Zscaler Inc.
Zscaler Inc.
  • Видео 876
  • Просмотров 40 868 586
Zero Trust et IA : l'avenir de la cybersécurité
Les pirates informatiques exploitent l’IA de manière créative pour compromettre les utilisateurs et s’introduire dans les entreprises. Dans un contexte de sécurité où vous devez combattre l’IA par une meilleure IA, la meilleure protection contre l’IA exige l'accès a des meilleures données. Zscaler a étendu son architecture Zero Trust avec de puissants moteurs d’IA qui sont entraînés et ajustés par 500 000 milliards de signaux quotidiens. Découvrez Zscaler Zero Trust + AI pour prévenir les attaques de ransomware et celles liées à l’IA.
About Zscaler
Zscaler (NASDAQ: ZS) accelerates digital transformation so that customers can be more agile, efficient, resilient, and secure. The Zscaler Zero ...
Просмотров: 72

Видео

Zero Trust und KI: Die Zukunft der Cybersicherheit
Просмотров 3623 часа назад
Cyberangreifer nutzen KI auf kreative Weise, um User zu kompromittieren und in Unternehmen einzudringen. In einer Sicherheitslandschaft in der KI mit besserer KI zu bekämpfen gilt, ist der KI-Schutz dann am wirkungsvollsten, wenn die Daten valide sind. Zscaler hat seine Zero-Trust-Architektur um leistungsstarke KI-Engines erweitert, die anhand von 500 Billionen täglichen Signalen trainiert und ...
Remote Radiology VPN Showdown
Просмотров 182День назад
Watch our Principal Sales Engineer demonstrate the remote radiology use case via VPN versus Zero Trust Exchange. Where did the IP address go? Connect to the application, not the network, and improve user experience AND security posture. Visit our healthcare page at www.zscaler.com/industries/healthcare for more information about how Zscaler enables healthcare organizations to securely modernize...
D.C. Government enhances security by transitioning 15,000 users from VPNs to Zscaler
Просмотров 390День назад
Following several years of VPN use, the Government of the District of Columbia has successfully transitioned to a cloud-based zero trust framework to enhance both security and productivity. Hear Suneel Cherukuri, D.C. Government CISO, explain the agency’s journey, detailing the deployment of Zscaler at record speeds, securing connectivity for 15,000 users, and significantly improving the overal...
Zscaler for B2B (2 Minutes)
Просмотров 57121 день назад
Securing third-party access to IT resources is critical for any organization's success. But the standard methods of securing this access create more problems than they solve. Fortunately, zero trust architecture is a perfect fit for securing B2B partners as they connect to your apps. Visit www.zscaler.com/b2b to learn more. About Zscaler Zscaler (NASDAQ: ZS) accelerates digital transformation s...
Securing the Enterprise With Zero Trust and AI | 10-min Interview
Просмотров 50828 дней назад
Zscaler CEO, Chairman, and Founder Jay Chaudhry sat down with Raakhee Mirchandani at WSJ Tech Live Cybersecurity 2024 to urge organizations to adopt new approaches to security and rethink their networks. About Zscaler Zscaler (NASDAQ: ZS) accelerates digital transformation so that customers can be more agile, efficient, resilient, and secure. The Zscaler Zero Trust Exchange protects thousands o...
Securing the Enterprise With Zero Trust and AI
Просмотров 21228 дней назад
Zscaler CEO, Chairman and Founder Jay Chaudhry says it’s time to adopt new approaches to security and rethink the network. About Zscaler Zscaler (NASDAQ: ZS) accelerates digital transformation so that customers can be more agile, efficient, resilient, and secure. The Zscaler Zero Trust Exchange protects thousands of customers from cyberattacks and data loss by securely connecting users, devices...
The NYC Department of Education ensures CIPA compliance for 1 million+ students with Zscaler
Просмотров 1,5 тыс.Месяц назад
The New York City Department of Education (NYC DOE) is the largest school system in the United States and among the largest in the world. It serves over 1 million students in Kindergarten through 12th grade with a staff of more than 150,000 teachers and administrators across all five boroughs of New York. In this video, Anthony Dixon (Director of Cyber Security Engineering) shares how the Zscal...
Zscaler + Imprivata
Просмотров 348Месяц назад
Zscaler and Imprivata integrate to ensure clinicians can seamlessly and securely authenticate in and out of shared devices, while user actions are logged for traceability and compliance requirements. Visit our healthcare page at www.zscaler.com/industries/healthcare for more information about how Zscaler enables healthcare organizations to securely modernize and accelerate cloud adoption, impro...
Remote Radiology VPN Showdown | Zscaler
Просмотров 299Месяц назад
