Beruflich Dokumente
Kultur Dokumente
110 Baytech Drive Suite 100 San Jose, CA 95134 | Phone: 1-866-902-7811 | www.zscaler.com
Copyright 2015
Copyright 2015
Box.com
Salesforce
Google Apps
The Zscaler Identify Broker also gives you the ability to log user access to cloud applications
irrespective of their location or device, as well as agent-less deployment.
Copyright 2015
Copyright 2015
Bandwidth Control
DLP
Authentication Bypass
SSL Bypass
This allows you to define policies without having to configure custom URL categories for cloud
applications that are already supported by Zscaler.
Copyright 2015
Zscaler now supports the OCSP protocol to verify the validity of all server
certificates
Zscaler now blocks all certificates with a revoked/unknown status and displays
an EUN.
Zscaler displays EUNs for bad server certificates in the following scenarios:
o
Zscaler does not fall back to the Zscaler root certificate if a custom self-signed
certificate is invalid. Instead, Zscaler continues to use the previously uploaded selfsigned certificate.
Copyright 2015
Copyright 2015
Authentication Enhancements
Zscaler now supports the following:
Frequent LDAP synchronizations (up to every 2 hours) for organizations that use the
Zscaler Authentication Bridge
Aliasing for Kerberos authentication, where the Zscaler service can synchronize
sAMAccountName as an alias for User Principal Name.
Copyright 2015
Security Features
Rule-Based Policies for Zscaler Behavioral Analysis
Zscaler Behavioral Analysis automatically sends suspicious files to our cloud-based sandboxes
for further inspection it is designed to give you protection similar to FireEye at a fraction of
the cost.
With Zscaler Summer 2015, we now support granular rule-based policies for Behavioral
Analysis. For example, you can set up a policy that increases your overall security posture by
enforcing that for your CFO, CEO and CEO, suspicious and unknown Adobe PDF and Microsoft
Office Documents must always be quarantined and inspected but for the remainder of your
employee population they will be passed and inspected.
Copyright 2015
10
Infrastructure Features
Virtual ZEN (Limited Availability)
With Summer 205, the Zscaler Enforcement Node (ZEN) is now available as a virtual machine
that you can deploy on premise. A virtual ZEN (vZEN) functions as a full-featured Zscaler proxy,
running on your network, inside your data center, or in your public or private cloud
infrastructure. vZENs are available as an additional subscription. Zscaler supports vZEN
deployments in clusters for scalability and load distribution. vZEN supports traffic forwarding
via GRE tunnels, L2 forwarding and PAC files.
Copyright 2015
11
Copyright 2015
12
Copyright 2015
13
Please note that the Zscaler app is not enabled by default on your account. Contact Zscaler
support to enable the Zscaler app for your account. The app is available in Limited Availability
mode and should not yet be used as your primary deployment vehicle for Zscaler.
Copyright 2015
14
Copyright 2015
15
.cgr
.mkv
.webm
.sldprt
.GIF
.JPEG
. PNG
Copyright 2015
16