[ad_1]
Most of the well-known cybersecurity specialist providers and many of the well-known enterprise-level vendors also started by offering antivirus software, or later antimalware software. Servers and clients (now called “endpoints”) are protected against signatures from a large list of known worms and viruses by an agent-based routine that examines the checksums of suspicious executables I can do it. As the number of threats has grown, platforms have evolved to protect against them in different ways. Heuristically or by examining the behavior of the app. These were combined by perimeter protection methods (such as IDS/IPS systems) and specialized isolation layers against e-mail-borne attacks, insider threats, etc.
Most businesses today have a mix of cybersecurity safeguards, with the recent addition of platforms that work across multiple as-a-service platforms in daily use. These are where the employee is part remote, part within the perimeter, BYOD joined by his SAHWYOD (stay at home with your own device – an acronym we just coined), It claims to work seamlessly. Zero Trust frameworks and this year’s it-girl, SASE, can loosely be described as a collection of various cybersecurity protections, even though they operate under the banner of one vendor.
Accepting a mix of cybersecurity tools and often vendors has been considered the norm for some time. Most security specialists (with the exception of giant pan-technica like HPE) dare to suggest being her one vendor to rule them all. in cyber security. Zscaler raised its head above the parapet with just such a claim.
Get a Cyber Security Specialist
In a press statement dated October 19, 2022, the company celebrated its acquisition of ShiftRight a month ago and the automation of its cybersecurity products as a result of adding the company’s capabilities to its portfolio.
The press statement also claims to have built a system of “unified data protection” based on information obtained from a global internet network and threat monitoring stations (called Zscaler Zero-Trust Exchange). We combine these insights with tools that protect endpoints, cloud, perimeter, mobile and, most recently, edge computing. So the automatable whole is now controllable from a single point and is called ‘zero configuration’. It seems that Bilbo’s ring is drawn.
Moinul Khan, Vice President and General Manager of Data Protection at Zscaler, said:[…] Zscaler Data Protection works for IT admins, not IT admins. Additionally, technology from the recently announced acquisition of ShiftRight enables organizations to manage hundreds of potential risks and incidents in a simple and highly sophisticated manner, significantly reducing case resolution times. ”
With cybersecurity personnel in short supply in the field today, having a centralized command and control function is an attractive proposition for many organizations, especially those with investments in existing security services. Zscaler’s Zero Trust framework is cloud-based, but covers web, SaaS, IaaS, PaaS, and private apps in addition to endpoint and email protection. The company says, “This eliminates the need for point products.” However, upon closer inspection, Zscaler’s portfolio consists of just that, some of which was developed in-house (with over 200 patents) and others acquired since 2018. , to name a few.
If your organization is under-resourced in cybersecurity and wants one provider to “take it all”, Zscaler can put you in just that position. The question remains whether such reliance on a single vendor is justified.
[ad_2]
Source link