www.zscaler.com Open in urlscan Pro
2606:4700::6812:1d4a  Public Scan

Submitted URL: https://hello.zscaler.com/api/mailings/click/PMRGSZBCHIYTONRXGEYTKNZMEJ2XE3BCHIRGQ5DUOBZTULZPO53XOLT2ONRWC3DFOIXGG33NF5RXK...
Effective URL: https://www.zscaler.com/customers/cushman-wakefield
Submission: On October 03 via api from US — Scanned from DE

Form analysis 3 forms found in the DOM

<form class="mb-[3rem] pt-[4.8rem] md:mb-[4.2rem] md:pt-[3rem]">
  <div class="relative"><input placeholder="What are you looking for?" aria-label="job-search-input" class="
  border-0
  focus:ring-0
  w-full
  font-normal
  text-[2rem]
  leading-10
  -tracking-[0.01rem]
  py-[1.3rem]
  pr-[3rem]
  bg-[transparent]
  focus:outline-none
  md:text-[3.2rem]
  md:leading-[3.5rem]
  border-b-[0.3rem]
  autofill:shadow-[0 0 0px 1000px transparent inset]
  autofill:transition-[background-color]
  autofill:duration-[5000s]
  autofill:ease-in-out
   text-white border-b-rebrandSkyBlue autofill:text-white placeholder:text-white placeholder:opacity-[0.4]" value=""></div>
</form>

<form class="marketoForm_root__Wkgni marketoForm_variant_footer__jwLCq mktoForm mktoHasWidth mktoLayoutLeft" id="mktoForm_1944" style="opacity: 100; font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); width: 1601px;"
  novalidate="novalidate">
  <style type="text/css">
    .mktoForm .mktoButtonWrap.mktoRound .mktoButton {
      color: #fff;
      border: 1px solid #a3bee2;
      -webkit-border-radius: 5px;
      -moz-border-radius: 5px;
      border-radius: 5px;
      background-color: #779dd5;
      background-image: -webkit-gradient(linear, left top, left bottom, from(#779dd5), to(#5186cb));
      background-image: -webkit-linear-gradient(top, #779dd5, #5186cb);
      background-image: -moz-linear-gradient(top, #779dd5, #5186cb);
      background-image: linear-gradient(to bottom, #779dd5, #5186cb);
      padding: 0.4em 1em;
      font-size: 1em;
    }

    .mktoForm .mktoButtonWrap.mktoRound .mktoButton:hover {
      border: 1px solid #45638c;
    }

    .mktoForm .mktoButtonWrap.mktoRound .mktoButton:focus {
      outline: none;
      border: 1px solid #45638c;
    }

