Streamline & Secure
Your Network & Users
with next generation cloud-enabled solution
LAWSON
TECHNOLOGY
FREDERIK LAWSON
© 2015, Indonesia
ISSUE #1
Broader, Deeper and More Sophisticated
Than Ever Before
a
LAWSON
TECHNOLOGY
Chart: Threats blocked for typical
Zscaler client, August 2014
Detail:
5 million threats blocked
65 million policy violations
Out of 1+ billion total transactions
Attacks span multiple vectors – only
security platforms can see this
ISSUE #2
Appliance Solution Is
Complex, Expensive and Slow
a
LAWSON
TECHNOLOGY
“We [spent] at least 4 days each
month just on malware
remediation and hours
on maintenance of appliances.”
– BIG 4 ACCOUNTING FIRM
Data Loss Prevention
Zero Day
Advanced Persistent Threat
Intrusion Prevention Systems
Anti-Virus
URL Filtering
Caching
Proxies
Rate Limiting
ISSUE #2
Appliance Solution Is
Complex, Expensive and Slow
a
LAWSON
TECHNOLOGY
Data Loss Prevention
Zero Day
Advanced Persistent Threat
Intrusion Prevention Systems
Anti-Virus
URL Filtering
Caching
Proxies
Rate LimitingHOW MANY UNITS do you use
to connect, to secure and
to control your data/info, users
and the network?
HOW MUCH TIME do you
spend managing them ?
HOW do you protect your
mobile users ?
HOW do you set up a common
policy across all of them ?
HOW MUCH do you spend for
investing and maintaining the
appliances ?
ISSUE #2
Appliance Solution Is
Complex, Expensive and Slow
a
LAWSON
TECHNOLOGY
BlueCoat
Internet
Expensive to purchase and to operate
Complexity introduces security gaps
Slows Internet performance, fails open under load
Often bypassed by mobile devices
Source: Global 1000 network
security diagram, August 2014
ISSUE #3
Your Users Are The Primary Attack Vector
a
LAWSON
TECHNOLOGY
The concept of the Corporate Perimeter is rapidly disappearing.
Nowadays, users are not only sitting in the office, also carry mobile
devices that are always on and almost always connected to the
Internet.
APPLIANCE SOLUTION can not protect your users while they are
outside your company
Data: Locations of users on Zscaler’s
network, average day, August 2014
the bad guys know this,
your users are becoming
the primary attack vector
the bad guys know this,
your users are becoming
the primary attack vector
ISSUE #4
The ICT Landscape Has Dramatically Shifted
a
LAWSON
TECHNOLOGY
everyone is on the road
and CONNECTED EVERYWHERE
fastest growing and
top-rated by analyst
industry-leading
client satisfaction
industry-leading
client satisfaction
used in 185+ countries
12M+ users
12B+ transactions/day
used in 185+ countries
12M+ users
12B+ transactions/day
zscaler is a carrier-grade
Security-as-a-Service
platform
zscaler is a carrier-grade
Security-as-a-Service
platform
Introducing
Revolutioning IP / Internet Security
NICHE PLAYERS VISIONARIES
LEADERSCHALLENGERS
fastest growing and
top-rated by analyst
LAWSON
TECHNOLOGY
Is Winning
Recognition & Awards Everywhere
LAWSON
TECHNOLOGY
“Security’s cloud revolution is upon us.”
“Zscaler… is experiencing remarkable growth with its
global security cloud.”
“Zscaler allows… companies in the world to move away from
premises-based to cloud solutions.”
Cloud security appears poised see material uptake going
forward. Web gateways, vulnerability management, identity
management, and antivirus are prime targets.”
“Zscaler is considered the most visionary vendor.”
“A number of high profile cyber security vendors such as
Zscaler… are expected to go public near term.”
