SIEM
Servers
Threat
Analysis
Security Management
Network
Data Center
File Servers Mainframe
DatabaseExchange
Servers
Domain
Servers
Firewall DLP
Storage
Public Key
Infrastructure
Keys
Certificate
Authority
UTM
Firewall
LDAP
Management
Console
Wireless
Access
DLP
UTM
Firewall
Wi-Fi Network
IPS
Mobile
User
UTM
Firewall
Enterprise
Users
DC/ DNS
Exchange
DHCP
AV,
Anti
Malware
Remote
Access
UTM
Firewall
Remote
Access
Gateway
CORPORATE
NETWORK
DLP
Router
Regional
Office
VPN
Mobile
Device
Management
DNS
Exchange
VPN
FtpWeb
Users
Internet
Router Outside
Firewall
Web
Server
Email
Server
WAF
Inside
Firewall
SwitchSwitch IDS / IPOS
UTM
Firewall
DLP
Analytics
/ SIEM
Networking
Security
Compute
Data Center
©2017 Zscaler, Inc. All rights reserved.20
SD-WAN + local UTMs
Global Dev Ops
Disaster Recovery Site MPLS
Remote and Branch OfficeRegional Hub and Campus
Data Center
Regional Hub and Campus
Internet
©2017 Zscaler, Inc. All rights reserved.21
Every Appliance Vendor’s Dream
Expensive to Deploy Security CompromisesComplex to Manage
New York
Management
Platform
Logging &
Reporting
Identity Management
Server
Additional Requirements
©2017 Zscaler, Inc. All rights reserved.22
©2017 Zscaler, Inc. All rights reserved. Zscaler™, SHIFT™, Direct-to-Cloud™ and ZPA™ are trademarks or registered trademarks of Zscaler, Inc.
in the United States and/or other countries. All other trademarks are the property of their respective owners.
There’s a better way:
Cloud Firewall ✔
©2017 Zscaler, Inc. All rights reserved.23 ©2017 Zscaler, Inc. All rights reserved.23
SD-WAN + Zscaler = Perfect fit
©2017 Zscaler, Inc. All rights reserved.24
Zscaler’s Security Architecture built for Performance
SECURE ALL
PORTS & PROTOCOLS
MULTIPLE PROPRIETARY
INSPECTION METHODS
ADVANCED THREAT
PROTECTION
Behavioral
Analysis
Sandbox
Dynamic Content
Classification
Page Risk Index
Anti-Malware
XSS Protection
CVE Protection
URL Filtering
Proxy (SSL)
Block Lists
File Type Control
DNS Filtering
Cloud FW (NGFW)
Browser Control
45 Billion
Requests per Day
Full Inline and SSL inspection
60+ INDUSTRY THREAT FEEDS
Threat sharing partnerships, commercial deals, open
source, private working groups.
FULL INLINE CONTENT INSPECTION
All bytes, all ports, all protocols,
including SSL – no compromises.
REAL-TIME THREAT CORRELATION
Dynamically computes the risk of every page object
using content and domain analysis.
CLOUD INTELLIGENCE
125M+ threats blocked daily. Once detected,
immediately blocked for all users. 120K+ unique
security updates a day.
©2017 Zscaler, Inc. All rights reserved.25
Extensive Cloud Security Platform: Born in the cloud for the cloud
Differentiated IP with 100+ broad and deep issued and pending patents
Extensible through API for layering of additional services by Zscaler and partners
Built as proxy-based platform that enables full inspection
Access Control
Cloud Firewall
URL Filtering
Bandwidth Control
DNS Filtering
Threat Prevention
Advanced Protection
Cloud Sandbox
Anti-Virus
DNS Security
Data Protection
Data Loss Protection
Cloud App Controls
File Type Controls
Access Controls
User to App
App Micro
Segmentation
Device Posture
App Security
Invisible Apps
DDoS Prevention
Private Certificates
Visibility
App Discovery
App Monitoring
User Monitoring
Zscaler Internet Access
Externally Managed Apps
Zscaler Private Access
Internally Managed Apps
Zscaler Multitenant Cloud Security Platform
©2017 Zscaler, Inc. All rights reserved.26
Zscaler peers with Office 365 in major DCs
Denver
Toronto
New York Paris
London
Amsterdam
Brussels
Stockholm
Moscow
Mumbai
Singapore
SydneyCape Town
Madrid
Riyadh
Johannesburg
San Francisco
Atlanta
Dallas
Frankfurt
Sao Paulo
Lagos
Kuala Lumpur
Tel Aviv
Washington DC
Chicago
Los Angeles
Copenhagen
Melbourne
Milan
Hong Kong Taipei
Zurich
Chennai
Tianjin
Tokyo
Doha
Dubai
Abu Dhabi
Miami
Jeddah
Al Khobar
Warsaw
Seattle
Oslo
Shanghai
45B+
Requests
processed/day
100M+
Threats
blocked/day
120K+
Unique security
updates/day
100 data centers
