SlideShare a Scribd company logo
1 of 34
1 ©2018 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION
Transform your branch and security
architecture for the cloud
The secure, direct-to-internet branch
Zeus Kerravala | Principal Analyst | ZK Research
Bill Lapp | Vice President of Customer Success | Zscaler
2
To ask a question
• Type your questions into the chat box in the
Webex panel or email us at
communications@zscaler.com
• We’ll try to get to all questions during the Q&A
session. If we do not get to your question, we’ll
make sure to follow up afterwards
• At the end of the webcast – please let us know
how we did!
©2018 Zscaler, Inc. All rights reserved.
Ask your question here…
© 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING
About ZK Research
Founded by 30+ year veteran industry analyst
Zeus Kerravala
Exclusive focus on network and
communications technology that are in market
transitions
Background on Kerravala
•10+ years as a Yankee Group Analyst
•15+ years in corporate IT and consulting
•Holds many technical certifications
•Regular contributor on Network World,
NoJitter, Tech Target, CSO Online and more
3
© 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING
The Digital Era Has Arrived
• Agility is everything in the
digital era
• Businesses need to adapt to
market shifts faster than the
competition
• Digital building blocks are
network centric
• DX has raised the value of the
network
4
© 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING
Digital Is Happening…
5
84%
13% 3%
Does your organization have a
digital transformation
initiative underway?
Yes
No
Unsure
... But uncertainty remains
• 51% of CxOs do not
know what their
industry will look like in
2020
• 48% fear their company
could be obsolete within
5 years
• 71% of businesses have
seen new competitors
emerge in past 5 years
© 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING
IT Needs A New Operating Model
• Legacy IT is manually intensive
• A digital business requires an agile,
modernized infrastructure
• DevOps and agile development require IT to
move with speed
• Migrating to a cloud architecture is requisite
for the shift to digital
• The cloud is a core digital enabler
6
IT Needs A New Operating Model
© 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING
Public Clouds Are Rising
• Cloud will grow at
18% CAGR from ’15-
’21
• Rest of IT ~ 3%
• 80% of Global 2000
has at least 20% of
IT running in the
cloud today
• Workloads in
clouds will outpace
legacy workloads
by 2019
36.9 46
55.3
67.7 75.8
86.5
97.2
10.5
13.6
15.9
18.6
22.1
26.9
31.2
10.1
12
14.9
17.6
19.9
22.5
26.4
0
20
40
60
80
100
120
140
160
180
2015 2016 2017 2018 2019 2020 2021
SaaS PaaS IaaS
The cloud is the right compute model for the digital era
© 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING
The Challenges With Legacy Networks
• Designed for client server and best
effort traffic
• Not optimized for cloud first
businesses
• Security was placed at a single point
• Internet traffic is backhauled across
the WAN – twice!
• Inefficient use of bandwidth and
poor performance 8
© 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING
WAN Modernization Is Mandatory
• Businesses have spent billions
increasing the level of app and
compute agility
• A lack of network agility is holding
organizations back
• SDNs have modernized data center
networks
• WANs need to be modernized
9
© 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING
Introducing SD-WANs
• Separation of control and data
plane puts innovation in SW
• “Active-active” architectures
• Cloud optimized
• Makes direct to cloud access from
branches possible
• High resiliency
• Optimizes application
performance
10
© 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING
Poll question 1:
• What is the status of SD-WAN within your
organization?
• No interest
• Currently researching
• Partially deployed
• Fully deployed
11
© 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING
Security Challenges With SD-WAN
• Perimeter security is no longer
sufficient
• ACLs are complex and time
consuming to set up
• Perimeter is continually changing
• Local Interent breakout creates new
security risks
• VPNs are spotty and frustrates users
12
© 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING
The Complexity Of Today’s WANs
13
WANs were orderly
but inflexible
WANs are agile but
chaotic
© 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING
Poll question 2:
• What best describes your opinion of local Internet
breakout in branch offices?
• No interest in it
• We like the idea but securing it is too complex
• We like the idea and are planning to deploy it
• We are currently using local internet breakout but struggle
with the security
• We are currently using local internet breakout and have
the security problem under control
14
© 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING
A Better Solution: Secure Cloud Access
15
Secure cloud
access provider
Home office
Branch office
Other workers
Other cloud
© 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING
Understanding Secure Cloud Access
• Users connect to a secure cloud access
provider
• Cloud provider has secure connections to
cloud services
• Apps are segmented without having to
implement network segmentation
• Internet can be used for transport without the
security risks
• Users only access what they are permitted to
by business policy
16
© 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING
Benefits Of Secure Cloud Access
• Faster, higher quality experience for users
• Reduced attack surface
• Granular application access control
• Easier to manage than ACLs and VLANs
• Improved performance
• Obviates the needs for VPNs
• Increased visibility into apps and activity
17
© 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING
What To Look For In A Solution Provider
• Global visibility for users and apps
• Secure, private access
• Integrated security
• Single pane of glass
• Micro-segmentation capabilities
• Health monitoring
• Customer provided keys
18
© 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING
Summary
• Digital transformation is changing the business
landscape faster than ever
• The cloud is a key enabler of digital transformation
• Cloud drives significantly different traffic patterns
than client server computing
• SD-WANs can transform the WANs
• A different security model is needed today
• Secure cloud access is the answer
19
©2018 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION20
©2018 Zscaler, Inc. All rights reserved. Zscaler™, SHIFT™, Direct-to-Cloud™ and ZPA™ are trademarks or registered trademarks of Zscaler, Inc.
in the United States and/or other countries. All other trademarks are the property of their respective owners.
A Transformation Journey
Powered by Zscaler
©2018 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION21
Zscaler enables secure IT transformation to the cloud
Internet and VPN Gateway
Ext. FW / IPS
URL Filtering
Antivirus
DLP
SSL
Sandbox
Global LB
DDoS
Ext FW/IPS
RAS (VPN)
Internal FW
Internal LB
SaaSOpen Internet
External
APPS
Data CenterIaaS
