Harness the capabilities of Zscaler to deliver a secure cloud-based, scalable web proxy and provide a zero-trust network access solution for private enterprise application access to end users
Key Features
- Get to grips with Zscaler quickly without the need for expensive training
- Implement Zscaler Internet Access (ZIA) and Zscaler Private Access (ZPA) security solutions with real-world deployments
- Find out how to choose the right options and features to architect a customized solution with Zscaler
Book Description
Many organizations are moving away from on-premise solutions to simplify administration and reduce expensive hardware upgrades. This book uses real-world examples of deployments to help you explore Zscaler, an information security platform that offers cloud-based security for both web traffic and private enterprise applications.
You'll start by discovering how Zscaler was born in the cloud, how it evolved into a mature product, and how it continues to do so with the addition of sophisticated features that are necessary to stay ahead in today's corporate environment. The book then delves into Zscaler Internet Access and Zscaler Private Access architectures in detail, before moving on to show you how to map future security requirements to ZIA features and transition your business applications to ZPA. As you make progress, you'll get to grips with all the essential features needed to architect a customized security solution and support it. In the final chapters of both modules, you'll find out how to troubleshoot the newly implemented ZIA and ZPA solutions and learn how to make these work efficiently for your enterprise.
By the end of this Zscaler book, you will be able to design, deploy, implement, as well as support a customized Zscaler security solution.
What you will learn
- Discover the need for Zscaler in the modern enterprise
- Understand the fundamental architecture of the Zscaler cloud
- Get to grips with the essential features of ZIA and ZPA
- Find out how to architect a Zscaler solution
- Discover best practices for deploying and implementing Zscaler solutions
- Familiarize yourself with the tasks involved in the operational maintenance of the Zscaler solution
Who This Book Is For
This book is for security engineers, security architects, security managers, and security operations specialists who want to understand Zscaler and may be involved in transitioning to or from Zscaler, or learn about deployment, implementation, and support of a Zscaler solution. Anyone looking to step into the ever-expanding world of zero-trust network access using the Zscaler solution will also find this book useful.