www.zscaler.com
Open in
urlscan Pro
2606:4700::6812:1d4a
Public Scan
URL:
https://www.zscaler.com/resources/security-terms-glossary/what-is-security-service-edge
Submission: On June 09 via api from US — Scanned from DE
Submission: On June 09 via api from US — Scanned from DE
Form analysis
2 forms found in the DOMPOST https://www.zscaler.com/search
<form action="https://www.zscaler.com/search" method="post" id="nav-search-form" accept-charset="UTF-8" data-drupal-form-fields="edit-keyword,edit-submit--2" role="search" aria-label="sitewide" __bizdiag="1663869817" __biza="WJ__">
<div class="js-form-item form-item js-form-type-textfield form-type-textfield js-form-item-keyword form-item-keyword form-no-label"> <input placeholder="Enter search" data-drupal-selector="edit-keyword" type="text" id="edit-keyword" name="keyword"
value="" size="60" maxlength="128" class="form-text"></div>
<div class="submit-wrapper"><i class="fa fa-search fg-color-white"></i> <input data-drupal-selector="edit-submit" type="submit" id="edit-submit--2" name="op" value="Submit" class="button button--primary js-form-submit form-submit"></div> <input
autocomplete="off" data-drupal-selector="form-xw2utz6hvaahlfxk8deps-t8yqrdtps4cgel8ohjcag" type="hidden" name="form_build_id" value="form-XW2UTZ6HvaAhlfxk8deps_T8yqrdtPs4cGEL8oHjcAg"> <input data-drupal-selector="edit-nav-search-form"
type="hidden" name="form_id" value="nav_search_form">
</form>
POST https://www.zscaler.com/forms/api
<form
class="webform-submission-form webform-submission-add-form webform-submission-subscription-form webform-submission-subscription-add-form webform-submission-subscription-node-46306-form webform-submission-subscription-node-46306-add-form subscription-form js-webform-details-toggle webform-details-toggle fv-form fv-form-bootstrap4"
data-submit-type="ajax" data-thankyou-text="Thanks for subscribing" data-thankyou-container=".subscription-thank-you" data-hide=".input-fields" autocomplete="off" data-drupal-selector="webform-submission-subscription-node-46306-add-form"
action="https://www.zscaler.com/forms/api" method="post" id="webform-submission-subscription-node-46306-add-form" accept-charset="UTF-8" data-drupal-form-fields="edit-email,edit-actions-submit,edit-newfirstname" novalidate="novalidate"
__bizdiag="-47424131" __biza="WJ__"><button type="submit" class="fv-hidden-submit" style="display: none; width: 0px; height: 0px;"></button>
<div class="row justify-content-center">
<div class="col col-12 col-md-4 col-lg-12 d-flex justify-content-center"></div>
<div class="col col-12 col-md-8 col-lg-7 fw-400 d-none text-center subscription-thank-you"></div>
<div class="col col-12 col-md-8 col-lg-7 position-relative input-fields d-flex justify-content-center zmt-16 zmt-lg-0">
<div class="form-group w-100 js-form-item form-item js-form-type-email form-type-email js-form-item-email form-item-email form-no-label fv-has-feedback"> <input class="form-control form-email required" autocomplete="off"
data-drupal-selector="edit-email" type="email" id="edit-email" name="Email" value="" size="60" maxlength="254" placeholder="EMAIL ADDRESS" required="required" aria-required="true" data-fv-message="Email address is mandatory"
data-fv-emailaddress-message="Please enter a valid email address" data-fv-emailremote-message="Please enter your corporate email address"
data-fv-field="Email"><i class="fv-control-feedback" data-fv-icon-for="Email" style="display: none;"></i><small class="form-control-feedback" data-fv-validator="emailAddress" data-fv-for="Email" data-fv-result="NOT_VALIDATED"
style="display: none;">Please enter a valid email address</small><small class="form-control-feedback" data-fv-validator="regexp" data-fv-for="Email" data-fv-result="NOT_VALIDATED" style="display: none;">Please enter a valid email
address</small><small class="form-control-feedback" data-fv-validator="remote" data-fv-for="Email" data-fv-result="NOT_VALIDATED" style="display: none;">Please enter your corporate email address</small><small class="form-control-feedback"
data-fv-validator="notEmpty" data-fv-for="Email" data-fv-result="NOT_VALIDATED" style="display: none;">Email address is mandatory</small><small class="form-control-feedback" data-fv-validator="stringLength" data-fv-for="Email"
data-fv-result="NOT_VALIDATED" style="display: none;">Email address is mandatory</small></div>
<div class="actions position-absolute h-100">
<div class="inner position-relative d-flex justify-content-between"> <input class="webform-button--submit button button--primary js-form-submit form-submit" data-drupal-selector="edit-actions-submit" type="submit" id="edit-actions-submit"