Internal
Internal (cloud or data center)
Connect a user to an authorized
private app (not network)
Fast and secure policy-based access to apps and services over the Internet
Any device, any location, on-net or off-net
External (open Internet or SaaS)
Nothing bad comes in,
nothing good leaks out
Zscaler
Internet Access
Zscaler
Private Access
HQMOBILE
BRANCHIOT
©2018 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION22
The Complex Infrastructure of a Large Global Organization
Open internet
MPLS
MPLS MPLS
MPLS
• 9 Data Centers
• 8 internet egress points
managed by 6 different teams
• 8 email systems managed by 6
different teams
900 locations across
22 countries
10,000 Users
3,000 Remote Users on
5 VPN solutions
17 MPLS providers with
various configurations
Unreliable | Difficult to Manage | Lack of Visibility
Poor End-User Experience | Significant CAPEX and OPEX
Fail-Over
EMEA DC
Fail-Over
NA DC
©2018 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION23
Cloud Transformation Journey – Phase 1
Four initiatives – 9 months
1. WAN vendor consolidation
2. SD WAN at 870 branches
3. Embrace Office 365 and phase-
out local email servers
4. Local internet breakouts with
appliances
30 Country &
Regional HQs
870 Branch
Locations
MPLS
WAN Vendor
9 Data Centers
Open Internet
IPSEC-to-MPLS architecture
(No MPLS at braches)
Branch office users were still complaining their internet experience was poor.
MPLS
WAN Vendor
SaaS
Benefits
• Cost savings
• Better internet experience at
country and regional HQs
• Simplified IT by standardizing
email/SharePoint and
reducing MPLS vendors from
17 to 1
1
4
MPLS
WAN Vendor
2
3
©2018 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION24
Cloud Transformation Journey – Phase 2
One initiative – 9 months
1. Implement local internet
breakouts in all branches
30 Country &
Regional HQs
870 Branch
Locations
9 Data Centers
MPLS
WAN Vendor
Open Internet
Option 1: Deploy branch
firewalls in 870 locations.
Option 2: Implement Zscaler
Cloud Security Platform.
XX
Office 365 required more than just traditional proxy ports.
Visibility provided by Zscaler led to courageous conversations on OSI Models Layers 8,9,10.
SaaS
Benefits
• Reduction in branch user internet
complaints (less pushback)
• Avoided the cost and overhead of
deploying 870 security appliances
• 60% reduction in Data Center
bandwidth requirements
• Enhanced Security Posture – SSL
inspection, cloud sandbox, DLP,
and SIEM integration
©2018 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION25
Cloud Transformation Journey – Phase 3
Three initiatives
1. Implement Zscaler Cloud Firewall
and Bandwidth Control for O365
2. Reduce security appliance
requirements at country /
regional HQs
3. Protect mobile users
30 Country &
Regional HQs
870 Branch
Locations
9 Data Centers
MPLS
WAN Vendor
Open Internet
Delivered a consistent end-user experience to IaaS and SaaS applications at all branch and HQ locations,
but the mobile user was still struggling
SaaS
Benefits
• Eliminated security appliances in
country & regional HQs
• Better Office 365 user
experiences in all locations
• Reduced risk by providing
identical security controls to
mobile workers
©2018 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION26
9 Data Centers
MPLS
WAN Vendor
Open Internet
SaaS IaaS
5 Data Centers
Cloud Transformation Journey – Phase 4
Three initiatives – 12 months
1. Migrate apps to IaaS – re-
platform critical apps to be
browser accessible
2. Deploy virtual NGFWs and load
balancers to eliminate traffic
tromboning
3. Consolidate data centers
30 Country &
Regional HQs
870 Branch
Locations
VM
Virtual NGFWs and load balancers were expensive, didn’t scale, and micro-segmentation challenges.
User confusion on when to use VPN and when they could use a browser.
Benefits
• Reduced data center costs
• Reference Architecture to provide
users better access re-platformed
apps (No VPN)
©2018 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION27
MPLS
WAN Vendor
Open Internet
SaaS
5 Data Centers
IaaS
VM
Cloud Transformation Journey – Phase 5
Two initiatives – 6 months
1. Seamless End-User Experience -
Implement Zscaler Private Access
2. Reference Architecture for a
Zero-Trust Network Model
30 Country &
Regional HQs
870 Branch
Locations
Future-proof app delivery strategy with positive end-user experience.
Benefits
• Simplified access to all
applications
• Eliminated the cost and
complexity of virtual firewalls
and load balancers in IaaS
• Enhanced security posture – app
microsegmentation, reduced
inbound attack surface,
enablement of zero-trust
network model
©2018 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION28
Transformation Journey – Summary
Cost Savings
8% of Overall IT Spend
(Optimized Network/Security Arch, DC
Consolidation, O365, etc.)
Cost Avoidance
$2.7M in appliance sprawl
Network transformation – SDWAN at 870 locations and deployment of 30 local breakouts with appliances
Network transformation – ZIA deployed to support local internet breakouts in 870 branch offices
Global collaboration tools – Successfully deployed Office 365 with Cloud FW and Bandwidth Control
Data center transformation – Moved apps to Azure/AWS and consolidated data centers
Application access transformation –Eliminated VPN, zero-trust network model, positive end-user experience
1
2
3
4
5
Benefits
Agile IT environment
Consistent end-user experience
Reduced business risk
©2018 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION29
Zscaler: The market leader in cloud security
Most Discerning Enterprise Customers
2,700 CUSTOMERS
Over 80 of the Fortune 500
54% International
Global Partners
100
Data centers
35B
Daily requests
185
Countries served
Largest Cloud Security Platform in the World
Mature Global Cloud Operations
Experienced Team with Pioneers in Cloud Security
Unparalleled Cloud Scale
©2018 Zscaler, Inc. All rights reserved.30
Let Zscaler empower your next IT project
Corporate deployment
of Office 365
Securing
SD-WAN transformation
VPN Replacement or
Securing App Access in AWS or Azure
Enhancing Security or
Replacing Traditional Proxies
Next Steps
Technical Workshop Proof of Concept Executive Briefing in San Jose, CA
©2018 Zscaler, Inc. All rights reserved.
June 25-27, 2018
The Cosmopolitan, Las Vegas
Register today at
zenithlive.zscaler.com
Join the conversation at
community.zscaler.com
©2018 Zscaler, Inc. All rights reserved.
Visit zscaler.com/transform to learn more
Thank You!
Questions and Next Steps
Zeus Kerravala
Principal Analyst,
ZK Research
zeus@zkresearch.com
Twitter @zkerravala
Bill Lapp
Vice President,
Customer Success, Zscaler
blapp@zscaler.com
Twitter @robilium
©2018 Zscaler, Inc. All rights reserved.
June 25-27, 2018
The Cosmopolitan, Las Vegas
Register today at
zenithlive.zscaler.com
Join the conversation at
community.zscaler.com
©2018 Zscaler, Inc. All rights reserved.
©2018 Zscaler, Inc. All rights reserved. Zscaler™, SHIFT™, Direct-to-Cloud™ and ZPA™ are trademarks or registered trademarks of Zscaler, Inc.
in the United States and/or other countries. All other trademarks are the property of their respective owners.