across 6 continents
Secure
Ongoing third-
party testing
CertifiedReliable
Redundancy within and
failover across DCs
Transparent
Trust portal for service
availability monitoring
Egress O365 close to user
Avoid network hairpins
Internet Peering
across 150 Vendors
O365 Peering Data Center
Deliver a fast connection
regardless of location!
4 Peta Bytes per Month!
©2017 Zscaler, Inc. All rights reserved.27
New York
Zscaler enables secure local Internet breakouts without appliances
Eliminate Appliances No Security CompromisesSingle Management Console
New York
Management
Platform
Logging &
Reporting
Identity Management
Server
Additional Requirements
Global visibility - cloud apps and usage
Identify botnet-infected machines that need
to be remediated
SLA backed session-by-session logs for
6 months with no rollovers
Real-life analytics –
Actionable info
You retain full control – policy and admin
Policies by user, locations, AD groups
Follow-the-user policy for the same
protection at any location, any device
Global real-time
policy engine
©2017 Zscaler, Inc. All rights reserved.28
SD-WAN + Cloud Security
Global Dev Ops
Disaster Recovery Site MPLS
Remote and Branch OfficeRegional Hub and Campus
Data Center
Regional Hub and Campus
Internet
©2017 Zscaler, Inc. All rights reserved.29
SD-WAN + Zscaler
Global Dev Ops
Disaster Recovery Site
MPLS
Remote and Branch OfficeRegional Hub and Campus
Data Center
Regional Hub and Campus
Internet
©2017 Zscaler, Inc. All rights reserved.30
Perfect Fit
Global Dev Ops
Disaster Recovery Site
MPLS
Remote and Branch OfficeRegional Hub and Campus
Data Center
Regional Hub and Campus
Internet
©2017 Zscaler, Inc. All rights reserved.31
Why Cloud Firewall?
On-Premise NGFW/UTM Appliances vs. Zscaler Cloud Firewall
Security Policy Only Enforced
On-Premise or via VPN
Short Logs, Multiple Log Sources =
Difficult Correlation
Supersized Appliances or Refresh
Required for Traffic Growth
Limited Inspection Capabilities
Inspects Only First 200-500kB
SSL requires additional hardware
Not Designed for Frequent Updates
or to Manage Policy for Models
with Different Features/Capacities
On-Premise Security
Infrastructure
Global Unified Access and
Security Service
To this..
Anywhere Policy
Enforcement
Full Log Analysis – Single
Pane of Glass
Scales Elastically
No hardware or software
Inspects ALL Traffic,
Including Native SSL
Inspection
120K Unique Security
Updates Daily
From this..
HQ/IOT All BRANCHESAll BRANCHES
©2017 Zscaler, Inc. All rights reserved.32 ©2018 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION32
A three-step journey to secure IT transformation: Land & Expand
Enable local Internet breakouts (SD-WAN)
Enable direct access to internal apps
Security + User Experience + ROI
SIMPLIFY
Remove multiple point products
SaaS
Open
internet
Private cloud /
Data center
Public
cloud
SECURE
Up-level security
Replace proxy or VPN in days
Little infrastructure change
Enhance Security
SaaS
Open
internet
Private cloud /
Data center
Public
cloud
TRANSFORM
Cloud-enable hybrid network, app
access
Open
internet
SaaS Public
cloud
Private
cloud / Data
center
Reduces sale cycles and accelerates deployments
Phase out gateway appliances
Outbound or inbound gateway
Reduce cost and complexity
©2017 Zscaler, Inc. All rights reserved.33
Thank You - Questions
Mehr über Zscaler für die Zweigstellen-Transformation
Branch Transformation – deutsche Webseite
https://info.zscaler.com/Branch-Transformation-Campaign_Branch-transformation-germany.html
Nils Ullmann
Solution Architect
Central Europe
nullmann@zscaler.com
linkedin.com/in/nullmann
Branch Transformation Whitepaper
https://info.zscaler.com/WP-the-definitive-guide-to-branch-transformation
©2017 Zscaler, Inc. All rights reserved.34
©2017 Zscaler, Inc. All rights reserved. Zscaler™, SHIFT™, Direct-to-Cloud™ and ZPA™ are trademarks or registered trademarks of Zscaler, Inc.
in the United States and/or other countries. All other trademarks are the property of their respective owners.