name="op" value="Subscribe"></div>
</div>
<div class="js-form-item form-item js-form-type-textarea form-type-textarea js-form-item-newfirstname form-item-newfirstname form-no-label"> <label for="edit-newfirstname" class="visually-hidden">newFirstName</label>
<div><textarea autocomplete="off" data-drupal-selector="edit-newfirstname" id="edit-newfirstname" name="newFirstName" rows="1" cols="60" class="form-textarea"
data-fv-field="newFirstName"></textarea><i class="fv-control-feedback" data-fv-icon-for="newFirstName" style="display: none;"></i></div>
</div> <input data-drupal-selector="edit-subid" type="hidden" name="subid" value="106"> <input data-drupal-selector="edit-formid" type="hidden" name="formid" value="1944"><small class="form-control-feedback" data-fv-validator="stringLength"
data-fv-for="newFirstName" data-fv-result="NOT_VALIDATED" style="display: none;">Spam Bot</small>
</div>
</div>
</form>
Text Content
Skip to main content This site uses JavaScript to provide a number of functions, to use this site please enable JavaScript in your browser. Protect your organization from cyberattacks associated with the Russia-Ukraine conflict > Open Open Open Search Toggle * Careers * Blog * Partners * Risk Assessment * Support * Contact Us * Sign In * admin.zscaler.net * admin.zscalerone.net * admin.zscalertwo.net * admin.zscalerthree.net * admin.zscalerbeta.net * admin.zscloud.net * Zscaler Private Access * en * fr * de * it * ja * es The world’s largest security platform built for the cloud * See The Difference * Zero Trust * Zscaler Difference * What is Zero Trust The strategy on which Zscaler was built * How Zscaler Delivers Zero Trust A platform that enforces policy based on context * Zero Trust Resources Learn its principles, benefits, strategies See how the Zero Trust Exchange can help you leverage cloud, mobility, AI, IoT, and OT technologies to become more agile and reduce risk Learn More * Customer Testimonials Hear first-hand transformation stories * Case Studies Learn about pioneering Zscaler customers * Analyst Recognition Industry experts weigh in on Zscaler * See the Zscaler Cloud in Action Traffic processed, malware blocked, and more * Experience the Difference Get started with zero trust See how the Zero Trust Exchange can help you leverage cloud, mobility, AI, IoT, and OT technologies to become more agile and reduce risk Learn More * Platform * Platform * Technology * Platform Overview Unified platform for transformation * Zero Trust Exchange * Zscaler Client Connector * Compliance * Privacy * Products Integrated services, infinitely scalable * Zscaler Internet Access * Zscaler Private Access * Zscaler Business to Business * Zscaler Cloud Protection * Zscaler Digital Experience * Zscaler Deception Technology Accelerate your transformation Protect and empower your business by leveraging the platform, process and people skills to accelerate your zero trust initiatives Learn More * Technologies Global proxy-based cloud architecture * Secure Web Gateway * Cloud Firewall * Cloud IPS * Cloud DLP * Cloud Sandbox * Cloud Browser Isolation * Cloud Configuration Security (CSPM) * Cloud Identity and Entitlements (CIEM) * Cloud Access Security Broker (CASB) * Capabilities Integrated services, infinitely scalable * SSL Inspection * Advanced Threat Protection * Bandwidth Control * Machine Learning Security * Security Service Edge * Secure Access Service Edge * Zero Trust Network Access * Cloud Security Gartner Magic Quadrant Leader Zscaler: A Leader in the Gartner® Magic Quadrant™ for Security Service Edge (SSE) New Positioned Highest in the Ability to Execute Read the report * Solutions * Modern Workplace Enablement * Security Transformation * Infrastructure Modernization * Industries & Partners * Modern Workplace Enablement Overview Create fast, secure experiences for users everywhere * Secure Work-from-anywhere Seamless access for the hybrid workforce * VPN Alternative * M&A Divestitures * Security Cloud Migration * Third-party Access * ZTNA On-Premises * Remote Collaboration * Secure Access to OT Systems * Ensure great digital experiences Seamless access through fast, secure and reliable connectivity * Zscaler Digital Experience Score * SaaS/Application Monitoring * Cloudpath Analytics * Endpoint Monitoring * UCaaS Monitoring Make hybrid work possible Secure work from anywhere, protect data, and deliver the best experience possible for users Get started * Security