More Related Content

What's hot

What is SASE and How Can Partners Talk About it?
What is SASE and How Can Partners Talk About it?What is SASE and How Can Partners Talk About it?
What is SASE and How Can Partners Talk About it?QOS Networks
 
Zero trust in a hybrid architecture
Zero trust in a hybrid architectureZero trust in a hybrid architecture
Zero trust in a hybrid architectureHybrid IT Europe
 
SD-WAN plus cloud security
SD-WAN plus cloud securitySD-WAN plus cloud security
SD-WAN plus cloud securityZscaler
 
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!Netskope
 
Cloud vs. On-Premises Security: Can you afford not to switch?
Cloud vs. On-Premises Security:  Can you afford not to switch?Cloud vs. On-Premises Security:  Can you afford not to switch?
Cloud vs. On-Premises Security: Can you afford not to switch?Zscaler
 
Cisco Meraki Portfolio Guide
Cisco Meraki Portfolio GuideCisco Meraki Portfolio Guide
Cisco Meraki Portfolio GuideMaticmind
 
Aryaka Bringing SASE to Life with a Zero Trust WAN.pdf
Aryaka Bringing SASE to Life with a Zero Trust WAN.pdfAryaka Bringing SASE to Life with a Zero Trust WAN.pdf
Aryaka Bringing SASE to Life with a Zero Trust WAN.pdfKlausSchwegler
 
CCSA Treinamento_CheckPoint.pptx
CCSA Treinamento_CheckPoint.pptxCCSA Treinamento_CheckPoint.pptx
CCSA Treinamento_CheckPoint.pptxEBERTE
 
SD-WAN 2.0: Building a Better SD-WAN
SD-WAN 2.0: Building a Better SD-WANSD-WAN 2.0: Building a Better SD-WAN
SD-WAN 2.0: Building a Better SD-WANADVA
 
SASE Future Proof sdwan 20 Sep2020 v2.1 BA
SASE Future Proof sdwan 20 Sep2020 v2.1 BASASE Future Proof sdwan 20 Sep2020 v2.1 BA
SASE Future Proof sdwan 20 Sep2020 v2.1 BAbourhan88100
 
Software-Defined WAN: A Real World Success Story
Software-Defined WAN: A Real World Success StorySoftware-Defined WAN: A Real World Success Story
Software-Defined WAN: A Real World Success StoryCisco Enterprise Networks
 
Zero Trust Enterprise Network at Adobe
Zero Trust Enterprise Network at AdobeZero Trust Enterprise Network at Adobe
Zero Trust Enterprise Network at AdobeVishwas Manral
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoPrime Infoserv
 
Understanding Cisco’ Next Generation SD-WAN Technology
Understanding Cisco’ Next Generation SD-WAN TechnologyUnderstanding Cisco’ Next Generation SD-WAN Technology
Understanding Cisco’ Next Generation SD-WAN TechnologyCisco Canada
 
security-reference-architecture.pdf
security-reference-architecture.pdfsecurity-reference-architecture.pdf
security-reference-architecture.pdfJoniGarcia9
 
Transform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanTransform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanDATA SECURITY SOLUTIONS
 

What's hot (20)

What is SASE and How Can Partners Talk About it?
What is SASE and How Can Partners Talk About it?What is SASE and How Can Partners Talk About it?
What is SASE and How Can Partners Talk About it?
 
