DATASHEET: Web Security

ZSCALER
Web Security
ONE POLICY, ONE CONSOLE, ONE GLOBAL PLATFORM AND ONE SEAMLESS SOLUTION
THE ZSCALER ADVANTAGE
• Stop today’s Advanced Threats
– in real-time
• Secure Web 2.0 Applications and
Unmatched protection against advanced and emerging threats.
With Zscaler Web Security, IT security teams can instantly create
and deploy granular web-based policies—by user, group, location
or action—to anyone, anywhere and on any device. It’s that easy!
Social Media
• Secure PCs, laptops, smart phones
and tablets
LEARN MORE at www.zscaler.com/websecurity
Speak with a specialist: 1-866-902-7811
Zscaler Web Security is a part of our massively scalable global Security as a Service platform that sits in-line
between your company and the Internet, protecting your enterprise from cyber threats, stopping intellectual
property leakage and ensuring compliance with corporate policies and statutory regulations. The Zscaler system
scans all incoming and outgoing Internet traffic irrespective of device or location, thus ensuring comprehensive
security and compliance for today’s ‘boundary-less’ enterprises. Zscaler Web Security protects you from a broad
range of web security threats including malicious URL requests, viruses, advanced persistent threats, adware,
spyware, botnets, cross-site scripting and much more.
Key Benefits
Gap-Free Prevention
• Instant protection against threats & vulnerabilities without the need to patch
• Safeguards against advanced persistent threats (APTs) by leveraging sophisticated
techniques like Behavioral Analysis
• Easily secure all smartphones and tablets without an agent
Cost Savings
• No appliances, software or clients to deploy and manage
• Just pay as you go – no patching, no updates and no backhauling!
• No buying excess capacity – cloud scales as you need capacity
Simplicity & Efficiency
• Eliminate complexity and point products – nothing to deploy and manage
• Global policy management – one policy follows users all around the world
Compliance and Real-time Analytics
• Helps meet regulatory and industry compliance – HIPPA, PCI, FISMA, etc.
• View any transaction, by any user, from any location – in seconds
• Transmit web logs seamlessly from the Zscaler Cloud to the enterprise SIEM in real-time
• Comprehensive DLP across all devices
Global Cloud Coverage
• World’s largest global security cloud; 100+ data centers
• Near-zero latency
• Five 9s availability – local, regional and multi-continent redundancy
ZSCALER WEB SECURITY
Features
URL Filtering
Zscaler enables organizations to limit their exposure to liability by
managing access to web content for users, groups and locations.
URLs are filtered by global reputation – against more than 90
categories, 30 super categories, and 6 classes.
Cloud Application and Social Media Control
Leverage the power of cloud applications and social media without
compromising productivity or security. Now, IT teams can easily
create granular global policies—based on users or groups—for
webmail, streaming media, social networking and IM.
Bandwidth Control
Easily and efficiently allocate bandwidth to prioritize businesscritical web applications over recreational usage.
Inline Threat Protection
Zscaler’s context-aware security scans every byte of inbound/
outbound traffic to secure devices, users, data and web applications
against advanced security threats. Inline ByteScan™, full SSL
scanning and Cloud Intelligence protects against botnets, malicious
active content, phishing, XSS attacks and more.
Behavioral Analysis
Zscaler provides non-signature based protection against zero
day exploits. By executing suspicious binary files in a sandbox,
malicious content can be identified even if the sample has never been
previously observed. The cloud model ensures that when a file is
identified, users across the entire network are immediately protected.
Unified Policy and Reporting
Zscaler delivers one, unified console to create web policy across
security, Internet access management and data loss prevention.
Administrators manage their own policy—with changes instantly
reflected across the entire cloud. The administrative portal also
provides a single pane of glass to view and analyze all traffic across all
devices and locations in real time.
Nanolog Streaming Service
Zscaler Nanolog Streaming Service (NSS) seamlessly transmits
web logs from the Zscaler Cloud to the enterprise SIEM in real time.
Administrators can choose to send all the logs or specific fields based
on interest or the EPS capacity. NSS enables companies to meet
compliance mandates on local log archival, correlate web logs to
other logs in the SIEM, and even receive real-time alerts on security
incidents from the SIEM.
Web Security Suites At-A-Glance
PROFESSIONAL
WEB
SUITE
BUSINESS
WEB
SUITE
ENTERPRISE
WEB
SUITE
Global Cloud Platform
Protect HQ, remote offices, laptops and smartphones. Full AD and LDAP Integration.
Real-Time Reporting
Report on any transaction, anywhere, in seconds.
URL Filtering
Granular policy by user, group, location, time and quota.
Inline Anti-Virus and Anti-Spyware
Signature based anti-malware and full inbound/outbound file inspection.
Advanced Threat Protection
PageRisk™ and real-time feeds stop phishing, botnets, XSS, Anonymizers and more.
Behavioral Analysis – Standard
Protect against 0-day threats and vulnerabilities.
SSL Decryption
Full inspection of all SSL traffic.
Cloud Application Visibility & Control
Granular Web 2.0 & application control for streaming media, social networking, webmail and IM
Web Access Control
Ensure outdated versions of browsers are forced to upgrade.
Data Loss Prevention
Inline scanning to log or block transactions with confidential data. Predefined engines/dictionaries.
Bandwidth Management
Protect bandwidth for web apps by location or time of day. Limit bandwidth consumption.
Encrypted VPN
Support for encrypted site-to-cloud traffic redirection (IPSec).
CONTACT US | Zscaler, Inc.
110 Baytech Drive, Suite 100 | San Jose, CA 95134, USA
+1 408.533.0288 or +1 866.902.7811
www.zscaler.com
Zscaler®, and the Zscaler Logo are trademarks of Zscaler, Inc. in the United States. All other trademarks, trade names or service marks used or mentioned herein belong to their respective owners
REV:20150211