Microsoft Office 365 is unlike any other SaaS application and, even with careful planning, it’s fair to say that deployments don’t always go as planned. Office 365 was designed to be accessed directly via the internet, and most companies just don’t have the proper network setup. It’s no surprise, then, that deploying Office 365 without the right planning and guidance can lead to network problems and a poor user experience.
Ready to deploy Office 365? If you think it’s going to be easy enough, you may want to think again. Microsoft Office 365 was designed to be accessed directly via the internet, and most companies simply don’t have the appropriate network setup. It’s no surprise, then, that deploying Office 365 without proper guidance can delay deployments and cause a terrible user experience
Moving from appliances to cloud security with phoenix children's hospitalZscaler
Applying consistent and robust security controls across your remote workforce hasn’t gotten any easier. The complexity brought about by mobile devices, cloud apps, untrusted networks, and more are compounded by the inspection demands of SSL traffic and the performance limitations of security appliances
This document provides an overview of governance strategies for SharePoint and Office 365. It discusses the importance of governance and outlines key considerations for governance plans, including defining security, handling hybrid environments between on-premises and cloud, and developing policies for information management and applications. The document emphasizes that governance is needed to bring consistency and manage the large amount of data, tools, and users across different systems and environments.
Adopting an SD-WAN solution is the best option that network organizations have to respond to a range of requirements such as lowering cost, increasing availability and providing high quality user experiences. However, network organizations are also under pressure to deliver best-of-breed security and in virtually all instances, adopting an SD-WAN solution results in implementing Direct Internet Access (DIA) which is challenging to secure using security appliances.
Three Key Steps for Moving Your Branches to the CloudZscaler
Is backhauling traffic the most efficient way to route traffic when your workloads move to the cloud? The migration of applications from the data center to the cloud calls for a new approach to networking and security. But, keeping up with application demands and user expectations can be a struggle. Explore the challenges and benefits of establishing secure local breakouts from someone who has done it.
Ready, Set, SD-WAN: Best Practices for Assuring Branch ReadinessThousandEyes
ThousandEyes EMEA webinar run on Tuesday October 29th at 1000 GMT. Presented by Ian Waters, Senior Director of EMEA Marketing and Tim Hale, Senior Solutions Engineer. Covering SD-WAN visibility best practices and featuring a live demo of ThousandEyes monitoring a Cisco Viptela SD-WAN.
Cisco Digital Network Architecture is based on these pillars
1) Service Virtualisation (eNFV and 3th party hosting)
2) Automation/SDN/Policy based networking
3) Analytics
4) Orchestration
5) Hybrid
6) Open and Programmable
7) Physical and Virtual
8) Software Driven
Analytics are key to implement NaaS (Network as a Sensor) and NeeE (Network as Enforcer)
https://masimatteo.wordpress.com/2016/06/21/from-we-must-have-a-network-cheap-to-ask-the-network-how-to-reinvent-the-business/
Managing Network Performance Within and Beyond Your EnterpriseThousandEyes
Your organization relies on the public Internet to deliver both on-premises and SaaS applications across a geographically distributed employee base. In these slides, see traditional enterprise networks vs. the complex topologies you rely on today, three problems with using traditional network performance management tools and the foundational technologies ThousandEyes has built to address the performance challenges of the modern enterprise. View the webinar with live demo here: http://ow.ly/BzAkM
Ready to deploy Office 365? If you think it’s going to be easy enough, you may want to think again. Microsoft Office 365 was designed to be accessed directly via the internet, and most companies simply don’t have the appropriate network setup. It’s no surprise, then, that deploying Office 365 without proper guidance can delay deployments and cause a terrible user experience
Moving from appliances to cloud security with phoenix children's hospitalZscaler
Applying consistent and robust security controls across your remote workforce hasn’t gotten any easier. The complexity brought about by mobile devices, cloud apps, untrusted networks, and more are compounded by the inspection demands of SSL traffic and the performance limitations of security appliances
This document provides an overview of governance strategies for SharePoint and Office 365. It discusses the importance of governance and outlines key considerations for governance plans, including defining security, handling hybrid environments between on-premises and cloud, and developing policies for information management and applications. The document emphasizes that governance is needed to bring consistency and manage the large amount of data, tools, and users across different systems and environments.
Adopting an SD-WAN solution is the best option that network organizations have to respond to a range of requirements such as lowering cost, increasing availability and providing high quality user experiences. However, network organizations are also under pressure to deliver best-of-breed security and in virtually all instances, adopting an SD-WAN solution results in implementing Direct Internet Access (DIA) which is challenging to secure using security appliances.
Three Key Steps for Moving Your Branches to the CloudZscaler
Is backhauling traffic the most efficient way to route traffic when your workloads move to the cloud? The migration of applications from the data center to the cloud calls for a new approach to networking and security. But, keeping up with application demands and user expectations can be a struggle. Explore the challenges and benefits of establishing secure local breakouts from someone who has done it.
Ready, Set, SD-WAN: Best Practices for Assuring Branch ReadinessThousandEyes
ThousandEyes EMEA webinar run on Tuesday October 29th at 1000 GMT. Presented by Ian Waters, Senior Director of EMEA Marketing and Tim Hale, Senior Solutions Engineer. Covering SD-WAN visibility best practices and featuring a live demo of ThousandEyes monitoring a Cisco Viptela SD-WAN.
Cisco Digital Network Architecture is based on these pillars
1) Service Virtualisation (eNFV and 3th party hosting)
2) Automation/SDN/Policy based networking
3) Analytics
4) Orchestration
5) Hybrid
6) Open and Programmable
7) Physical and Virtual
8) Software Driven
Analytics are key to implement NaaS (Network as a Sensor) and NeeE (Network as Enforcer)
https://masimatteo.wordpress.com/2016/06/21/from-we-must-have-a-network-cheap-to-ask-the-network-how-to-reinvent-the-business/
Managing Network Performance Within and Beyond Your EnterpriseThousandEyes
Your organization relies on the public Internet to deliver both on-premises and SaaS applications across a geographically distributed employee base. In these slides, see traditional enterprise networks vs. the complex topologies you rely on today, three problems with using traditional network performance management tools and the foundational technologies ThousandEyes has built to address the performance challenges of the modern enterprise. View the webinar with live demo here: http://ow.ly/BzAkM
Nous avons présenté lors de cette session ESPC15 à Stockholm les différents points à prendre en charge pour s'assurer de la performance dans SharePoint online.
