Advanced internet security made simple

Zscaler is a global cloud-based information security platform that provides Internet security, web security, next generation firewalls, sandboxing, SSL inspection, antivirus, vulnerability management. Protect and apply policy to any device, any location with simple management, fantastic logging and huge scalability.


Web Security

Analyse both inbound and outbound traffic in real time, for any device, anywhere in the world, to ensure that your users are protected against Advanced Web browsing threats like phishing or spyware, as well as malicious or rogue apps, and apps that may pose security or privacy risks to data on the device. Also enforce corporate content filtering and browsing policies.



Zscaler Advanced Persistent Threat (APT) Protection, you can now protect your organisation from these sophisticated threats with a multi-layered “protect-detect-remediate” defence framework, including advanced “signatureless” behavioural analysis and forensics capabilities. Tests show performance shattering results in comparison to appliance based solutions.


SSL Inspection

Comprehensively inspect and secure SSL encrypted internet traffic. Otherwise, you are literally blind to over one third of all information transiting your organisation—it’s like leaving your front and back doors wide open and it will only get worse. Cybercriminals know about your SSL blind spots. They leverage SSL tunnels to sneak malware into the corporate network, to hide command and control traffic, and to exfiltrate your data.

Data Loss Prevention Padlock

Data Loss Prevention

Zscaler's Data Loss Prevention (DLP) protects your confidential information and intellectual property by inspecting all of your outbound Internet traffic, including SSL-encrypted traffic, and helps you meet industry, statutory and regulatory compliance standards for the protection of information. Quickly deploy robust Data Loss Prevention without the long integration cycles associated with hardware ICAP proxies.

Zscaler data centre map


Any user, any device, anywhere in the world can be secured and managed through the world’s largest global Internet security footprint with more than 100 data centres worldwide, processing more than 12 billion transactions every day with near-zero latency to instantly secure more than 12 million users at more than 5,000 global enterprises, governments and military organizations, spread across more than 185 countries

zscaler platform process


No backhauling through head office. No stack of appliances to sequence traffic through. Breakout direct to the internet wherever the user is. Improved control and improved user experience with direct to cloud through over 100 global data centres. You can take advantage of unified reporting – any transaction, any user, any location - and analysis instead of dealing with dozens of reporting interfaces.

Zscaler direct to cloud deployment


Just point the internet traffic at the Zscaler cloud security platform and manage policy through a web browser. A coherent range of services designed from the ground up for cloud. No more patching of appliances. No worry about data centre power and cooling. When a new threat is identified for any customer, all customers have their signatures automatically updated.

Simple as starting the cloud


Customers range from a handful of users to hundreds of thousands. Unlike with appliance based solutions, adding users is simple. Want to add another site? Simple. The fact the Zscaler security cloud platform handles more transactions than Google, Twitter and Facebook combined also means they have huge insight into trends and events on the internet.

The Simple Scalable Solution Versus The Appliance Stack

Zscaler HTML5 Management GUI

Zscaler Analytics GUI

Typical Data Centre Appliance Stack

Typical data centre security appliance stack

Protection and Compliance in Minutes

Channel your internet traffic through the world’s largest security cloud and we will inspect every byte, ensure the content is safe and compliant, forward approved traffic to its eventual destination and then log the actions we have taken.

The security cloud acts like a security and compliance filter in the path of all of your Internet traffic – whether it is destined for consumer websites like Facebook, Google or Baidu, commercial cloud applications like and Box, public cloud services like Amazon Web Services or Microsoft Windows Azure, or your own private cloud applications, perhaps running at IBM, HP or Verizon data centres. We also inspect the Internet traffic generated by mobile applications.

Zscaler is designed to protect all of your users and all of your systems, wherever on the planet they happen to be located and however they are connected

  • corporate LAN
  • hotel Wi-Fi
  • home office
  • 3G/4G

and whatever the device is, including smart phones and Internet-connected “things.”

APT With No Sacrificial Lamb

Nearly all appliance vendors that provide APT protection are deployed in tap mode – meaning that the file that may be malware will still be delivered to the victim. Some minutes or hours later when that file is determined to be malware, only then does the system alert security analysts – already too late as the infection has already happened. That poor first user was a “sacrificial lamb” as is still infected.

Zscaler provides an initial inspection quarantine that guarantees even the first file seen can be quarantined until it is cleared or blocked if flagged as malicious. This is the only way to guarantee the halt of the spread of an infection. Because Zscaler’s security cloud handles APT detection over 50 times faster than typical appliance solutions, the delay is viable.

Gartner APT Detect Remediate Protect

Over 30% of Internet Traffic Encrypted with SSL

Today, more and more Internet traffic is encrypted using the Secure Sockets Layer (SSL) protocol—across our systems Zscaler see more than 30% of traffic encrypted with SSL, and growing.

Ten years ago, SSL encryption was used primarily for banking and other secure transactions, but now SSL is becoming mainstream—all major consumer and commercial cloud applications like Google Search, Office 365, Salesforce, Box, and Facebook are 100% SSL with many actively promoting ubiquitous use of SSL encryption for all Internet access.

So what’s the problem? Most traditional security appliances are ‘blind’ to SSL traffic.

Even if an appliance has the theoretical ability to decrypt SSL traffic, the computational burden this puts on the system means that you either have to accept poor performance or add significantly more hardware to maintain acceptable user experience. This is why most organisations do not today decrypt and inspect SSL traffic. The recent move to 2048-bit SSL certificates has aggravated this problem, by causing, on average, greater than 80% degradation in appliance performance, according to NSS labs.

Mobile Security – Smart Phones, Tablets, etc

Zscaler’s Mobile Security Solution is custom built to address the evolving challenges of mobile data and app security for both employee-owned and corporate-issued mobile devices. Simply forward your entire mobile traffic—browser and app—to Zscaler’s cloud security platform where both inbound and outbound traffic are analysed in real time to ensure that your users are protected against Advanced Web browsing threats like phishing or spyware, as well as malicious or rogue apps, and apps that may pose security or privacy risks to data on the device. Zscaler Mobile App ProfilerTM technology enables the protection of mobile apps based on the network traffic, identifies the device platforms the apps were running on, and flags any security or privacy risks that they may pose. All this is achieved with minimal latency—thus maintaining optimal user experience.

Whether you provide your employees with mobile devices or your users bring their own, it does not matter—Zscaler has you covered. Struggling with managing iOS vs Android?  We have solutions for any platform—Zscaler has you covered. The whole point of mobile security is that it needs to be mobile—not just in where it is used, but how and when it is used.