SlideShare a Scribd company logo
0 ©2018 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION
Say Hello to the Software-
Defined Perimeter
How SDPs deliver zero trust security
Jon Oltsik
Senior Principal Analyst
and ESG Fellow
Dhawal Sharma
Sr. Director Product
Management, Zscaler
1
Public Cloud Usage Trends
We currently use cloud
computing services, 85%
We plan to use/are interested in
using cloud computing services,
12%
We have no plans or interest in using
cloud computing services, 3%
Overall usage of public cloud computing services. (Percent of respondents, N=651)
2
Public Cloud Usage Trends, 2013-2018
57%
70% 71%
75% 78%
85%
2013 2014 2015 2016 2017 2018
Overall usage of public cloud services, 5-year trend. (Percent of respondents)
3
Public Cloud Usage Trends: Service Model Breakdown
39%
51%
74%
25%
24%
13%
20%
15%
7%
14%
10%
5%
1%
1%
1%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
Platform-as-a-service (PaaS)
Infrastructure-as-a-service
(IaaS)
Software-as-a-service (SaaS)
Please indicate your organization’s usage of or plans for each of the following cloud
computing services. (Percent of respondents, N=651)
Currently use
Do not currently use but we plan to
No use or plans at this time but we are interested
No use, plans, or interest at this time
Don’t know
4
Endpoint Device Platforms Used
35%
43%
43%
53%
69%
BYOD devices that are profiled and verified to
comply with our security policy
Virtual desktop (VDI) workspace environments
Company-issued MacOS desktop/laptop
Company-issued mobile devices (Android,
MacOS, etc.)
Company-issued Windows desktop/laptop
Which of the following endpoint device platforms are currently used by your
organization’s employees? (Percent of respondents, N=385, multiple
responses accepted)
5
The perimeter has extended from the datacenter, to the internet
6
Application Access Requirements
• Can scale with business needs
• Is built for zero trust access
• Delivers sensitive data protection
• Centralizes control for all services
7
Current Network Access Model
DMZ
8
Application access must change
• Extra burden for users
• Costly and complex networks
• Insecure against modern threats
• Lack of granular visibility into network traffic
9
Insanity: “Doing the same thing over and over again
and expecting different results.”
- Albert Einstein
WORDS TO LIVE BY
10
The Rise of the Software-defined Perimeter
11
SDP Quote
“No one has an SDP
budget, but
Every enterprise has
an SDP need.”
12
13
Top Enterprise SDP Use Cases
• VPN replacement
• Third-party access
• Privileged account management
• Cloud application access
• Application discovery
14
SDPs are key to achieving a zero trust security model
• Never automatically trust any user or network
• Reduce the attack surface by reducing # of users able to access an application
• Provide access on a strict “need to know” basis
• Verify before granting any level of access to an application
• Create a segment of one between a named user and a named application
15 ©2018 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION
Zscaler Private Access
Zero trust access to internal applications
16 ©2018 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION
ZPA: Make application access secure, seamless and simple
Public Cloud
Private Cloud
/ Data Center
• Zero trust access to internal apps
running in any environment
• Embrace application
segmentation by default
• Provide app connectivity without
placing users on-net
• Delivers seamless user
experience across users & apps
INTERNALLY
MANAGED
HQMOBILE BRANCHIOT
17
ModernPlatformsRequireModernMethodsforConnectingToThem
• “By 2021, 60% of enterprises will phase out network VPNs for
