www.zscaler.com
Open in
urlscan Pro
2606:4700::6812:1d4a
Public Scan
Submitted URL: https://pages.zscaler.com/MzA2LVpFSi0yNTYAAAGJaeVNwE2BBSkbWLwah2G1I_SDOyYzyvRBKXQIawmJvogp-XZtGAc-1aBfn9wEOHcEH5EYMts=
Effective URL: https://www.zscaler.com/blogs/product-insights/briefer-history-zero-trust-major-milestones-rethinking-enterprise-securit...
Submission: On January 19 via manual from US — Scanned from DE
Effective URL: https://www.zscaler.com/blogs/product-insights/briefer-history-zero-trust-major-milestones-rethinking-enterprise-securit...
Submission: On January 19 via manual from US — Scanned from DE
Form analysis
5 forms found in the DOMPOST https://www.zscaler.com/search
<form action="https://www.zscaler.com/search" method="post" id="nav-search-form" accept-charset="UTF-8" role="search" aria-label="sitewide" __bizdiag="1663869817" __biza="WJ__">
<div class="js-form-item form-item js-form-type-textfield form-type-textfield js-form-item-keyword form-item-keyword form-no-label">
<input placeholder="Enter search" data-drupal-selector="edit-keyword" type="text" id="edit-keyword" name="keyword" value="" size="60" maxlength="128" class="form-text">
</div>
<div class="submit-wrapper"><i class="fa fa-search fg-color-white"></i>
<input data-drupal-selector="edit-submit" type="submit" id="edit-submit" name="op" value="Submit" class="button button--primary js-form-submit form-submit">
</div>
<input autocomplete="off" data-drupal-selector="form-zndoujrii12dy84maygf5wvtvba5xnp1tgvbjo-jhrq" type="hidden" name="form_build_id" value="form-zndoUJRii12dy84mAygf5wvtvBA5xNP1TgvBJO_jhRQ">
<input data-drupal-selector="edit-nav-search-form" type="hidden" name="form_id" value="nav_search_form">
</form>
<form id="mktoForm_7140" data-formid="7140" class="subscription-form-blog-new mkto-form-check mktoForm mktoHasWidth mktoLayoutLeft" novalidate="novalidate"
style="font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); width: 1601px;" __bizdiag="1714217501" __biza="WJ__">
<style type="text/css">
.mktoForm .mktoButtonWrap.mktoRound .mktoButton {
color: #fff;
border: 1px solid #a3bee2;
-webkit-border-radius: 5px;
-moz-border-radius: 5px;
border-radius: 5px;
background-color: #779dd5;
background-image: -webkit-gradient(linear, left top, left bottom, from(#779dd5), to(#5186cb));
background-image: -webkit-linear-gradient(top, #779dd5, #5186cb);
background-image: -moz-linear-gradient(top, #779dd5, #5186cb);
background-image: linear-gradient(to bottom, #779dd5, #5186cb);
padding: 0.4em 1em;
font-size: 1em;
}
.mktoForm .mktoButtonWrap.mktoRound .mktoButton:hover {
border: 1px solid #45638c;
}
.mktoForm .mktoButtonWrap.mktoRound .mktoButton:focus {
outline: none;
border: 1px solid #45638c;
}
.mktoForm .mktoButtonWrap.mktoRound .mktoButton:active {
background-color: #5186cb;
background-image: -webkit-gradient(linear, left top, left bottom, from(#5186cb), to(#779dd5));
background-image: -webkit-linear-gradient(top, #5186cb, #779dd5);
background-image: -moz-linear-gradient(top, #5186cb, #779dd5);
background-image: linear-gradient(to bottom, #5186cb, #779dd5);
}
</style>
<div class="mktoFormRow">
<div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 10px;">
<div class="mktoOffset" style="width: 10px;"></div>
<div class="mktoFieldWrap mktoRequiredField"><label for="Email" id="LblEmail" class="mktoLabel mktoHasWidth" style="width: 0px;">
<div class="mktoAsterix">*</div>
</label>
<div class="mktoGutter mktoHasWidth" style="width: 10px;"></div><input id="Email" name="Email" placeholder="Email Address" maxlength="255" aria-labelledby="LblEmail InstructEmail" type="email"
class="mktoField mktoEmailField mktoHasWidth mktoRequired" aria-required="true" style="width: 250px;"><span id="InstructEmail" tabindex="-1" class="mktoInstruction"></span>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="subBlog" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="Single_OptIn_IP_Address__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="Campaign_Type__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="Campaign_Theme__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="newFirstName" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="Google_Click_Id__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="Campaign_Medium__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="Campaign_Source__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;">