Transformation Overview A modern cloud approach * Prevent Cyberthreats Prevent phishing, ransomware, and other attacks * Ransomware Protection * Log4j * Prevent Data Loss Protect data everywhere from exposure or theft * Guest Wi-Fi Protection The World’s Most Effective Ransomware Protection Ransomware is the biggest threat to digital business. Learn how to take a proactive, zero trust approach to safeguarding your enterprise Get Started * Infrastructure Modernization Overview Enable the new world of cloud and mobility * Simplify Branch Connectivity Simplify and secure direct-to-cloud connections * Office 365 * Rethink Network Security * Direct-to-cloud Architecture * Secure Cloud Connectivity Secure connectivity between clouds and workloads Enable the Agile Branch Your network security is costing more than it’s worth. See how five companies drove simplicity, savings and security Watch Now * Industries Our ecosystem of zero trust partners * Zscaler for Public Sector * Zscaler for Federal * Zscaler for State and Local * Zscaler for Education * Zscaler for Australian Government * Zscaler for China * Zscaler for Banking and FS * Partner Integrations Simplified deployment and management * AWS * Microsoft * CrowdStrike * VMware * Aruba * Cisco * ServiceNow * SAP * Splunk Secure your ServiceNow Deployment It’s time to protect your ServiceNow data better and respond to security incidents quicker Get Started * Resources * Learn * Act * Engage * Content Library Explore topics that will inform your journey * Blog Perspectives from technology and transformation leaders * Security Assessment Toolkit Analyze your environment to see where you could be exposed * Webinars and Demos A first-hand look into important topics * Executive Insights App Security insights at your fingertips * Ransomware ROI Calculator Assess the ROI of ransomware risk reduction Zero Trust Content Library Dive into the latest security research and best practices Get Started * Security & Threat Analytics Threat dashboards, cloud activity, IoT, and more * Security Advisories News about security events and protections * Vulnerability Disclosure Program Webinars, training, demos, and more * Trust Portal Zscaler cloud status and advisories Zero Trust Content Library Dive into the latest security research and best practices Get Started * The Cloud-First Architect Tools and best practices for the cloud * Zenith Community Discuss ideas and issues with peers * CXO REvolutionaries Events, insights, and resources for CXOs * Training and Certifications Ongoing programs via Zero Trust Academy * Cloud Security Alliance Securing the cloud through best practices * Events Upcoming opportunities to meet with Zscaler Zero Trust Content Library Dive into the latest security research and best practices Get Started * Company * About * Media * Partners * About Zscaler How it began, where it’s going * Leadership Meet our management team * Investor Relations News, stock information, and quarterly reports * Customers Learn about their transformation journeys * Compliance Our adherence to rigorous standards * ESG Our Environmental, Social, and Governance approach * Events Upcoming opportunities to meet with Zscaler Zscaler Careers Join a recognized leader in Zero trust to help organization transform securely Apply Now * Media Center News, blogs, events, photos, logos, and other brand assets * News and Press Zscaler in the news Zscaler Careers Join a recognized leader in Zero trust to help organization transform securely Apply Now * Partner Portal Tools and resources for Zscaler partners * Summit Partner Program Collaborating to ensure customer success * System Integrators Helping joint customers become cloud-first companies * Service Providers Delivering an integrated platform of services * Technology Deep integrations simplify cloud migration * Partner Inquiry Become a Zscaler partner Zscaler Careers Join a recognized leader in Zero trust to help organization transform securely Apply Now * * Request a demo * Request a demo Resources > Security Terms Glossary > What Is Secure Service Edge (SSE) WHAT IS SECURITY SERVICE EDGE? Download Gartner SSE MQ WHAT IS SECURITY SERVICE EDGE? Security service edge (SSE), as defined by Gartner, is a convergence of network security services delivered from a purpose-built cloud platform. SSE can be considered a subset of the secure access service edge (SASE) framework with its architecture squarely focused on security services. The secure service edge comprises three core services: 1. Secure access to the internet