    .mktoForm .mktoButtonWrap.mktoRound .mktoButton:active {
      background-color: #5186cb;
      background-image: -webkit-gradient(linear, left top, left bottom, from(#5186cb), to(#779dd5));
      background-image: -webkit-linear-gradient(top, #5186cb, #779dd5);
      background-image: -moz-linear-gradient(top, #5186cb, #779dd5);
      background-image: linear-gradient(to bottom, #5186cb, #779dd5);
    }
  </style>
  <div class="mktoFormRow">
    <div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 10px;">
      <div class="mktoOffset" style="width: 10px;"></div>
      <div class="mktoFieldWrap mktoRequiredField"><label for="Email_1944" id="LblEmail_1944" class="mktoLabel mktoHasWidth" style="width: 0px;">
          <div class="mktoAsterix">*</div>
        </label>
        <div class="mktoGutter mktoHasWidth" style="width: 10px;"></div><input id="Email_1944" name="Email" placeholder="Please enter your email to subscribe" maxlength="255" aria-labelledby="LblEmail_1944 InstructEmail_1944" type="email"
          class="mktoField mktoEmailField mktoHasWidth mktoRequired" aria-required="true" style="width: 250px;" aria-label="Enter email"><span id="InstructEmail_1944" tabindex="-1" class="mktoInstruction"></span>
        <div class="mktoClear"></div>
      </div>
      <div class="mktoClear"></div>
    </div>
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="subBlog" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Single_OptIn_IP_Address__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Campaign_Type__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Campaign_Theme__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="newFirstName" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Google_Click_Id__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Campaign_Medium__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Campaign_Source__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" placeholder="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoButtonRow"><span class="mktoButtonWrap mktoRound" style="margin-left: 120px;"><button type="submit" class="mktoButton">Subscribe</button></span></div><input type="hidden" name="formid" class="mktoField mktoFieldDescriptor"
    value="1944" placeholder=""><input type="hidden" name="munchkinId" class="mktoField mktoFieldDescriptor" value="306-ZEJ-256" placeholder=""><input type="hidden" name="LeadSource" class="mktoField mktoFieldDescriptor" value="Website Direct"
    placeholder=""><input type="hidden" name="Lead_Source_Type__c" class="mktoField mktoFieldDescriptor" value="Website" placeholder=""><input type="hidden" name="Lead_Source_Detail__c" class="mktoField mktoFieldDescriptor" value=""
    placeholder=""><input type="hidden" name="Lead_Source_Recent__c" class="mktoField mktoFieldDescriptor" value="" placeholder=""><input type="hidden" name="Campaign_Content__c" class="mktoField mktoFieldDescriptor" value="" placeholder=""><input
    type="hidden" name="Campaign_ID__c" class="mktoField mktoFieldDescriptor" value="" placeholder=""><input type="hidden" name="Campaign_Term__c" class="mktoField mktoFieldDescriptor" value="" placeholder="">
</form>

<form class="marketoForm_root__Wkgni marketoForm_variant_footer__jwLCq mktoForm mktoHasWidth mktoLayoutLeft"
  style="opacity: 0; font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); visibility: hidden; position: absolute; top: -500px; left: -1000px; width: 1600px;" novalidate="novalidate"></form>

Text Content

___

This site uses JavaScript to provide a number of functions, to use this site
please enable JavaScript in your browser.
OpenSearch
ThreatLabzCXO REvolutionariesCareersPartnersSupport
ShowContact UsOptions
Get in touch1-408-533-0288Chat with us
ShowSign InOptions
Zscaler Cloud Portal | AdminZscaler Cloud Portal One | AdminZscaler Cloud Portal
Two | AdminZscaler Cloud Portal Three | AdminZscaler Cloud Portal Beta |
Adminadmin.zscloud.netZscaler Private Access Cloud Portal One | AdminZscaler
Private Access Cloud Portal Two | Admin

Home
The Zscaler ExperienceProducts & SolutionsPlatformResourcesCompany
Request a demoopen search
open navigation
The Zscaler Experience

Zscaler: A Leader in the 2024 Gartner® Magic Quadrant™ for Security Service Edge
(SSE)

Get the full report

Your world, secured

Experience the transformative power of zero trust.



The Zscaler Difference

The Zscaler Difference
Experience the World’s Largest Security Cloud
Customer Success Stories
Analyst Recognition
Machine Learning and AI at Zscaler
Reduce Your Carbon Footprint

Zero Trust Fundamentals

Zero Trust Fundamentals
What Is Zero Trust?
What Is Security Service Edge (SSE)?
What Is Zero Trust Network Access (ZTNA)?
What Is Secure Web Gateway (SWG)?
What Is Cloud Access Security Broker (CASB)?
What Is Secure Access Service Edge (SASE)?
What is Data Security Posture Management (DSPM)?
Zero Trust Resources
Products & Solutions
Secure Your Users

Provide users with seamless, secure, reliable access to applications and data.


Secure Your Workloads

Build and run secure cloud apps, enable zero trust cloud connectivity, and
protect workloads from data center to cloud.


Secure Your IoT and OT

Provide zero trust connectivity for IoT and OT devices and secure remote access
to OT systems.




