Sign in
Migration Mapping Assistant Your Saved List Partners Sell in AWS Marketplace Amazon Web Services Home Help
About Zscaler

Born in the cloud to secure the cloud. Built from the ground up, Zscaler's multi-tenant cloud architecture lets customers enjoy elastic scale while maintaining security and data privacy. Zscaler was started in 2008 when a number of industry veterans, including CEO Jay Chaudhry, came together to create the next step in network security. Zscaler was built on several foundational observations, including the fact that business and personal applications had begun moving to the cloud, Web 2.0 was leading to the evolution of web-based apps, and that the adoption of mobility meant that users could be working from anywhere. These observations generated several tenants of a next generation security architecture, including: Perimeter-based security appliances can't provide real protection, because both users and the apps that they are seeking no longer reside within any perimeter. Point products, even those considered best-of-breed, are not designed to interact with one another for to a holistic perspective IT sees only pixels, not the picture. The majority of unresolved threats come from the internet, so the most effective place to handle security is in the cloud between the users and the web. Threats evolve constantly, and to catch zero-day exploits before they hit the network it is impossible to rely on signatures alone.


Zscaler Products (2)
showing 1 - 2
  • (0)
  • Version ZPA Connector AMI 2019.08
  • Sold by Zscaler

Connectors can be co-located with your enterprise applications, or they can be deployed in any location that has connectivity to the applications. Typically, they are deployed on network segments that can access secured applications and the ZPA cloud simultaneously, such as in a DMZ. Connectors only...

Linux/Unix, CentOS 7 - 64-bit Amazon Machine Image (AMI)

Zscaler Private Access™ (ZPA™) is a new way to provide secure remote access. ZPA works by abstracting private, internal applications from the networks upon which they reside. Instead of the network layer tunnels used in legacy remote access methods, the ZPA solution provides authorized users access...

showing 1 - 2