Outage analysis: BGP Routing Errors Ripple Across the InternetThousandEyes
How did Cloudflare, AWS, Discord and a metals manufacturer all end up in the same Internet pile-up? For nearly two hours on June 24, 2019, a BGP routing error from an ISP in Pennsylvania rippled outward across the global Internet, creating havoc and causing Cloudflare, AWS and related services like Discord and Nintendo Life to become unavailable to many users. The worst part is that it was entirely preventable.
2016 Internet Outages: Trends, Insights & Analysis ThousandEyes
The document summarizes major internet outages that occurred in 2016, including DDoS attacks, infrastructure overload from peak traffic, and outages caused by fragile infrastructure and lack of redundancy. Some key trends identified are that the internet is vulnerable to DDoS attacks and failures of critical infrastructure like DNS. Planning and testing are important to avoid outages from overloaded networks or misconfigurations. The document recommends monitoring critical services, building resilient networks with redundant infrastructure, and being proactive in testing and identifying bottlenecks. It includes demonstrations of outages from a DDoS attack on Dyn, infrastructure overload during a Powerball lottery, and a route leak impacting Amazon traffic.
The document outlines the agenda for an SOA 12c Launch event taking place on September 23, 2014. It includes a schedule of presentations on topics like SOA 12c integration capabilities in the cloud, mobile solutions, and the Internet of Things. Presenters will discuss new SOA 12c products and features, automation of business processes with BPM 12c, development on SOA 12c and transitioning to the new version.
The document discusses how IT is evolving in a cloud world. Key points include:
- Business is driving digital transformation and IT must change from technology-first to business-first to remain relevant.
- There is only one global network that businesses don't control, so the focus must shift from security controls to managing risk.
- Transformation starts with changing organizational mindsets to embrace new business models.
- Zscaler's cloud security platform can help organizations securely adopt the cloud by providing a consistent security policy for all users on any network or device.
It’s 2019 and your users are working from anywhere but the office, enterprise applications have migrated to the cloud or hybrid environment, and VPN is no longer the answer to private application access in this new world of user-to-app connectivity.
This document provides an introduction and overview of ThousandEyes. It begins with an introduction of the speaker and agenda. It then discusses what ThousandEyes is and its locations, customers, and features. It provides examples of common enterprise problems and how ThousandEyes can help with visibility. It also discusses different deployment options, use cases, and best practices for cloud adoption. Finally, it demonstrates dashboards and provides examples of outage case studies and Cisco integrations.
F5 Infosec Israel 2013 Application Centric SecurityTzoori Tamam
This document summarizes F5 Networks and their application-centric security solutions. F5 provides application delivery controllers and firewalls that consolidate network and security functions. Their solutions provide comprehensive protection for applications from layers 3 through 7, including firewalling, SSL inspection, traffic management, and web application security. They aim to gain visibility into application traffic and detect attacks while maintaining high performance and scalability.
Monitoring End User Experience with Endpoint AgentThousandEyes
Endpoint Agent monitors end user experience from employee laptops and desktops to understand web performance and Internet connectivity of any browser-based service. Learn to troubleshoot end user issues and use the newest Endpoint Agent features.
It’s the difference between doing thousands of tasks manually and having an automated system that helps you focus on business goals. The advent of big data and analytics helps to enable better real-time decision making, automation, and efficiencies necessary to deliver such digitalized applications. Cisco DNA automation and assurance are built on a software-defined networking (SDN) controller, rich contextual analytics, network virtualization and the cloud.
O365Engage17 - Modern collaboration in teams and projects powered by office 365NCCOMMS
Jasper Oosterveld gave a presentation on modern collaboration tools in Office 365. He discussed Yammer for enterprise social networking, Outlook Groups for email-focused collaboration, Microsoft Teams for chat-focused work, and SharePoint for file sharing. For each tool, he covered tips for use, security and compliance features, backup and management options, and the product roadmap. He concluded by advising attendees to learn about the different tools, understand their organization's needs, demo the options, and select the best collaboration service or services.
Correlate Log Data with Business Metrics Like a JediTrevor Parsons
The Logentries and Hosted Graphite integration allows you to connect two of your favorite Ops tools to easily extract important data from your log files, visualize them as metrics, and share them in Hosted Graphite dashboards.
• Integrate your systems to extract the metrics you need, from both your applications and log data.
• Set-up log metric dashboards based on common use cases (e.g. error tracking, performance, app usage).
• Get off the "complexity elevator" of hosting your own in-house logging or graphite solutions.
• Delight your team and organization with valuable metrics and performance insights.
ThousandEyes EMEA Webinar - Lifting the Lid on Service Provider Performance w...ThousandEyes
The document discusses ThousandEyes, a network intelligence solution that provides visibility into digital experiences across networks. It highlights how enterprises have lost control and visibility as digital experiences rely on various external service providers and public networks. ThousandEyes monitors these networks through billions of daily probes from global agents to detect outages through its Internet Insights solution. The solution provides correlated views of application and network performance as well as macro outages. It can help enterprises more quickly identify issues, make better decisions on service providers, and improve customer communications. The presentation concludes with a demo and next steps to try the solution.
Facebook Outage Analysis: Using External Visibility to Fortify AvailabilityThousandEyes
The presentation summarized Facebook's outage in October 2021. It discussed how Facebook's DNS architecture was hosted in their own data centers. During the outage, Facebook's authoritative nameservers became nonresponsive. Additionally, BGP advertisements for Facebook's DNS IP blocks were withdrawn, making the DNS servers unreachable. This caused users to be unable to access Facebook services. The root cause analysis showed that maintenance impacted Facebook's internal backbone connections. Lessons included avoiding single points of failure in DNS, diversifying providers and services, and optimizing business continuity strategies.
Lessons from an AWS outage and how to detect root cause of cloud service disr...ThousandEyes
Enterprise IT and Ops team are frequently challenged by complex cloud architectures that are continually evolving. As a result, your teams suffer from increased MTTI during fault diagnosis and are often left frustrated and helpless during a cloud outage.
Join this webinar to see an analysis of a recent AWS outage and the downstream implications a cloud outage can have on your service delivery and user experience. In this demonstration you will learn:
- Monitoring best practices to reduce MTTI during cloud outages
- Why APM and cloud-native tools like CloudWatch fall short
- How to hold cloud service providers accountable when something goes wrong
Slides from ThousandEyes EMEA webinar on Tuesday June 5th at 1000 BST. Delivered by Ian Waters, Solutions Marketing Director and Nitin Nayar, Senior Solutions Engineer.