digital business communications in favor of software-defined
perimeters”
• Gartner
• November 2017
18
Building ZPA’s SDP Architecture
Built on Zscaler’s Foundation
• 4+ Year Dedicated Investment with a dedicated engineering team building our SDP
• Leveraged a Proven End Point - Zscaler App (all ports/protocols) on Windows, Mac, IOS and
Android across 1.5M+ endpoints already
• User Experience is awesome! Users access internal apps just like they access Internet and SaaS
“Any to Any” Internet Scale Architecture
• Modern micro-services architecture with auto-scaling and containerization
• Running in Zscaler Datacenters plus AWS and Azure (20+ regions)
19
Zscaler Private Access – How the service works
Zscaler App2
SDP architecture
Zscaler Enforcement Node (ZEN) –
secure user to app connection
• Cloud Policy engine - user to app access rights
1
Zscaler App – requests access to an app2
App Connector – sits in front of apps;
Inside-out connections only - “I’ll call
you”
3 1
ZEN (hosts policy)
Data Center
App connectors
3
3
EMPLOYEESPARTNERS
The experience users want. The security IT needs.
New York London Sydney
20
The 4 security tenets in action
Data Center
EMPLOYEESPARTNERS
Remote users are never
placed on-net
• Application access,
not network access
1
Applications are invisible
to unauthorized users
• Users can’t access
what they can’t see
• Outbound
connections only
2
App segmentation not
network segmentation
• Define which users
access which apps
3
The internet is the new
secure network
• Double-tunneling for
secure access
4
21
Location: Germany
Industry: Manufacturing
User Count: 12,000 users in over 100
locations and 70 countries
Zscaler Products: ZPA, ZIA
Use Case:
• VPN retirement
• Secure cloud adoption
• Zero-trust adoption
The challenge
Benefits of SDP
• MAN Energy Solutions was undertaking a
massive cloud (AWS) adoption, and needed a
better way to provide remote access to internal
applications.
• Needed more visibility into their network and to
ensure true zero trust access to their internal
applications
• ZPA secures access for over 5,000 MAN ES employees.
Enabled zero trust security through application
segmentation and enforcing granular policies via the
Zscaler Security Cloud.
• Users and devices are never allowed on the network,
which increases security and decreasing risk. Creating a
Zero-trust network.
22
Location: Maryland, USA
Industry: Food, Beverage &
Tobacco
User Count: 21,000 employees
Zscaler Products: ZPA, ZIA
Use Case:
• VPN retirement
• Secure partner access
The challenge
Benefits of Zscaler Platform
• Was having issues with their legacy VPN solution. Wanted a
remote access solution that provided reliable and secure
access to SAP
• Leveraging Google Chromebooks and VPN services lack
compatibility with these devices. In future will need a
security service for secure partner access to internal apps
• Needed a solution that supported a spectrum of different
operating systems for employees and partners.
• Provides a reliable solution for remote users to gain access to internal
applications, all while enabling a zero-trust model by never placing users
on the network.
• Google Chromebooks have policy-based access to SAP and other
sensitive internal applications
• Uses ZPA’s browser access feature which requires no client on the
endpoint device
• Avoid lock-in
23
Read the ESG Solution Showcase
“Say Hello to the Software-Defined Perimeter”
info.zscaler.com/resources-industry-reports-esg-software-defined-perimeter.html
Thank You!
Jon Oltsik
Senior Principal Analyst and
ESG Fellow
Dhawal Sharma
Sr. Director Product
Management, Zscaler
24