and web by way of a secure web gateway (SWG) 2. Secure access to SaaS and cloud apps via a cloud access security broker (CASB) 3. Secure remote access to private apps through zero trust network access (ZTNA) WHAT HAS DRIVEN THE NEED FOR SSE? As a growing industry trend, SSE solves fundamental challenges organizations face relating to remote work, the cloud, secure edge computing, and digital transformation. As organizations adopt software and infrastructure as a service (SaaS, IaaS) offerings as well as other cloud apps, their data becomes more distributed outside their on-premises data centers. In addition, growing populations of users are mobile and remote, connecting from everywhere, over any connection, to their cloud apps and data. Securing cloud apps and mobile users is difficult with traditional network security approaches because: * Anchored to the data center, legacy technologies can't follow connections between users and cloud apps. * Relaying ("hairpinning") user traffic to a data center via traditional VPN for inspection slows everything down. * Administration and hardware maintenance make traditional data center approaches expensive. * VPNs are easy to exploit due to a lack of patching. To make matters worse, today’s data center security stacks have organically grown into complex, difficult-to-integrate collections of point products. This complexity inherently leaves gaps between disparate security solutions, further increasing the risk of advanced threats or ransomware attacks. SECURE ACCESS SERVICE EDGE (SASE) VS. SECURITY SERVICE EDGE (SSE) In the SASE framework, network and security services should be consumed through a unified, cloud-delivered approach. The networking and security aspects of SASE solutions focus on improving the user-to-cloud-app experience while reducing costs and complexity. You can look at a SASE platform in two slices. The SSE slice focuses on unifying all security services, including SWG, CASB, and ZTNA. The other, the WAN edge slice, focuses on doing so for networking services, including software-defined wide area networking (SD-WAN), WAN optimization, quality of service (QoS), and other means of improving routing to cloud apps. Source: CXO REvolutionaries, "Security Service Edge (SSE) reflects a changing market: what you need to know" ADVANTAGES OF SSE OVER TRADITIONAL NETWORK SECURITY Delivered from a unified cloud-centric platform, SSE enables organizations to break free from the challenges of traditional network security. SSE provides four primary advantages: 1. Better risk reduction SSE enables cybersecurity to be delivered without being tied to a network. Security is delivered from a cloud platform that can follow the user-to-app connection regardless of location. Delivering all security services in a unified way reduces risk because it eliminates the gaps often seen between point products. SSE also improves visibility across users—wherever they are—and data, regardless of the channels accessed. Additionally, SSE automatically enforces security updates across the cloud without the typical lag time of manual IT administration. 2. Zero trust access SSE platforms (along with SASE) should enable least-privileged access from users to cloud or private apps with a strong zero trust policy based on four factors: user, device, application, and content. No user should be inherently trusted, and access should be granted based on identity and policy. Securely connecting users and apps using business policies over the internet ensures a more secure remote experience because users are never placed on the network. Meanwhile, threats cannot move laterally, and applications remain protected behind the SSE platform. Apps are not exposed to the internet and thus can't be discovered, which reduces the attack surface, increasing your security and further minimizing business risk. 3. User experience By Gartner's definition, SSE must be fully distributed across a global footprint of data centers. The best SSE architectures are purpose-built for inspection in every data center, as opposed to vendors hosting their SSE platforms in IaaS infrastructures. Distributed architecture improves performance and reduces latency because content inspection—including TLS/SSL decryption and inspection—occurs where the end user connects to the SSE cloud. Combined with peering across the SSE platform, this gives your mobile users the best experience. They no longer need to use slow VPNs, and access to apps in public and private clouds is fast and seamless. 