Products

Products

Transform your organization with 100% cloud native services

Secure Internet Access (ZIA)
Secure Private Access (ZPA)
Digital Experience (ZDX)
Data Protection (CASB/DLP)

Solution Areas

Solution Areas

Propel your business with zero trust solutions that secure and connect your
resources

Cyberthreat Protection
Data Protection
Zero Trust Networking
Business Analytics
VPN Alternative
Zero Trust SASE
Accelerate M&A Integration
Optimize Digital Experiences
Zero Trust SD-WAN
Zero Trust Cloud Connectivity
Zero Trust for IoT/OT
Data Security Posture Management (DSPM)
Find a Product or Solution
Partner IntegrationsIndustry and Market Solutions
Platform
Zero Trust Exchange Platform

Learn how Zscaler delivers zero trust with a cloud native platform that is the
world’s largest security cloud

Zero Trust Exchange PlatformTitle Link


Transform with Zero Trust Architecture

Transform with Zero Trust Architecture

Propel your transformation journey

Secure Digital Transformation
Application Transformation
Network Transformation
Security Transformation

Secure Your Business Goals

Secure Your Business Goals

Achieve your business and IT initiatives

Ensure Secure Business Continuity
Accelerate M&A and Divestitures
Recession-Proof Your Enterprise
Secure Your Hybrid Workforce
Download Zscaler Client Connector
Resources
Learn, connect, and get support.

Explore tools and resources to accelerate your transformation and secure your
world

Learn, connect, and get support.Title Link

Amplifying the voices of real-world digital and zero trust pioneers

Visit now


Stay up to date on best practices

Resource Library
Blog
Customer Success Stories
Webinars
Zpedia

Find programs, certifications, and events

Upcoming Events
Zenith Live
Zscaler Academy

Get research and insights at your fingertips

ThreatLabz Analytics

Tools designed for you

Security Preview
Threat Assessment Tools
Security Advisory Updates
Disclose a Vulnerability
Executive Insights App
Ransomware Protection ROI Calculator

Connect and find support

Customer Success Center
Zenith Community
CXO REvolutionaries
Zscaler Help Portal

See solutions for your industry and country

Public Sector
Healthcare
Financial Services
Education
See all

Resource Center

Resource Center

Stay up to date on best practices

Resource Library
Blog
Customer Success Stories
Webinars
Zpedia

Events & Trainings

Events & Trainings

Find programs, certifications, and events

Upcoming Events
Zenith Live
Zscaler Academy

Security Research & Services

Security Research & Services

Get research and insights at your fingertips

ThreatLabz Analytics

Tools

Tools

Tools designed for you

Security Preview
Threat Assessment Tools
Security Advisory Updates
Disclose a Vulnerability
Executive Insights App
Ransomware Protection ROI Calculator

Community & Support

Community & Support

Connect and find support

Customer Success Center
Zenith Community
CXO REvolutionaries
Zscaler Help Portal

Industry & Market Solutions

Industry & Market Solutions

See solutions for your industry and country

Public Sector
Healthcare
Financial Services
Education
See all
Company
About Zscaler

Discover how it began and where it’s going

Partners

Meet our partners and explore system integrators and technology alliances

News & Announcements

Stay up to date with the latest news

Leadership Team

Meet our management team

Partner Integrations

Partner Integrations

Investor Relations

See news, stock information, and quarterly reports

Environmental, Social & Governance

Learn about our ESG approach

Careers

Join our mission

Press Center

Find everything you need to cover Zscaler

Compliance

Understand our adherence to rigorous standards

Zenith Ventures

Understand our adherence to rigorous standards

Customer Success Story


CUSHMAN & WAKEFIELD BLOCKS MILLIONS OF THREATS & ACCELERATES M&A INTEGRATIONS

Zscaler Reduces Dependence on VPN and Improves Secure Cloud App Access for
52,000+ Users




challenges

Provide secure SaaS access for mobile users, protect against external and
internal threats, and adopt a security-as-a-service model



results

Supports the business model: 80% SaaS environment used by mostly mobile users

Reduces risk: Detected and blocked 2.3M threats hidden in encrypted traffic in 3
months

Boosts protection: Prevented 513.2M policy violations and blocked 3.3M security
threats in 90 days