Zero trust in a hybrid architecture
Zero trust in a hybrid architectureZero trust in a hybrid architecture
Zero trust in a hybrid architecture
 
SD-WAN plus cloud security
SD-WAN plus cloud securitySD-WAN plus cloud security
SD-WAN plus cloud security
 
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
 
Cloud vs. On-Premises Security: Can you afford not to switch?
Cloud vs. On-Premises Security:  Can you afford not to switch?Cloud vs. On-Premises Security:  Can you afford not to switch?
Cloud vs. On-Premises Security: Can you afford not to switch?
 
Zero trust deck 2020
Zero trust deck 2020Zero trust deck 2020
Zero trust deck 2020
 
Cisco Meraki Portfolio Guide
Cisco Meraki Portfolio GuideCisco Meraki Portfolio Guide
Cisco Meraki Portfolio Guide
 
Aryaka Bringing SASE to Life with a Zero Trust WAN.pdf
Aryaka Bringing SASE to Life with a Zero Trust WAN.pdfAryaka Bringing SASE to Life with a Zero Trust WAN.pdf
Aryaka Bringing SASE to Life with a Zero Trust WAN.pdf
 
Understanding SASE
Understanding SASE Understanding SASE
Understanding SASE
 
CCSA Treinamento_CheckPoint.pptx
CCSA Treinamento_CheckPoint.pptxCCSA Treinamento_CheckPoint.pptx
CCSA Treinamento_CheckPoint.pptx
 
SD-WAN
SD-WANSD-WAN
SD-WAN
 
SD-WAN 2.0: Building a Better SD-WAN
SD-WAN 2.0: Building a Better SD-WANSD-WAN 2.0: Building a Better SD-WAN
SD-WAN 2.0: Building a Better SD-WAN
 
SASE Future Proof sdwan 20 Sep2020 v2.1 BA
SASE Future Proof sdwan 20 Sep2020 v2.1 BASASE Future Proof sdwan 20 Sep2020 v2.1 BA
SASE Future Proof sdwan 20 Sep2020 v2.1 BA
 
Software-Defined WAN: A Real World Success Story
Software-Defined WAN: A Real World Success StorySoftware-Defined WAN: A Real World Success Story
Software-Defined WAN: A Real World Success Story
 
Zero Trust Enterprise Network at Adobe
Zero Trust Enterprise Network at AdobeZero Trust Enterprise Network at Adobe
Zero Trust Enterprise Network at Adobe
 
Network Access Control (NAC)
Network Access Control (NAC)Network Access Control (NAC)
Network Access Control (NAC)
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAlto
 
Understanding Cisco’ Next Generation SD-WAN Technology
Understanding Cisco’ Next Generation SD-WAN TechnologyUnderstanding Cisco’ Next Generation SD-WAN Technology
Understanding Cisco’ Next Generation SD-WAN Technology
 
security-reference-architecture.pdf
security-reference-architecture.pdfsecurity-reference-architecture.pdf
security-reference-architecture.pdf
 
Transform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanTransform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wan
 

Similar to The secure, direct to-internet branch

Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraZscaler
 
PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...
PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...
PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...PROIDEA
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraZscaler
 
How Cloud Providers are Playing with Traditional Data Center
How Cloud Providers are Playing with Traditional Data CenterHow Cloud Providers are Playing with Traditional Data Center
How Cloud Providers are Playing with Traditional Data CenterHostway|HOSTING
 
Making Money in the Cloud
Making Money in the CloudMaking Money in the Cloud
Making Money in the CloudGravitant, Inc.
 
Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyesThousandEyes
 
Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyesThousandEyes
 
06_08_emea_how_to_evaluate_rollout_and_operationalize_your_sdwan_projects_web...
06_08_emea_how_to_evaluate_rollout_and_operationalize_your_sdwan_projects_web...06_08_emea_how_to_evaluate_rollout_and_operationalize_your_sdwan_projects_web...
06_08_emea_how_to_evaluate_rollout_and_operationalize_your_sdwan_projects_web...ThousandEyes
 
Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudOvercoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudZscaler
 
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?SaraPia5
 
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocence
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocenceCisco Connect Ottawa 2018 dna assurance shortest path to network innocence
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocenceCisco Canada
 
Migrating to Cloud Native Solutions
Migrating to Cloud Native SolutionsMigrating to Cloud Native Solutions
Migrating to Cloud Native Solutionsinwin stack
 
Cloud Best Practices
Cloud Best PracticesCloud Best Practices
Cloud Best Practicesenzoriv
 
The evolving CIO|CISO relationship
The evolving CIO|CISO relationship  The evolving CIO|CISO relationship
The evolving CIO|CISO relationship Zscaler
 
Risc and velostrata 2 28 2018 lessons_in_cloud_migration
Risc and velostrata  2 28 2018 lessons_in_cloud_migrationRisc and velostrata  2 28 2018 lessons_in_cloud_migration
Risc and velostrata 2 28 2018 lessons_in_cloud_migrationRISC Networks
 
The greatest SDWAN sales slidedeck ever created
The greatest SDWAN sales slidedeck ever createdThe greatest SDWAN sales slidedeck ever created
The greatest SDWAN sales slidedeck ever createdRonald Bartels
 
Journey to the Cloud
Journey to the CloudJourney to the Cloud
Journey to the CloudPete Nieminen
 