4. Consolidation advantages With all key security services unified, you'll see lower costs and less complexity. SSE can deliver many key security services—SWG, CASB, ZTNA, cloud firewall (FWaaS), cloud sandbox, cloud data loss prevention (DLP), cloud security posture management (CSPM), and cloud browser isolation (CBI)—all in one platform. Plus, if you don't need everything right away, you can easily add any of these services as your organization grows. With all protection unified under one policy, all channels your users and data traverse get the same consistent protection. GARTNER REPORT: 2021 STRATEGIC ROADMAP FOR SASE CONVERGENCE Read the full report SSE REFLECTS A CHANGING MARKET: WHAT YOU NEED TO KNOW Read our blog post ZSCALER SSE AT A GLANCE Read the brief ZSCALER SECURITY SERVICE EDGE INFOGRAPHIC Take a look COMPREHENSIVE SECURITY FOR THE MODERN ENTERPRISE Learn more INDUSTRY TALK FEATURING GARTNER: THE FUTURE OF NETWORK SECURITY IS SASE Watch the webinar TOP SSE USE CASES 1. Secure access to cloud services and web usage Enforcing policy control over user access to the internet, web, and cloud applications (historically performed by a SWG) is one of the primary use cases for the security service edge. SSE policy control helps mitigate risk as end users access content on- and off-network. Enforcing corporate internet and access control policies for compliance is also a key driver for this use case across IaaS, PaaS, and SaaS. Another key capability is cloud security posture management (CSPM), which protects your organization from risky misconfigurations that can lead to breaches. 2. Detect and mitigate threats Detecting threats and preventing successful attacks across the internet, web, and cloud services are key drivers for adopting SSE and, to a lesser extent, SASE. With end users accessing content across any connection or device, organizations need a strong defense-in-depth approach to malware, phishing, and other threats. Your SSE platform must have advanced threat prevention capabilities, including cloud firewall (FWaaS), cloud sandbox, malware detection, and cloud browser isolation. CASBs enable inspection of data within SaaS apps and can identify and quarantine existing malware before it inflicts damage. Adaptive access control, whereby an end user's device posture is determined and access is adjusted accordingly, is also a key component. 3. Connect and secure remote workers The modern remote workforce needs remote access to cloud services and private applications without the inherent risks of VPN. Enabling access to applications, data, and content without enabling access to the network is a critical piece of zero trust access because it eliminates the security ramifications of placing the user on a flat network. Providing secure access to private and cloud apps without needing to open firewall ACLs or expose apps to the internet is key here. SSE platforms should enable native inside-out app connectivity, keeping apps "dark" to the internet. A ZTNA approach should also offer scalability across a global network of access points, giving all your users the fastest experience regardless of connectivity demands. 4. Identify and protect sensitive data SSE enables you to find and control sensitive data no matter where it resides. By unifying key data protection technologies, an SSE platform provides better visibility and greater simplicity across all data channels. Cloud DLP enables sensitive data (e.g., personally identifiable information [PII]) to be easily found, classified, and secured to support Payment Card Industry (PCI) standards and other compliance policies. SSE also simplifies data protection, as you can create DLP policies just once and apply them across inline traffic and data at rest in cloud apps via CASBs. The most effective SSE platforms also deliver high-performance TLS/SSL inspection to address encrypted traffic (that is, most data in transit). Also key for this use case is shadow IT discovery, which allows organizations to block risky or sanctioned applications across all endpoints. CHOOSING THE RIGHT SSE SOLUTION Look for an SSE platform that gives you fast, scalable security and a seamless user experience based on zero trust. You need a platform that is: Purpose-built for a fast user and cloud app experience Fast, secure access requires a cloud native architecture globally distributed across a large data center footprint. SSE platforms built for inspection have an advantage over SSE platforms hosted in IaaS clouds, which are not primarily built