Enterprise Agents: Deployment Best PracticesThousandEyes
This document provides best practices for deploying ThousandEyes Enterprise Agents within an organization's network. It discusses the different deployment models for the agents including virtual appliances, containers, and physical installers. It recommends deploying agents in data centers, branch offices, and remote locations to monitor WAN links, SaaS applications, and voice/web services. Guidelines are provided around choosing appropriate tests based on agent resources and setting up agents behind NAT or proxies. A demo is also offered to illustrate installing and running tests with the Enterprise Agents.
If you don´t invest in IOT someone else will, and then you´ll be licensing or acquiring their know-how...
CONNECT - DETECT - ACT NOW
IoT40Systems at work
Ready to deploy Office 365? If you think it’s going to be easy enough, you may want to think again. Microsoft Office 365 was designed to be accessed directly via the internet, and most companies simply don’t have the appropriate network setup.
Get an office 365 expereience your users will love v8.1Zscaler
The document discusses challenges with deploying Office 365 and recommends using Zscaler's cloud security platform as a better solution. It notes that traditional hub-and-spoke VPN architectures and routing traffic through on-premises appliances increases latency and hurts the user experience. Zscaler differentiates Office 365 traffic and sends it directly to Microsoft while applying full security controls. It also provides benefits like one-click configuration, local DNS for faster connections, bandwidth control to prioritize Office 365, and visibility into usage. The summary concludes that Zscaler is fully compliant with Microsoft's recommendations and provides the best user experience and rapid deployment.
Nous avons présenté lors de cette session ESPC15 à Stockholm les différents points à prendre en charge pour s'assurer de la performance dans SharePoint online.
Outage analysis: BGP Routing Errors Ripple Across the InternetThousandEyes
How did Cloudflare, AWS, Discord and a metals manufacturer all end up in the same Internet pile-up? For nearly two hours on June 24, 2019, a BGP routing error from an ISP in Pennsylvania rippled outward across the global Internet, creating havoc and causing Cloudflare, AWS and related services like Discord and Nintendo Life to become unavailable to many users. The worst part is that it was entirely preventable.
2016 Internet Outages: Trends, Insights & Analysis ThousandEyes
The document summarizes major internet outages that occurred in 2016, including DDoS attacks, infrastructure overload from peak traffic, and outages caused by fragile infrastructure and lack of redundancy. Some key trends identified are that the internet is vulnerable to DDoS attacks and failures of critical infrastructure like DNS. Planning and testing are important to avoid outages from overloaded networks or misconfigurations. The document recommends monitoring critical services, building resilient networks with redundant infrastructure, and being proactive in testing and identifying bottlenecks. It includes demonstrations of outages from a DDoS attack on Dyn, infrastructure overload during a Powerball lottery, and a route leak impacting Amazon traffic.
The document outlines the agenda for an SOA 12c Launch event taking place on September 23, 2014. It includes a schedule of presentations on topics like SOA 12c integration capabilities in the cloud, mobile solutions, and the Internet of Things. Presenters will discuss new SOA 12c products and features, automation of business processes with BPM 12c, development on SOA 12c and transitioning to the new version.
The document discusses how IT is evolving in a cloud world. Key points include:
- Business is driving digital transformation and IT must change from technology-first to business-first to remain relevant.
- There is only one global network that businesses don't control, so the focus must shift from security controls to managing risk.
- Transformation starts with changing organizational mindsets to embrace new business models.
- Zscaler's cloud security platform can help organizations securely adopt the cloud by providing a consistent security policy for all users on any network or device.
It’s 2019 and your users are working from anywhere but the office, enterprise applications have migrated to the cloud or hybrid environment, and VPN is no longer the answer to private application access in this new world of user-to-app connectivity.
This document provides an introduction and overview of ThousandEyes. It begins with an introduction of the speaker and agenda. It then discusses what ThousandEyes is and its locations, customers, and features. It provides examples of common enterprise problems and how ThousandEyes can help with visibility. It also discusses different deployment options, use cases, and best practices for cloud adoption. Finally, it demonstrates dashboards and provides examples of outage case studies and Cisco integrations.
F5 Infosec Israel 2013 Application Centric SecurityTzoori Tamam
This document summarizes F5 Networks and their application-centric security solutions. F5 provides application delivery controllers and firewalls that consolidate network and security functions. Their solutions provide comprehensive protection for applications from layers 3 through 7, including firewalling, SSL inspection, traffic management, and web application security. They aim to gain visibility into application traffic and detect attacks while maintaining high performance and scalability.
Monitoring End User Experience with Endpoint AgentThousandEyes
Endpoint Agent monitors end user experience from employee laptops and desktops to understand web performance and Internet connectivity of any browser-based service. Learn to troubleshoot end user issues and use the newest Endpoint Agent features.
It’s the difference between doing thousands of tasks manually and having an automated system that helps you focus on business goals. The advent of big data and analytics helps to enable better real-time decision making, automation, and efficiencies necessary to deliver such digitalized applications. Cisco DNA automation and assurance are built on a software-defined networking (SDN) controller, rich contextual analytics, network virtualization and the cloud.
O365Engage17 - Modern collaboration in teams and projects powered by office 365NCCOMMS
Jasper Oosterveld gave a presentation on modern collaboration tools in Office 365. He discussed Yammer for enterprise social networking, Outlook Groups for email-focused collaboration, Microsoft Teams for chat-focused work, and SharePoint for file sharing. For each tool, he covered tips for use, security and compliance features, backup and management options, and the product roadmap. He concluded by advising attendees to learn about the different tools, understand their organization's needs, demo the options, and select the best collaboration service or services.
Correlate Log Data with Business Metrics Like a JediTrevor Parsons
The Logentries and Hosted Graphite integration allows you to connect two of your favorite Ops tools to easily extract important data from your log files, visualize them as metrics, and share them in Hosted Graphite dashboards.
• Integrate your systems to extract the metrics you need, from both your applications and log data.
• Set-up log metric dashboards based on common use cases (e.g. error tracking, performance, app usage).
• Get off the "complexity elevator" of hosting your own in-house logging or graphite solutions.
• Delight your team and organization with valuable metrics and performance insights.
ThousandEyes EMEA Webinar - Lifting the Lid on Service Provider Performance w...ThousandEyes
The document discusses ThousandEyes, a network intelligence solution that provides visibility into digital experiences across networks. It highlights how enterprises have lost control and visibility as digital experiences rely on various external service providers and public networks. ThousandEyes monitors these networks through billions of daily probes from global agents to detect outages through its Internet Insights solution. The solution provides correlated views of application and network performance as well as macro outages. It can help enterprises more quickly identify issues, make better decisions on service providers, and improve customer communications. The presentation concludes with a demo and next steps to try the solution.