Leveraging Cloudstack and Apiculus to Launch and Operate a Profitable Public ...
Leveraging Cloudstack and Apiculus to Launch and Operate a Profitable Public ...Leveraging Cloudstack and Apiculus to Launch and Operate a Profitable Public ...
Leveraging Cloudstack and Apiculus to Launch and Operate a Profitable Public ...ShapeBlue
 
How to Evaluate, Rollout, and Operationalize Your SD-WAN Projects
How to Evaluate, Rollout, and Operationalize Your SD-WAN ProjectsHow to Evaluate, Rollout, and Operationalize Your SD-WAN Projects
How to Evaluate, Rollout, and Operationalize Your SD-WAN ProjectsThousandEyes
 
How sdp delivers_zero_trust
How sdp delivers_zero_trustHow sdp delivers_zero_trust
How sdp delivers_zero_trustZscaler
 

Similar to The secure, direct to-internet branch (20)

Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation Era
 
PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...
PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...
PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation Era
 
How Cloud Providers are Playing with Traditional Data Center
How Cloud Providers are Playing with Traditional Data CenterHow Cloud Providers are Playing with Traditional Data Center
How Cloud Providers are Playing with Traditional Data Center
 
Making Money in the Cloud
Making Money in the CloudMaking Money in the Cloud
Making Money in the Cloud
 
Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyes
 
Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyes
 
06_08_emea_how_to_evaluate_rollout_and_operationalize_your_sdwan_projects_web...
06_08_emea_how_to_evaluate_rollout_and_operationalize_your_sdwan_projects_web...06_08_emea_how_to_evaluate_rollout_and_operationalize_your_sdwan_projects_web...
06_08_emea_how_to_evaluate_rollout_and_operationalize_your_sdwan_projects_web...
 
Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudOvercoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the Cloud
 
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
 
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocence
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocenceCisco Connect Ottawa 2018 dna assurance shortest path to network innocence
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocence
 
Migrating to Cloud Native Solutions
Migrating to Cloud Native SolutionsMigrating to Cloud Native Solutions
Migrating to Cloud Native Solutions
 
Cloud Best Practices
Cloud Best PracticesCloud Best Practices
Cloud Best Practices
 
The evolving CIO|CISO relationship
The evolving CIO|CISO relationship  The evolving CIO|CISO relationship
The evolving CIO|CISO relationship
 
Risc and velostrata 2 28 2018 lessons_in_cloud_migration
Risc and velostrata  2 28 2018 lessons_in_cloud_migrationRisc and velostrata  2 28 2018 lessons_in_cloud_migration
Risc and velostrata 2 28 2018 lessons_in_cloud_migration
 
The greatest SDWAN sales slidedeck ever created
The greatest SDWAN sales slidedeck ever createdThe greatest SDWAN sales slidedeck ever created
The greatest SDWAN sales slidedeck ever created
 
Journey to the Cloud
Journey to the CloudJourney to the Cloud
Journey to the Cloud
 
Leveraging Cloudstack and Apiculus to Launch and Operate a Profitable Public ...
Leveraging Cloudstack and Apiculus to Launch and Operate a Profitable Public ...Leveraging Cloudstack and Apiculus to Launch and Operate a Profitable Public ...
Leveraging Cloudstack and Apiculus to Launch and Operate a Profitable Public ...
 
How to Evaluate, Rollout, and Operationalize Your SD-WAN Projects
How to Evaluate, Rollout, and Operationalize Your SD-WAN ProjectsHow to Evaluate, Rollout, and Operationalize Your SD-WAN Projects
How to Evaluate, Rollout, and Operationalize Your SD-WAN Projects
 
How sdp delivers_zero_trust
How sdp delivers_zero_trustHow sdp delivers_zero_trust
How sdp delivers_zero_trust
 

More from Zscaler

Zscaler mondi webinar
Zscaler mondi webinarZscaler mondi webinar
Zscaler mondi webinarZscaler
 
3 reasons-sdp-is-replacing-vpn-in-2019
3 reasons-sdp-is-replacing-vpn-in-20193 reasons-sdp-is-replacing-vpn-in-2019
3 reasons-sdp-is-replacing-vpn-in-2019Zscaler
 
Top 5 predictions webinar
Top 5 predictions webinarTop 5 predictions webinar
Top 5 predictions webinarZscaler
 
Three ways-zero-trust-security-redefines-partner-access-ch
Three ways-zero-trust-security-redefines-partner-access-chThree ways-zero-trust-security-redefines-partner-access-ch
Three ways-zero-trust-security-redefines-partner-access-chZscaler
 
Office 365 kelly services
Office 365 kelly servicesOffice 365 kelly services
Office 365 kelly servicesZscaler
 
Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18Zscaler
 
Get an office 365 expereience your users will love v8.1
Get an office 365 expereience your users will love v8.1Get an office 365 expereience your users will love v8.1
Get an office 365 expereience your users will love v8.1Zscaler
 
Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8Zscaler
 
Schneider electric powers security transformation with one simple app copy
Schneider electric powers security transformation with one simple app   copySchneider electric powers security transformation with one simple app   copy
Schneider electric powers security transformation with one simple app copyZscaler
 
Top 5 mistakes deploying o365
Top 5 mistakes deploying o365Top 5 mistakes deploying o365
Top 5 mistakes deploying o365Zscaler
 
Zenith Live - Security Lab - Phantom
Zenith Live - Security Lab - PhantomZenith Live - Security Lab - Phantom
Zenith Live - Security Lab - PhantomZscaler
 