<div class="mktoClear"></div>
</div>
<div class="mktoButtonRow"><span class="mktoButtonWrap mktoRound" style="margin-left: 120px;"><button type="submit" class="mktoButton">Subscribe</button></span></div><input type="hidden" name="formid" class="mktoField mktoFieldDescriptor"
value="7140"><input type="hidden" name="munchkinId" class="mktoField mktoFieldDescriptor" value="306-ZEJ-256">
</form>
<form id="mktoForm_1944" data-formid="1944" class="subscription-form mkto-form-check mktoForm mktoHasWidth mktoLayoutLeft" novalidate="novalidate"
style="font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); width: 414px;" __bizdiag="1714217501" __biza="WJ__">
<style type="text/css">
.mktoForm .mktoButtonWrap.mktoRound .mktoButton {
color: #fff;
border: 1px solid #a3bee2;
-webkit-border-radius: 5px;
-moz-border-radius: 5px;
border-radius: 5px;
background-color: #779dd5;
background-image: -webkit-gradient(linear, left top, left bottom, from(#779dd5), to(#5186cb));
background-image: -webkit-linear-gradient(top, #779dd5, #5186cb);
background-image: -moz-linear-gradient(top, #779dd5, #5186cb);
background-image: linear-gradient(to bottom, #779dd5, #5186cb);
padding: 0.4em 1em;
font-size: 1em;
}
.mktoForm .mktoButtonWrap.mktoRound .mktoButton:hover {
border: 1px solid #45638c;
}
.mktoForm .mktoButtonWrap.mktoRound .mktoButton:focus {
outline: none;
border: 1px solid #45638c;
}
.mktoForm .mktoButtonWrap.mktoRound .mktoButton:active {
background-color: #5186cb;
background-image: -webkit-gradient(linear, left top, left bottom, from(#5186cb), to(#779dd5));
background-image: -webkit-linear-gradient(top, #5186cb, #779dd5);
background-image: -moz-linear-gradient(top, #5186cb, #779dd5);
background-image: linear-gradient(to bottom, #5186cb, #779dd5);
}
</style>
<div class="mktoFormRow">
<div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 10px;">
<div class="mktoOffset" style="width: 10px;"></div>
<div class="mktoFieldWrap mktoRequiredField"><label for="Email" id="LblEmail" class="mktoLabel mktoHasWidth" style="width: 0px;">
<div class="mktoAsterix">*</div>
</label>
<div class="mktoGutter mktoHasWidth" style="width: 10px;"></div><input id="Email" name="Email" placeholder="Email Address" maxlength="255" aria-labelledby="LblEmail InstructEmail" type="email"
class="mktoField mktoEmailField mktoHasWidth mktoRequired" aria-required="true" style="width: 250px;"><span id="InstructEmail" tabindex="-1" class="mktoInstruction"></span>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="subBlog" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="Single_OptIn_IP_Address__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="Campaign_Type__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="Campaign_Theme__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="newFirstName" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="Google_Click_Id__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="Campaign_Medium__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="email" style="margin-bottom: 10px;">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="Campaign_Source__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="nurture" style="margin-bottom: 10px;">
<div class="mktoClear"></div>
</div>
<div class="mktoButtonRow"><span class="mktoButtonWrap mktoRound" style="margin-left: 120px;"><button type="submit" class="mktoButton">Subscribe</button></span></div><input type="hidden" name="formid" class="mktoField mktoFieldDescriptor"
value="1944"><input type="hidden" name="munchkinId" class="mktoField mktoFieldDescriptor" value="306-ZEJ-256">
</form>
<form data-formid="1944" class="subscription-form mkto-form-check mktoForm mktoHasWidth mktoLayoutLeft" novalidate="novalidate"
style="font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); visibility: hidden; position: absolute; top: -500px; left: -1000px; width: 1600px;" __bizdiag="840173383" __biza="WJ__"></form>
