Want to create interactive content? It’s easy in Genially!

Get started free

Zscaler Zero Trust

A O

Created on January 18, 2023

Start designing with a free template

Discover more than 1500 professional designs like these:

Geniaflix Presentation

Vintage Mosaic Presentation

Shadow Presentation

Newspaper Presentation

Zen Presentation

Audio tutorial

Pechakucha Presentation

Transcript

Zscaler Zero Trust Overview

Interns:​ John Paja, Malik Cobbs, Jefry Ramos ​ Jamiu Olayinka, ​Anthony Johnson​ Mentors: ​ Dr. Lethia Jackson, Dr. Velma Latson, ​ Dr. Daryl Stone, Dr. Haydar Teymourlouei​

start

Outline​​

Zero Trust​

Zscaler​

Zscaler Management Services

Benefits of Zscaler​

What is Zero Trust?​

  • Zero Trust is a security model that maintains strict access controls to a system by not trusting anyone or any device by default.​​
  • Zero Trust is a framework for securing infrastructure and data for today’s digital transformation.​
  • Zero Trust can be simply put as "Never Trust, Always Verify."

Zero Trust Federal Mandate​​

Zero Trust Federal Mandate​​

On May 12, 2021, the White House released Executive Order 14028, requiring federal agencies to migrate to a Zero Trust Architecture and meet specific cybersecurity standards by the end of Fiscal Year (FY) 2024.

Zero Trust Architecture with Zscaler ​​

Zero Trust Architecture with Zscaler ​​

Zscaler is a software-as-a-service (SaaS) security platform that allows an organization to achieve a Zero Trust Architecture (ZTA). ​

What Is Zscaler​?​

  • Zscaler is a cloud security solution that enables Zero Trust Security.​​​
  • Zscaler secures and manages access to a company’s resources/data.​

Zscaler Security Solution​​

  • A user can access VA resources on Zscaler via Zscaler Client Connector or any web browser.​​
  • After a user enters their credentials and is verified by Zscaler, they have secure access to all resources authorized to that specific user from the employer.

Zscaler Management Service

App Connector

Establishes a secure, dedicated connection between the internal network and the Zscaler Cloud.

Zscaler Cloud Service

Verify users and devices, control access, and enforce security policy.

Web Browser Access or Zscaler Client Connector (Zscaler APP)

Establishes a secure connection to the Zscaler Cloud Service.

Adapted from: Zscaler. (2023). Zscaler Zero Trust Exchange | Key Attributes & Benefits. Retrieved from https://www.zscaler.com/platform/zero-trust-exchange ​

3: App Connectors​

Zscaler App Connector:​ Connects to VA resources and allows VA resources to be accessed through Zscaler.

Adapted from: Zscaler. (2023). Zscaler Zero Trust Exchange | Key Attributes & Benefits. Retrieved from https://www.zscaler.com/platform/zero-trust-exchange ​

2: Zscaler Cloud Service​

Provides a secure connection between a Client Connector and an App Connector by:​

  • Enforces VA security policy before establishing a secure connection for files, folders, and other resources.​
  • Controls the content and access to data associated with cyberthreats and sensitive data.​
  • Verifies the identity of users, devices, and access to the resources requested.​

Zscaler. (2023). 7 Key Elements of Highly Successful Zero Trust Architecture. Retrieved from https://www.zscaler.com/seven-elements-of-zero-trust

1: Web Browser Access or Zscaler Client Connector (Zscaler APP)​

A user signs into Zscaler:​

  • Through their normal web browser.
OR
  • Through the Zscaler Client Connector App (Automatically on GFE by an administrator update).

Zscaler. (2022).What Is Zscaler Client Connector? Retrieved from https://help.zscaler.com/z-app/what-zscaler-app

Benefits of Zscaler​​

  • Better control access to sensitive resources within VA.​​​
  • Reduce the risk of an attacker moving from one resource to another.​​
  • Help organizations enforce their security policies and prevent unauthorized access​.​​
  • Easy to monitor and track network activity.​​
  • Detect and respond to potential security threats quickly.​
Software Development Friendly​​
  • Zscaler runs automatically in the background. ​​​
  • There are no changes from the software development or programming side.​​
  • Does not affect any programs/applications already created (no need for modifications, updates/patches).​​
User Experience ​​
  • Fast and secure access to VA resources.​​
  • All resources can be accessed in the Zscaler Cloud Service using the Zscaler Client Connector App.​

Reference​s

  • Morris. (2019). How to Securely Access Amazon Virtual Private Clouds Using Zscaler Private Access | Amazon Web Services. Amazon Web Services. Retrieved from https://aws.amazon.com/blogs/apn/how-to-securely-access-amazon-virtual-private-clouds-using-zscaler-private-access/
  • U.S. General Services Administration. (2022). Executive Order 14028: Improving the Nation’s Cybersecurity. Executive Order 14028: Improving the Nation’s Cybersecurity | GSA. Retrieved from https://www.gsa.gov/technology/technology-products-services/it-security/executive-order-14028-improving-the-nations-cybersecurity
  • Zscaler. (2022).What Is Zscaler Client Connector? | Zscaler. Retrieved from https://help.zscaler.com/z-app/what-zscaler-app
  • Zscaler. (2023). 7 Key Elements of Highly Successful Zero Trust Architecture. Retrieved from https://www.zscaler.com/seven-elements-of-zero-trust
  • Zscaler. (2023). Zscaler Zero Trust Exchange | Key Attributes & Benefits. Retrieved from https://www.zscaler.com/platform/zero-trust-exchange

Questions