Moving from appliances to cloud security with phoenix children's hospital
Moving from appliances to cloud security with phoenix children's hospitalMoving from appliances to cloud security with phoenix children's hospital
Moving from appliances to cloud security with phoenix children's hospitalZscaler
 
O365 quick with fast user experience
O365 quick with fast user experienceO365 quick with fast user experience
O365 quick with fast user experienceZscaler
 
Faster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in awsFaster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in awsZscaler
 
Migration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscalerMigration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscalerZscaler
 
Office 365 deployment
Office 365 deploymentOffice 365 deployment
Office 365 deploymentZscaler
 
Dissecting ssl threats
Dissecting ssl threatsDissecting ssl threats
Dissecting ssl threatsZscaler
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Zscaler
 
Top reasons o365 deployments fail
Top reasons o365 deployments failTop reasons o365 deployments fail
Top reasons o365 deployments failZscaler
 
GDPR - are you ready?
GDPR - are you ready?GDPR - are you ready?
GDPR - are you ready?Zscaler
 

More from Zscaler (20)

Zscaler mondi webinar
Zscaler mondi webinarZscaler mondi webinar
Zscaler mondi webinar
 
3 reasons-sdp-is-replacing-vpn-in-2019
3 reasons-sdp-is-replacing-vpn-in-20193 reasons-sdp-is-replacing-vpn-in-2019
3 reasons-sdp-is-replacing-vpn-in-2019
 
Top 5 predictions webinar
Top 5 predictions webinarTop 5 predictions webinar
Top 5 predictions webinar
 
Three ways-zero-trust-security-redefines-partner-access-ch
Three ways-zero-trust-security-redefines-partner-access-chThree ways-zero-trust-security-redefines-partner-access-ch
Three ways-zero-trust-security-redefines-partner-access-ch
 
Office 365 kelly services
Office 365 kelly servicesOffice 365 kelly services
Office 365 kelly services
 
Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18
 
Get an office 365 expereience your users will love v8.1
Get an office 365 expereience your users will love v8.1Get an office 365 expereience your users will love v8.1
Get an office 365 expereience your users will love v8.1
 
Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8
 
Schneider electric powers security transformation with one simple app copy
Schneider electric powers security transformation with one simple app   copySchneider electric powers security transformation with one simple app   copy
Schneider electric powers security transformation with one simple app copy
 
Top 5 mistakes deploying o365
Top 5 mistakes deploying o365Top 5 mistakes deploying o365
Top 5 mistakes deploying o365
 
Zenith Live - Security Lab - Phantom
Zenith Live - Security Lab - PhantomZenith Live - Security Lab - Phantom
Zenith Live - Security Lab - Phantom
 
Moving from appliances to cloud security with phoenix children's hospital
Moving from appliances to cloud security with phoenix children's hospitalMoving from appliances to cloud security with phoenix children's hospital
Moving from appliances to cloud security with phoenix children's hospital
 
O365 quick with fast user experience
O365 quick with fast user experienceO365 quick with fast user experience
O365 quick with fast user experience
 
Faster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in awsFaster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in aws
 
Migration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscalerMigration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscaler
 
Office 365 deployment
Office 365 deploymentOffice 365 deployment
Office 365 deployment
 
Dissecting ssl threats
Dissecting ssl threatsDissecting ssl threats
Dissecting ssl threats
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
 
Top reasons o365 deployments fail
Top reasons o365 deployments failTop reasons o365 deployments fail
Top reasons o365 deployments fail
 
GDPR - are you ready?
GDPR - are you ready?GDPR - are you ready?
GDPR - are you ready?
 

Recently uploaded

Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一3sw2qly1
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Personfurqan222004
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 

Recently uploaded (20)