Facebook Outage Analysis: Using External Visibility to Fortify AvailabilityThousandEyes
The presentation summarized Facebook's outage in October 2021. It discussed how Facebook's DNS architecture was hosted in their own data centers. During the outage, Facebook's authoritative nameservers became nonresponsive. Additionally, BGP advertisements for Facebook's DNS IP blocks were withdrawn, making the DNS servers unreachable. This caused users to be unable to access Facebook services. The root cause analysis showed that maintenance impacted Facebook's internal backbone connections. Lessons included avoiding single points of failure in DNS, diversifying providers and services, and optimizing business continuity strategies.
Lessons from an AWS outage and how to detect root cause of cloud service disr...ThousandEyes
Enterprise IT and Ops team are frequently challenged by complex cloud architectures that are continually evolving. As a result, your teams suffer from increased MTTI during fault diagnosis and are often left frustrated and helpless during a cloud outage.
Join this webinar to see an analysis of a recent AWS outage and the downstream implications a cloud outage can have on your service delivery and user experience. In this demonstration you will learn:
- Monitoring best practices to reduce MTTI during cloud outages
- Why APM and cloud-native tools like CloudWatch fall short
- How to hold cloud service providers accountable when something goes wrong
Slides from ThousandEyes EMEA webinar on Tuesday June 5th at 1000 BST. Delivered by Ian Waters, Solutions Marketing Director and Nitin Nayar, Senior Solutions Engineer.
Enterprise Agents: Deployment Best PracticesThousandEyes
This document provides best practices for deploying ThousandEyes Enterprise Agents within an organization's network. It discusses the different deployment models for the agents including virtual appliances, containers, and physical installers. It recommends deploying agents in data centers, branch offices, and remote locations to monitor WAN links, SaaS applications, and voice/web services. Guidelines are provided around choosing appropriate tests based on agent resources and setting up agents behind NAT or proxies. A demo is also offered to illustrate installing and running tests with the Enterprise Agents.
If you don´t invest in IOT someone else will, and then you´ll be licensing or acquiring their know-how...
CONNECT - DETECT - ACT NOW
IoT40Systems at work
Ready to deploy Office 365? If you think it’s going to be easy enough, you may want to think again. Microsoft Office 365 was designed to be accessed directly via the internet, and most companies simply don’t have the appropriate network setup.
Get an office 365 expereience your users will love v8.1Zscaler
The document discusses challenges with deploying Office 365 and recommends using Zscaler's cloud security platform as a better solution. It notes that traditional hub-and-spoke VPN architectures and routing traffic through on-premises appliances increases latency and hurts the user experience. Zscaler differentiates Office 365 traffic and sends it directly to Microsoft while applying full security controls. It also provides benefits like one-click configuration, local DNS for faster connections, bandwidth control to prioritize Office 365, and visibility into usage. The summary concludes that Zscaler is fully compliant with Microsoft's recommendations and provides the best user experience and rapid deployment.
With over 10,000 users and 900 locations across 22 countries, Kelly Services exemplifies the diversified multinational organization. But as Kelly Services looked to standardize on Office 365, it became apparent that full application support across the Office 365 suite would require a complete network transformation, from a legacy hub-and-spoke network to a modern direct-to-cloud architecture.
Join this session to hear first-hand how Kelly Services was able to drive down MPLS and networking costs, deliver a fast Office 365 application experience to users around the globe, and fundamentally transform its network infrastructure.
This document discusses principles for optimizing connectivity to Office 365 services. It recommends differentiating Office 365 traffic, optimizing routes to minimize latency, and assessing whether network security devices duplicate functionality available in Office 365. It provides information on Microsoft's published endpoints and describes challenges customers have reported with frequent IP address updates. The document outlines new categories for IP and URL endpoints to help customers optimize network configurations for Office 365 traffic.
Enterprise Networks - Cisco Digital Network Architecture - Introducing the Ne...Cisco Canada
The document discusses Cisco's Digital Network Architecture (DNA) and the Cisco DNA Center. It introduces DNA as an open, programmable and automated network architecture powered by intent and informed by context. It describes how DNA Center allows users to automate network provisioning and policy, gain insights through assurance and analytics capabilities, and translate business intent into network policies through an intuitive interface. The document provides examples of how DNA Center streamlines operations through profile-driven automation, software management, and expressive intent-based policies.
SharePoint Online vs. On-Premise document compares Microsoft SharePoint Online to an on-premise SharePoint implementation. Some key differences include SharePoint Online having higher security but more limited customization options compared to on-premise which has more robust features but requires managing security. Migrating to SharePoint Online can provide cost savings on licensing and infrastructure but requires planning to address limitations in areas like search and administration interfaces. The document provides considerations for law firms evaluating moving to SharePoint Online.
Cisco Digital Network Architecture - Introducing the Network IntuitiveCisco Canada
The document discusses Cisco's Digital Network Architecture (DNA) and the Cisco DNA Center. It introduces DNA as an open, programmable network architecture powered by automation, analytics, and intent-based policies. It describes how DNA Center allows network administrators to automate network operations, gain deep insights through assurance and analytics features, and translate business objectives into network policies through an intent-based model. Key capabilities of DNA Center discussed include automated network provisioning and deployment, software management, and gathering metrics to identify issues and make data-driven decisions.
Nviron event rerun april 2014 delegate versionnvironltd
The document outlines an agenda for a presentation on Office 365 and connected cloud advances. The agenda includes an overview of Office 365, updates on Microsoft licensing, a discussion of identity and access management services from IAMCLOUD, campus wireless networking from Dell, mobile device management concepts, and a case study on leveraging Office 365 SharePoint. Speakers from Microsoft, IAMCLOUD, Dell, and Nviron will discuss how Office 365 is evolving to provide more capabilities and cost savings, advanced identity management and single sign-on options, wireless infrastructure for mobile devices and BYOD, and how organizations can replace Windows XP and get assistance from Nviron.
Overcoming the Challenges of Architecting for the CloudZscaler
This document summarizes the key requirements for securely routing branch traffic directly to the cloud according to Zscaler. The five key requirements are:
1. The cloud is a true multi-tenant platform built for performance and scalability.
2. The cloud uses a proxy architecture to deliver uncompromising security across all content and SSL.
3. The cloud provides visibility and management to simplify security administration and speed threat response.
4. The cloud delivers the full security stack as a service across locations.
5. The cloud supports today's mobility by providing fast connections to users regardless of location.
The document discusses several ways that a large enterprise customer with multiple branch offices can optimize connectivity to Microsoft cloud services like Office 365 and Azure. It provides details on configuring network security devices using published Microsoft endpoint data to identify and route Office 365 traffic efficiently. It also compares approaches like using SD-WAN, ExpressRoute connections, or secure web gateways to provide local internet breakouts or private connections to the cloud.
