Zscaler webcasts and demos provide insight into the most topical issues around the threat landscape, cloud‑based security and access, and business transformation. Join a live webcast or a demo to ask questions directly to experts, or watch a previously recorded webcast any time. Either way, it’s free.
DATE: Thursday, August 17th, 2017 | Americas - 08:30 am PDT (16:30 pm UK, 17:30 pm CET)
KEYNOTE SPEAKER: Jen Toscano, Sr. Product Marketing Manager, Zscaler, Inc.
GUEST SPEAKER: Chandan Agarwal, Product Manager, Zscaler, Inc.
What does your bandwidth traffic look like? What apps and services do you have accessing the Internet? How do you ensure that your network is optimized for business productivity? With more traffic bound for the Internet, it is essential that business apps, like Office 365, are prioritized over YouTube, live-streaming sporting events, and even over non-critical business traffic.
Please join Jen Toscano, Sr. Product Marketing Manager, and Chandan Agarwal, Product Manager, as they discuss how Zscaler Bandwidth Control enables you to manage, control, and allocate bandwidth to ensure that business-critical applications take priority over other traffic.
Easy to deploy and hassle free
DATE: Thursday, August 03rd, 2017 | Americas - 11:00 am PDT (19:00 pm UK, 20:00 pm CET)
More live demo sessions:
This demo will highlight concrete security and business reasons on why moving to Zscaler's 100% Security-as-a-Service model is the only viable option to keep your growing organization and employees safe in today's social and mobile world. Read more..
Enabling Application Access With Zscaler
KEYNOTE SPEAKER: Lisa Lorenzin, Director Emerging Technology Solutions, Zscaler, Inc.
No More M&Ms: transitioning from legacy VPN to modern SDP with Zscaler Private Access
Many IT teams used an “M&M” approach to design network security: create a hard shell or perimeter around the soft interior. For remote users, traditional L3 VPNs extend that perimeter, placing remote users' endpoints directly onto the enterprise network. This puts the enterprise's network and data at risk from a range of threats - compromised credentials can lead to unintended exposure, as attackers move laterally throughout the network environment.
KEYNOTE SPEAKER: Larry Biagini, Chief Technology Evangelist, Zscaler, Inc.
HOST: Jason Georgi, Head of the Value Management Office, Zscaler, Inc.
As businesses mandates more innovation from IT, the role of the CIO and CTO become more critical while, in many cases, the CISO becomes an after-thought or a checkbox on key initiatives.
Join Larry Biagini, former CTO of GE and now Chief Technology Evangelist with Zscaler, for a webcast that digs into relationships and technologies that drive IT innovation and business outcomes.
KEYNOTE SPEAKER: Dhawal Sharma, Director Product Management, Zscaler, Inc.
Companies are selecting SD-WAN as a way to enhance or replace traditional branch routers in order to support low-latency applications, including VoIP calling, video-conferencing, streaming media, and SaaS or cloud-hosted applications, over greater distances. In fact, Gartner has predicted that, by the end of 2019, 30% of enterprises will deploy SD-WAN technology in their branches.
SD-WAN is a proven and cost-effective approach to establish local Internet breakouts, but they create security challenges, particularly as IT organizations feel they have no other choice than to make additional hardware and software investments to support each branch or remote office.
Please join Dhawal Sharma, Director of Product Management at Zscaler, as he explains why the cloud is the answer when it comes to delivering the the most efficient and secure local Internet breakouts.
What you need to know
KEYNOTE SPEAKER: Bil Harmer, Office of the CISO, Zscaler, Inc.
KEYNOTE SPEAKER: Deepen Desai, Senior Director, Security Research, Zscaler, Inc.
As many companies sought to regain their footing after last month’s devastating WannaCry attack, we saw another ransomware attack yesterday, which impacted businesses in more than 65 countries.
GUEST SPEAKER: Dr. Sri Subramanian, Sr. Director, Product Management, Zscaler, Inc.
HOST: Jen Toscano, Sr. Product Marketing Manager, Zscaler, Inc.