young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 

The secure, direct to-internet branch

  • 1. 1 ©2018 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION Transform your branch and security architecture for the cloud The secure, direct-to-internet branch Zeus Kerravala | Principal Analyst | ZK Research Bill Lapp | Vice President of Customer Success | Zscaler
  • 2. 2 To ask a question • Type your questions into the chat box in the Webex panel or email us at communications@zscaler.com • We’ll try to get to all questions during the Q&A session. If we do not get to your question, we’ll make sure to follow up afterwards • At the end of the webcast – please let us know how we did! ©2018 Zscaler, Inc. All rights reserved. Ask your question here…
  • 3. © 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING About ZK Research Founded by 30+ year veteran industry analyst Zeus Kerravala Exclusive focus on network and communications technology that are in market transitions Background on Kerravala •10+ years as a Yankee Group Analyst •15+ years in corporate IT and consulting •Holds many technical certifications •Regular contributor on Network World, NoJitter, Tech Target, CSO Online and more 3
  • 4. © 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING The Digital Era Has Arrived • Agility is everything in the digital era • Businesses need to adapt to market shifts faster than the competition • Digital building blocks are network centric • DX has raised the value of the network 4
  • 5. © 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING Digital Is Happening… 5 84% 13% 3% Does your organization have a digital transformation initiative underway? Yes No Unsure ... But uncertainty remains • 51% of CxOs do not know what their industry will look like in 2020 • 48% fear their company could be obsolete within 5 years • 71% of businesses have seen new competitors emerge in past 5 years
  • 6. © 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING IT Needs A New Operating Model • Legacy IT is manually intensive • A digital business requires an agile, modernized infrastructure • DevOps and agile development require IT to move with speed • Migrating to a cloud architecture is requisite for the shift to digital • The cloud is a core digital enabler 6 IT Needs A New Operating Model
  • 7. © 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING Public Clouds Are Rising • Cloud will grow at 18% CAGR from ’15- ’21 • Rest of IT ~ 3% • 80% of Global 2000 has at least 20% of IT running in the cloud today • Workloads in clouds will outpace legacy workloads by 2019 36.9 46 55.3 67.7 75.8 86.5 97.2 10.5 13.6 15.9 18.6 22.1 26.9 31.2 10.1 12 14.9 17.6 19.9 22.5 26.4 0 20 40 60 80 100 120 140 160 180 2015 2016 2017 2018 2019 2020 2021 SaaS PaaS IaaS The cloud is the right compute model for the digital era
  • 8. © 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING The Challenges With Legacy Networks • Designed for client server and best effort traffic • Not optimized for cloud first businesses • Security was placed at a single point • Internet traffic is backhauled across the WAN – twice! • Inefficient use of bandwidth and poor performance 8
  • 9. © 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING WAN Modernization Is Mandatory • Businesses have spent billions increasing the level of app and compute agility • A lack of network agility is holding organizations back • SDNs have modernized data center networks • WANs need to be modernized 9
  • 10. © 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING Introducing SD-WANs • Separation of control and data plane puts innovation in SW • “Active-active” architectures • Cloud optimized • Makes direct to cloud access from branches possible • High resiliency • Optimizes application performance 10
  • 11. © 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING Poll question 1: • What is the status of SD-WAN within your organization? • No interest • Currently researching • Partially deployed • Fully deployed 11
  • 12. © 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING Security Challenges With SD-WAN • Perimeter security is no longer sufficient • ACLs are complex and time consuming to set up • Perimeter is continually changing • Local Interent breakout creates new security risks • VPNs are spotty and frustrates users 12
  • 13. © 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING The Complexity Of Today’s WANs 13 WANs were orderly but inflexible WANs are agile but chaotic
  • 14. © 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING Poll question 2: • What best describes your opinion of local Internet breakout in branch offices? • No interest in it • We like the idea but securing it is too complex • We like the idea and are planning to deploy it • We are currently using local internet breakout but struggle with the security • We are currently using local internet breakout and have the security problem under control 14
  • 15. © 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING A Better Solution: Secure Cloud Access 15 Secure cloud access provider Home office Branch office Other workers Other cloud
  • 16. © 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING Understanding Secure Cloud Access • Users connect to a secure cloud access provider • Cloud provider has secure connections to cloud services • Apps are segmented without having to implement network segmentation • Internet can be used for transport without the security risks • Users only access what they are permitted to by business policy 16
  • 17. © 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING Benefits Of Secure Cloud Access • Faster, higher quality experience for users • Reduced attack surface • Granular application access control • Easier to manage than ACLs and VLANs • Improved performance • Obviates the needs for VPNs • Increased visibility into apps and activity 17
  • 18. © 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING What To Look For In A Solution Provider • Global visibility for users and apps • Secure, private access • Integrated security • Single pane of glass • Micro-segmentation capabilities • Health monitoring • Customer provided keys 18
  • 19. © 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING Summary • Digital transformation is changing the business landscape faster than ever • The cloud is a key enabler of digital transformation • Cloud drives significantly different traffic patterns than client server computing • SD-WANs can transform the WANs • A different security model is needed today • Secure cloud access is the answer 19
  • 20. ©2018 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION20 ©2018 Zscaler, Inc. All rights reserved. Zscaler™, SHIFT™, Direct-to-Cloud™ and ZPA™ are trademarks or registered trademarks of Zscaler, Inc. in the United States and/or other countries. All other trademarks are the property of their respective owners. A Transformation Journey Powered by Zscaler