<form data-formid="7140" class="subscription-form-blog-new mkto-form-check mktoForm mktoHasWidth mktoLayoutLeft" novalidate="novalidate"
style="font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); visibility: hidden; position: absolute; top: -500px; left: -1000px; width: 1600px;" __bizdiag="840173383" __biza="WJ__"></form>
Text Content
Skip to main content This site uses JavaScript to provide a number of functions, to use this site please enable JavaScript in your browser. Open Open Open Search Toggle * Careers * Blog * Partners * Risk Assessment * Support * Contact Us * Get in touch * 1-408-533-0288 * Chat with us * Sign In * admin.zscaler.net * admin.zscalerone.net * admin.zscalertwo.net * admin.zscalerthree.net * admin.zscalerbeta.net * admin.zscloud.net * Zscaler Private Access * en * fr * de * it * ja * es The world’s largest security platform built for the cloud * See The Difference * Zero Trust * Zscaler Difference * What is Zero Trust The strategy on which Zscaler was built * How Zscaler Delivers Zero Trust A platform that enforces policy based on context * Zero Trust Resources Learn its principles, benefits, strategies See how the Zero Trust Exchange can help you leverage cloud, mobility, AI, IoT, and OT technologies to become more agile and reduce risk Learn More * Customer Success Stories Hear first-hand transformation stories * Analyst Recognition Industry experts weigh in on Zscaler * See the Zscaler Cloud in Action Traffic processed, malware blocked, and more * Experience the Difference Get started with zero trust See how the Zero Trust Exchange can help you leverage cloud, mobility, AI, IoT, and OT technologies to become more agile and reduce risk Learn More * Products & Solutions * Overview * Industries & Partners * Secure Your Users Provide users with seamless, secure, reliable access to applications and data. Secure Your Workloads Build and run secure cloud apps, enable zero trust cloud connectivity, and protect workloads from data center to cloud. Secure Your OT and IoT Provide zero trust connectivity for OT and IoT devices and secure remote access to OT systems. * Products Transform your organization with 100% cloud-native services * Secure Internet Access (ZIA) * Secure Private Access (ZPA) * Digital Experience (ZDX) * Posture Control * Solutions Propel your business with zero trust solutions that secure and connect your resources * Stop Cyberattacks * Protect Data * Zero Trust App Access * VPN Alternative * Accelerate M&A/Divestitures * Optimize Digital Experiences * Zero Trust SD-WAN * Build and Run Secure Cloud Apps * Zero Trust Cloud Connectivity * Zero Trust for IoT/OT Make hybrid work possible Secure work from anywhere, protect data, and deliver the best experience possible for users Get Started * Industries Our ecosystem of zero trust partners * Zscaler for Public Sector * Zscaler for Federal * Zscaler for State and Local * Zscaler for Education * Zscaler for Australian Government * Zscaler for China * Zscaler for Banking and FS * Zscaler for Healthcare * Partner Integrations Simplified deployment and management * Microsoft * CrowdStrike * AWS * Okta * Splunk * Aruba * Cisco * VMware * SAP * Salesforce * ServiceNow Secure your ServiceNow Deployment It’s time to protect your ServiceNow data better and respond to security incidents quicker Get Started * Platform * Platform * Technology * Platform Overview Unified platform for transformation * Zero Trust Exchange * Zscaler Client Connector * Compliance * Privacy * Capabilities Integrated services, infinitely scalable * SSL Inspection * Advanced Threat Protection * Bandwidth Control * Machine Learning Security * Security Service Edge * Secure Access Service Edge * Zero Trust Network Access Accelerate your transformation Protect and empower your business by leveraging the platform, process and people skills to accelerate your zero trust initiatives Learn More * Technologies Global proxy-based cloud architecture * Secure Web Gateway * Cloud Firewall * Cloud IPS * Cloud DLP * Cloud Sandbox * Cloud Browser Isolation * Cloud Configuration Security (CSPM) * Cloud Identity and Entitlements (CIEM) * Cloud Access Security Broker (CASB) * Cloud Native Application Protection Platform (CNAPP) * Deception Gartner Magic Quadrant Leader Zscaler: A Leader in the Gartner® Magic Quadrant™ for Security Service Edge (SSE) New Positioned Highest in the Ability to Execute Read Report * Resources * Learn * Act * Engage * Content Library Explore topics that will inform your journey * Blog Perspectives from technology and transformation leaders * Security Assessment Toolkit Analyze your environment to see where you could be exposed * Webinars and Demos A first-hand look into important topics * Executive Insights App Security insights at your fingertips * Ransomware ROI Calculator Assess the ROI of ransomware risk reduction * Training and Certifications Engaging learning experiences, live training, and certifications * Customer Success Center Quickly connect to resources to accelerate your transformation * Customer Success Stories Hear first-hand transformation stories Customer Success Center All your Zscaler essentials in one place Get Started * Security & Threat Analytics Threat dashboards, cloud activity, IoT, and more * Security Advisories News about security events and protections * Vulnerability Disclosure Program Webinars, training, demos, and more * Trust Portal Zscaler cloud status and advisories Zero Trust Content Library Dive into the latest security research and best practices Get Started * The Cloud-First Architect Tools and best practices for the cloud * Zenith Community Discuss ideas and issues with peers * CXO REvolutionaries Events, insights, and resources for CXOs * Cloud Security Alliance Securing the cloud through best practices * Events Upcoming opportunities to meet with Zscaler Zero Trust Content Library Dive into the latest security research and best practices Get Started * Company * About * Media * Partners * About Zscaler How it began, where it’s going * Leadership Meet our management team * Investor Relations News, stock information, and quarterly reports * Compliance Our adherence to rigorous standards * ESG Our Environmental, Social, and Governance approach * Events Upcoming opportunities to meet with Zscaler Zscaler Careers Join a recognized leader in Zero trust to help organization transform securely Apply Now * Media Center News, blogs, events, photos, logos, and other brand assets * News and Press Zscaler in the news Zscaler Careers Join a recognized leader in Zero trust to help organization transform securely Apply Now * Partner Portal Tools and resources for Zscaler partners * Summit Partner Program Collaborating to ensure customer success * System Integrators Helping joint customers become cloud-first companies * Service Providers Delivering an integrated platform of services * Technology Deep integrations simplify cloud migration * Partner Inquiry Become a Zscaler partner Zscaler Careers Join a recognized leader in Zero trust to help organization transform securely Apply Now * * Request a demo * Request a demo ZSCALER CLOUD PLATFORM May 25, 2022 A BRIEF(ER) HISTORY OF ZERO TRUST: MAJOR MILESTONES IN RETHINKING ENTERPRISE SECURITY WHY TELL THE STORY OF ZERO TRUST? Many in IT security believe zero trust is a game-changer, a fundamental rethink about enterprise security and protection of the networks and resources that house our best ideas, connect our brightest talent, and grant access to transformative productivity tools. But to understand how truly revolutionary the zero trust model is in cybersecurity, it’s necessary to understand how the idea of zero trust architecture evolved into one that fundamentally overhauls decades-old thinking. What follows is a brief history of some of the key moments in the making of the zero trust movement. Key moments in the history of zero trust 1987 – Engineers from the Digital Equipment Corporation (DEC) publish the first paper on firewall technology, ushering in decades of "castle-and-moat" network security thinking 2001 – IEEE Standards Association publishes the 802.1X protocol for network access control (NAC 2004 – The Jericho forum is chartered, introducing the principle of de-perimeterization 2007 - The Defense Information Systems Agency (DISA) publishes its "black core" model for a software-defined perimeter, which struggled to gain traction. 