More Related Content

What's hot

Realise True Business Value .pdf
Realise True Business Value .pdfRealise True Business Value .pdf
Realise True Business Value .pdfThousandEyes
 
5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use CasesNetskope
 
Understanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN SolutionUnderstanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN SolutionCisco Canada
 
How SASE can help you move securely from the PSN with VMware and Breeze Networks
How SASE can help you move securely from the PSN with VMware and Breeze NetworksHow SASE can help you move securely from the PSN with VMware and Breeze Networks
How SASE can help you move securely from the PSN with VMware and Breeze NetworksArticulate Marketing
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsThousandEyes
 
Bitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use CasesBitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use CasesBitglass
 
Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Cloudflare
 
Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...
Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...
Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...ThousandEyes
 
SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN Ashutosh Kaushik
 
A Better Architecture for Hybrid WAN - VeloCloud
A Better Architecture for Hybrid WAN - VeloCloudA Better Architecture for Hybrid WAN - VeloCloud
A Better Architecture for Hybrid WAN - VeloCloudVeloCloud Networks, Inc.
 
Cloud vs. On-Premises Security: Can you afford not to switch?
Cloud vs. On-Premises Security:  Can you afford not to switch?Cloud vs. On-Premises Security:  Can you afford not to switch?
Cloud vs. On-Premises Security: Can you afford not to switch?Zscaler
 
Understanding Cisco’ Next Generation SD-WAN Technology
Understanding Cisco’ Next Generation SD-WAN TechnologyUnderstanding Cisco’ Next Generation SD-WAN Technology
Understanding Cisco’ Next Generation SD-WAN TechnologyCisco Canada
 
Cisco Meraki Overview
Cisco Meraki OverviewCisco Meraki Overview
Cisco Meraki OverviewSSISG
 
ThousandEyes Overview
ThousandEyes Overview ThousandEyes Overview
ThousandEyes Overview ThousandEyes
 
Next Generation Nexus 9000 Architecture
Next Generation Nexus 9000 ArchitectureNext Generation Nexus 9000 Architecture
Next Generation Nexus 9000 ArchitectureCisco Canada
 
Azure Tutorial For Beginners | Microsoft Azure Tutorial For Beginners | Azure...
Azure Tutorial For Beginners | Microsoft Azure Tutorial For Beginners | Azure...Azure Tutorial For Beginners | Microsoft Azure Tutorial For Beginners | Azure...
Azure Tutorial For Beginners | Microsoft Azure Tutorial For Beginners | Azure...Simplilearn
 
[Round table] zeroing in on zero trust architecture
[Round table] zeroing in on zero trust architecture[Round table] zeroing in on zero trust architecture
[Round table] zeroing in on zero trust architectureDenise Bailey
 
palo-alto-networks-sase-overview-deck.pptx
palo-alto-networks-sase-overview-deck.pptxpalo-alto-networks-sase-overview-deck.pptx
palo-alto-networks-sase-overview-deck.pptxinfoeliechahine
 
4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptxaungyekhant1
 

What's hot (20)

Realise True Business Value .pdf
Realise True Business Value .pdfRealise True Business Value .pdf
Realise True Business Value .pdf
 
5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases
 
Understanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN SolutionUnderstanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN Solution
 
How SASE can help you move securely from the PSN with VMware and Breeze Networks
How SASE can help you move securely from the PSN with VMware and Breeze NetworksHow SASE can help you move securely from the PSN with VMware and Breeze Networks
How SASE can help you move securely from the PSN with VMware and Breeze Networks
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of Concepts
 
Bitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use CasesBitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use Cases
 
Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)
 
Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...
Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...
Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...
 
SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN
 
A Better Architecture for Hybrid WAN - VeloCloud
A Better Architecture for Hybrid WAN - VeloCloudA Better Architecture for Hybrid WAN - VeloCloud
A Better Architecture for Hybrid WAN - VeloCloud
 
Cloud vs. On-Premises Security: Can you afford not to switch?
Cloud vs. On-Premises Security:  Can you afford not to switch?Cloud vs. On-Premises Security:  Can you afford not to switch?
Cloud vs. On-Premises Security: Can you afford not to switch?
 
Understanding Cisco’ Next Generation SD-WAN Technology
Understanding Cisco’ Next Generation SD-WAN TechnologyUnderstanding Cisco’ Next Generation SD-WAN Technology
Understanding Cisco’ Next Generation SD-WAN Technology
 
Cisco Meraki Overview
Cisco Meraki OverviewCisco Meraki Overview
Cisco Meraki Overview
 
ThousandEyes Overview
ThousandEyes Overview ThousandEyes Overview
ThousandEyes Overview
 
Next Generation Nexus 9000 Architecture
Next Generation Nexus 9000 ArchitectureNext Generation Nexus 9000 Architecture
Next Generation Nexus 9000 Architecture
 
Azure Tutorial For Beginners | Microsoft Azure Tutorial For Beginners | Azure...
Azure Tutorial For Beginners | Microsoft Azure Tutorial For Beginners | Azure...Azure Tutorial For Beginners | Microsoft Azure Tutorial For Beginners | Azure...
Azure Tutorial For Beginners | Microsoft Azure Tutorial For Beginners | Azure...
 
[Round table] zeroing in on zero trust architecture
[Round table] zeroing in on zero trust architecture[Round table] zeroing in on zero trust architecture
[Round table] zeroing in on zero trust architecture
 
palo-alto-networks-sase-overview-deck.pptx
palo-alto-networks-sase-overview-deck.pptxpalo-alto-networks-sase-overview-deck.pptx
palo-alto-networks-sase-overview-deck.pptx
 
ClearPass Overview
ClearPass OverviewClearPass Overview
ClearPass Overview
 
4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx
 

Similar to SD-WAN plus Cloud Security Stack for Optimal Branch Connectivity

Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudOvercoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudZscaler
 
