Global leaders are coming to Zenith Live. Are you? Learn More
Global leaders are coming to Zenith Live. Are you?
Learn More
Resources > Webcasts And Demos

Thought leadership webcasts and live demos

Zscaler webcasts and demos provide insight into the most topical issues around the threat landscape, cloud‑based security and access, and business transformation. Join a live webcast or a demo to ask questions directly to experts, or watch a previously recorded webcast any time. Either way, it’s free.

Upcoming webcasts

Moving from Appliances to Cloud Security with Phoenix Children's Hospital

DATE: Thursday, June 21st, 2018 | Americas - 10:00 am PDT (18:00 pm UK, 19:00 pm CET)

KEYNOTE SPEAKER: Steve Grossenbacher, Sr. Product Marketing Manager, Zscaler

GUEST SPEAKER: Daniel Shuler CISO, Director IT Security, Phoenix Children’s Hospital

Applying consistent security controls across remote workforce is a challenge most companies struggle with. In addition, the demands of inspecting SSL traffic and the performance limitations of security appliances are causing real problems for IT organizations. Join this webcast to hear firsthand how Phoenix Children's Hospital was able to overcome these common IT challenges. You’ll also gain valuable insights from a Zscaler customer on the IT transformation journey, and perspectives on what it takes to make your network and security cloud ready.  


Live Demos

World class security for your growing organization:

Easy to deploy and hassle free

DATE: Thursday, June 28th, 2018 | Americas - 11:00 am PDT (19:00 pm UK, 20:00 pm CET)

KEYNOTE SPEAKER: Mark Porter, Senior Systems Engineer, Zscaler, Inc.

More live demo sessions:

- Thursday, June 28th, 2018 | Americas - 11:00 a.m. PDT (2:00 p.m. EDT)

- Thursday, July 5th, 2018 | Americas - 11:00 a.m. PDT (2:00 p.m. EDT)

This demo will highlight concrete security and business reasons on why moving to Zscaler's 100% Security-as-a-Service model is the only viable option to keep your growing organization and employees safe in today's social and mobile world. Read more..

Recently recorded webcasts

Faster, Simpler, More Secure Remote Access to Apps in AWS

Improve user experience and simplify your move to AWS

KEYNOTE SPEAKER: Patrick Foxhoven, CIO and VP Emerging Technologies, Zscaler, Inc.

KEYNOTE SPEAKER: Sam Hennessey, Senior Solutions Architect, Amazon Web Services

Although 60% of enterprises now run apps on AWS, the user experience for remote users is typically slow as most traffic is still tunneled through their data center breaking the cloud experience. A secure direct-to-cloud remote access experience without a VPN enables enterprises to migrate their legacy apps to AWS by delivering fast app access and policy-based security.


Accelerate the Migration to Microsoft Azure with Zscaler Private Access

Your apps are moving to Azure. Don’t let network security get in the way

KEYNOTE SPEAKER: Lisa Lorenzin, Director of Emerging Technology Solutions, Zscaler, Inc.

GUEST SPEAKER: Sean Dastouri Senior Cloud Architect Microsoft Azure,

Many companies still try to rely on the network-centric methods of the old world (i.e remote access VPN), when apps ran only in the datacenter, to provide user-to-app connectivity. They're now recognizing that the complexity of appliances and the need to manage ACLs and FW policies will actually slow the move to Azure dramatically. It's time for a new approach. One built for the new world.


How Zscaler enables simpler Office 365 deployment and a fast user experience

KEYNOTE SPEAKER: Naresh Kumar, Principal Product Manager, Zscaler, Inc.

Most companies don’t realize that Microsoft Office 365 was designed to be accessed directly via the internet. It’s no surprise, then, that deploying Office 365 without proper guidance can lead to delayed deployments and a terrible user experience. Attend this webcast to explore Microsoft’s latest connectivity guidance for deploying Office 365 and find out how Zscaler can make your Office 365 initiative a success.