2009 – Google's BeyondCorp is founded to reimagine security architecture in the wake of Operation Aurora 2010 – Analyst John Kindervag coins the term "zero trust" in a paper for the Forrester Research Group 2013 - The Cloud Security Alliance's software-defined perimeter, dependent on SPA, flounders due to tech limitations; The Jericho Forum declares de-perimeterization a “fact” and disbands 2017 – Continuous Adaptive Risk and Trust Assessment (CARTA) is designed as a risk management framework by Gartner 2019 – Gartner introduces the concept of the secure access service edge (SASE) 2020 – NIST publishes SP 800-207 as a unified framework for establishing zero trust architecture (ZTA) 2021 – Gartner specifies the security components of SASE are a new market category, known as the secure service edge (SSE) 2022 – The U.S. Government's Office of Management and Budget mandates the adoption of zero trust principles for all agencies by 2024 802.1X AND NETWORK ACCESS CONTROL The 802.1X protocol was released in 2001 as a standard regulating network access control (NAC) for wireless devices. The increasing adoption of these wireless devices was complicating notions of a strictly defined corporate perimeter, and organizations were feeling a need to address their growing use. The 802.1X supplicant, or client, was meant to allow networks to authenticate an endpoint before allowing a connection. Unfortunately, not all devices were 802.1X-capable. Printers, IoT systems, and other connected devices prevented this method from serving as a universal solution to the problem of unauthorized network access. THE JERICHO FORUM IMAGINES A BOLD WAY FORWARD In 2003, a group of European technology leaders recognized the problems inherent to castle-and-moat network architecture and began discussing ways to bring down the network walls. They convened a working group in 2004 known as The Jericho Forum, which introduced the idea of “de-perimeterization” and gave the world a set of "commandments" that laid the groundwork for best practices for governing perimeter-less networks. MORE THAN A BUZZWORD: ENTER “ZERO TRUST” In 2010, Forrester analyst John Kindervag published a paper titled “No More Chewy Centers: Introducing The Zero Trust Model Of Information Security." More than a buzzword, it gave the IT security industry something to latch onto when architecting a new model for connectivity. The premise was that presence on a network was not a sufficient basis for granting trust. Identity – and the ability to verify it – replaced the perimeter as the core criterion for access. Alas, up to this point, nothing fundamental had shifted in the enterprise environment itself. Networks were still an all-or-nothing, inside-or-out construct. BEYOND (THE PERIMETER) CORP As is so often the case in cybersecurity, threat actors drove the next evolution in network security. China’s People’s Liberation Army conducted a major operation against U.S. tech companies including Akamai, Adobe, and Juniper Networks – and Google responded with BeyondCorp. The intent, according to Google, was “shifting access controls from the network perimeter to individual users…[enabling] secure work from virtually any location without the need for a traditional VPN.” Zero trust, in its purest sense of disregard for the on/off-network distinction, had arrived. But Google was seeking to address a difficult problem, and despite trying to “pave the path for other organizations to realize their own implementation of a zero trust network,” it was still a strategy beyond the capabilities of most enterprises in 2010. “THE MAN” WEIGHS IN ON ZERO TRUST In 2020, the National Institute for Standards and Technology (NIST) reframed the conversation with its NIST 800-207 standard for zero trust architecture. This new cybersecurity paradigm was focused on resource protection and the premise that trust should never be granted implicitly, but must continuously be evaluated. The shackles of the perimeter and the notion of the virtual private network were discarded. Its essentials are key to understanding how zero trust operates, and why it’s a departure from the approaches that came before it. The 800-207 standard stipulates key tenets and assumptions for zero trust. Three of the most critical points (from a much longer list) are: 1. No resource is inherently trusted. 