Virtualized Firewall: Is it the panacea to secure distributed enterprises?
Virtualized Firewall: Is it the panacea to secure distributed enterprises?Virtualized Firewall: Is it the panacea to secure distributed enterprises?
Virtualized Firewall: Is it the panacea to secure distributed enterprises?Zscaler
 
Addressing IT Modernization Challenges Across the U.S Public Sector
Addressing IT Modernization Challenges Across the U.S Public SectorAddressing IT Modernization Challenges Across the U.S Public Sector
Addressing IT Modernization Challenges Across the U.S Public SectorThousandEyes
 
Three Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the CloudThree Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the CloudZscaler
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraZscaler
 
Enhancing SaaS Performance: A Hands-on Workshop for Partners
Enhancing SaaS Performance: A Hands-on Workshop for PartnersEnhancing SaaS Performance: A Hands-on Workshop for Partners
Enhancing SaaS Performance: A Hands-on Workshop for PartnersThousandEyes
 
RapidScale Company Presentation
RapidScale Company PresentationRapidScale Company Presentation
RapidScale Company PresentationRapidScale
 
EMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarEMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarThousandEyes
 
Zscaler ThreatLabz dissects the latest SSL security attacks
Zscaler ThreatLabz dissects the latest SSL security attacksZscaler ThreatLabz dissects the latest SSL security attacks
Zscaler ThreatLabz dissects the latest SSL security attacksZscaler
 
What is ThousandEyes Webinar
What is ThousandEyes WebinarWhat is ThousandEyes Webinar
What is ThousandEyes WebinarThousandEyes
 
10 Things to Look for in a Data Center
10 Things to Look for in a Data Center10 Things to Look for in a Data Center
10 Things to Look for in a Data CenterJason Basye
 
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?michaelbasoah
 
A Quick Introduction to Microsoft Azure Public Cloud
A Quick Introduction to Microsoft Azure Public CloudA Quick Introduction to Microsoft Azure Public Cloud
A Quick Introduction to Microsoft Azure Public CloudZNetLive
 
ThousandEyes Enterprise Digital Workshop
ThousandEyes Enterprise Digital WorkshopThousandEyes Enterprise Digital Workshop
ThousandEyes Enterprise Digital WorkshopThousandEyes
 
Schneider electric powers security transformation with one simple app copy
Schneider electric powers security transformation with one simple app   copySchneider electric powers security transformation with one simple app   copy
Schneider electric powers security transformation with one simple app copyZscaler
 
Faster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in awsFaster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in awsZscaler
 
How sdp delivers_zero_trust
How sdp delivers_zero_trustHow sdp delivers_zero_trust
How sdp delivers_zero_trustZscaler
 
Alpha & Omega's Managed Security
Alpha & Omega's Managed SecurityAlpha & Omega's Managed Security
Alpha & Omega's Managed SecurityDarryl Santa
 
Introduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile PaymentIntroduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile PaymentJean Ryu
 

Similar to SD-WAN plus Cloud Security Stack for Optimal Branch Connectivity (20)

Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudOvercoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the Cloud
 
Virtualized Firewall: Is it the panacea to secure distributed enterprises?
Virtualized Firewall: Is it the panacea to secure distributed enterprises?Virtualized Firewall: Is it the panacea to secure distributed enterprises?
Virtualized Firewall: Is it the panacea to secure distributed enterprises?
 
Addressing IT Modernization Challenges Across the U.S Public Sector
Addressing IT Modernization Challenges Across the U.S Public SectorAddressing IT Modernization Challenges Across the U.S Public Sector
Addressing IT Modernization Challenges Across the U.S Public Sector
 
Three Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the CloudThree Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the Cloud
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation Era
 
Enhancing SaaS Performance: A Hands-on Workshop for Partners
Enhancing SaaS Performance: A Hands-on Workshop for PartnersEnhancing SaaS Performance: A Hands-on Workshop for Partners
Enhancing SaaS Performance: A Hands-on Workshop for Partners
 
RapidScale Company Presentation
RapidScale Company PresentationRapidScale Company Presentation
RapidScale Company Presentation
 
EMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarEMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? Webinar
 
Zscaler ThreatLabz dissects the latest SSL security attacks
Zscaler ThreatLabz dissects the latest SSL security attacksZscaler ThreatLabz dissects the latest SSL security attacks
Zscaler ThreatLabz dissects the latest SSL security attacks
 
What is ThousandEyes Webinar
What is ThousandEyes WebinarWhat is ThousandEyes Webinar
What is ThousandEyes Webinar
 
10 Things to Look for in a Data Center
10 Things to Look for in a Data Center10 Things to Look for in a Data Center
10 Things to Look for in a Data Center
 
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
 
A Quick Introduction to Microsoft Azure Public Cloud
A Quick Introduction to Microsoft Azure Public CloudA Quick Introduction to Microsoft Azure Public Cloud
A Quick Introduction to Microsoft Azure Public Cloud
 
ThousandEyes Enterprise Digital Workshop
ThousandEyes Enterprise Digital WorkshopThousandEyes Enterprise Digital Workshop
ThousandEyes Enterprise Digital Workshop
 
