SlideShare a Scribd company logo
1 of 22
©2017 Zscaler, Inc. All rights reserved.0
Secure Remote Access To Apps In Azure
Patrick Foxhoven
CIO Zscaler
Experience Users Want.
Security You Need.
Chris Hines
Senior Manager, Zscaler Private Access
©2017 Zscaler, Inc. All rights reserved.1
Zscaler: The market leader in cloud security
Enterprise Customers
2,700 CUSTOMERS
Over 80 of the Fortune 500
54% International
Global Partners
100
Data centers
35B
Daily requests
185
Countries served
Unparalleled Cloud Scale
Largest Cloud Security Platform in the World
©2017 Zscaler, Inc. All rights reserved.2
Announced New Solution with Microsoft at Ignite
• Zscaler is a MSFT Partner
• New Zscaler Private Access for
Azure solution
“Zscaler helps to simplify the enterprise journey
to Microsoft Azure for both public and hybrid
environments…Zscaler Private Access gives
users the choice and the benefit of secure
connectivity...”
- Yousef Khalidi, Corporate Vice President,
Microsoft Azure Networking, Microsoft Corp
https://www.zscaler.com/press/zscaler-partners-accelerate-cloud-adoption-microsoft-azure
©2017 Zscaler, Inc. All rights reserved.3
The Castle and Moat Security Architecture
Secure your network by building a
perimeter around it.
©2017 Zscaler, Inc. All rights reserved.4
The Traditional Hub and Spoke Network Architecture.
Backhaul traffic to a central datacenter.
©2017 Zscaler, Inc. All rights reserved.5
Apps Moved To Azure
More than 40% of
enterprises are running
applications in Azure
©2017 Zscaler, Inc. All rights reserved.6
Global LB
DDoS
Ext. FW / IPSInternal LB
Internal FW
RAS (VPN)
Site-to-site VPN
Legacy Application Access Breaks Cloud and Mobility
Remote User
©2017 Zscaler, Inc. All rights reserved.7
How mobile users feel
with current experience
©2017 Zscaler, Inc. All rights reserved.8
Security
Castle & Moat User to App Policies
Cloud And Mobility Forces Secure Remote Access To Evolve
App Location
Datacenter Cloud
Direct-to-Cloud
Network
Hub & Spoke
©2017 Zscaler, Inc. All rights reserved.9
Modern Direct-to-Cloud
Architecture
Faster, simpler, and
more secure
Z-App
©2017 Zscaler, Inc. All rights reserved.10
Enterprise Benefits
CostExperience Security Simple
©2017 Zscaler, Inc. All rights reserved.11
Zscaler Private Access
A Revolutionary Approach to Internal App Access
©2017 Zscaler, Inc. All rights reserved.12
4 Key Design Tenets
1 Connect users to apps without bringing them on the network
2 Never expose applications to the Internet
3 Segment apps without segmenting the network
4 Provide remote access over the Internet without appliances
©2017 Zscaler, Inc. All rights reserved.13
Z-Connector
Z-App
Datacenter
Azure
ExpressRoute
• Cloud Policy Engine: user to app access rights
• Z-App: requests access to an app
• Z-Connector: sits in front of apps
(inside out connections)
• Z-Brokers: secure user to app connection
ZPA: Securely connects the right user to the right app
Experience Users Want. Security You Need.
Z-Brokers
©2017 Zscaler, Inc. All rights reserved.14
Zscaler & Azure
Better Together.
• Direct-to-cloud experience
• ZENs hosted within Azure
• Connectors hosted within Azure
• Enable local breakouts
©2017 Zscaler, Inc. All rights reserved.15
ZPA Service - The 4 Security Tenets in Action
EMPLOYEESPARTNERS
Remote users are never
placed on the network
• Application access,
not network access
1
Applications are invisible
to unauthorized users
• Users can’t access
what they can’t see
2
Policy-based access to
specific apps
• Define which users
access which apps
3
The internet is the new
secure network
• Double-tunneling for
secure access
4
©2017 Zscaler, Inc. All rights reserved.16
Azure Active Directory Marketplace
ZPA and Azure – One Click Integrations
©2017 Zscaler, Inc. All rights reserved.17
Cloud-based security
The access users want,
with the security you need
1. Secure access to apps in
datacenter & cloud
2. Authorized access to specific apps
3. Fast and seamless remote user
experience
4. No VPN
Vision: Secure Remote Access To Internal Apps In Cloud & Datacenter
HQON-THE-GO BRANCHES
©2017 Zscaler, Inc. All rights reserved.18
DEMO
Zscaler Private Access
©2017 Zscaler, Inc. All rights reserved.19
?
Q&A
©2017 Zscaler, Inc. All rights reserved.20
Questions and next steps
20
Learn more about Zscaler
ZPA For Azure
zscaler.com/product/zpa-for-
azure
Free Security Health Check
www.zscaler.com/securitypreview
Other Webcasts
Lessons for thriving - not just surviving - in the cloud
Jay Chaudhry - Zscaler & Frederik Janssen – Siemens
On Demand: zscaler.com/company/webcasts
©2017 Zscaler, Inc. All rights reserved.21
21