2. All communication is secured regardless of network location. 3. All resource authentication and authorization are dynamic and strictly enforced before access is allowed. If this was a paradigm shift in terms of thinking about zero trust, the revolution in terms of advancement came with the U.S. Office of Management and Budget (OMB) M-22-09 directive, issued in 2022. Suddenly, zero trust became the law of the land, at least where U.S. federal agencies were concerned. But the implications were broader. With executive endorsement – almost certainly bearing in mind a high-profile 2021 supply chain attack that compromised federal agencies including State, Treasury, Homeland Security, Commerce, and Energy – the zero trust methodology had the weight of the American government behind it. FURTHER REFINING ZERO TRUST The U.S. government’s endorsement of zero trust principles didn’t mark the end of advancement for this model. Zscaler's approach to zero trust architecture aligns closely with NIST's ZTA framework and Gartner's definition for SSE. And it goes beyond these standards, with three fundamental advancements in zero trust thinking: 1. All traffic is zero trust traffic 2. Identity and context always come before connectivity 3. Applications - and even app environments - should remain invisible to unauthorized users To learn more about this modern approach to zero trust, including how Zscaler is driving the next milestones in rethinking enterprise security, read the full white paper “A brief history of zero trust: Major milestones in rethinking enterprise security.” You can also catch a recording of my LinkedIn Live presentation on the topic with Greg Simpson. * Product Insights * Zscaler Cloud Platform * * * * * AUTHOR LISA LORENZIN RECOMMENDED FOR YOU LEVERAGING ZSCALER FOR YOUR NEXT IT M&A INTEGRATION ZERO TRUST IS HERE TO STAY. IS YOUR ORGANIZATION READY? HERE COMES THE HYBRID OFFICE—AND IT’S GOING TO BE A NIGHTMARE FOR IT LEADERS ZERO TRUST SUCCESS STORIES FROM SMALL AND MEDIUM-SIZED ORGANIZATIONS GET THE LATEST ZSCALER BLOG UPDATES IN YOUR INBOX * Subscribe Subscription confirmed. More of the latest from Zscaler, coming your way soon! By submitting the form, you are agreeing to our privacy policy. * Platforms & Products * Zero Trust Exchange * Zscaler Client Connector * Zscaler Internet Access * Zscaler Private Access * Zscaler B2B * Zscaler Cloud Protection * Zscaler Digital Experience * Solutions * Secure Work-from-Anywhere * Modern Workplace Enablement * Security Transformation * Technologies & Capabilities * Secure Access Service Edge * Zero Trust Network Access * Secure Web Gateways * Cloud Firewall * Cloud Sandbox * Cloud IPS * Cloud DLP * Cloud Browser Isolation * Technologies & Capabilities * Cloud Identity and Entitlements * CASB * SSL Inspection * Advanced Threat Protection * Bandwidth Control * Machine Learning Security * Popular Links * Careers * About Zscaler * Leadership * Content Library * News and Press Releases * Media Kit * CXO REvolutionaries * Zenith Community * Information * Zpedia * Plans and Pricing * Virtual Briefing Center * Zscaler FAQs * Contact Us * Subscribe Thanks for subscribing * * * * * Sitemap * Privacy * Legal * Security ©2023 Zscaler, Inc. All rights reserved. ZscalerTM and Zero Trust ExchangeTM are either (i) registered trademarks or service marks or (ii) trademarks or service marks of Zscaler, Inc. in the United States and/or other countries. Any other trademarks are the properties of their respective owners. Zscaler uses cookies to personalize content and ads, to provide social media features and to analyze our traffic. We also share information about your use of our site with our social media, advertising and analytics partners.Please review our Cookies Policy for more information. Cookies Settings Accept Cookies