Watch our Principal Sales Engineer demonstrate the remote radiology use case via VPN versus Zero Trust Exchange. Where did the IP address go? Connect to the application, not the network, and improve user experience AND security posture. Visit our healthcare page at www.zscaler.com/industries/healthcare for more information about how Zscaler enables healthcare organizations to securely modernize...
Branch Connector for Healthcare | Zscaler
Просмотров 320Месяц назад
Enabled by the Zscaler Zero Trust Exchange (ZTE), Zscaler Branch Connector is a virtual machine (VM) that simplifies traffic forwarding to Zscaler services. The Zero Trust Software-Defined Wide Area Network (SD-WAN) is deployed as a Branch Connector VM. This supplies branches and data centers with fast and reliable access to the internet and private applications with a direct-to-cloud architect...
La cybersécurité à l'ère de l'IA : Démocratisation de la Sécurité Numérique avec l’IA 2/3
Просмотров 144Месяц назад
Dans un contexte de démocratisation croissante de l’intelligence artificielle (IA) en cybersécurité, la protection des actifs numériques devient de plus en plus complexe. Quelles implications pour les entreprises de toutes tailles, des startups aux multinationales, et même pour les utilisateurs individuels ? Dans ce deuxième podcast, Sam Curry, VP & CISO en résidence chez Zscaler, évoque la man...
La cybersécurité à l'ère de l'IA : Vers une Cybersécurité Proactive : Stratégies et Défis 3/3
Просмотров 60Месяц назад
L’avenir de la cybersécurité à l’ère des menaces évolutives est la « Défense proactive » selon Sam Curry, vice-président, directeur général et CISO en résidence chez Zscaler. En effet, les entreprises doivent passer d’une posture défensive à une stratégie proactive en cybersécurité, connue en anglais sous le nom de « Defend Forward ». Cette approche se distingue des méthodes réactives tradition...
La cybersécurité à l'ère de l'IA : Des fantômes dans la machine 1/3
Просмотров 65Месяц назад
L’intégration croissante de l’Intelligence Artificielle (IA) et la montée en puissance du modèle Zero Trust ont un fort impact sur la cybersécurité. Sam Curry, VP & CISO en résidence chez Zscaler, évoque les défis et les évolutions de l’industrie de la cybersécurité, alors que l’IA devient un outil essentiel pour la surveillance des réseaux, permettant de détecter les anomalies et de répondre d...
Cybersicherheit im Zeitalter von KI: Cyberangriffe proaktiv abwehren, Angriffsfläche verringern 3/3
Просмотров 61Месяц назад
Mit einer proaktiven Sicherheitsstrategie lassen sich low hanging fruits identifizieren, die es Hackern leicht machen, in Netzwerke einzudringen, Daten abzuziehen oder Schadsoftware zu installieren. “Das heißt, man muss Angriffe vorab verstehen und versuchen, den zu schützenden Perimeter zu verringern. Also wie kann ich das, was angegriffen werden kann, massiv reduzieren”, sagt Christoph Schuhw...
Cybersicherheit im Zeitalter von KI: Wer gewinnt den KI-Wettlauf? Hacker oder Unternehmen? 2/3
Просмотров 104Месяц назад
Cybersicherheit im Zeitalter von KI: Wer gewinnt den KI-Wettlauf? Hacker oder Unternehmen? 2/3
Cybersicherheit im Zeitalter von KI: Zero Trust zum Schutz von IT- und OT-Infrastruktur 1/3
Просмотров 40Месяц назад
Cybersicherheit im Zeitalter von KI: Zero Trust zum Schutz von IT- und OT-Infrastruktur 1/3
Cybersecurity in the Age of AI: Defend Forward 3/3
Просмотров 115Месяц назад
Cybersecurity in the Age of AI: Defend Forward 3/3
Cybersecurity in the Age of AI: The Democratisation of AI Security 2/3
Просмотров 132Месяц назад
Cybersecurity in the Age of AI: The Democratisation of AI Security 2/3
Cybersecurity in the Age of AI: Ghosts in the Machine
Просмотров 105Месяц назад
Cybersecurity in the Age of AI: Ghosts in the Machine
Zero Trust: Hype oder Notwendigkeit? Episode 1/3
Просмотров 208Месяц назад
Zero Trust: Hype oder Notwendigkeit? Episode 1/3
Zero Trust: wie lassen sich künftige Sicherheitsanforderungen bewältigen? Episode 3/3
Просмотров 56Месяц назад
Zero Trust: wie lassen sich künftige Sicherheitsanforderungen bewältigen? Episode 3/3
Zero Trust: Hat klassische IT-Sicherheit ausgedient? Episode 2/3
Просмотров 96Месяц назад
Zero Trust: Hat klassische IT-Sicherheit ausgedient? Episode 2/3
Zero Trust SD-WAN für Workloads kurz erklärt
Просмотров 149Месяц назад
Zero Trust SD-WAN für Workloads kurz erklärt
IT-Probleme proaktiv erkennen und lösen mit Zscaler Digital Experience & KI
Просмотров 98Месяц назад
IT-Probleme proaktiv erkennen und lösen mit Zscaler Digital Experience & KI
Le Zero Trust en 6 minutes
Просмотров 181Месяц назад
Le Zero Trust en 6 minutes
Le SD-WAN Zero Trust pour Workloads en bref
Просмотров 121Месяц назад
Le SD-WAN Zero Trust pour Workloads en bref
Superviser l'expérience utilisateur avec Zscaler Digital Experience
Просмотров 50Месяц назад
Superviser l'expérience utilisateur avec Zscaler Digital Experience
Zero Trust SD-WAN in breve
Просмотров 211Месяц назад
Zero Trust SD-WAN in breve
Migliorare la Digital User Experience con Zscaler Digital Experience
Просмотров 40Месяц назад
Migliorare la Digital User Experience con Zscaler Digital Experience