Don’t let SSL be a security blindspot

Understand the stealthy threats targeting your users

KEYNOTE SPEAKER: Deepan Desai, Vice President, Security Research, Zscaler ThreatLabZ

IT is faced with a major compromise when it comes to inspecting encrypted traffic, because most organizations don’t have the budget to fully inspect it. Yet hackers are getting more creative in how they deliver malware over SSL/TLS, adding to inspection challenges. Attend this webcast to discuss the latest attack trends, and best practices you can employ to bolster your security and protect your users.


Solving the Secure SD-WAN Paradox

KEYNOTE SPEAKER: Dr. Jim Metzler, Principal Analyst at Ashton, Metzler & Associates

KEYNOTE SPEAKER: Dhawal Sharma, Sr. Director of Product Management at Zscaler

KEYNOTE SPEAKER: Tony Banuelos, Product Line Manager at VeloCloud, now part of VMware

Join this webcast as we discuss the ways organizations can improve their security posture while taking advantage of the benefits offered by SD-WAN and embracing the advantages of cloud-enabling technologies. Case studies and deployment best practices of implementing a secure SD-WAN solution will be shared.



The secure, direct-to-internet branch

KEYNOTE SPEAKER: Zeus Kerravala, Founder and Principal Analyst, ZK Research

KEYNOTE SPEAKER: Bill Lap, Vice President of Customer Success, Zscaler, Inc.

Digital transformation is driving the evolution of branch IT and security architectures to take advantage of cloud services. In this webcast, we’ll be joined by Zeus Kerravala, Founder and Principal Analyst, ZK Research, to explore the best ways to address the challenges of complexity and security in the branch, and provide a scalable architecture for the adoption of SaaS and cloud services.


Adopting A Zero-Trust Model. Google Did It, Can You?

Change from old-world network-centric, to new-world user- and app-centric

KEYNOTE SPEAKER: Ameet Jani, Product Manager, Google, LLC.

KEYNOTE SPEAKER: Manoj Apte, Chief Stratagy officer, Zscaler, Inc.

Based on 6 years of creating zero trust networks at Google, the BeyondCorp framework has led to the popularization of a new network security model within enterprises, called the software-defined perimeter. It takes a fundamentally different approach to providing secure access to applications, doing away with the need for traditional perimeter-based network security like solutions like VPNs.

So what does this mean for enterprises not named Google, and how can they can adopt a similar security approach within their organization?



Top reasons Office 365 deployments fail

Pilots may go well, but rollouts can be a different story

KEYNOTE SPEAKER: Steve House, Vice President, Product Management, Zscaler, Inc.

Microsoft Office 365 is unlike any other SaaS application and, even with careful planning, it’s fair to say that deployments don’t always go as planned. Office 365 was designed to be accessed directly via the internet, and most companies just don’t have the proper network setup. It’s no surprise, then, that deploying Office 365 without the right planning and guidance can lead to network problems and a poor user experience.

In this webcast, we’ll explore Microsoft’s current connectivity guidance for optimizing Office 365 in your network. You’ll hear how to remove common deployment hurdles, what network changes you need to make, and how you can guarantee a fast user experience.


GDPR - are you ready?

Key steps to getting GDPR right

KEYNOTE SPEAKER: Chris Hodson, EMEA CISO, Zscaler, Inc.

KEYNOTE SPEAKER: Shaun Ghafouri, Associate General Counsel, Zscaler, Inc.

In four months, the General Data Protection Regulation (GDPR) will go into effect, but how many organisations will be ready? According to Gartner, not many: “By the end of 2018, over 50% of companies affected by the GDPR will not be in full compliance with its requirements.”


Secure Remote Access to AWS Your Users Will Love

Improve user experience and simplify your move to AWS

KEYNOTE SPEAKER: Patrick Foxhoven, CIO and VP Emerging Technologies, Zscaler, Inc.

59% of enterprises are running applications in AWS and users are accessing them from outside the network. As adoption takes place incumbent technology, like the remote access VPN, provide a poor user experience and introduce additional networking and security complexity. This not only slows cloud initiatives, but frustrates users and makes life difficult for admins.

Enterprise must rethink the way they provide remote access to internal apps.