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?michaelbasoah
Dr. Amit Sinha is an experienced leader in security and wireless technologies. The document discusses the need to upgrade appliance-based security solutions from 1024-bit to 2048-bit SSL encryption by December 31, 2013 due to increased performance demands. Traditional appliances may struggle to support 2048-bit SSL interception and encryption. Zscaler's direct-to-cloud network is already upgraded to 2048-bit SSL to securely enable mobile and distributed workforces without hardware or software upgrades.
What's New in Syncsort's Trillium Line of Data Quality Software - TSS Enterpr...Precisely
Today, in the age of big data, data quality is more essential than ever. Whatever the size of your data – you need it to be clean, free of duplicates and ready for use.
View this customer education webinar on-demand where you will learn more about the latest improvements in the market-leading data quality solution – Syncsort’s TSS Enterprise, and how it can help you receive a quicker ROI from your Syncsort Trillium investment.
During this webinar, you will learn more about new TSS Enterprise 15.8 features such as:
• Performance improvements in Syncsort Trillium Discovery
• Syncsort’s Collibra integration for a stronger data governance capability
• Added support for Amazon EMR to Syncsort Trillium Quality for Big Data
• The NEW real-time data quality function
Don’t have TSS? View this webinar on-demand to see what you may be missing by not having market-leading data quality solutions. Whether you need to de-duplicate millions of records on Spark, want to fix data errors in real-time in your CRM or build geo-location and address verification into your web application – we’ve got what you’re looking for!
On my first session I would to introduce everyone to formerly known SQL Azure (actually Windows Azure SQL Database). Under Tips and Trick session I will show which points, features, compatibility and non-compatibility for SQL Azure are important for DBA's. I will cover functionalities, performance, cost, and sla and security aspects.
After break I will show how we can work with our data in the Cloud using SQL Azure, Blob Storage, what functionality of backup, restore, encryption and availability are available for us, how we can implement hybrid environment and when an why it is (or not) good practice.
And finally I hope we will find few minutes for discussion about Future of the DBA (not only in AD 2016)
Meeting Archive: A Simple Step to Gain 33% Performance Improvements in Reques...Meghan Weinreich
A stellar mobile online user experience is crucial for e-commerce vendors. Even 100 milliseconds of latency is perceptible to humans and has been shown to impact conversion rates and revenue. E-commerce vendors need to ensure their website is performant at all times: whether it is just another normal business day or traffic is spiking.
Bespoke Post is the leader in monthly subscription services for men. They receive an average of 500K users coming to their site each month and, so far this year, is pushing over 25 million pageviews. Performance is of paramount importance, so they strive to keep the experience smooth and performant for their customers even during the busiest shopping days regardless of the device being used. Join us and learn how Bespoke Post:
-Handles traffic that spikes to 15x greater than a normal business day
-Improved site request times by 33.3%
-Achieves 83% reduction in bandwidth
Back to the Future - Understand and Optimize your IBM Notes/Domino Infrastruc...panagenda
1. The DNA analysis examined a Domino environment with 26 servers, 4 different releases, over 22,000 GB of storage, and identified various optimization opportunities including 102 databases with integrity issues and 1020 open to anonymous.
2. Key findings included that the environment could potentially be consolidated down to 6 servers by addressing session concurrency issues, and storage could be reduced by 63% by consolidating duplicate databases.
3. User demand profiling showed that most activity was concentrated in mail files, directories and applications, with a small number of power users responsible for a large percentage of reads. Network compression was enabled for only 1% of users.
OFFICE 365- CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...Waterstons Ltd
There is much debate around the virtues and pitfalls associated with cloud solutions; one thing is clear, if your organisation uses any Microsoft productivity products such as Office, cloud based or not, you should be aware of Office 365. Office 365 has been available since mid-2011 and is currently in its second major iteration; it is very clear that Microsoft sees it as a key offering and this will have wide ranging implications even for organisations that are determined to remain cloud free.
Waterstons specialist consultants will discuss the use of Office 365 and how it relates to Exchange, SharePoint, Lync, Desktops and integration with infrastructure applications. The seminar will cover the advantages, disadvantages, business benefits and potential pitfalls of using Office 365. The team will also explore what the future might look like and how this will have an impact far beyond those companies who have chosen to dip their toe in the 365 cloud…
This presentation talks through cloud computing, including the advantages and disadvantages for small businesses. It's a little annimation heavy, so view it in presentation mode only.
This document summarizes a presentation by Michael Nelson and Martin Levy of Cloudflare on the future of the internet. Some of the key points made in the presentation include:
- The internet is changing faster than ever before and it is difficult to see the changes happening in the underlying infrastructure.
- Focus should be placed on data rather than the network itself.
- The edge is where much of the innovation and action will take place going forward through services like Cloudflare Workers that allow running custom code at the edge.
- Trends include replacing hardware with cloud services, having intelligent systems optimize performance and security at the edge, and democratizing the web through application platforms.
Similar to Top reasons o365 deployments fail v1 (20)
How to Start Affiliate Marketing with ChatGPT- A Step-by-Step Guide (1).pdfSimpleMoneyMaker
Discover the power of affiliate marketing with ChatGPT! This comprehensive guide takes you through the process of starting and scaling your affiliate marketing business using the latest AI technology. Learn how to leverage ChatGPT to generate content ideas, create engaging articles, and connect with your audience through personalized interactions. From building your strategy and optimizing conversions to analyzing performance and staying updated with industry trends, this eBook provides everything you need to know to succeed in affiliate marketing. Whether you're a beginner looking to start your online business or an experienced marketer wanting to take your efforts to the next level, this guide is your roadmap to success in the world of affiliate marketing.
Mindfulness Techniques Cultivating Calm in a Chaotic World.pptxelizabethella096
In today’s fast-paced world, stress and anxiety have become common companions for many. With constant connectivity and an unending stream of information, finding moments of peace can seem like an insurmountable challenge. However, mindfulness techniques offer a beacon of calm amidst the chaos, helping individuals to center themselves and find balance. These practices, rooted in ancient traditions and supported by modern science, are accessible to everyone and can profoundly impact mental and emotional well-being.