More Related Content

PPTX
Three ways-zero-trust-security-redefines-partner-access-ch
PPTX
Faster, simpler, more secure remote access to apps in aws
PPTX
Three ways-zero-trust-security-redefines-partner-access-v8
PPTX
Ma story then_now_webcast_10_17_18
PPTX
What Comes After VPN?
PPTX
Get an office 365 expereience your users will love v8.1
PPTX
How to Overcome Network Access Control Limitations for Better Network Security
PPTX
Office 365 kelly services
Three ways-zero-trust-security-redefines-partner-access-ch
Faster, simpler, more secure remote access to apps in aws
Three ways-zero-trust-security-redefines-partner-access-v8
Ma story then_now_webcast_10_17_18
What Comes After VPN?
Get an office 365 expereience your users will love v8.1
How to Overcome Network Access Control Limitations for Better Network Security
Office 365 kelly services

What's hot (20)

PPTX
Cloud vs. On-Premises Security: Can you afford not to switch?
PPTX
3 reasons-sdp-is-replacing-vpn-in-2019
PPTX
Secure access to applications on Microsoft Azure
PPTX
Zscaler ThreatLabz dissects the latest SSL security attacks
PPTX
Virtualized Firewall: Is it the panacea to secure distributed enterprises?
PDF
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
PPTX
Migration to microsoft_azure_with_zscaler
PPTX
Top 5 predictions webinar
PPTX
Adopting A Zero-Trust Model. Google Did It, Can You?
PPTX
Schneider electric powers security transformation with one simple app copy
PPTX
Maximize your cloud app control with Microsoft MCAS and Zscaler
PDF
Three Key Steps for Moving Your Branches to the Cloud
PPTX
O365 quick with fast user experience
PPTX
The secure, direct to-internet branch
PPTX
Rethinking Cybersecurity for the Digital Transformation Era
PPTX
The evolution of IT in a cloud world
PPTX
Dissecting ssl threats
PDF
How VPNs and Firewalls Put Your Organization at Risk
PPTX
Overcoming the Challenges of Architecting for the Cloud
PPTX
Rethinking Cybersecurity for the Digital Transformation Era
Cloud vs. On-Premises Security: Can you afford not to switch?
3 reasons-sdp-is-replacing-vpn-in-2019
Secure access to applications on Microsoft Azure
Zscaler ThreatLabz dissects the latest SSL security attacks
Virtualized Firewall: Is it the panacea to secure distributed enterprises?
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
Migration to microsoft_azure_with_zscaler
Top 5 predictions webinar
Adopting A Zero-Trust Model. Google Did It, Can You?
Schneider electric powers security transformation with one simple app copy
Maximize your cloud app control with Microsoft MCAS and Zscaler
Three Key Steps for Moving Your Branches to the Cloud
O365 quick with fast user experience
The secure, direct to-internet branch
Rethinking Cybersecurity for the Digital Transformation Era
The evolution of IT in a cloud world
Dissecting ssl threats
How VPNs and Firewalls Put Your Organization at Risk
Overcoming the Challenges of Architecting for the Cloud
Rethinking Cybersecurity for the Digital Transformation Era
Ad

Similar to How sdp delivers_zero_trust (20)

PPTX
Webinar remote access_no_vpn_pitfalls_111517
PPTX
Secure remote access to AWS your users will love
PDF
ciscothousandeyesusecase
PDF
EMEA10: Trepidation in Moving to the Cloud
PDF
HP Discover - Developing new applications for the cloud
PPTX
PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...
PPTX
Zero trust for everybody: 3 ways to get there fast
PDF
2025-07-15 EMEA Volledig Inzicht Dutch Webinar
PPTX
Shedding Light on Shadow IT for File Sharing
PDF
F5 Synthesis Toronto February 2014 Roadshow
PPTX
Getting Started with ThousandEyes Proof of Concepts
PDF
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
PPTX
Mobile enterprise sept 24 v1
PDF
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
PDF
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
PPTX
SD-WAN_MoD.pptx for SD WAN networks connectivity
PDF
A New Approach to Continuous Monitoring in the Cloud
PDF
Making Money in the Cloud
PPTX
Application Darwinism - Why Most Enterprise Apps Will Evolve to the Cloud
PPTX
Interop 2013: Network Intelligent Applications & Driving Smarter Business wit...
Webinar remote access_no_vpn_pitfalls_111517
Secure remote access to AWS your users will love
ciscothousandeyesusecase
EMEA10: Trepidation in Moving to the Cloud
HP Discover - Developing new applications for the cloud
PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...
Zero trust for everybody: 3 ways to get there fast
2025-07-15 EMEA Volledig Inzicht Dutch Webinar
Shedding Light on Shadow IT for File Sharing
F5 Synthesis Toronto February 2014 Roadshow
Getting Started with ThousandEyes Proof of Concepts
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
Mobile enterprise sept 24 v1
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
SD-WAN_MoD.pptx for SD WAN networks connectivity
A New Approach to Continuous Monitoring in the Cloud
Making Money in the Cloud
Application Darwinism - Why Most Enterprise Apps Will Evolve to the Cloud
Interop 2013: Network Intelligent Applications & Driving Smarter Business wit...
Ad

More from Zscaler (10)

PPTX
Zscaler mondi webinar
PDF
Top 5 mistakes deploying o365
PDF
Zenith Live - Security Lab - Phantom
PPTX
Moving from appliances to cloud security with phoenix children's hospital
PPTX
Office 365 deployment
PPTX
SD-WAN plus cloud security
PPTX
Top reasons o365 deployments fail
PPT
GDPR - are you ready?
PPTX
Maximize your cloud app control with Microsoft MCAS and Zscaler
PPTX
DNS Security, is it enough?
Zscaler mondi webinar
Top 5 mistakes deploying o365
Zenith Live - Security Lab - Phantom
Moving from appliances to cloud security with phoenix children's hospital
Office 365 deployment
SD-WAN plus cloud security
Top reasons o365 deployments fail
GDPR - are you ready?
Maximize your cloud app control with Microsoft MCAS and Zscaler
DNS Security, is it enough?