Some Of The 5,000+ Organizations
That Have Adopted
LAWSON
TECHNOLOGY
Up-level / extra layer
of security in the cloud
Hardware consolidation,
elimination & avoidance
Protection against
Advanced Persistent Threats
Guest Wifi
security and GRC
Mobile & BYOD
security and compliance
Cloud application
control, visibility & experience
Deploy cloud-enabled
networks
Delivers Unprecedented Scale
12+ million users, 5,000+ organizations, across 185+ countries
LAWSON
TECHNOLOGY
Some Of The 5,000+ Organizations
That Have Adopted
LAWSON
TECHNOLOGY
Strategic Partners Enhance The Value
Proposition
LAWSON
TECHNOLOGY
Exclusive Security as a Service platform provider
Jointly developed out
of the box integration
First to receive vulnerabilities
and implement fixes
SIEM, MDM and Identity
management integration
Located in 100+ global data centers
LAWSON
TECHNOLOGY
100% reliability, complete redundancy, massive bandwidth
Automatic connection to closest node, policy follows the user
24x7x365 follow the sun operations
/
LAWSON
TECHNOLOGY
THE SOLUTION
/
Is Foundational for Cloud-Enabled
Networking
LAWSON
TECHNOLOGY
Provision a commodity Internet
connection at each of your locations
All Internet-bound traffic routes through
Zscaler local policy enforcement points
and then on to the Internet
All data-center and internal bound traffic
routes across your existing WAN
Eliminates the need to backhaul
Internet traffic through a limited number
of secure Internet Gateways
Massive cost savings by reducing MPLS /
WAN bandwidth usage
Greatly improved WAN performance
Greatly improved Internet experience for users
For some firms, more than pays for entire Zscaler
subscription
Is Profoundly Better For Today's World:
Multiple Stacks of Appliances vs Security as a
Service (SaaS)
LAWSON
TECHNOLOGY
Better security, compliance and productivity
Four to ten times more cost effective – pennies per
user per day
Vastly better performance, reliability, superior user
experience
OR
Multiple appliances
at every Internet gateway
One global, unified
cloud platform
Security as a Service (SaaS) Makes
Endusers, IT and Senior Management Happy
LAWSON
TECHNOLOGY
Improved employee productivity and satisfaction
IT can focus on more strategic, value added activities
Avoid audit risk, remediation and reputation damage
Better security with easier
administration and lower cost of
ownership
Headaches of managing stacks of
appliances go away
Internet and Intranet performance
vastly improves for users
IT can safely enable access to Web 2.0 –
making users even happier
CEO and CFO gain visibility into cloud
usage, easing GRC and audit
Testing and deployment is fast and easy – get
started in days, global roll out in weeks
LAWSON
TECHNOLOGY
Improved employee productivity and satisfaction
IT can focus on more strategic, value added activities
Avoid audit risk, remediation and reputation damage
Simple managed configuration – no software or
hardware required on device
– Routers / firewalls
• Configure GRE tunnel or VPN to Zscaler
– Guest WiFi
• Secure DNS
– Mobile laptops
• Secure DNS, PAC file or agent
– Tablets and smart phones
• Apple – Built into iOS 7 or agent
• Android – Built into Samsung KNOX or agent
Easy to test with individual devices, workgroups or
offices
: Network & Internet Security
everywhere --- Delivered Via Cloud Computing
LAWSON
TECHNOLOGY
Is Comprehensive, Unified
Cloud Security And Compliance Platform
LAWSON
TECHNOLOGY
Cloud Security Is Better Security
LAWSON
TECHNOLOGY
How it works: Connect to the Internet through
global Zscaler policy enforcement points
LAWSON
TECHNOLOGY
Is Always In-Line And Real-time
LAWSON
TECHNOLOGY
Better security and compliance
Avoids overloading the security operation center
Does not allow infections to happen in the first place
Missed Alarms and 40 Million
Stolen Credit Card Numbers:
How Target Blew It
Zscaler inspects every byte of traffic in real-time
– Advanced persistent threats / zero-day threats are
additionally processed by our advanced behavioral
analysis engine
By default, all threats and violations are automatically
blocked
– Compare to appliance-based security strategies that
only alert
24
Decrypts and Inspects SSL Traffic
LAWSON
TECHNOLOGY
Complete visibility into all traffic – no blind spots
Granular controls to ensure appropriate employee privacy
25
SSL traffic on
enterprise networks
is growing rapidly &
creating security
blind spots
SSL traffic is becoming pervasive, but most
organizations are blind to it
– 35% percent of Internet traffic is now encrypted with
SSL, growing to more than 50% in 2015
The most sophisticated threats are using SSL
– 16% of all traffic blocked uses SSL
– 54% of advanced persistent threats use SSL
Zscaler automatically decrypts and inspects SSL
traffic, in real-time
– Flexible, granular policies for what to inspect vs. pass
– Zscaler can host your certificates
Uniquely Features Globally Unified
Administration, Policy Management and
Reporting
LAWSON
TECHNOLOGY
Comprehensive global visibility
Eliminates gaps and configuration mistakes
Greatly reduced cost of administration
26
Centralized administration
– Single console can manage all
applications and all locations
Unified policy management
– User, role, department,
company
and location-based
– Set once, enforce everywhere
– Directory service integration
Unified global logging and
reporting
– Near real-time reporting &
analysis
– Regional log storage
– Built-in SIEM integration

Streamline and Secure Your Network and Users

  • 1.