Embark on style journeys Indian clothing store denver guide.pptxOmnama Fashions
Finding the perfect "Indian Clothing Store Denver" is essential for those seeking vibrant, authentic, and culturally rich attire in the heart of Colorado. Denver, a city known for its diverse culture and eclectic fashion scene, offers a variety of options for those in search of traditional and contemporary Indian clothing. Whether you're preparing for a wedding, festival, or cultural event, or simply wish to incorporate the elegance and beauty of Indian fashion into your wardrobe, discovering the right store can make all the difference.
janani Digital Marketer|Digital Marketing consultant|Marketing Promotion|Coim...janudm24
Myself Janani Digital marketing consultant located in coimbatore I offer all kinds of digital marketing services for your business requirements such as SEO SMO SMM SMO CAMPAIGNS content writing web design for all your business needs with affordable cost
Digital Marketing Services | Techvolt Software :
Digital Marketing is a latest method of Marketing techniques widely used across the Globe. Digital Marketing is an online marketing technique and methods used for all products and services through Search Engine and Social media advertisements. Previously the marketing techniques were used without using the internet via direct and indirect marketing strategies such as advertising through Telemarketing,Newspapers,Televisions,Posters etc.
List of Services offered in Digital Marketing |Techvolt Software :
Techvolt Software offers best Digital Marketing services for promoting your products and services through online platform on the below methods of Digital marketing
1. Search Engine Optimization (SEO)
2. Search Engine Marketing (SEM)
3. Social Media Optimization (SMO)
4. Social Media Marketing (SMM)
5. Campaigns
Importance | Need of Digital Marketing (Online Promotions) :
1. Quick Promotions through Online
2. Generation of More leads and Business Enquiries via Search Engine and Social Media Platform
3. Latest Technology development vs Business promotions
4. Creation of Social Branding
5. Promotion with less investment
Benefits Digital Marketing Services at Techvolt software :
1. Services offered with Affordable cost
2. Free Content writing
3. Free Dynamic Website design*
4. Best combo offers on website Hosting,design along with digital marketing services
5. Assured Lead Generation through Search Engine and Social Media
6. Online Maintenance Support
Free Website + Digital Marketing Services
Techvolt Software offers Free website design for all customer and clients who is availing the digital marketing services for a minimum period of 6 months.
With Regards
Janani Digital Marketer
Coimbatore,Tamilnadu.
Build marketing products across the customer journey to grow your business and build a relationship with your customer. For example you can build graders, calculators, quizzes, recommendations, chatbots or AR apps. Things like Hubspot's free marketing grader, Moz's site analyzer, VenturePact's mobile app cost calculator, new york times's dialect quiz, Ikea's AR app, L'Oreal's AR app and Nike's fitness apps. All of these examples are free tools that help drive engagement with your brand, build an audience and generate leads for your core business by adding value to a customer during a micro-moment.
Key Takeaways:
Learn how to use specific GPTs to help you Learn how to build your own marketing tools
Generate marketing ideas for your business How to think through and use AI in marketing
How AI changes the marketing game
Boost Your Instagram Views Instantly Proven Free Strategies.pptxInstBlast Marketing
Join Performance Car Exclusive to drive the finest supercars, engineered with advanced materials and cutting-edge technology for peak performance.
https://instblast.com/instagram/free-instagram-views
Evaluating the Effectiveness of Women-Focused MarketingHighViz PR
Women centric marketing is a vital part in reaching one of the most influential groups of consumers. Here is a guide to know and measure the impact of women-centric marketing efforts-
Mastering Local SEO for Service Businesses in the AI Era"" is tailored specifically for local service providers like plumbers, dentists, and others seeking to dominate their local search landscape. This session delves into leveraging AI advancements to enhance your online visibility and search rankings through the Content Factory model, designed for creating high-impact, SEO-driven content. Discover the Dollar-a-Day advertising strategy, a cost-effective approach to boost your local SEO efforts and attract more customers with minimal investment. Gain practical insights on optimizing your online presence to meet the specific needs of local service seekers, ensuring your business not only appears but stands out in local searches. This concise, action-oriented workshop is your roadmap to navigating the complexities of digital marketing in the AI age, driving more leads, conversions, and ultimately, success for your local service business.
Key Takeaways:
Embrace AI for Local SEO: Learn to harness the power of AI technologies to optimize your website and content for local search. Understand the pivotal role AI plays in analyzing search trends and consumer behavior, enabling you to tailor your SEO strategies to meet the specific demands of your target local audience. Leverage the Content Factory Model: Discover the step-by-step process of creating SEO-optimized content at scale. This approach ensures a steady stream of high-quality content that engages local customers and boosts your search rankings. Get an action guide on implementing this model, complete with templates and scheduling strategies to maintain a consistent online presence. Maximize ROI with Dollar-a-Day Advertising: Dive into the cost-effective Dollar-a-Day advertising strategy that amplifies your visibility in local searches without breaking the bank. Learn how to strategically allocate your budget across platforms to target potential local customers effectively. The session includes an action guide on setting up, monitoring, and optimizing your ad campaigns to ensure maximum impact with minimal investment.
Can you kickstart content marketing when you have a small team or even a team of one? Why yes, you can! Dennis Shiao, founder of marketing agency Attention Retention will detail how to draw insights from subject matter experts (SMEs) and turn them into articles, bylines, blog posts, social media posts and more. He’ll also share tips on content licensing and how to establish a webinar program. Attend this session to learn how to make an impact with content marketing even when you have a small team and limited resources.
Key Takeaways:
- You don't need a large team to start a content marketing program
- A webinar program yields a "one-to-many" approach to content creation
- Use partnerships and licensing to create new content assets
From Subreddits To Search: Maximizing Your Brand's Impact On RedditSearch Engine Journal
The search landscape is undergoing a seismic shift, and Reddit is at the epicenter. Google's Helpful Content Update and its $60 million deal with Reddit, coupled with OpenAI's partnership, have catapulted Reddit's real-time content to unprecedented heights.
Check out this insightful webinar exploring the newfound importance of Reddit in the digital marketing landscape. Learn how these changes make Reddit an essential platform for getting your brand and content in front of evolving search audiences.
You’ll hear:
- The evolution of Reddit as a major influencer on SERPS over the years.
- The impact of recent changes and partnerships on Reddit’s place in search.
- A comprehensive look at Reddit, how it works, and how to approach it.
- Unique engagement opportunities presented by Reddit.
