Category Topics

Welcome to the Zscaler Community!

Welcome to the Zscaler community.
17

The Cloud-First Architect

As applications move to the cloud and users become increasingly mobile, the old ways of operating networks and security appliances is less and less effective. You must take a new approach to architecture, policy, and design.
87

Authentication

Authentication covers discussions on the Zscaler platform around various modes of authentication.
210

Client Connector

Zscaler Client Connector, formerly Zscaler App, simplifies the enforcement of security and policy control from the Zscaler Cloud for both Zscaler Internet Access (ZIA) and Zscaler Private Access (ZPA). Client Connector is available for desktop and mobile devices.
644

Cloud Firewall

The Cloud Firewall category covers questions about the Zscaler Cloud Firewall and Web Proxy solutions.
251

Cloud Protection

Zscaler Cloud Protection delivers a new approach that takes the operational complexity and headaches out of cloud workload security. Our innovative zero trust architecture reduces business risk by automatically remediating security gaps, minimizing the attack surface, and eliminating lateral threat movement.
41

Cloud Sandbox

The Cloud Sandbox category covers advanced threat protection, Cloud Sandboxing, IPS, & AV on the Zscaler Cloud.
34

Data Protection

The Data Protection category covers the Zscaler Data Loss Prevention (DLP) solutions & CASB Integration topics.
34

Deception

Deception is a proactive defense approach that detects active threats by injecting decoys (servers, apps, endpoints, fake files, fake users etc) that mimic production assets for the sole purpose of alerting you to adversary presence.
6

Platform

The Platform category covers topics related to Private Service Edge, analytics, the product UIs, API access, logging, and the Zscaler NSS solution. This category was combined from previous categories - DNS, Cloud Reporting and Management, customer info and compliance
195

Private Access

The Zscaler Private Access (ZPA) service provides the basis for Zero Trust Network Access (ZTNA). ZPA provides seamless and secure remote access to internal applications, regardless of where they exist, and without placing users on the corporate network.
291

Zenith Live & Events

Zenith Live, Regional User Groups & Events - Zenith Live is our yearly user conference, held in the US and EMEA. We host additional events such as Zscaler Academy and various user groups on a regular basis. Regional user groups and events occur regularly, check back for events happening in your area.
40

Training and Certification

Find out about Zscaler training and certification offerings
61

ThreatLabz

Zscaler ThreatLabz is a global threat research team with a mission to protect customers from advanced cyberthreats. Made up of more than 100 security experts with decades of experience in tracking threat actors, malware reverse engineering, behavior analytics, and data science, the team operates 24/7 to identify and prevent emerging threats using insights from 300 trillion daily signals from the Zscaler Zero Trust Exchange.
Since its inception, ThreatLabz has been tracking the evolution of emerging threat vectors, campaigns, and groups, contributing critical findings and insights on zero-day vulnerabilities, —including active IOCs and TTPs for threat actors, malware, and ransomware families, phishing campaigns, and more.
ThreatLabz supports industry information sharing and plays an integral role in the development of world-class security solutions at Zscaler. See the latest ThreatLabz threat research on the Zscaler blog.
2