    Streamline & Secure YourNetwork & Users with next generation cloud-enabled solution LAWSON TECHNOLOGY FREDERIK LAWSON © 2015, Indonesia
  • 2.
    ISSUE #1 Broader, Deeperand More Sophisticated Than Ever Before a LAWSON TECHNOLOGY Chart: Threats blocked for typical Zscaler client, August 2014 Detail: 5 million threats blocked 65 million policy violations Out of 1+ billion total transactions Attacks span multiple vectors – only security platforms can see this
  • 3.
    ISSUE #2 Appliance SolutionIs Complex, Expensive and Slow a LAWSON TECHNOLOGY “We [spent] at least 4 days each month just on malware remediation and hours on maintenance of appliances.” – BIG 4 ACCOUNTING FIRM Data Loss Prevention Zero Day Advanced Persistent Threat Intrusion Prevention Systems Anti-Virus URL Filtering Caching Proxies Rate Limiting
  • 4.
    ISSUE #2 Appliance SolutionIs Complex, Expensive and Slow a LAWSON TECHNOLOGY Data Loss Prevention Zero Day Advanced Persistent Threat Intrusion Prevention Systems Anti-Virus URL Filtering Caching Proxies Rate LimitingHOW MANY UNITS do you use to connect, to secure and to control your data/info, users and the network? HOW MUCH TIME do you spend managing them ? HOW do you protect your mobile users ? HOW do you set up a common policy across all of them ? HOW MUCH do you spend for investing and maintaining the appliances ?
  • 5.
    ISSUE #2 Appliance SolutionIs Complex, Expensive and Slow a LAWSON TECHNOLOGY BlueCoat Internet Expensive to purchase and to operate Complexity introduces security gaps Slows Internet performance, fails open under load Often bypassed by mobile devices Source: Global 1000 network security diagram, August 2014
  • 6.
    ISSUE #3 Your UsersAre The Primary Attack Vector a LAWSON TECHNOLOGY The concept of the Corporate Perimeter is rapidly disappearing. Nowadays, users are not only sitting in the office, also carry mobile devices that are always on and almost always connected to the Internet. APPLIANCE SOLUTION can not protect your users while they are outside your company Data: Locations of users on Zscaler’s network, average day, August 2014 the bad guys know this, your users are becoming the primary attack vector the bad guys know this, your users are becoming the primary attack vector
  • 7.
    ISSUE #4 The ICTLandscape Has Dramatically Shifted a LAWSON TECHNOLOGY everyone is on the road and CONNECTED EVERYWHERE
  • 8.
    fastest growing and top-ratedby analyst industry-leading client satisfaction industry-leading client satisfaction used in 185+ countries 12M+ users 12B+ transactions/day used in 185+ countries 12M+ users 12B+ transactions/day zscaler is a carrier-grade Security-as-a-Service platform zscaler is a carrier-grade Security-as-a-Service platform Introducing Revolutioning IP / Internet Security NICHE PLAYERS VISIONARIES LEADERSCHALLENGERS fastest growing and top-rated by analyst LAWSON TECHNOLOGY
  • 9.
    Is Winning Recognition &Awards Everywhere LAWSON TECHNOLOGY “Security’s cloud revolution is upon us.” “Zscaler… is experiencing remarkable growth with its global security cloud.” “Zscaler allows… companies in the world to move away from premises-based to cloud solutions.” Cloud security appears poised see material uptake going forward. Web gateways, vulnerability management, identity management, and antivirus are prime targets.” “Zscaler is considered the most visionary vendor.” “A number of high profile cyber security vendors such as Zscaler… are expected to go public near term.”
  • 10.
    Some Of The5,000+ Organizations That Have Adopted LAWSON TECHNOLOGY Up-level / extra layer of security in the cloud Hardware consolidation, elimination & avoidance Protection against Advanced Persistent Threats Guest Wifi security and GRC Mobile & BYOD security and compliance Cloud application control, visibility & experience Deploy cloud-enabled networks
  • 11.
    Delivers Unprecedented Scale 12+million users, 5,000+ organizations, across 185+ countries LAWSON TECHNOLOGY
  • 12.
    Some Of The5,000+ Organizations That Have Adopted LAWSON TECHNOLOGY
  • 13.