With Brent Csutoras, a Reddit expert with over 18 years of experience on the platform, we’ll delve into the intricacies of Reddit's communities, known as Subreddits, and how to leverage their power without compromising authenticity or violating community guidelines in the age of AI-driven search experiences.
Don't miss this opportunity to stay ahead of the curve and leverage Reddit for your brand's success.
Spotify: Revolutionizing the Music Streaming IndustryTMR Infra
Spotify's unique blend of technology, user-centric design, and industry influence has
cemented its position as a leader in music streaming. By continuously evolving and adapting,
Spotify remains a dominant force, shaping the future of music consumption. As it continues
to innovate and expand, Spotify is likely to maintain its position as the go.
Top Strategies for Building High-Quality Backlinks in 2024 PPT.pdf1Solutions Pvt. Ltd.
As we move into 2024, the methods for building high-quality backlinks continue to evolve, demanding more sophisticated and strategic approaches. This presentation aims to explore the latest trends and proven strategies for acquiring high-quality backlinks that can elevate your SEO efforts.
Visit:- https://www.1solutions.biz/link-building-packages/
We’ve entered a new era in digital. Search and AI are colliding, in more ways than one. And they all have major implications for marketers.
• SEOs now use AI to optimize content.
• Google now uses AI to generate answers.
• Users are skipping search completely. They can now use AI to get answers. So AI has changed everything …or maybe not. Our audience hasn’t changed. Their information needs haven’t changed. Their perception of quality hasn’t changed. In reality, the most important things haven’t changed at all. In this session, you’ll learn the impact of AI. And you’ll learn ways that AI can make us better at the classic challenges: getting discovered, connecting through content and staying top of mind with the people who matter most. We’ll use timely tools to rebuild timeless foundations. We’ll do better basics, but with the most advanced techniques. Andy will share a set of frameworks, prompts and techniques for better digital basics, using the latest tools of today. And in the end, Andy will consider - in a brief glimpse - what might be the biggest change of all, and how to expand your footprint in the new digital landscape.
Key Takeaways:
How to use AI to optimize your content
How to find topics that algorithms love
How to get AI to mention your content and your brand
3. 2
Zscaler: The Market Leader in Cloud Security
Enterprise Customers
2,800 CUSTOMERS
Over 200 of the Fortune Global 2000
Global Partners
100
Data centers
45B
Daily requests
185
Countries served
Cloud Scale
The Pioneer in Cloud Security
Mature Global Cloud Operations
Conglomerates
3 of the top 3
Oil and gas operations
3 of the top 4
Beverage
5 of the top 7
Apparel and accessories
2 of the top 4
Specialized chemicals
2 of the top 3
Food retail
6 of the top 12
4. Office 365 traffic is growing at breakneck speeds!
1.3 billion Office 365 requests daily
10 X Growth over 2 years!!
5. But Office 365 Deployments are stuck in the slow lane!
A deployment survey of over 200 customers
had problems accessing
business-critical applications
including Office 365.
45%
Many were plagued by bandwidth
and network latency issues on a
daily and weekly basis
70%Weekly issues
reported
33%Daily issues
reported
Despite appliance upgrades, after deployment:
6. 5
Microsoft’s Guidance for Office 365 is Direct Internet
Tech Community Blog: bit.ly/Zscaler_O365
• Differentiate Office 365 Traffic
• Egress Office 365 close to user with matching DNS resolution
• Avoid Network Hairpins and optimize direct connectivity
• Assess bypassing proxies and other inspection devices
7. 6
Cloud apps need low latency connections
Legacy Hub and Spoke is the WRONG approach
Cloud apps like Skype and Sharepoint are
designed for low latency direct access
Hub and Spoke and VPN requirements
add unnecessary latency
The user experience for Office 365 is
compromised
MPLS backhauling adds extra cost to
deployment
DC Apps
HQ/IOT San FranciscoNew York
Paris London
Avoid network hairpins
Microsoft recommends against using a
Hub and Spoke network with Office 365
Hub-and-Spoke Network
8. 7
Legacy Hub and Spoke is the WRONG approach
Increased connect load on Firewalls and Proxies
Outlook connections
per user
Office 365 creates a excessive long-lived
connections that exhaust firewalls
Outlook creates 12-20 connections per user!
Office 365 requires all ports and protocols,
not just Web (80/443)
The impact on user experience?
Random hangs and connection issues
Assess bypassing Proxies
9. 8
Not recommended and requires Microsoft
review and approval
Express route is very complex to configure
correctly
Office 365 traffic growth will outpace
gateway upgrades and budgets
“Microsoft has a review policy… ensure that
all parties are aware of the 2-6 months of
planning, extra complexity…”
ExpressRoute for Office not Recommended
Adds complexity and extra planning
DC Apps
HQ/IOT San FranciscoNew York
Paris London
Hub and Spoke with ExpressRoute
Avoid network hairpins
10. 9
Direct Internet connection with appliances
Requires constant firewall updates – missing
an IP/URL update can break connectivity
Sacrifices security in branches with only
UTMs or firewalls ensure local DNS
Office 365 overwhelms appliances, despite
upgrades
Appliance Sprawl
Assess bypassing Proxies
DC Apps
HQ/IOTNew York
Paris London
Complex, costly, and still under capacity
San Francisco
11. 10
HQMOBILE
BRANCHIOT
Data Loss Prevention
Cloud Apps (CASB)
File Type Controls
Data Protection
Cloud Firewall
URL Filtering
Bandwidth Control
DNS Filtering
Access Control
Adv. Protection
Cloud Sandbox
Anti-Virus
DNS Security
Threat Prevention
Zscaler
Open
Internet
Differentiate O365 traffic
Egress O365 close to user
Direct Internet for a fast user
experience across all ports and
protocols
Easily deployed. No hardware needed!