Schneider electric powers security transformation with one simple app copy
Schneider electric powers security transformation with one simple app   copySchneider electric powers security transformation with one simple app   copy
Schneider electric powers security transformation with one simple app copy
 
Faster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in awsFaster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in aws
 
How sdp delivers_zero_trust
How sdp delivers_zero_trustHow sdp delivers_zero_trust
How sdp delivers_zero_trust
 
Alpha & Omega's Managed Security
Alpha & Omega's Managed SecurityAlpha & Omega's Managed Security
Alpha & Omega's Managed Security
 
Introduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile PaymentIntroduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile Payment
 

More from Zscaler

Zscaler mondi webinar
Zscaler mondi webinarZscaler mondi webinar
Zscaler mondi webinarZscaler
 
3 reasons-sdp-is-replacing-vpn-in-2019
3 reasons-sdp-is-replacing-vpn-in-20193 reasons-sdp-is-replacing-vpn-in-2019
3 reasons-sdp-is-replacing-vpn-in-2019Zscaler
 
Top 5 predictions webinar
Top 5 predictions webinarTop 5 predictions webinar
Top 5 predictions webinarZscaler
 
Three ways-zero-trust-security-redefines-partner-access-ch
Three ways-zero-trust-security-redefines-partner-access-chThree ways-zero-trust-security-redefines-partner-access-ch
Three ways-zero-trust-security-redefines-partner-access-chZscaler
 
Office 365 kelly services
Office 365 kelly servicesOffice 365 kelly services
Office 365 kelly servicesZscaler
 
Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18Zscaler
 
Get an office 365 expereience your users will love v8.1
Get an office 365 expereience your users will love v8.1Get an office 365 expereience your users will love v8.1
Get an office 365 expereience your users will love v8.1Zscaler
 
Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8Zscaler
 
Top 5 mistakes deploying o365
Top 5 mistakes deploying o365Top 5 mistakes deploying o365
Top 5 mistakes deploying o365Zscaler
 
Zenith Live - Security Lab - Phantom
Zenith Live - Security Lab - PhantomZenith Live - Security Lab - Phantom
Zenith Live - Security Lab - PhantomZscaler
 
Moving from appliances to cloud security with phoenix children's hospital
Moving from appliances to cloud security with phoenix children's hospitalMoving from appliances to cloud security with phoenix children's hospital
Moving from appliances to cloud security with phoenix children's hospitalZscaler
 
O365 quick with fast user experience
O365 quick with fast user experienceO365 quick with fast user experience
O365 quick with fast user experienceZscaler
 
Migration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscalerMigration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscalerZscaler
 
Office 365 deployment
Office 365 deploymentOffice 365 deployment
Office 365 deploymentZscaler
 
Dissecting ssl threats
Dissecting ssl threatsDissecting ssl threats
Dissecting ssl threatsZscaler
 
The evolution of IT in a cloud world
The evolution of IT in a cloud worldThe evolution of IT in a cloud world
The evolution of IT in a cloud worldZscaler
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraZscaler
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Zscaler
 
Top reasons o365 deployments fail
Top reasons o365 deployments failTop reasons o365 deployments fail
Top reasons o365 deployments failZscaler
 
GDPR - are you ready?
GDPR - are you ready?GDPR - are you ready?
GDPR - are you ready?Zscaler
 

More from Zscaler (20)

Zscaler mondi webinar
Zscaler mondi webinarZscaler mondi webinar
Zscaler mondi webinar
 
3 reasons-sdp-is-replacing-vpn-in-2019
3 reasons-sdp-is-replacing-vpn-in-20193 reasons-sdp-is-replacing-vpn-in-2019
3 reasons-sdp-is-replacing-vpn-in-2019
 
Top 5 predictions webinar
Top 5 predictions webinarTop 5 predictions webinar
Top 5 predictions webinar
 
Three ways-zero-trust-security-redefines-partner-access-ch
Three ways-zero-trust-security-redefines-partner-access-chThree ways-zero-trust-security-redefines-partner-access-ch
Three ways-zero-trust-security-redefines-partner-access-ch
 
Office 365 kelly services
Office 365 kelly servicesOffice 365 kelly services
Office 365 kelly services
 
Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18
 
Get an office 365 expereience your users will love v8.1
Get an office 365 expereience your users will love v8.1Get an office 365 expereience your users will love v8.1
Get an office 365 expereience your users will love v8.1
 
Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8
 
Top 5 mistakes deploying o365
Top 5 mistakes deploying o365Top 5 mistakes deploying o365
Top 5 mistakes deploying o365
 
Zenith Live - Security Lab - Phantom
Zenith Live - Security Lab - PhantomZenith Live - Security Lab - Phantom
Zenith Live - Security Lab - Phantom
 
Moving from appliances to cloud security with phoenix children's hospital
Moving from appliances to cloud security with phoenix children's hospitalMoving from appliances to cloud security with phoenix children's hospital
Moving from appliances to cloud security with phoenix children's hospital
 
O365 quick with fast user experience
O365 quick with fast user experienceO365 quick with fast user experience
O365 quick with fast user experience
 
Migration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscalerMigration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscaler
 
Office 365 deployment
Office 365 deploymentOffice 365 deployment
Office 365 deployment
 
Dissecting ssl threats
Dissecting ssl threatsDissecting ssl threats
Dissecting ssl threats
 
The evolution of IT in a cloud world
The evolution of IT in a cloud worldThe evolution of IT in a cloud world
The evolution of IT in a cloud world
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation Era
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
 
Top reasons o365 deployments fail
Top reasons o365 deployments failTop reasons o365 deployments fail
Top reasons o365 deployments fail
 
GDPR - are you ready?
GDPR - are you ready?GDPR - are you ready?
GDPR - are you ready?
 