Комментарии

  • @MahiyaKhatun-q3p
    @MahiyaKhatun-q3p 3 дня назад

    Young Deborah White Nancy Clark Kevin

  • @OwnerenmenGergely-w3b
    @OwnerenmenGergely-w3b 5 дней назад

    4:17

  • @AjaySingh-ey7gt
    @AjaySingh-ey7gt 7 дней назад

    Very good

  • @AjaySingh-ey7gt
    @AjaySingh-ey7gt 7 дней назад

    Very good

  • @mallika2259
    @mallika2259 Месяц назад

    Does this mean 1 of every 200 requests is a threat? (125M threats, 25B requests/day)?

  • @jsmith7701
    @jsmith7701 Месяц назад

    Oh yeah Crowdstrike. That's the company Hillary and the DNC hired in 2016 to cover up her illegal bathroom server, and then lied about Trump/Russia collision. Boy, these guys are the best. If you want to steal an election anywhere in the world, then hire Crowdstrike. Why are DNC servers located in Ukraine anyway? Seems an odd place to keep them.

  • @sfa987
    @sfa987 Месяц назад

    Video after 2:22 only shows a frozen screen

  • @djangosmissingfingers
    @djangosmissingfingers 2 месяца назад

    If the lightweight VM isn't listening for inbound connectivity, how is traffic going to get from the User -> Cloud -> VM / App?

  • @isotope3223
    @isotope3223 2 месяца назад

    Adding AI to Zscaler zero trust makes sense as you're already seeing the packets, so why not analyze them. This is another solid step forward

  • @kentroglobalinvestmentllc8921
    @kentroglobalinvestmentllc8921 2 месяца назад

    So impressed!

  • @FiredUpWealth
    @FiredUpWealth 2 месяца назад

    Awesome! Cybersecurity is a huge secular growth trend to profit from in your portfolio!

  • @yoyonis6840
    @yoyonis6840 2 месяца назад

    Yay zscaler!