Reduced reliance on VPN and SD-WAN at 400+ sites worldwide, easing the security
as a service transition

Speeds up M&A integration by providing access to key apps in days, not months


 1. Customer Snapshot
 2. Customer Video
 3. Customer Quote
 4. Customer Case Study
 5. More from This Customer
 6. Products and Solutions
 7. Related Customer Success Stories




Cushman & Wakefield snapshot

Founded in 1917, Cushman & Wakefield is one of the “big three” largest
commercial real estate services organizations in the world. The publicly traded
company manages approximately 5.1 billion square feet of commercial space and
has 52,000 employees in more than 400 offices across 60 countries.

Industry:

Real Estate

HQ:

Chicago, Illinois, USA

Size:

52,000+ employees across 400 offices in 60 countries

Video


LAYING THE FOUNDATION FOR CLOUD AND SD-WAN WITH ZSCALER

Play Customer Video

▶



ERIK HART

Chief Information Security Officer, Cushman & Wakefield
My goal is to work with a trusted security partner who can provide a
streamlined, simple-to-manage service that has the ability to scale—and that’s
exactly where the Zscaler Zero Trust Exchange fits into our strategy.

Customer Case Study


SHIFTING FROM A LEGACY INFRASTRUCTURE TO THE CLOUD

When CISO Erik Hart joined Cushman & Wakefield about five years ago, his vision
was to shift the company’s approach to security away from infrastructure,
devices, and appliances to thinking about cloud-based security as a service
(SECaaS).

A globally distributed company with hundreds of branch offices and a mostly
mobile workforce, Cushman & Wakefield needed to improve SaaS application
performance for users, simplify its network architecture, and accelerate M&A
integrations. In 2019, the company adopted SD-WAN and the Zscaler Zero Trust
Exchange as its compatible cloud-based security solution. Since then, Cushman &
Wakefield has pushed ahead with its cloud-first goals even more aggressively,
significantly minimizing reliance on the data center and SD-WAN.

“We’ve had a big shift in how we operate our business. Given that SaaS is 80% of
what powers Cushman & Wakefield, we’re continuing to simplify our infrastructure
and shrink the size of our data centers as we move to a cloud-first and
partner-first model,” said CISO Erik Hart. “As a security practitioner, my goal
is to work with a trusted security partner who can provide a streamlined,
simple-to-manage service that has the ability to scale—and that’s exactly where
the Zscaler Zero Trust Exchange fits into our strategy.


THE ZERO TRUST JOURNEY BEGINS WITH SECURING APPLICATION ACCESS FOR MOBILE USERS

Because of the nature of Cushman & Wakefield’s business, many employees—property
managers, building engineers, and other technicians—work out in the field. Even
before the COVID-19 pandemic, only about 30% of users worked in a corporate
office.

When Cushman & Wakefield rolled out SD-WAN to improve connectivity, Hart sought
out a security solution that would provide the benefits of a next-generation
firewall at a lower cost, with less maintenance, and with greater flexibility.
He and his team selected Zscaler Internet Access (ZIA), part of the Zero Trust
Exchange. Zscaler integrated seamlessly and enabled secure local internet
breakouts without the expense and complexity of traditional on-premises firewall
appliances.

Zscaler also provided identical protection for users using any device, wherever
they connected to the internet or accessed Microsoft 365, Salesforce, Mimecast,
Workday, or SaaS-based real estate applications. The combined solution also gave
the team complete visibility over what was happening on the network and who was
using which applications. Zscaler enabled the IT team to prioritize traffic to
business-critical applications over traffic going to YouTube or social media.


FOLLOWING THE USER WITH UNIFIED SECURITY POLICIES AND RAPID SAAS ACCESS

Cushman & Wakefield was fully prepared for remote work when the time came. Hart
recounted: “In 2020, when the pandemic hit, a C-level technology peer asked me,
‘So, what do we have to do to pivot with security?’ I answered, ‘Nothing. We’re
all set. Zscaler is already on everyone’s computer.’" 