Recently uploaded

Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 

Recently uploaded (20)

Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 

SD-WAN plus Cloud Security Stack for Optimal Branch Connectivity

  • 1. ©2018 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION0 ©2018 Zscaler, Inc. All rights reserved. SD-WAN plus Cloud Security Stack für optimale Zweigstellen-Anbindung Schneller Internet-Zugang für jede Zweigstelle braucht einen Cloud Security Stack mit Firewall Nils Ullmann – Solutions Architect, Central Europe – nullmann@zscaler.com Jürgen Strapko – Regional Sales Manager – jstrapko@zscaler.com
  • 2. Housekeeping • Type your questions into the chat box in the WebEx panel • More questions? We’ll try to get to all questions during the Q&A session. If we do not get to your question, we’ll make sure to follow up afterwards • Technical issues? Email us at webcast@zscaler.com • Your Feedback? At the end of the webcast – please let us know how we did!
  • 3. ©2017 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION2 Our Mission Empower organizations to realize the full potential of the cloud and mobility by securely connecting users to applications from any device, anywhere
  • 4. ©2017 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION3 New leaders are born when megashifts take place Data center and hardware Applications in the data center On-Premise security
  • 5. ©2017 Zscaler, Inc. All rights reserved.4 How, when, and where we work is changing
  • 6. ©2018 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION5 Source: Riverbed, SkyHigh Networks, Right-Scale, Cisco CLOUD TRANSFORMATION IS HAPPENING 79% of workloads now run in the cloud 80% of Employees Use Shadow Cloud Applications 98% of IT decision makers say next-gen networks are required 320% Increase in O365 Enterprise Adoption
  • 7. ©2017 Zscaler, Inc. All rights reserved.6 ©2017 Zscaler, Inc. All rights reserved.6 A quick recap of networking history
  • 8. ©2017 Zscaler, Inc. All rights reserved.7 1990’s private WANs MPLS Remote and Branch Office Remote and Branch OfficeRegional Hub and Campus Data Center
  • 9. ©2017 Zscaler, Inc. All rights reserved.8 App. teams Disaster Recovery Site Private WAN Remote and Branch Office Remote and Branch OfficeRegional Hub and Campus Data Center 2000’s
  • 10. ©2017 Zscaler, Inc. All rights reserved.9 2010’s App. teams IT Ops Disaster Recovery Site Private WAN Remote and Branch Office Remote and Branch OfficeRegional Hub and Campus Data Center
  • 11. ©2017 Zscaler, Inc. All rights reserved.10 ©2017 Zscaler, Inc. All rights reserved.10 … and now SD-WAN
  • 12. ©2017 Zscaler, Inc. All rights reserved.11 2010’s App. teams IT Ops Disaster Recovery Site Private WAN Remote and Branch Office Remote and Branch OfficeRegional Hub and Campus Data Center
  • 13. ©2017 Zscaler, Inc. All rights reserved.12 Bandwidth Problems Everywhere Global Dev Ops Disaster Recovery Site MPLS Remote and Branch OfficeRegional Hub and Campus Data Center Regional Hub and Campus Internet
  • 14. ©2017 Zscaler, Inc. All rights reserved.13 Add More Links Global Dev Ops Disaster Recovery Site MPLS Remote and Branch OfficeRegional Hub and Campus Data Center Regional Hub and Campus Internet
  • 15. ©2017 Zscaler, Inc. All rights reserved.14 MPLS + Local Internet = Overlay Global Dev Ops Disaster Recovery Site MPLS Remote and Branch OfficeRegional Hub and Campus Data Center Regional Hub and Campus Internet
  • 16. ©2017 Zscaler, Inc. All rights reserved.15 MPLS Remote and Branch Office Data Center Internet Let’s dig into the details
  • 17. ©2017 Zscaler, Inc. All rights reserved.16 Remote & Branch Offices Data Centers Internet MPLS CE RouterPE RouterUnderlay - Network BGP (OSPF) OSPF (BGP) The Details
  • 18. ©2017 Zscaler, Inc. All rights reserved.17 ©2017 Zscaler, Inc. All rights reserved.17 What about Security …
  • 19. ©2017 Zscaler, Inc. All rights reserved.18 Global Dev Ops Disaster Recovery Site MPLS Remote and Branch OfficeRegional Hub and Campus Data Center Regional Hub and Campus Internet SD-WAN – No Change in Security and not in Internet Performance
  • 20. ©2017 Zscaler, Inc. All rights reserved.19 UTM Firewall Restricted Network Non-Compliant users Remediation Servers Firewall Web Scanners NAC/NAP Security Policy SIEM Servers Threat Analysis Security Management Network Data Center File Servers Mainframe DatabaseExchange Servers Domain Servers Firewall DLP Storage Public Key Infrastructure Keys Certificate Authority UTM Firewall LDAP Management Console Wireless Access DLP UTM Firewall Wi-Fi Network IPS Mobile User UTM Firewall Enterprise Users DC/ DNS Exchange DHCP AV, Anti Malware Remote Access UTM Firewall Remote Access Gateway CORPORATE NETWORK DLP Router Regional Office VPN Mobile Device Management DNS Exchange VPN FtpWeb Users Internet Router Outside Firewall Web Server Email Server WAF Inside Firewall SwitchSwitch IDS / IPOS UTM Firewall DLP Analytics / SIEM Networking Security Compute Data Center
  • 21. ©2017 Zscaler, Inc. All rights reserved.20 SD-WAN + local UTMs Global Dev Ops Disaster Recovery Site MPLS Remote and Branch OfficeRegional Hub and Campus Data Center Regional Hub and Campus Internet
  • 22. ©2017 Zscaler, Inc. All rights reserved.21 Every Appliance Vendor’s Dream Expensive to Deploy Security CompromisesComplex to Manage New York Management Platform Logging & Reporting Identity Management Server Additional Requirements
  • 23. ©2017 Zscaler, Inc. All rights reserved.22 ©2017 Zscaler, Inc. All rights reserved. Zscaler™, SHIFT™, Direct-to-Cloud™ and ZPA™ are trademarks or registered trademarks of Zscaler, Inc. in the United States and/or other countries. All other trademarks are the property of their respective owners. There’s a better way: Cloud Firewall ✔
  • 24. ©2017 Zscaler, Inc. All rights reserved.23 ©2017 Zscaler, Inc. All rights reserved.23 SD-WAN + Zscaler = Perfect fit