    Strategic Partners EnhanceThe Value Proposition LAWSON TECHNOLOGY Exclusive Security as a Service platform provider Jointly developed out of the box integration First to receive vulnerabilities and implement fixes SIEM, MDM and Identity management integration
  • 14.
    Located in 100+global data centers LAWSON TECHNOLOGY 100% reliability, complete redundancy, massive bandwidth Automatic connection to closest node, policy follows the user 24x7x365 follow the sun operations
  • 15.
  • 16.
    / Is Foundational forCloud-Enabled Networking LAWSON TECHNOLOGY Provision a commodity Internet connection at each of your locations All Internet-bound traffic routes through Zscaler local policy enforcement points and then on to the Internet All data-center and internal bound traffic routes across your existing WAN Eliminates the need to backhaul Internet traffic through a limited number of secure Internet Gateways Massive cost savings by reducing MPLS / WAN bandwidth usage Greatly improved WAN performance Greatly improved Internet experience for users For some firms, more than pays for entire Zscaler subscription
  • 17.
    Is Profoundly BetterFor Today's World: Multiple Stacks of Appliances vs Security as a Service (SaaS) LAWSON TECHNOLOGY Better security, compliance and productivity Four to ten times more cost effective – pennies per user per day Vastly better performance, reliability, superior user experience OR Multiple appliances at every Internet gateway One global, unified cloud platform
  • 18.
    Security as aService (SaaS) Makes Endusers, IT and Senior Management Happy LAWSON TECHNOLOGY Improved employee productivity and satisfaction IT can focus on more strategic, value added activities Avoid audit risk, remediation and reputation damage Better security with easier administration and lower cost of ownership Headaches of managing stacks of appliances go away Internet and Intranet performance vastly improves for users IT can safely enable access to Web 2.0 – making users even happier CEO and CFO gain visibility into cloud usage, easing GRC and audit
  • 19.
    Testing and deploymentis fast and easy – get started in days, global roll out in weeks LAWSON TECHNOLOGY Improved employee productivity and satisfaction IT can focus on more strategic, value added activities Avoid audit risk, remediation and reputation damage Simple managed configuration – no software or hardware required on device – Routers / firewalls • Configure GRE tunnel or VPN to Zscaler – Guest WiFi • Secure DNS – Mobile laptops • Secure DNS, PAC file or agent – Tablets and smart phones • Apple – Built into iOS 7 or agent • Android – Built into Samsung KNOX or agent Easy to test with individual devices, workgroups or offices
  • 20.
    : Network &Internet Security everywhere --- Delivered Via Cloud Computing LAWSON TECHNOLOGY
  • 21.
    Is Comprehensive, Unified CloudSecurity And Compliance Platform LAWSON TECHNOLOGY
  • 22.
    Cloud Security IsBetter Security LAWSON TECHNOLOGY
  • 23.
    How it works:Connect to the Internet through global Zscaler policy enforcement points LAWSON TECHNOLOGY
  • 24.
    Is Always In-LineAnd Real-time LAWSON TECHNOLOGY Better security and compliance Avoids overloading the security operation center Does not allow infections to happen in the first place Missed Alarms and 40 Million Stolen Credit Card Numbers: How Target Blew It Zscaler inspects every byte of traffic in real-time – Advanced persistent threats / zero-day threats are additionally processed by our advanced behavioral analysis engine By default, all threats and violations are automatically blocked – Compare to appliance-based security strategies that only alert 24
  • 25.
    Decrypts and InspectsSSL Traffic LAWSON TECHNOLOGY Complete visibility into all traffic – no blind spots Granular controls to ensure appropriate employee privacy 25 SSL traffic on enterprise networks is growing rapidly & creating security blind spots SSL traffic is becoming pervasive, but most organizations are blind to it – 35% percent of Internet traffic is now encrypted with SSL, growing to more than 50% in 2015 The most sophisticated threats are using SSL – 16% of all traffic blocked uses SSL – 54% of advanced persistent threats use SSL Zscaler automatically decrypts and inspects SSL traffic, in real-time – Flexible, granular policies for what to inspect vs. pass – Zscaler can host your certificates
  • 26.
    Uniquely Features GloballyUnified Administration, Policy Management and Reporting LAWSON TECHNOLOGY Comprehensive global visibility Eliminates gaps and configuration mistakes Greatly reduced cost of administration 26 Centralized administration – Single console can manage all applications and all locations Unified policy management – User, role, department, company and location-based – Set once, enforce everywhere – Directory service integration Unified global logging and reporting – Near real-time reporting & analysis – Regional log storage – Built-in SIEM integration