  • @adamwhite3811
    @adamwhite3811 2 месяца назад

    I really dont understand the /32 and how this connects. If the host needs to get somewhere, and it is not seen as the same segment, then it needs to look at its routing table, will arp for the next hop and send the traffic. In this case, the zscaler is not on the same segment, so how does this work? What does it arp for? how does it send the packet there through the OSI stack? It still needs some kind of reachability. My only guess is that there is some proxying or tunneling of the traffic and the /32 is not really a /32, but isolated through some mechanism from talking to anything but the zscaler device. Would be nice to not have to guess, and actually, you know, have it explained, would take less than a minute. Also since someone else was nitpicking, I might as well do it too. If you are going to draw networking symbols, drawing a core with a traditional router picture, that implies L3, that firewall hanging off is all but useless

  • @barrythompson8813
    @barrythompson8813 2 месяца назад

    Appreciate the humour brought to a dry subject 🙂

  • @HKashaf
    @HKashaf 2 месяца назад

    I don't understand this solution, isn't Microsoft defender for cloud and M365 already providing posture score. And what does Zscalar actually provide cloud based control for segmentation?

  • @sonixps
    @sonixps 3 месяца назад

    interest on this solution. Can provide detail implementation guide for reference?

  • @SapiaCasim
    @SapiaCasim 3 месяца назад

    Wow amazing

  • @hakimoum1
    @hakimoum1 3 месяца назад

    Could you give us more information on load balancing? What if you have multiple server for one application. How does Zscaler do the load balancing?

  • @routeypackets2842
    @routeypackets2842 3 месяца назад

    So it appears to be a router on a stick, but still sharing the same broadcast domain? There aren't really details here but I'm trying to understand how you are truly isolating the clients on a same VLAN from each other, it can't just be at a layer 3 level, you blocking ARP's etc? They running clients? Just changing a host to a /32 would certainly contain that host but what about misconfiguration or bad actors also attached to that VLAN?

    • @Ruchikun
      @Ruchikun 2 месяца назад

      I mean. Zscaler pretends it's not just vpn/firewalling but in the end... Everyone relies on the same basic tech :p private vlans have been a thing for aaaaaages

  • @RbNetEngr
    @RbNetEngr 3 месяца назад

    A few comments: 1. You did not provide any real details here. You imply that the ZScaler Airgap ‘client’ locks down each individual host, and the Airgap box (physical or virtual) manages the policy to lock down each host. But you didn’t provide enough details here. 2. Unlike NSX, which applies policy to the virtual NIC shim that is not part of the VM, Airgap looks to be installed on the hosts. So, what would stop a bad actor from disabling or removing Airgap from that host? 3. Nitpick. You started out by drawing the Core of what you said was a Data Center, and the first thing you drew was a User VLAN. Generally, user VLANs are out in the campus, or branch locations, and NOT in the Data Center. So, does the Airgap solution ONLY apply to Data Centers (as a replacement for functionality provided by NSX or similar), or is it also something that could/would be deployed on a campus or branch network as well? 4. If this IS a solution for Data Center, Campus and Branch/Remote Office networks, does each location need a LOCAL ZScaler Airgap “policy box” to manage policy? Or would a smaller number of distributed or centralized “policy boxes” be deployed to manage policy for remote networks? And if the “policy boxes” are remote, what happens to policy enforcement and application if the Airgap-equipped hosts lose communication with the “policy boxes”?

  • @altcoinwizz
    @altcoinwizz 3 месяца назад

    I had a genuine laugh more than once, this guy should make more videos like this! Also I think the camera was slightly out of focus, the lines were not sharp. Neverthless, great video 😄

  • @kalaravikalaravi6141
    @kalaravikalaravi6141 4 месяца назад

    J😢😢😢

  • @chandratondepu1240
    @chandratondepu1240 4 месяца назад

    Thank you sharing about microsegmentation.

  • @irenejackson8577
    @irenejackson8577 5 месяцев назад

    😇 P R O M O S M

  • @dulcemiel7863
    @dulcemiel7863 5 месяцев назад

    실적 좋은데

  • @sharkdavid
    @sharkdavid 6 месяцев назад

    This is great but you guys need a media/marketing team asap. Investors won’t buy what they can’t generally understand. Talking about myself here.