  • 25. ©2017 Zscaler, Inc. All rights reserved.24 Zscaler’s Security Architecture built for Performance SECURE ALL PORTS & PROTOCOLS MULTIPLE PROPRIETARY INSPECTION METHODS ADVANCED THREAT PROTECTION Behavioral Analysis Sandbox Dynamic Content Classification Page Risk Index Anti-Malware XSS Protection CVE Protection URL Filtering Proxy (SSL) Block Lists File Type Control DNS Filtering Cloud FW (NGFW) Browser Control 45 Billion Requests per Day Full Inline and SSL inspection 60+ INDUSTRY THREAT FEEDS Threat sharing partnerships, commercial deals, open source, private working groups. FULL INLINE CONTENT INSPECTION All bytes, all ports, all protocols, including SSL – no compromises. REAL-TIME THREAT CORRELATION Dynamically computes the risk of every page object using content and domain analysis. CLOUD INTELLIGENCE 125M+ threats blocked daily. Once detected, immediately blocked for all users. 120K+ unique security updates a day.
  • 26. ©2017 Zscaler, Inc. All rights reserved.25 Extensive Cloud Security Platform: Born in the cloud for the cloud Differentiated IP with 100+ broad and deep issued and pending patents Extensible through API for layering of additional services by Zscaler and partners Built as proxy-based platform that enables full inspection Access Control Cloud Firewall URL Filtering Bandwidth Control DNS Filtering Threat Prevention Advanced Protection Cloud Sandbox Anti-Virus DNS Security Data Protection Data Loss Protection Cloud App Controls File Type Controls Access Controls User to App App Micro Segmentation Device Posture App Security Invisible Apps DDoS Prevention Private Certificates Visibility App Discovery App Monitoring User Monitoring Zscaler Internet Access Externally Managed Apps Zscaler Private Access Internally Managed Apps Zscaler Multitenant Cloud Security Platform
  • 27. ©2017 Zscaler, Inc. All rights reserved.26 Zscaler peers with Office 365 in major DCs Denver Toronto New York Paris London Amsterdam Brussels Stockholm Moscow Mumbai Singapore SydneyCape Town Madrid Riyadh Johannesburg San Francisco Atlanta Dallas Frankfurt Sao Paulo Lagos Kuala Lumpur Tel Aviv Washington DC Chicago Los Angeles Copenhagen Melbourne Milan Hong Kong Taipei Zurich Chennai Tianjin Tokyo Doha Dubai Abu Dhabi Miami Jeddah Al Khobar Warsaw Seattle Oslo Shanghai 45B+ Requests processed/day 100M+ Threats blocked/day 120K+ Unique security updates/day 100 data centers across 6 continents Secure Ongoing third- party testing CertifiedReliable Redundancy within and failover across DCs Transparent Trust portal for service availability monitoring Egress O365 close to user Avoid network hairpins Internet Peering across 150 Vendors O365 Peering Data Center Deliver a fast connection regardless of location! 4 Peta Bytes per Month!
  • 28. ©2017 Zscaler, Inc. All rights reserved.27 New York Zscaler enables secure local Internet breakouts without appliances Eliminate Appliances No Security CompromisesSingle Management Console New York Management Platform Logging & Reporting Identity Management Server Additional Requirements Global visibility - cloud apps and usage Identify botnet-infected machines that need to be remediated SLA backed session-by-session logs for 6 months with no rollovers Real-life analytics – Actionable info You retain full control – policy and admin Policies by user, locations, AD groups Follow-the-user policy for the same protection at any location, any device Global real-time policy engine
  • 29. ©2017 Zscaler, Inc. All rights reserved.28 SD-WAN + Cloud Security Global Dev Ops Disaster Recovery Site MPLS Remote and Branch OfficeRegional Hub and Campus Data Center Regional Hub and Campus Internet
  • 30. ©2017 Zscaler, Inc. All rights reserved.29 SD-WAN + Zscaler Global Dev Ops Disaster Recovery Site MPLS Remote and Branch OfficeRegional Hub and Campus Data Center Regional Hub and Campus Internet
  • 31. ©2017 Zscaler, Inc. All rights reserved.30 Perfect Fit Global Dev Ops Disaster Recovery Site MPLS Remote and Branch OfficeRegional Hub and Campus Data Center Regional Hub and Campus Internet
  • 32. ©2017 Zscaler, Inc. All rights reserved.31 Why Cloud Firewall? On-Premise NGFW/UTM Appliances vs. Zscaler Cloud Firewall Security Policy Only Enforced On-Premise or via VPN Short Logs, Multiple Log Sources = Difficult Correlation Supersized Appliances or Refresh Required for Traffic Growth Limited Inspection Capabilities Inspects Only First 200-500kB SSL requires additional hardware Not Designed for Frequent Updates or to Manage Policy for Models with Different Features/Capacities On-Premise Security Infrastructure Global Unified Access and Security Service To this.. Anywhere Policy Enforcement Full Log Analysis – Single Pane of Glass Scales Elastically No hardware or software Inspects ALL Traffic, Including Native SSL Inspection 120K Unique Security Updates Daily From this.. HQ/IOT All BRANCHESAll BRANCHES
  • 33. ©2017 Zscaler, Inc. All rights reserved.32 ©2018 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION32 A three-step journey to secure IT transformation: Land & Expand Enable local Internet breakouts (SD-WAN) Enable direct access to internal apps Security + User Experience + ROI SIMPLIFY Remove multiple point products SaaS Open internet Private cloud / Data center Public cloud SECURE Up-level security Replace proxy or VPN in days Little infrastructure change Enhance Security SaaS Open internet Private cloud / Data center Public cloud TRANSFORM Cloud-enable hybrid network, app access Open internet SaaS Public cloud Private cloud / Data center Reduces sale cycles and accelerates deployments Phase out gateway appliances Outbound or inbound gateway Reduce cost and complexity
  • 34. ©2017 Zscaler, Inc. All rights reserved.33 Thank You - Questions Mehr über Zscaler für die Zweigstellen-Transformation Branch Transformation – deutsche Webseite https://info.zscaler.com/Branch-Transformation-Campaign_Branch-transformation-germany.html Nils Ullmann Solution Architect Central Europe nullmann@zscaler.com linkedin.com/in/nullmann Branch Transformation Whitepaper https://info.zscaler.com/WP-the-definitive-guide-to-branch-transformation
  • 35. ©2017 Zscaler, Inc. All rights reserved.34 ©2017 Zscaler, Inc. All rights reserved. Zscaler™, SHIFT™, Direct-to-Cloud™ and ZPA™ are trademarks or registered trademarks of Zscaler, Inc. in the United States and/or other countries. All other trademarks are the property of their respective owners.