  • 21. ©2018 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION21 Zscaler enables secure IT transformation to the cloud Internet and VPN Gateway Ext. FW / IPS URL Filtering Antivirus DLP SSL Sandbox Global LB DDoS Ext FW/IPS RAS (VPN) Internal FW Internal LB SaaSOpen Internet External APPS Data CenterIaaS Internal Internal (cloud or data center) Connect a user to an authorized private app (not network) Fast and secure policy-based access to apps and services over the Internet Any device, any location, on-net or off-net External (open Internet or SaaS) Nothing bad comes in, nothing good leaks out Zscaler Internet Access Zscaler Private Access HQMOBILE BRANCHIOT
  • 22. ©2018 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION22 The Complex Infrastructure of a Large Global Organization Open internet MPLS MPLS MPLS MPLS • 9 Data Centers • 8 internet egress points managed by 6 different teams • 8 email systems managed by 6 different teams 900 locations across 22 countries 10,000 Users 3,000 Remote Users on 5 VPN solutions 17 MPLS providers with various configurations Unreliable | Difficult to Manage | Lack of Visibility Poor End-User Experience | Significant CAPEX and OPEX Fail-Over EMEA DC Fail-Over NA DC
  • 23. ©2018 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION23 Cloud Transformation Journey – Phase 1 Four initiatives – 9 months 1. WAN vendor consolidation 2. SD WAN at 870 branches 3. Embrace Office 365 and phase- out local email servers 4. Local internet breakouts with appliances 30 Country & Regional HQs 870 Branch Locations MPLS WAN Vendor 9 Data Centers Open Internet IPSEC-to-MPLS architecture (No MPLS at braches) Branch office users were still complaining their internet experience was poor. MPLS WAN Vendor SaaS Benefits • Cost savings • Better internet experience at country and regional HQs • Simplified IT by standardizing email/SharePoint and reducing MPLS vendors from 17 to 1 1 4 MPLS WAN Vendor 2 3
  • 24. ©2018 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION24 Cloud Transformation Journey – Phase 2 One initiative – 9 months 1. Implement local internet breakouts in all branches 30 Country & Regional HQs 870 Branch Locations 9 Data Centers MPLS WAN Vendor Open Internet Option 1: Deploy branch firewalls in 870 locations. Option 2: Implement Zscaler Cloud Security Platform. XX Office 365 required more than just traditional proxy ports. Visibility provided by Zscaler led to courageous conversations on OSI Models Layers 8,9,10. SaaS Benefits • Reduction in branch user internet complaints (less pushback) • Avoided the cost and overhead of deploying 870 security appliances • 60% reduction in Data Center bandwidth requirements • Enhanced Security Posture – SSL inspection, cloud sandbox, DLP, and SIEM integration
  • 25. ©2018 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION25 Cloud Transformation Journey – Phase 3 Three initiatives 1. Implement Zscaler Cloud Firewall and Bandwidth Control for O365 2. Reduce security appliance requirements at country / regional HQs 3. Protect mobile users 30 Country & Regional HQs 870 Branch Locations 9 Data Centers MPLS WAN Vendor Open Internet Delivered a consistent end-user experience to IaaS and SaaS applications at all branch and HQ locations, but the mobile user was still struggling SaaS Benefits • Eliminated security appliances in country & regional HQs • Better Office 365 user experiences in all locations • Reduced risk by providing identical security controls to mobile workers
  • 26. ©2018 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION26 9 Data Centers MPLS WAN Vendor Open Internet SaaS IaaS 5 Data Centers Cloud Transformation Journey – Phase 4 Three initiatives – 12 months 1. Migrate apps to IaaS – re- platform critical apps to be browser accessible 2. Deploy virtual NGFWs and load balancers to eliminate traffic tromboning 3. Consolidate data centers 30 Country & Regional HQs 870 Branch Locations VM Virtual NGFWs and load balancers were expensive, didn’t scale, and micro-segmentation challenges. User confusion on when to use VPN and when they could use a browser. Benefits • Reduced data center costs • Reference Architecture to provide users better access re-platformed apps (No VPN)
  • 27. ©2018 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION27 MPLS WAN Vendor Open Internet SaaS 5 Data Centers IaaS VM Cloud Transformation Journey – Phase 5 Two initiatives – 6 months 1. Seamless End-User Experience - Implement Zscaler Private Access 2. Reference Architecture for a Zero-Trust Network Model 30 Country & Regional HQs 870 Branch Locations Future-proof app delivery strategy with positive end-user experience. Benefits • Simplified access to all applications • Eliminated the cost and complexity of virtual firewalls and load balancers in IaaS • Enhanced security posture – app microsegmentation, reduced inbound attack surface, enablement of zero-trust network model
  • 28. ©2018 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION28 Transformation Journey – Summary Cost Savings 8% of Overall IT Spend (Optimized Network/Security Arch, DC Consolidation, O365, etc.) Cost Avoidance $2.7M in appliance sprawl Network transformation – SDWAN at 870 locations and deployment of 30 local breakouts with appliances Network transformation – ZIA deployed to support local internet breakouts in 870 branch offices Global collaboration tools – Successfully deployed Office 365 with Cloud FW and Bandwidth Control Data center transformation – Moved apps to Azure/AWS and consolidated data centers Application access transformation –Eliminated VPN, zero-trust network model, positive end-user experience 1 2 3 4 5 Benefits Agile IT environment Consistent end-user experience Reduced business risk
  • 29. ©2018 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION29 Zscaler: The market leader in cloud security Most Discerning Enterprise Customers 2,700 CUSTOMERS Over 80 of the Fortune 500 54% International Global Partners 100 Data centers 35B Daily requests 185 Countries served Largest Cloud Security Platform in the World Mature Global Cloud Operations Experienced Team with Pioneers in Cloud Security Unparalleled Cloud Scale
  • 30. ©2018 Zscaler, Inc. All rights reserved.30 Let Zscaler empower your next IT project Corporate deployment of Office 365 Securing SD-WAN transformation VPN Replacement or Securing App Access in AWS or Azure Enhancing Security or Replacing Traditional Proxies Next Steps Technical Workshop Proof of Concept Executive Briefing in San Jose, CA
  • 31. ©2018 Zscaler, Inc. All rights reserved. June 25-27, 2018 The Cosmopolitan, Las Vegas Register today at zenithlive.zscaler.com Join the conversation at community.zscaler.com
  • 32. ©2018 Zscaler, Inc. All rights reserved. Visit zscaler.com/transform to learn more Thank You! Questions and Next Steps Zeus Kerravala Principal Analyst, ZK Research zeus@zkresearch.com Twitter @zkerravala Bill Lapp Vice President, Customer Success, Zscaler blapp@zscaler.com Twitter @robilium
  • 33. ©2018 Zscaler, Inc. All rights reserved. June 25-27, 2018 The Cosmopolitan, Las Vegas Register today at zenithlive.zscaler.com Join the conversation at community.zscaler.com
  • 34. ©2018 Zscaler, Inc. All rights reserved. ©2018 Zscaler, Inc. All rights reserved. Zscaler™, SHIFT™, Direct-to-Cloud™ and ZPA™ are trademarks or registered trademarks of Zscaler, Inc. in the United States and/or other countries. All other trademarks are the property of their respective owners.