  • @ronmcgee6761
    @ronmcgee6761 7 месяцев назад

    Nice

  • @oliverwhite1119
    @oliverwhite1119 7 месяцев назад

    so, when you gonna introduce IPv6?

  • @47-swagatikasamantaray59
    @47-swagatikasamantaray59 7 месяцев назад

    Hello sir, I am a fresh graduate who is currently doing a research project on zero trust across multicloud ERPs. If you aa someone who is well experienced in the field would be generous enough to please help in my google survey to understand current and future market trends in it, it would be life saving. Please please respond back. Consider it as a request from a younger version of you.

  • @Nikoolayy1
    @Nikoolayy1 7 месяцев назад

    Can Zscaler ZPA/ZIA access policies be based on IOT device types that were detected by ML not only seeing the IOT device types and their network patterns in a Report? For example allowing specific camera models to talk only to the camera vendor's cloud server through ZIA or allowing internal access to the cameras using ZPA to specific specific AD user or AD groups ?

  • @anonymous-sy8ev
    @anonymous-sy8ev 7 месяцев назад

    I was hoping this video would show competitive info. Maybe a battle card that would distinguish setting you apart from products like Prisma Access from Palo Alto Networks and other competitors. If you want to be set apart then consider being more specific about how you do that exactly in comparison.

  • @JB-uk7mn
    @JB-uk7mn 8 месяцев назад

    ☠️😂 Poor Bruce 😔

  • @marvinearly7340
    @marvinearly7340 9 месяцев назад

    Wow!

  • @shubhamsinghhimta
    @shubhamsinghhimta 10 месяцев назад

  • @chloe.deitch
    @chloe.deitch 10 месяцев назад

    i love you😝

  • @toddbristol707
    @toddbristol707 10 месяцев назад

    Great Video! Tooker didn't give you enough credit lol!

  • @lucasp1227
    @lucasp1227 10 месяцев назад

    Great video on generative Ai. I really learned a lot about how to safely embrace the future of Ai.

  • @toxic.grave.studios7912
    @toxic.grave.studios7912 10 месяцев назад

    🎉🎉🎉

  • @scooter8793
    @scooter8793 10 месяцев назад

    Brian, thanks for this video, Super Helpful and much easier than reading a White Paper or a Slide Deck!!

  • @popparotten
    @popparotten 10 месяцев назад

    Thanks for the info! And are you the guy that’s from Pebcak podcast?!?!

  • @nascomfub
    @nascomfub 10 месяцев назад

    You're like a super sharp and physically imposing Mr. Rogers in the Zero Trust neighborhood. I love it.

  • @TravisAllabach-xc8tv
    @TravisAllabach-xc8tv 11 месяцев назад

    So maybe rudimentary question - when you say VM is that essentially just a server running on the site that needs provisioned to run the Zscaler software?

    • @Dimerzl
      @Dimerzl 5 месяцев назад

      @@user-ck5qu2yo9i isn't that just a massive single point of failure then?

  • @karthikeyanag8791
    @karthikeyanag8791 Год назад

    I have a doubt in zscaler If am in office network do I need to connect ZIA/ZPA? If am in public network, I can resolve my application urls with private ip, If am in public network, Can I connect both ZPA & ZIA in same time ? so that I can connect private applications and I can connect public networks securely.

  • @superman_1975
    @superman_1975 Год назад

    Next generation and ever lasting technology. Great people.

  • @sekarankrishnan6177
    @sekarankrishnan6177 Год назад

    My cousin, love you for uplifting the generation. Love you Kavi.

  • @Who_iz_dis
    @Who_iz_dis Год назад

    Curious if app control (with current capabilities) could get Salesforce instances onboarded?

  • @ayatulkhursi
    @ayatulkhursi Год назад

    Brilliant..

  • @bluusoda
    @bluusoda Год назад

    well done

  • @rasmusforlorn7767
    @rasmusforlorn7767 Год назад

    Do I need to prepare my network (VNet and Subnet level in Azure) to bring this segmentation into action? Looks like I can apply it without having to create a ton of /28 subnets.