More Related Content

What's hot

What's hot (20)

3 reasons-sdp-is-replacing-vpn-in-2019
3 reasons-sdp-is-replacing-vpn-in-20193 reasons-sdp-is-replacing-vpn-in-2019
3 reasons-sdp-is-replacing-vpn-in-2019
 
Get an office 365 expereience your users will love v8.1
Get an office 365 expereience your users will love v8.1Get an office 365 expereience your users will love v8.1
Get an office 365 expereience your users will love v8.1
 
Zscaler ThreatLabz dissects the latest SSL security attacks
Zscaler ThreatLabz dissects the latest SSL security attacksZscaler ThreatLabz dissects the latest SSL security attacks
Zscaler ThreatLabz dissects the latest SSL security attacks
 
Migration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscalerMigration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscaler
 
Office 365 kelly services
Office 365 kelly servicesOffice 365 kelly services
Office 365 kelly services
 
Schneider electric powers security transformation with one simple app copy
Schneider electric powers security transformation with one simple app   copySchneider electric powers security transformation with one simple app   copy
Schneider electric powers security transformation with one simple app copy
 
Three Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the CloudThree Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the Cloud
 
How sdp delivers_zero_trust
How sdp delivers_zero_trustHow sdp delivers_zero_trust
How sdp delivers_zero_trust
 
Maximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and ZscalerMaximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and Zscaler
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation Era
 
The secure, direct to-internet branch
The secure, direct to-internet branchThe secure, direct to-internet branch
The secure, direct to-internet branch
 
Dissecting ssl threats
Dissecting ssl threatsDissecting ssl threats
Dissecting ssl threats
 
O365 quick with fast user experience
O365 quick with fast user experienceO365 quick with fast user experience
O365 quick with fast user experience
 
Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudOvercoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the Cloud
 
The evolution of IT in a cloud world
The evolution of IT in a cloud worldThe evolution of IT in a cloud world
The evolution of IT in a cloud world
 
Secure remote access to AWS your users will love
Secure remote access to AWS your users will loveSecure remote access to AWS your users will love
Secure remote access to AWS your users will love
 
Moving from appliances to cloud security with phoenix children's hospital
Moving from appliances to cloud security with phoenix children's hospitalMoving from appliances to cloud security with phoenix children's hospital
Moving from appliances to cloud security with phoenix children's hospital
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation Era
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
 
SD-WAN plus cloud security
SD-WAN plus cloud securitySD-WAN plus cloud security
SD-WAN plus cloud security
 

Similar to Secure access to applications on Microsoft Azure

Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...
eSAT Publishing House
 
Shedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File SharingShedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File Sharing
CipherCloud
 
Splendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptxSplendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptx
ssuserea0dfe
 
Cloud expo 10 myths rex wang oracle ss
Cloud expo 10 myths rex wang oracle ssCloud expo 10 myths rex wang oracle ss
Cloud expo 10 myths rex wang oracle ss
Rex Wang
 
Oracle presentation at Tech Summit PR 2014
Oracle presentation at Tech Summit PR 2014Oracle presentation at Tech Summit PR 2014
Oracle presentation at Tech Summit PR 2014
Tech Summit PR 2014
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Norm Barber
 

Similar to Secure access to applications on Microsoft Azure (20)

