Global leaders are coming to Zenith Live. Are you? Learn More
Global leaders are coming to Zenith Live. Are you?
Learn More
Solutions > Secure Remote Access

Secure Remote Access to Cloud

Apps have moved to cloud. Users have moved off the network

The migration of internal applications to cloud services like Azure, AWS and Google and the increase in remote employees means that enterprises must now rethink how they provide remote access.

Relying on incumbent technologies, based on data center appliances, introduces networking and security costs and complexity. In the end, cloud adoption is slowed, users have a poor user experience and the network is left vulnerable.

Relying on UTM and NGFW appliances to secure internet traffic is costly, results in appliance sprawl, and compromises branch security.

A new approach to secure remote access to cloud

One born in the cloud to secure the cloud

The network is at
further risk

Today, connecting users to apps in the cloud means giving them access to the network. Malware on mobile devices can be introduced to the network, extending the attack surface to both the data center and the cloud.

Cloud access, without network access

This new approach gives users access to specific internal applications, based on granular policies. This is accomplished without placing remote users on the network, ensuring its protected from malware on mobile devices.

Users Miss Out On
Cloud Experience

Legacy remote access technology lacks the ability to provide a cloud-like user experience. Diminishing the value that cloud delivers to enterprise teams and frustrating remote users.

Direct-to-cloud user experience

Remote users are now taken directly to the cloud vs. being routed to a datacenter hosted in a far off location. This provides a seamless experience, increases productivity and enables enterprises to benefit from cloud agility.

Complexity slows
cloud adoption

Security and networking complexity introduced by the need to implement new appliances, and setting up site-to-site VPNs for remote access, slows cloud initiatives. It also leads to increased costs to the business.

Standardized security for Faster adoption

Using this cloud based security approach teams can standardize security across all datacenters and cloud providers. This reduces the complexity, reduces implementation time from months to just hours, and accelerates cloud initiatives.

The network is at
further risk

Today, connecting users to apps in the cloud means giving them access to the network. Malware on mobile devices can be introduced to the network, extending the attack surface to both the data center and the cloud.

Cloud access, without network access

This new approach gives users access to specific internal applications, based on granular policies. This is accomplished without placing remote users on the network, ensuring its protected from malware on mobile devices.

Users Miss Out On
Cloud Experience

Legacy remote access technology lacks the ability to provide a cloud-like user experience. Diminishing the value that cloud delivers to enterprise teams and frustrating remote users.

Direct-to-cloud user experience

Remote users are now taken directly to the cloud vs. being routed to a datacenter hosted in a far off location. This provides a seamless experience, increases productivity and enables enterprises to benefit from cloud agility.

Complexity slows
cloud adoption

Security and networking complexity introduced by the need to implement new appliances, and setting up site-to-site VPNs for remote access, slows cloud initiatives. It also leads to increased costs to the business.

Standardized security for Faster adoption

Using this cloud based security approach teams can standardize security across all datacenters and cloud providers. This reduces the complexity, reduces implementation time from months to just hours, and accelerates cloud initiatives.

Software-defined perimeter for secure remote access to cloud

The Zscaler Private Access Service provides secure remote access to internal applications in cloud and without placing users on the corporate network. The cloud service requires no complex remote access VPN gateway appliances, and uses cloud-hosted policies to authenticate access and route user traffic to the closest application location to them. A true software-defined solution that can work in conjunction with direct access technology which directly connects customer data centers with cloud service provider data centers.

1.  Cloud Policy Engine
  • Hosted in cloud
  • Provides users access to app
  • Customizable by admins
2.  Z-App 
  • Mobile client
  • Installs on all users devices
3.  Z-Connector
  • Sits in front of apps in cloud
  • Lightweight binary, runs in cloud or data center
  • Listens for access requests from Z-cloud
  • No inbound connections
4.  Z-Broker
  • Brokers a secure connection between a Z-App and a Z-Connector

Enterprise benefits

Seamless User experience

Fast, direct access to cloud with a cloud-like user experience

Secure Cloud Access

Remote users are never placed on the network, but instead are given access to apps based on policy

Reduce costs

There are no appliances to purchase and teams optimize bandwidth of direct access technologies

Accelerated Adoption

Standardized security reduces security and networking complexity and accelerates cloud initiatives

See how this e-commerce company replaced its remote access VPN
and now provides a better experience while improving security.

Read the story

Suggested Resources

Solution brief

ZPA for Azure

Read the solution brief  

Demo

See a demo of Zscaler Private Access in action

Watch demo 

Whitepaper

The Definitive Guide to Secure Remote Access

Read the white paper  

Simplify your move to the cloud

Don’t let legacy technology make cloud adoption complex. Get up to 6 months of Zscaler Private Access service for FREE.

Switch to ZPA