Zscaler extends the power of the Zero Trust Exchange™ platform with breakthrough cybersecurity innovations to identify, mitigate, and manage large-scale attacks

Zscaler, Inc. (NASDAQ: ZS), the leader in cloud security, today debuted four new cybersecurity services and capabilities which further extend the power of its Zscaler Zero Trust Exchange™ cloud security platform. The innovations not only enhance the monitoring and remediation of sophisticated attacks but also deliver a fundamentally new approach to securely connecting branch offices – all while simplifying and streamlining the management process at scale for IT professionals. 

Large-scale cybersecurity attacks have become increasingly sophisticated and widespread. These attacks can have a devastating impact on an organization's reputation, financial stability, and day-to-day operations. To combat these threats, it's essential for businesses to have a comprehensive cloud security platform that can provide real-time threat detection, automated response, and proactive risk mitigation. Processing over 300 billion transactions per day, the Zscaler platform is a fully integrated, extensible cloud security platform that provides customers with always-on intelligence that allows organizations to take a proactive approach to security, respond to threats efficiently, and optimize their security posture. 

At Zenith Live Las Vegas, Zscaler unveiled the following security services and capabilities:

Zscaler Risk360 - A powerful risk quantification and visualization framework

Zscaler Risk360 helps CIOs and CISOs make informed and expedited business decisions that help reduce cyber risk. By leveraging a rich set of signals from internal and external sources within the Zscaler platform, IT and security leaders gain unparalleled visibility and actionable intelligence from more than 100 data-driven factors to enable the following:

  • Powerful Risk Quantification - Delivers real-time risk scores for all stages of cyber breaches, as well as risk visualized across four entities, including workforce, third parties, applications, and assets. 
  • Intuitive Visualization and Reporting - Filters top drivers for cyber risk and anticipates financial exposure estimates, including financial remediation recommendations, with the ability to create concise board-level presentation materials.
  • Actionable Remediation - Prioritizes actionable recommendations with guided workflows to investigate and remediate the most critical issues to keep an organization secure and operations running non-stop.

Read More...