Editor's Notes

  1. S-1 empower organizations to realize the full potential of the cloud and mobility by securely connecting users to applications from any device, anywhere.
  2. https://451research.com/blog/773-according-to-new-451-research-survey,-40-of-enterprises-are-usinghyperconverged-infrastructure
  3. But the Challenge of going direct to the Internet with appliances Deploy a bunch of appliances to all locations. How many locations does your customer have? Can they realistically deploy the same appliance stack sitting in their gateway to every location? No – creates expensive appliance sprawl. Pan will say – create regional hubs and backhaul traffic – which defeats the point of cloud applications and local internet breakouts OR Instead, security compromises - how many boxes can they afford and the level of security provided. Compromise leaves org vulnerable. And it is not just us saying this. When we asked end users at RSA about their concerns about creating local internet breakouts, They were concerned that it would require additional appliances, about the lack security and control with that many appliances – and that it would be too complex to manage Bottom line – appliances don’t work for breakouts. It no longer makes sense to backhaul outbound Internet traffic to a firewall in a regional or corporate datacenter. Expensive MPLS backhauling = negative user experience. It no longer makes sense to compromise security by installing smaller boxes in the branch.
  4. Security needs to move to cloud, apps must shift from network-based to policy-based access that securely connects the right users to the right apps. And you can do that with Zscaler Cloud firewall
  5. This slide was shared with us by a prospect-turned-customer on the value of migrating from hub-and-spoke, appliance-centric architecture to Zscaler.