You want to create a fast and secure experience for your branch users. Cloud applications, like Office 365, are being rapidly adopted and are designed to be accessed directly via the Internet. To securely embrace cloud apps and services and deliver a fast user experience, Internet traffic needs to be routed locally. But how can you establish secure direct Internet connections without backhauling and without without duplicating stacks of security appliances at each branch?
Please join Dr. Sri Subramanian, Sr. Director of Product Management and Jen Toscano, Sr. Product Marketing Manager as they discuss how Zscaler Cloud Firewall enables fast and secure local Internet breakouts, and delivers next generation firewall capabilities, including security and access controls for Internet traffic on all ports, and security that follows the user to provide identical protection no matter where they connect.
In the direct-to-Internet world, the old approach to secure access won't work
KEYNOTE SPEAKER: Denzil Wessels, Senior Director Product Management, Zscaler, Inc.
Virtual Private Networks, the de facto standard for employee and third-party access to internal applications, were designed almost twenty years ago to make users feel as if they were on the corporate network.Unfortunately, the VPN process creates a terrible user experience, regardless of whether applications are on a public cloud (Azure, AWS) or in the corporate data center. IT is forced to resort to “unnatural acts of networking” to segment and secure valuable assets, creating a cumbersome solution that no one would choose if they were building it from scratch.The problem is that no one has built a viable alternative to the VPN… Until now. Zscaler Private Access is what comes next in the world of secure access to internal applications.
KEYNOTE SPEAKER: Jeff Pollard, Principal Analyst serving Security & Risk Professionals, Forrester Research, Inc.
GUEST SPEAKER: Lisa Lorenzin, Director, Emerging Technology Solutions, Zscaler, Inc.
Forrester's Zero Trust Model requires a simple but profound change in the way we think about information security. In Zero Trust, all network traffic is inherently untrusted. In this webcast our keynote speakers from Forrester and Zscaler will explain how IT teams must evolve their approach to security based on new network models and data flows. We will also share details from Forrester's Security and Risk playbook and the necessary shift in investments to support application access transformation. We will conclude this webcast by discussing recent innovations in the Zscaler cloud security platform which support the Zero Trust Model.
Finding a Needle in a stack of Needles
KEYNOTE SPEAKER: Jozef Krakora, Principal Product Manager, Zscaler, Inc.
KEYNOTE SPEAKER: Steve Grossenbacher, Sr Product Marketing Manager, Zscaler, Inc.
Do you have what it takes to find today’s Advanced Persistent Threats? Current cyberattacks employ a range of techniques that often make them invisible to traditional security controls. With SSL threats on the rise, and hackers getting more and more creative on how they deliver threats, advanced threats can easily hide in plain sight. Finding and stopping these complex attacks takes a complete platform approach. Attend this webcast to discuss the latest attack trends, and best practices you can employ to bolster your security.
KEYNOTE SPEAKER: Jason Georgi, Director of the Transformation Office, Zscaler, Inc.
As the cloud transforms enterprise IT, it brings a lot more savings than cold hard cash. No question, reducing infrastructure costs is the #1 attraction to cloud. But there are two other cost dimensions with huge impact on security that must not be ignored. The payoffs depend on whether you approach security with a cloud vs. on-premises model. An organization’s choices are crucial – both for enterprise security and for the roles of its stakeholders. Join this webinar as we compare three cloud vs. on-premises cost considerations.
What we can learn from the facts
KEYNOTE SPEAKER: Deepen Desai, Senior Director, Security Research & Operations, Zscaler, Inc.
KEYNOTE SPEAKER: Patrick Foxhoven, Chief Information Officer, VP of Emerging Technologies, Zscaler, Inc.
The WannaCry attack has generated a lot of press, some theories, and plenty of misinformation. Join our security experts to hear evidence-based information, so you can discern the truth about this evolving threat. They’ll discuss the initial attack vector, new strains, what we’re seeing in the Zscaler cloud, and protective actions you can take now. Finally, they’ll discuss how we can more effectively protect against modern threats like WannaCry by rethinking the way we apply security and access controls.