Recently uploaded (20)

PDF
Lean-Manufacturing-Tools-Techniques-and-How-To-Use-Them.pdf
DOCX
Powerful Ways AIRCONNECT INFOSYSTEMS Pvt Ltd Enhances IT Infrastructure in In...
PPTX
newyork.pptxirantrafgshenepalchinachinane
PPT
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
PDF
Alethe Consulting Corporate Profile and Solution Aproach
PDF
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
PDF
Course Overview and Agenda cloud security
PDF
simpleintnettestmetiaerl for the simple testint
PDF
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
PPTX
Internet Safety for Seniors presentation
PDF
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
PDF
si manuel quezon at mga nagawa sa bansang pilipinas
PPTX
TITLE DEFENSE entitle the impact of social media on education
PDF
Understand the Gitlab_presentation_task.pdf
PPTX
Reading as a good Form of Recreation
PPTX
artificialintelligenceai1-copy-210604123353.pptx
PPTX
The-Importance-of-School-Sanitation.pptx
PDF
BIOCHEM CH2 OVERVIEW OF MICROBIOLOGY.pdf
PDF
Session 1 (Week 1)fghjmgfdsfgthyjkhfdsadfghjkhgfdsa
PPTX
AI_Cyberattack_Solutions AI AI AI AI .pptx
Lean-Manufacturing-Tools-Techniques-and-How-To-Use-Them.pdf
Powerful Ways AIRCONNECT INFOSYSTEMS Pvt Ltd Enhances IT Infrastructure in In...
newyork.pptxirantrafgshenepalchinachinane
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
Alethe Consulting Corporate Profile and Solution Aproach
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
Course Overview and Agenda cloud security
simpleintnettestmetiaerl for the simple testint
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
Internet Safety for Seniors presentation
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
si manuel quezon at mga nagawa sa bansang pilipinas
TITLE DEFENSE entitle the impact of social media on education
Understand the Gitlab_presentation_task.pdf
Reading as a good Form of Recreation
artificialintelligenceai1-copy-210604123353.pptx
The-Importance-of-School-Sanitation.pptx
BIOCHEM CH2 OVERVIEW OF MICROBIOLOGY.pdf
Session 1 (Week 1)fghjmgfdsfgthyjkhfdsadfghjkhgfdsa
AI_Cyberattack_Solutions AI AI AI AI .pptx