For Hart, the big advantage of Zscaler is that it follows the user. No matter
where employees work—in the field, at home, or at the office—they have
consistent protection and policy enforcement along with fast, direct access to
the SaaS applications they need to do their jobs.

Hart and his team plan to continue modernizing branch office connectivity while
strengthening security. They are beginning to set up new offices following a
café model, where users can securely connect to corporate resources without the
need for outdated point-to-point VPN or SD-WAN. To enable access to private
applications, he intends to broaden his implementation of Zscaler Private
Access.


COMPREHENSIVE PROTECTION COVERS ALL THE BASES

When it comes to cybersecurity, one of Hart’s primary areas of focus is
protecting the company’s systems and sensitive data from ransomware and other
advanced attacks, breaches, and insider threats motivated by malice or resulting
from carelessness.

“The Zscaler Zero Trust Exchange plays a critical role in keeping threats at bay
by minimizing the attack surface. Because a user is connected only to a single
application and not to the network, lateral movement of a potential attacker is
eliminated,” Hart pointed out.

To prevent compromise, Zscaler performs TLS/SSL traffic inspection before
establishing connectivity to SaaS applications in order to identify malware and
leaked data hidden in encrypted traffic. AI-powered cloud security services
further enhance protection, preventing ransomware, phishing, zero-day malware,
and advanced attacks based on threat intelligence gathered from 300 trillion
daily signals by Zscaler ThreatLabz. 

Zscaler also protects mobile users and their devices from phishing and web-based
attacks through configurable URL filtering rules and policies that control
access to specified categories of websites and sites with high risk scores.

Quote

> With the Zscaler Zero Trust Exchange, we’re pleased to say that we’ve had no
> major security events that negatively affected our clients or users.

Erik Hart, Chief Information Security Officer, Cushman & Wakefield


INTEGRATIONS SUPPORT A COORDINATED, EXTENSIBLE ZERO TRUST PLATFORM

The interoperability between Zscaler and other strategic solutions in Cushman &
Wakefield’s technology ecosystem is fundamental to the company’s cloud-first and
zero trust transformation. With its open API, Zscaler simplifies integration
with these critical solutions, making consolidated infrastructure and
defense-in-depth a reality.

In 2019, when the company decided to use SD-WAN, it deployed Zscaler to secure
connections to the open internet and SaaS applications at its more than 400
branch offices. With the integration, branch offices manage cloud and internet
traffic without backhauling it to the data center, resulting in faster
connections and a better user experience. The integration also provides
consistent protection for all users, regardless of location, and policy-based
access company-wide, without the maintenance headaches and high costs of
on-premises firewall appliances.

“To advance our goal of achieving cloud agility and simplicity, it made sense to
go with Zscaler because it  integrates so seamlessly with SD-WAN,” said Hart. 

More recently, the Zscaler integration with CrowdStrike has enhanced endpoint
protection by sharing real-time threat intelligence, data alerts, and device
health information. The Zscaler-CrowdStrike integration continually assesses the
security of devices in real time. Only devices that meet the designated Zero
Trust Assessment (ZTA) score threshold can access sensitive applications. Shared
threat intelligence and automated workflows help minimize the number of security
incidents.

“The ZTA score, threat intelligence, and automated workflow provide our team
with insight into the threat landscape to apply appropriate access policies,
reduce the attack surface, prevent lateral movement, and deliver timely threat
detection and response,” noted Hart


TAILORING SECURITY TO MEET CLIENTS’ DATA PRIVACY AND COMPLIANCE REQUIREMENTS

As a global organization, Cushman & Wakefield works with clients of all types,
all with varying data privacy requirements and security postures depending on
their size and location. The agile, scalable Zscaler architecture enables his
team to customize protection as needed. 

