Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.



Zscaler services enable any end user, from any place, using any device a rich Internet experience while enforcing security and business policy. We deliver this service using our Global Cloud Infrastructure. Rather than buying appliances, we have a new on-demand business model, whereby customers pay a subscription fee. Our cloud service is built upon ground-breaking, high-performance technology that eliminates latency. Zscaler reduces risk, lowers cost, improves resource utilization, and simplifies IT administration.

Our Website:

Latest Content From Zscaler

Webcast: Cloud Security Strategies for Today’s Enterprises

by ZscalerJan 06, 2022

The typical enterprise relies on dozens, even hundreds, of cloud applications and services sprawled across different platforms and service providers. Security teams need to shoulder the responsibility of coordinating security and incident response and not leave it up to individual providers. In this webinar, experts discuss the specific tools and best practices to manage security in the cloud environment. You’ll learn technologies and strategies to safely move data into the cloud, enforce policies across different platforms, and monitor data in the cloud. You’ll walk away with recommendations on ways to securely manage cloud environments, even across multiple vendors.

Webcast: Monitoring the Invisible - Digital Experiences in a Zero Trust World

by ZscalerAug 31, 2021

Zero trust architectures such as Zero Trust Exchange are intrinsically better than traditional network security models in securing user-to-app interactions. They make enterprise applications invisible to the internet, allow only authorized users to interact and deny everything else, including performance monitoring traffic. Continuous and proactive monitoring of end-user experiences and applications requires a unique and holistic approach in zero-trust environments. 

Research Report: ThreatLabZ Ransomware Review: The Advent of Double Extortion

by ZscalerAug 16, 2021

The Zscaler™ ThreatLabZ threat research team analyzes more than 150 billion platform transactions and 100 million blocked attacks every day to understand emerging threats and how to stop them. In 2020, ThreatLabZ observed a notable escalation of ransomware in terms of frequency and the sophistication and severity of incidents, resulting in higher — and more guaranteed — payouts from victims.

  • Details
  • Research Report

Whitepaper: Architects Guide to Zero Trust Network Access

by ZscalerAug 16, 2021

Many enterprises are considering zero trust network access (ZTNA) services as an alternative to VPN. In fact, Gartner believes that by 2021, 60% of enterprises will phase out their existing VPN for a ZTNA service. But, the reality is that in any large (global) organization even a small change in how users access applications can become a huge task. This document will help you understand where to begin so that you can embrace ZTNA, quickly, and without disruption to the business.

Whitepaper: Definitive Guide to Secure Remote Access

by ZscalerAug 16, 2021

Enterprises are migrating their private applications to public clouds, and users are consuming more applications, connecting to them from everywhere and from any device. This has created a proliferation of perimeters around users, devices and applications. Although many organizations have already taken steps to embrace digitalization and enable a zero trust network, their connectivity is still operating on incumbent network-centric approaches. Teams struggle to retrofit network-centric VPN technology to meet the needs of the modern user and the transforming business, but retrofitted approaches can prevent digitalization. It's time to redefine secure remote access.

E-Book: How five organizations are elevating WFH into a long-term strategy

by ZscalerAug 16, 2021

What do you need when workers go everywhere and bring their own devices? Supporting a handful of remote workers is one thing, but how do you enable a large workforce to securely access the internet, SaaS, and private applications — when they could be anywhere in the world using any device? Learn how five organizations are elevating WFH into a long-term strategy.

Whitepaper: Guide to Enabling a Work from Anywhere Organization

by ZscalerAug 16, 2021

The way employees work has changed dramatically in the past year as the world has had to quickly adopt work-from-home technologies for the sake of user productivity and business operations. While this has given employees the freedom to access data from practically anywhere, it also brings with it a host of challenges when it comes to mitigating business risk.

Whitepaper: Using ZTNA to Deliver the Experience Users Want

by ZscalerJun 08, 2021

Secure app access to your workforce from any device, anywhere, at any time.

Whitepaper: Why IT leaders Should Consider a Zero-Trust Network Access Strategy

by ZscalerJun 08, 2021

Your role as an IT leader has evolved, and so too have the technologies that drive business decisions. Today, you are tasked with guiding your organization as it adopts public cloud services and allowing mobile users to work from any device, anywhere, while ensuring the security of the business.

To achieve these goals, you need a modern approach to security. In this paper you can read about:

  • Changing technology and the evolving role of IT leaders
  • Factors IT leaders must now consider when adopting new technology
  • How a ZTNA solution drives business success
  • See why enterprises are moving away from the traditional DMZ network security method and are using services born in the cloud, to secure the cloud. Propelling their careers, and their organization forward in the process.

Whitepaper: State of Encrypted Attacks

by ZscalerJun 08, 2021

The Zscaler threat research team analyzed 6.6 billion threats hidden inside encrypted traffic for a closer look into evolving attack techniques. Without proper inspection, encryption can be a vulnerability. ThreatLabZ, Zscaler's global research team, analyzed billions of encrypted threats delivered over SSL/TLS channels in 2020. Read the detailed report to learn how encrypted threats have become more sophisticated this past year, including:

  • Explosive growth in volume: 260% increase in SSL-based threats in the last nine months
  • Increasing abuse of cloud-based file-sharing services: Over 30% of all SSL-based attacks spoofed collaboration services such as Google Drive, OneDrive, AWS, and Dropbox
  • Hidden ransomware on the rise: More than 500% increase in ransomware delivered over encrypted web traffic between March and September of 2020
  • Best practices for preventing encrypted threats with SSL inspection at scale: Security and data protection systems that can't inspect 100% of traffic put enterprises at risk

Read the report to gain deep insights into how attackers are accelerating their encryption use to bypass traditional defenses and how you can better protect your enterprise.