Webinar remote access_no_vpn_pitfalls_111517
Webinar remote access_no_vpn_pitfalls_111517Webinar remote access_no_vpn_pitfalls_111517
Webinar remote access_no_vpn_pitfalls_111517
 
Maximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and ZscalerMaximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and Zscaler
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
 
Cloud Computing Lecture 02.pptx
Cloud Computing Lecture 02.pptxCloud Computing Lecture 02.pptx
Cloud Computing Lecture 02.pptx
 
Zero Trust Networks
Zero Trust NetworksZero Trust Networks
Zero Trust Networks
 
CipherCloud for Any App
CipherCloud for Any AppCipherCloud for Any App
CipherCloud for Any App
 
Citrix MDX Technologies Feature Brief
Citrix MDX Technologies Feature BriefCitrix MDX Technologies Feature Brief
Citrix MDX Technologies Feature Brief
 
Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...
 
John Merline - How make your cloud SASE
John Merline - How make your cloud SASE John Merline - How make your cloud SASE
John Merline - How make your cloud SASE
 
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
 
Shedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File SharingShedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File Sharing
 
IMS and Azure Offerings by Godrej Infotech
IMS and Azure Offerings by Godrej InfotechIMS and Azure Offerings by Godrej Infotech
IMS and Azure Offerings by Godrej Infotech
 
CC UNIT-2.pptx
CC UNIT-2.pptxCC UNIT-2.pptx
CC UNIT-2.pptx
 
Splendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptxSplendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptx
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUD
 
Cloud expo 10 myths rex wang oracle ss
Cloud expo 10 myths rex wang oracle ssCloud expo 10 myths rex wang oracle ss
Cloud expo 10 myths rex wang oracle ss
 
Strengthen Cloud Security
Strengthen Cloud SecurityStrengthen Cloud Security
Strengthen Cloud Security
 
Oracle presentation at Tech Summit PR 2014
Oracle presentation at Tech Summit PR 2014Oracle presentation at Tech Summit PR 2014
Oracle presentation at Tech Summit PR 2014
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 

More from Zscaler

More from Zscaler (7)

Zscaler mondi webinar
Zscaler mondi webinarZscaler mondi webinar
Zscaler mondi webinar
 
Top 5 mistakes deploying o365
Top 5 mistakes deploying o365Top 5 mistakes deploying o365
Top 5 mistakes deploying o365
 
Zenith Live - Security Lab - Phantom
Zenith Live - Security Lab - PhantomZenith Live - Security Lab - Phantom
Zenith Live - Security Lab - Phantom
 
Office 365 deployment
Office 365 deploymentOffice 365 deployment
Office 365 deployment
 
Top reasons o365 deployments fail
Top reasons o365 deployments failTop reasons o365 deployments fail
Top reasons o365 deployments fail
 
GDPR - are you ready?
GDPR - are you ready?GDPR - are you ready?
GDPR - are you ready?
 
DNS Security, is it enough?
DNS Security, is it enough? DNS Security, is it enough?
DNS Security, is it enough?
 

Recently uploaded

AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
VictorSzoltysek
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
How to Choose the Right Laravel Development Partner in New York City_compress...
How to Choose the Right Laravel Development Partner in New York City_compress...How to Choose the Right Laravel Development Partner in New York City_compress...
How to Choose the Right Laravel Development Partner in New York City_compress...
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 