for the demands of real-time content inspection. When every data center is an inspection node, security is always fast and local to the user, wherever they are. Also, look for fast and strong peering from SSE vendors, so the cloud app experience remains optimized. Built from the ground up with a zero trust architecture Access control should be governed by identity and never place users on your network. Look for cloud native vendors that offer broad support for zero trust access across all users, devices, IoT, cloud apps, and workloads. Here, too, a vendor with a large global data center footprint will ensure your users always get a fast experience without the hindrance of a VPN. Your vendor's ZTNA approach to SSE should have a proven track record across large global deployments, as scalability is imperative for remote user productivity. Capable of scalable, inline proxy inspection Proxy inspection terminates both connections—from the device and from the cloud app. Sitting between the two means full SSL inspection can be performed and connections are not allowed to "pass through." This enables better security and inspection than traditional passthrough firewalls. Focus on SSE platforms that can deliver content and TLS/SSL inspection at a global scale. Since inline inspection is usually performed on business-critical traffic, interruptions due to scalability issues can have serious impact. Ensure your chosen SSE vendor has strong service-level agreements (SLAs) and a track record of inspecting inline traffic for large global enterprises. Driving further innovation in SSE growth As organizations embrace SSE as a unified platform, additional security capabilities and services will ensure the SSE platform is future-proof. One service beginning to migrate into SSE is digital experience monitoring, which allows IT to quickly identify connectivity issues in the user-to-cloud-app connection. Additionally, as defined by the SASE architecture, network service consolidation along with an SSE platform is important. This includes strong connectivity support across SD-WAN services, local branch office connectivity, and multicloud connectivity. By focusing on SASE service providers that are also driving SSE innovation, you can ensure room for growth without adding complexity as your organization's cloud ecosystem matures. ZSCALER AND SSE Zscaler solves your cloud and mobility challenges with a revolutionary platform for SSE and beyond. We'll help you reduce your costs and complexity with zero trust, eliminate your attack surface, and provide a fantastic user experience. Learn more about Zscaler SSE. You should also take a look at the 2022 Gartner Magic Quadrant for Security Service Edge. We're proud to be a Leader and highest in "Ability to Execute." * PLATFORMS & PRODUCTS * Zero Trust Exchange * Zscaler Client Connector * Zscaler Internet Access * Zscaler Private Access * Zscaler B2B * Zscaler Cloud Protection * Zscaler Digital Experience * SOLUTIONS * Secure Work-from-Anywhere * Modern Workplace Enablement * Security Transformation * TECHNOLOGIES & CAPABILITIES * Secure Access Service Edge * Zero Trust Network Access * Secure Web Gateways * Cloud Firewall * Cloud Sandbox * Cloud IPS * Cloud DLP * Cloud Browser Isolation * TECHNOLOGIES & CAPABILITIES * Cloud Configuration Security * Cloud Identity and Entitlements * CASB * SSL Inspection * Advanced Threat Protection * Bandwidth Control * Machine Learning Security * POPULAR LINKS * Careers * About Zscaler * Leadership * Content Library * News and Press Releases * Media Kit * CXO REvolutionaries * Zenith Community * INFORMATION * Glossary * Plans and Pricing * Virtual Briefing Center * Zscaler FAQs * Contact Us Please enter a valid email addressPlease enter a valid email addressPlease enter your corporate email addressEmail address is mandatoryEmail address is mandatory newFirstName Spam Bot * * * * * SITEMAP * PRIVACY * LEGAL * SECURITY ©2022 Zscaler, Inc. All rights reserved. ZscalerTM and Zero Trust ExchangeTM are either (i) registered trademarks or service marks or (ii) trademarks or service marks of Zscaler, Inc. in the United States and/or other countries. Any other trademarks are the properties of their respective owners. Zscaler uses cookies to personalize content and ads, to provide social media features and to analyze our traffic. We also share information about your use of our site with our social media, advertising and analytics partners.Please review our Cookies Policy for more information. Cookies Settings Accept Cookies