How sdp delivers_zero_trust

  • 1. 0 ©2018 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION Say Hello to the Software- Defined Perimeter How SDPs deliver zero trust security Jon Oltsik Senior Principal Analyst and ESG Fellow Dhawal Sharma Sr. Director Product Management, Zscaler
  • 2. 1 Public Cloud Usage Trends We currently use cloud computing services, 85% We plan to use/are interested in using cloud computing services, 12% We have no plans or interest in using cloud computing services, 3% Overall usage of public cloud computing services. (Percent of respondents, N=651)
  • 3. 2 Public Cloud Usage Trends, 2013-2018 57% 70% 71% 75% 78% 85% 2013 2014 2015 2016 2017 2018 Overall usage of public cloud services, 5-year trend. (Percent of respondents)
  • 4. 3 Public Cloud Usage Trends: Service Model Breakdown 39% 51% 74% 25% 24% 13% 20% 15% 7% 14% 10% 5% 1% 1% 1% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Platform-as-a-service (PaaS) Infrastructure-as-a-service (IaaS) Software-as-a-service (SaaS) Please indicate your organization’s usage of or plans for each of the following cloud computing services. (Percent of respondents, N=651) Currently use Do not currently use but we plan to No use or plans at this time but we are interested No use, plans, or interest at this time Don’t know
  • 5. 4 Endpoint Device Platforms Used 35% 43% 43% 53% 69% BYOD devices that are profiled and verified to comply with our security policy Virtual desktop (VDI) workspace environments Company-issued MacOS desktop/laptop Company-issued mobile devices (Android, MacOS, etc.) Company-issued Windows desktop/laptop Which of the following endpoint device platforms are currently used by your organization’s employees? (Percent of respondents, N=385, multiple responses accepted)
  • 6. 5 The perimeter has extended from the datacenter, to the internet
  • 7. 6 Application Access Requirements • Can scale with business needs • Is built for zero trust access • Delivers sensitive data protection • Centralizes control for all services
  • 9. 8 Application access must change • Extra burden for users • Costly and complex networks • Insecure against modern threats • Lack of granular visibility into network traffic
  • 10. 9 Insanity: “Doing the same thing over and over again and expecting different results.” - Albert Einstein WORDS TO LIVE BY
  • 11. 10 The Rise of the Software-defined Perimeter
  • 12. 11 SDP Quote “No one has an SDP budget, but Every enterprise has an SDP need.”
  • 13. 12
  • 14. 13 Top Enterprise SDP Use Cases • VPN replacement • Third-party access • Privileged account management • Cloud application access • Application discovery
  • 15. 14 SDPs are key to achieving a zero trust security model • Never automatically trust any user or network • Reduce the attack surface by reducing # of users able to access an application • Provide access on a strict “need to know” basis • Verify before granting any level of access to an application • Create a segment of one between a named user and a named application
  • 16. 15 ©2018 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION Zscaler Private Access Zero trust access to internal applications
  • 17. 16 ©2018 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION ZPA: Make application access secure, seamless and simple Public Cloud Private Cloud / Data Center • Zero trust access to internal apps running in any environment • Embrace application segmentation by default • Provide app connectivity without placing users on-net • Delivers seamless user experience across users & apps INTERNALLY MANAGED HQMOBILE BRANCHIOT
  • 18. 17 ModernPlatformsRequireModernMethodsforConnectingToThem • “By 2021, 60% of enterprises will phase out network VPNs for digital business communications in favor of software-defined perimeters” • Gartner • November 2017
  • 19. 18 Building ZPA’s SDP Architecture Built on Zscaler’s Foundation • 4+ Year Dedicated Investment with a dedicated engineering team building our SDP • Leveraged a Proven End Point - Zscaler App (all ports/protocols) on Windows, Mac, IOS and Android across 1.5M+ endpoints already • User Experience is awesome! Users access internal apps just like they access Internet and SaaS “Any to Any” Internet Scale Architecture • Modern micro-services architecture with auto-scaling and containerization • Running in Zscaler Datacenters plus AWS and Azure (20+ regions)
  • 20. 19 Zscaler Private Access – How the service works Zscaler App2 SDP architecture Zscaler Enforcement Node (ZEN) – secure user to app connection • Cloud Policy engine - user to app access rights 1 Zscaler App – requests access to an app2 App Connector – sits in front of apps; Inside-out connections only - “I’ll call you” 3 1 ZEN (hosts policy) Data Center App connectors 3 3 EMPLOYEESPARTNERS The experience users want. The security IT needs. New York London Sydney
  • 21. 20 The 4 security tenets in action Data Center EMPLOYEESPARTNERS Remote users are never placed on-net • Application access, not network access 1 Applications are invisible to unauthorized users • Users can’t access what they can’t see • Outbound connections only 2 App segmentation not network segmentation • Define which users access which apps 3 The internet is the new secure network • Double-tunneling for secure access 4
  • 22. 21 Location: Germany Industry: Manufacturing User Count: 12,000 users in over 100 locations and 70 countries Zscaler Products: ZPA, ZIA Use Case: • VPN retirement • Secure cloud adoption • Zero-trust adoption The challenge Benefits of SDP • MAN Energy Solutions was undertaking a massive cloud (AWS) adoption, and needed a better way to provide remote access to internal applications. • Needed more visibility into their network and to ensure true zero trust access to their internal applications • ZPA secures access for over 5,000 MAN ES employees. Enabled zero trust security through application segmentation and enforcing granular policies via the Zscaler Security Cloud. • Users and devices are never allowed on the network, which increases security and decreasing risk. Creating a Zero-trust network.
  • 23. 22 Location: Maryland, USA Industry: Food, Beverage & Tobacco User Count: 21,000 employees Zscaler Products: ZPA, ZIA Use Case: • VPN retirement • Secure partner access The challenge Benefits of Zscaler Platform • Was having issues with their legacy VPN solution. Wanted a remote access solution that provided reliable and secure access to SAP • Leveraging Google Chromebooks and VPN services lack compatibility with these devices. In future will need a security service for secure partner access to internal apps • Needed a solution that supported a spectrum of different operating systems for employees and partners. • Provides a reliable solution for remote users to gain access to internal applications, all while enabling a zero-trust model by never placing users on the network. • Google Chromebooks have policy-based access to SAP and other sensitive internal applications • Uses ZPA’s browser access feature which requires no client on the endpoint device • Avoid lock-in
  • 24. 23 Read the ESG Solution Showcase “Say Hello to the Software-Defined Perimeter” info.zscaler.com/resources-industry-reports-esg-software-defined-perimeter.html Thank You! Jon Oltsik Senior Principal Analyst and ESG Fellow Dhawal Sharma Sr. Director Product Management, Zscaler
  • 25. 24