One Click configuration automates
O365 IP address changes and exempts
from SSL inspection
Optimize connectivity with Zscaler
Cloud Firewall and Bandwidth Control
A full security stack for the rest of
your direct internet connection
For your Open Internet traffic
Office 365
For your Office 365 Traffic
Fully compliant with Microsoft’s
connection recommendations
Zscaler for Office 365 and Direct Internet Differentiate O365 traffic
Egress O365 close to user
12. 11
Minimize Office 365 latency with Local DNS
Guarantee a fast, local connection regardless of location
Zscaler Local DNS Architecture
San Jose User > San Jose DNS > San Jose O365
Shortest path, fewer hops = faster user experience
Latency: 12ms
Common Centralized DNS Architecture
San Jose user > LA > Denver > Austin > Atlanta O365
Lots of hops increases: slower user experience
Latency: 52ms
Los Angeles
RTT=22 ms
Austin
RTT=48 ms
Atlanta
RTT=52 ms
Denver
RTT=36 ms
San Jose
RTT=12 ms
Local DNS
Centralized
DNS
O365
Connection
O365
Connection
Egress O365 close to user
Avoid network hairpins
14. Easily maintains updates without day to day
Office 365 administration
Traditional approach requires constant
firewall updates to maintain connectivity
HQ BRANCH
Local Network Egress
Unhindered Access
BRANCH
Zscaler One Click Configuration Optimized Connectivity
Simplify day to day Office 365 administration
Updates Office 365 connection details
multiple times a week
Automatically configures white list
Exempts Office 365 traffic from
authentication and SSL decryption
Fingerprints all Office 365 applications
No more keeping up with URL and IP changes
in the Office 365 applications.
.XML update list
One Click Configuration Easily define approved tenants
15. 14
Zscaler Bandwidth Control
Prioritize Office 365 traffic as Business Critical
Policies are defined in a single console and
immediately enforced globally
Policies are enforced in the cloud,
before the last mile bottleneck
Window shaping and bandwidth throttling
deliver a smooth user experience
Always guarantee
Office 365
40% of bandwidth
Cap YouTube
traffic at 20%
How Zscaler Bandwidth Control Works
Local Network Egress
Unhindered Access
Differentiate O365 traffic
16. 15
Optimized Zscaler TCP Scaling for faster file downloads
3MB file download from a SharePoint public site hosted at Iowa instance
Without Zscaler With Zscaler
Slower scaling,
does not scale beyond 3MB
Scaling starts after 50% of
transaction has completed
Starts at default
256 Byte value
Pre-negotiated
64KB connection
Scales faster, window scale > 4MB
Differentiate O365 traffic
17. 16
Fully Embrace Direct Internet with Zscaler Cloud Firewall
Office 365 (All ports and protocols)
Port: 443
Protocol: HTTPS
User: Jen
APP: Outlook Online
Location: All
APP: Outlook Online
Port: 3478, 3479, 3480, 3481
Protocol: UDP
User: Chris
APP: Skype for Business Online
Location: All
APP: Skype for Business Online
Port: Any
Protocol: UDP
User: Steve
Location: All
APP: BitTorrent
Internet
Branch User
Checking Email
HQ User
Sharing Desktop
Mobile User
Downloading Movies
APP: BitTorrent
Easily scale NGFW control across all locations without
the appliance cost and complexity.
Application visibility and control
• Adv. DPI engine - stateful packet inspection
• ID Apps regardless of port, protocol, or evasion
• Intrusion Prevention w/ protocol anomaly and
signature-based detection.
User identity awareness
ID Users & Groups regardless of IP address
Unified Policy and Visibility
Single console for policy management
and real-time log visibility
Zscaler
Cloud
Firewall
Direct Internet Traffic
Unlimited SSL inspection capacity
• Inspect ALL your Internet traffic
• One-Click config excludes O365 traffic
18. 17
Low Office 365
traffic in NY
despite one of the
largest offices
– user issues?
Easily identify
the top
Office 365 users
OneDrive
traffic is low –
is Box still
being used?
Real-time
traffic volume
trending
Get Unprecedented Office 365 Visibility with Zscaler
How well is Office 365 being adopted by your users?
19. 18
• Causing WAN congestion
• Sessions were overwhelming firewalls
• Deploying UTMs or NGFWs was prohibitively
expensive and complex (650 locations)
CHALLENGES
• Local Internet breakouts for a fast connection
• Cloud Firewall – elastic scale to handle the
increase number of connections
• Bandwidth Control for Office 365 prioritization
SOLUTION
17B monthly
transactions
2.8PB of traffic
processed monthly
Office 365 is finally the highest use – not YouTube
40% of bandwidth
reserved for O365
during periods of
contention
YouTube
capped at 20%
WAN transformation: Fast Office 365 experience
Global workforce staffing company case study
20. 19
Zscaler for Office 365 ✔
1. Fully Compliant Microsoft Connection Method (700+ customers)
2. Best possible user experience (fast response times)
3. Rapid deployment (no upgrades, configuration changes)
4. Investment protection and cost avoidance (no hardware or backhaul)
5. Visibility into all Internet traffic within seconds (single console)
Zscaler for Office 365: Five Reasons Why
21. June 25 – 27, 2018 | The Cosmopolitan, Las Vegas
EXPERIENCE
the first annual conference for Zscaler
customers, partners, and prospects
DISCOVER
the latest innovations and insights on
the secure, cloud-first enterprise
REGISTER
at zenithlive.zscaler.com to join us
22. Zscaler for Office 365
Solution Brief
zscaler.com/O365
The 4 Pitfalls of
Deploying Office 365
zscaler.com/pitfalls
Learn more about Office 365
Maximize your cloud app control
with Microsoft MCAS and Zscaler
GDPR – Are you ready?
Key steps to getting it right
Thank You!
Questions and Next Steps
Steve House
Vice President, Product Management
shouse@zscaler.com
Other Webcasts
zscaler.com > resources > webcasts and live demos
Editor's Notes
https://msdn.microsoft.com/en-us/library/mt450488.aspx
Although ExpressRoute is being used by Microsoft IT, ExpressRoute is not required or recommended for Office 365 customers except in a small number of situations.
These situations include a) regulatory requirements that would mandate a direct network connection or b) following a required customer network assessment for Skype for Business voice and video when network deficiencies are discovered that ExpressRoute can address. In the situations where ExpressRoute for Office 365 is implemented, Microsoft should be directly involved to ensure a successful implementation.
TCP Window scaling allows large files to be downloaded faster and efficiently
Large TCP Window size per connection to O365 with flexible receive buffer for faster downloads
App identification with DPI & Heuristics
Kelly services, a long time customer of Zscaler, was looking to deploy Office 365. As they went into pilot mode, their users were complaining and realized that Office 365 creates a high number of long-lived connections that increases network utilization and can overwhelm firewalls. And traffic and congestion was increasing on the MPLS network — which was driving MPLS costs higher. They evaluated deploying NGFWs at all the branches to route traffic locally, but it was too expensive. They decided to leverage the Zscaler Cloud Firewall and bandwidth control to route traffic locally and ensure Office 365 traffic was prioritized over YouTube during periods of congestion.
To date, we’ve helped over 700 customers successfully deploy Office 365, and we’re processing 17B requests monthly and about 1.2PB of traffic.