“Zscaler gives us the flexibility to address the security and compliance needs
of clients in each of our locations without having to invest in additional
security point products. We may need strong data loss prevention for our large
financial sector clients and other capabilities for a single building that's
owned by a real estate investor who wants to look after the needs of his or her
tenants. Zscaler is perfect for us in that regard,” said Hart


SCALABLE SECURITY AND STREAMLINED INFRASTRUCTURE FOSTER BUSINESS AGILITY

The positive impacts of Zscaler are readily apparent at Cushman & Wakefield. Not
only can the platform scale to process upwards of 20 billion transactions every
quarter; it also reduces business risk by monitoring traffic for data leaks and
malware. In just three months, Zscaler detected and blocked 2.3 million
encrypted threats. Furthermore, Zscaler elevates protection, stopping 513.2M
policy violations and blocking 3.3 million threats in one quarter.

“With the Zscaler Zero Trust Exchange, we’re pleased to say that we’ve had no
major security events that negatively affected our clients or users,” remarked
Hart.

Looking at the big picture, Zscaler fully supports the Cushman & Wakefield
business model, with its mainly SaaS-focused highly mobile workforce. For the
most part, Zscaler has eliminated legacy solutions, such as VPN and firewalls,
that the company relied on in the past. The net result is a more streamlined IT
environment, a unified and improved user experience, a more robust security
posture, and greater agility


HOW ZERO TRUST ADDRESSES THE NEEDS OF A GLOBAL COMPANY

Over the course of his career, Hart noted that one of the biggest digital
transformation lessons he has learned is the importance of evolving the focus of
security—away from infrastructure and toward supporting how, where, and when
employees perform their jobs. That’s why zero trust is central to his philosophy
of less security infrastructure and more attention to creating a seamless
security experience for all users.

By moving core security to the cloud with Zscaler, Cushman & Wakefield can
protect its users anywhere. With zero trust architecture, Hart and his team have
not only gained visibility; they have reduced response time when protecting the
organization and its assets from today’s sophisticated threats. Hart underscored
that Zscaler has enabled Cushman & Wakefield to swiftly meet its security and
technology goals without getting bogged down with “unhelpful legacy
infrastructure that doesn't address immediate needs.”

“In a post-COVID world, we still have good reasons for prioritizing remote work
enablement. As a CISO of a global company, with global responsibilities, it
simply makes more sense for me to prioritize communicating with distant geos
over commuting to an office most days,” he explained.

“The Zscaler Zero Trust Exchange lets us establish a centralized overview of
where users are connecting from, which devices they are using, and the posture
of those devices. And unlike our legacy security stack, it has helped us become
more efficient by consolidating practices like monitoring and blocking.”

Quote

> So many vendors make big promises, but Zscaler actually does what it says it
> can do.

Erik Hart, Chief Information Security Officer, Cushman & Wakefield


WHAT’S NEXT: BETTER VISIBILITY INTO RISK, CONTINUED INTEGRATIONS, SIMPLIFYING
M&AS

As Hart plans for the future, he has three items on his priority list: continued
security ecosystem consolidation, getting a better handle on Cushman &
Wakefield’s security risk profile, and mapping out a strategy to simplify and
accelerate the M&A process.

Streamlining Cushman & Wakefield’s security infrastructure is always top-of-mind
for Hart. He is looking at building a coordinated security ecosystem through
additional Zscaler integrations. This includes making the most of recent
investments in additional CrowdStrike products such as Falcon LogScale, its
next-generation SIEM and log management tool, and integrating with other
existing solutions such as Mimecast, a cloud-based email security and management
system used by all employees.

“An important action item for me is to look more deeply into how we can increase
operational efficiencies by taking full advantage of Zscaler’s open API. We’re
looking at ways to broaden threat intelligence sharing, enable better
visibility, and engage automation to a greater degree,” said Hart.

To better understand Cushman & Wakefield’s security risk, Hart is evaluating
Zscaler Risk360. This intuitive quantification and visualization framework
generates a detailed risk posture profile based on real data ingested from an
organization’s Zscaler environment and Zscaler ThreatLabz security research.
Risk360 is a practical data-driven risk management tool that can help Cushman &
Wakefield gain complete visibility to risk in all areas of its environment and
drive continual cybersecurity improvement. 