Secure access to applications on Microsoft Azure

  • 1. ©2017 Zscaler, Inc. All rights reserved.0 Secure Remote Access To Apps In Azure Patrick Foxhoven CIO Zscaler Experience Users Want. Security You Need. Chris Hines Senior Manager, Zscaler Private Access
  • 2. ©2017 Zscaler, Inc. All rights reserved.1 Zscaler: The market leader in cloud security Enterprise Customers 2,700 CUSTOMERS Over 80 of the Fortune 500 54% International Global Partners 100 Data centers 35B Daily requests 185 Countries served Unparalleled Cloud Scale Largest Cloud Security Platform in the World
  • 3. ©2017 Zscaler, Inc. All rights reserved.2 Announced New Solution with Microsoft at Ignite • Zscaler is a MSFT Partner • New Zscaler Private Access for Azure solution “Zscaler helps to simplify the enterprise journey to Microsoft Azure for both public and hybrid environments…Zscaler Private Access gives users the choice and the benefit of secure connectivity...” - Yousef Khalidi, Corporate Vice President, Microsoft Azure Networking, Microsoft Corp https://www.zscaler.com/press/zscaler-partners-accelerate-cloud-adoption-microsoft-azure
  • 4. ©2017 Zscaler, Inc. All rights reserved.3 The Castle and Moat Security Architecture Secure your network by building a perimeter around it.
  • 5. ©2017 Zscaler, Inc. All rights reserved.4 The Traditional Hub and Spoke Network Architecture. Backhaul traffic to a central datacenter.
  • 6. ©2017 Zscaler, Inc. All rights reserved.5 Apps Moved To Azure More than 40% of enterprises are running applications in Azure
  • 7. ©2017 Zscaler, Inc. All rights reserved.6 Global LB DDoS Ext. FW / IPSInternal LB Internal FW RAS (VPN) Site-to-site VPN Legacy Application Access Breaks Cloud and Mobility Remote User
  • 8. ©2017 Zscaler, Inc. All rights reserved.7 How mobile users feel with current experience
  • 9. ©2017 Zscaler, Inc. All rights reserved.8 Security Castle & Moat User to App Policies Cloud And Mobility Forces Secure Remote Access To Evolve App Location Datacenter Cloud Direct-to-Cloud Network Hub & Spoke
  • 10. ©2017 Zscaler, Inc. All rights reserved.9 Modern Direct-to-Cloud Architecture Faster, simpler, and more secure Z-App
  • 11. ©2017 Zscaler, Inc. All rights reserved.10 Enterprise Benefits CostExperience Security Simple
  • 12. ©2017 Zscaler, Inc. All rights reserved.11 Zscaler Private Access A Revolutionary Approach to Internal App Access
  • 13. ©2017 Zscaler, Inc. All rights reserved.12 4 Key Design Tenets 1 Connect users to apps without bringing them on the network 2 Never expose applications to the Internet 3 Segment apps without segmenting the network 4 Provide remote access over the Internet without appliances
  • 14. ©2017 Zscaler, Inc. All rights reserved.13 Z-Connector Z-App Datacenter Azure ExpressRoute • Cloud Policy Engine: user to app access rights • Z-App: requests access to an app • Z-Connector: sits in front of apps (inside out connections) • Z-Brokers: secure user to app connection ZPA: Securely connects the right user to the right app Experience Users Want. Security You Need. Z-Brokers
  • 15. ©2017 Zscaler, Inc. All rights reserved.14 Zscaler & Azure Better Together. • Direct-to-cloud experience • ZENs hosted within Azure • Connectors hosted within Azure • Enable local breakouts
  • 16. ©2017 Zscaler, Inc. All rights reserved.15 ZPA Service - The 4 Security Tenets in Action EMPLOYEESPARTNERS Remote users are never placed on the network • Application access, not network access 1 Applications are invisible to unauthorized users • Users can’t access what they can’t see 2 Policy-based access to specific apps • Define which users access which apps 3 The internet is the new secure network • Double-tunneling for secure access 4
  • 17. ©2017 Zscaler, Inc. All rights reserved.16 Azure Active Directory Marketplace ZPA and Azure – One Click Integrations
  • 18. ©2017 Zscaler, Inc. All rights reserved.17 Cloud-based security The access users want, with the security you need 1. Secure access to apps in datacenter & cloud 2. Authorized access to specific apps 3. Fast and seamless remote user experience 4. No VPN Vision: Secure Remote Access To Internal Apps In Cloud & Datacenter HQON-THE-GO BRANCHES
  • 19. ©2017 Zscaler, Inc. All rights reserved.18 DEMO Zscaler Private Access
  • 20. ©2017 Zscaler, Inc. All rights reserved.19 ? Q&A
  • 21. ©2017 Zscaler, Inc. All rights reserved.20 Questions and next steps 20 Learn more about Zscaler ZPA For Azure zscaler.com/product/zpa-for- azure Free Security Health Check www.zscaler.com/securitypreview Other Webcasts Lessons for thriving - not just surviving - in the cloud Jay Chaudhry - Zscaler & Frederik Janssen – Siemens On Demand: zscaler.com/company/webcasts
  • 22. ©2017 Zscaler, Inc. All rights reserved.21 21