Welcome to the #ZscalerExchange

Welcome to the #ZscalerExchange

Welcome to the #ZscalerExchange, your trusted source for the latest in cybersecurity insights, news, and innovations. Each edition is crafted to bring you the latest information from the world of cybersecurity, featuring expert analysis, innovative solutions, and the latest updates on current cybersecurity events.

Whether you're a novice or a seasoned expert, our newsletter aims to provide you with actionable knowledge to keep you at the forefront of the cybersecurity world. Thank you for subscribing, and we look forward to helping you stay ahead in the ever-evolving ecosystem.

How to build resilience in the event of extreme cloud outages

The 3 Key Functions of Zero Trust Architecture

With widespread IT outages over the summer, many organizations are evaluating their critical tech vendors’ strategies for resilience and disaster recovery.

We received a flurry of calls following these summer incidents from concerned customers who wanted to understand whether Zscaler is exposed to similar risk. We advised our customers and prospects at length in an oversubscribed series of CXO briefings and a public Preventing Cloud Outages webinar.

While no cloud vendor is immune to issues, Zscaler has multiple safeguards in place that dramatically lower risk. With Zscaler:

  • Customers initiate their own upgrades

  • Most updates are done in the cloud—not on the endpoint agent

  • Zscaler tests updates in our own environment first

Check out our full blog post detailing how Zscaler has built in resilience against outages.

Watch: The Four Steps of a Ransomware Attack

At Zenith Live 2024, Zscaler CSO Deepen Desai presented on the four stages of a ransomware attack. 

Watch his full 30-minute keynote where he presents these stages, his CSO playbook on how to prevent them, as well as real-world examples of threat actors.

Ransomware attacks continue to push the limits, becoming ever more sophisticated as payouts hit record-setting highs. To learn more, read the ThreatLabz 2024 Ransomware Report for the latest findings on ransomware trends, expert analysis of malicious data leak sites, predictions, and security best practices.

Customer Stories: MGM Resorts International stacks the cards against cyberattacks with Zscaler

Learn how MGM reduced their attack surface and improved their networking and security agility. By leveraging the Zscaler zero trust platform, they protect their 70,000 employees globally, increase device usage efficiency by 50% by improving connectivity, eliminate VPNs, and block 275,000 threats monthly.

Final thoughts

We would like to sincerely thank you for reading our first edition of The Zscaler Exchange. 

This is an evolving newsletter, and we encourage your feedback on how we can make this content better. Our initial survey showed a desire for innovations, industry news, and more.

To keep you informed about the latest new releases coming from Zscaler, we would like share our most recent Zscaler Innovation Launch: Zero Trust Segmentation for Branch and Cloud. 

Experience a more agile, secure, and cost-effective way to connect users, devices, and workloads between and within the branch, cloud, and data center.

In the future, watch for information on the newest innovations coming from Zscaler. Also, please continue to let us know what you would like to see via the comments. We will do our best to give you the content that you request.

Be sure to subscribe, share this newsletter with your networks, and stay safe!

Subham Chatterjee

HOF: NASA | IBM | Google | Amazon AWS | WHO | US GOV | Tolgee | NI | Emerson | Uplers | Rank: 24th IBM Leaderboard 2024 (Hackerone) | 7th in Amazon AWS VDP(Hackerone) | Done: EJPT | CNSP | PEH

2w

Hello Zscaler team, with regrets I want to inform you that, I always had a keen interest in joining your security team as it's one of the most trusted network but in our college recently Zscaler came for campus placement and despite having required skills ( Amazon Web Services (AWS) HackerOne Leaderboard 7 rank(all time) , IBM hackerone Leaderboard 33 rank (2024) ) , I was not even shortlisted to sit in the interview and students with zero to less knowledge of security got selected. It's very sad and dishurtening in the same time. Please reconsider this and atleast give me a chance to prove myself as a junior intern. Hopefully you will notice my comment. Thank you.

Like
Reply
Ryo Sonobe

Managing Director at ICPA

2w

The incident with CrowdStrike in July highlighted the risks and challenges of relying on the traditional approach of embedding security into endpoints, particularly when it comes to recovery. It served as a compelling example that underscored the importance of adopting a zero-trust approach and embedding security on the service side, offering valuable insights to promote this concept.

Like
Reply
Yeruel Birku

CTO|Enterprise Architect |CCSA| CCNP|NSE4|IBM SIEM|PM|CyberSecurity| IBMNetcool| SymantecDLP| NOC| SOC| SCS| Paloalto|Checkpoint|PAM|Barracuda|Arista|SDN|Kaspersky|CIO|CTO|VoIP|Meraki|Forcepoint|Cloud|IoT|Proofpoint

1mo

Thanks

Like
Reply

Thanks for inviting, sharing an informative-insightful article, Zscaler. Best wishes, to Jay Chaudhry, CEO, Chairman & Founder, and 'Team #Zscaler, Inc'.

Simrat Bhandari

Cybersecurity Consultant - Cywarden Inc || Helping Global Clients with Niche Cybersecurity Services || VAPT || Global SOC || SIEM || SOAR || Google Chronicle || Design & Implementation Consultant

1mo

Your commitment to keeping your community informed and engaged is commendable!

To view or add a comment, sign in

Insights from the community

Others also viewed

Explore topics