Finally, M&As is another area where Hart expects to more fully utilize Zscaler.
While M&A activity slowed down for Cushman & Wakefield during the pandemic, it
is expected to ramp up soon. Zscaler will be instrumental in quickly integrating
acquired companies as well as getting users up and running on business-critical
applications in days rather than months.

“So many vendors make big promises, but Zscaler actually does what it says it
can do. I see that Zscaler, as a vendor, has a well-defined technology roadmap
that provides opportunities for future exploration and expansion,” summarized
Hart


MORE FROM THIS CUSTOMER

CISO Erik Hart on Cushman & Wakefield’s transformation
Read CXO Journey
Cushman & Wakefield’s roadmap for consolidating and simplifying security with
Zscaler
Read the Blog

Products

Zscaler Zero Trust Exchange™
Zscaler Internet Access™ (ZIA™)
Zscaler Private Access™ (ZPA™)

Solutions

Zero Trust App Access
Stop Cyberattacks
Protect Data
Secure Your Users
Accelerate M&A Integration
VPN Alternative
Zero Trust SD-WAN


RELATED CUSTOMER SUCCESS STORIES

ManpowerGroup
View Success Story
Falkirk Council
View Success Story
Protegrity
View Success Story
XPO
View Success Story
01 / 02
Go to next slideGo to previous slide
All customer stories
THE ZSCALER EXPERIENCE

Learn about:

Your world, securedZero TrustSecure Access Service Edge (SASE)Security Service
Edge (SSE)Zero Trust Network Access (ZTNA)Secure Web Gateway (SWG)Cloud Access
Security Broker (CASB)Cloud Native Application Protection Platform (CNAPP)Data
Security Posture Management (DSPM)
PRODUCTS & SOLUTIONS
Secure Your Users

Secure Your Workloads

Secure Your IoT and OT

Secure Internet Access (ZIA)

Data Protection (CASB/DLP)

Digital Experience (ZDX)

Industry & Market Solutions

Partner Integrations

Zscaler Client Connector

PLATFORM
Zero Trust Exchange Platform

Secure Digital Transformation

Network Transformation

Application Transformation

Security Transformation

RESOURCES
Resource Library

Customer Success Stories

Security Preview

Threat Assessment Tools

ThreatLabz Analytics & Insights

Upcoming Events

Blog

Zscaler Academy

CXO Revolutionaries

Zpedia

Ransomware Protection ROI Calculator

POPULAR LINKS
Pricing & Plans

About Zscaler

Leadership Team

Career Opportunities

Find or Become a Partner

Customer Success Center

Investor Relations

Press Center

News & Announcements

ESG

Compliance

Contact Zscaler

Home
English
EnglishFrançaisDeutschItaliano日本Castellano - MexicoCastellano - EspañaPortugues
- Brasil

Zscaler is universally recognized as the leader in zero trust. Leveraging the
largest security cloud on the planet, Zscaler anticipates, secures, and
simplifies the experience of doing business for the world's most established
companies.

English
EnglishFrançaisDeutschItaliano日本Castellano - MexicoCastellano - EspañaPortugues
- Brasil
*












Subscribe
Visit us on FacebookLinkedinFollow us on TwitterSubscribe our Youtube Channel
SitemapPrivacyLegalSecurity
© 2024 Zscaler, Inc.

All rights reserved. Zscaler™ and other trademarks listed at
zscaler.com/legal/trademarks are either (i) registered trademarks or service
marks or (ii) trademarks or service marks of Zscaler, Inc. in the United States
and/or other countries. Any other trademarks are the properties of their
respective owners.







Zscaler uses cookies, pixels, and other tools to collect information you provide
to us and to capture and record your interaction with our site. We use this
information to enhance site navigation, personalize content, analyze your use of
our website, and assist in our marketing efforts and customer service. To
deliver the best experience and to assist with our efforts, Zscaler social
media, advertising, analytics, and hosting service providers may have access to
the information that you provide to us. By clicking "Accept All," you consent to
our collection, use, and disclosure of such information and to ourTerms of
Service. For more information about our data processing practices, please see
ourPrivacy Policy.
Manage Cookie Preferences Reject All Accept All