SlideShare a Scribd company logo
©2017 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION0
ZSCALER CONFIDENTIAL INFORMATION
Maximize your cloud app control with
Microsoft MCAS and Zscaler
Dhawal Sharma | Director of Product Management at Zscaler
Niv Goldenberg | Group Program Manager at Microsoft
©2017 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION1
To ask a question
• Type your questions into the chat box in the Webex
panel or email us at communications@zscaler.com
• We’ll try to get to all questions during the Q&A
session. If we do not get to your question, we’ll make
sure to follow up afterwards
• At the end of the webcast – please let us know how
we did!
©2017 Zscaler, Inc. All rights reserved.
Ask your question here…
©2017 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION.
HQ
Branch
Branch
Branch
Branch
Branch Branch BranchBranch
Home, Coffee Shop Airport, Hotel
SaaS Open Internet IaaS
Cloud and Mobility Break Network Security
The Internet is Your New Corporate Network
“GE will run 70 percent of its
workload in the cloud by 2020”
Jim Fowler, CIO
“The Internet will be our new
corporate network by 2020”
Frederik Janssen, Head of Infrastructure
“Office 365 was built to be accessed
via direct Internet connection”
How do you secure a network (Internet) you don’t control?
EMEAAPJ
©2017 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION.
Cloud and mobility break network security
HQ
EMEA
Branch
APJ
Branch
Branch
Branch
Branch Branch BranchBranch
Zscaler enables secure network and application transformation
NEW SECURITY MODEL
Secure the Network
Securely connect users to apps
Direct to Internet
Broadband / Wi-Fi / LTE / 5G
NEW NETWORK
MODEL
OLD SECURITY
MODEL
Hub-and-Spoke
MPLS / VPN
OLD NETWORK
MODEL
Secure the Corporate Network
SaaS Open Internet IaaS
Home, Coffee
Shop
Airport, Hotel
On average, an organization has 28 cloud storage apps and
41 collaboration apps routinely used by its employees.
On-premises
But Office 365 Deployments are stuck in the slow lane!
A deployment survey of over 200 customers
had problems accessing
business-critical applications
including Office 365.
45%
Many were plagued by bandwidth
and network latency issues on a
daily and weekly basis
70%Weekly issues
reported
33%Daily issues
reported
Despite appliance upgrades, after deployment:
©2017 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION.
Categorize Cloud Apps Into Categories
• After discovery, categorize cloud services (CSP) using risk ratings and company policies
• Separate cloud services into sanctioned, permitted, and restricted services
• Enforce appropriate controls for each category
Sanctioned Apps Permitted Apps Restricted Apps
©2017 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION.
Zscaler Provides CASB Functions for Inline Content
Internet &
Shadow Apps
(managed devices and on-premise)
Allow enterprises to
securely enable cloud apps
by providing Cloud App
Visibility, Content
Inspection, Security and
Cloud App Compliance
Visibility
App Logging & Discovery
Threat Prevention
Stop Malware
Data Protection
DLP & Encryption
Compliance
UEBA, Access Controls
User Experience
Bandwidth Control, Peering
Vision
HQMobile BranchIOT
Inline Policy Controls
© 2017 Riverbed Technology. All rights reserved. 8
Cloud App Security
©2017 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION9
Microsoft Cloud Application
Security (MCAS) Overview
A comprehensive, intelligent security solution that brings visibility, real-time
controls and security to your cloud applications.
ControlDiscover Protect
Integrates with your SIEM, Identity and Access Management, DLP and Information Protection solutions
Discover and
assess risks
Protect your
information
Detect
threats
Control access
in real time
Identify cloud apps on your
network, gain visibility into shadow
IT, and get risk assessments and
ongoing analytics.
Get granular control over data
and use built-in or custom
policies for data sharing and
data loss prevention.
Identify high-risk usage and
detect unusual behavior using
Microsoft threat intelligence
and research.
Manage and limit cloud app
access based on conditions and
session context, including user
identity, device, and location.
101010101
010101010
101010101
01011010
10101
Get anomalous usage alerts, new app and
trending apps alerts.
On-going analytics
Discover 15K+ cloud apps in use across your
networks and sensitive data they store.
Discovery of cloud apps and data
Assess cloud app risk based on ~60 security and
compliance risk factors.
Cloud app risk assessment
Protect your employees’ privacy while discovering
cloud apps in your environment.
Log anonymization
Investigate cloud use profiles of specific users,
machines, apps and groups.
Advanced investigation tools
Control access to cloud apps as well as to
sensitive data within these apps based on user,
location, device, and app (any SAML-based
app, any OS).
Context-aware session policies
Limit activities performed within user sessions
in SaaS apps based on user identity, location,
device state, and detected sign-in risk level.
Unique integration with Azure Active Directory
Enforce browser-based “view only” mode for
low-trust sessions. Classify, label, and protect
on download. Gain visibility into unmanaged
device activity.
Investigate & enforce app and data restrictions
Set granular policies to control data in the
cloud—either automated or based on file
label—using out-of-the-box policies or ones
you customize.
Granular Data loss prevention (DLP) policies
Control and protect sensitive files through
policies and governance to comply with
regulations (e.g., GDPR, HIPAA, PCI, SOX).
Compliance policies
Identify policy violations, enforce actions such
as quarantine and permissions removal.
Policy enforcement
Apply protection, including encryption and
classification, to files with sensitive
information
Native protection – at rest and inline
User manually classifies a file in Office apps,
Cloud App Security reads classification from the
file to give admins visibility to cloud activities on
this data: Upload, sharing & download.
Sharing control based on user input
Proxy automatically encrypts files labeled as
“internal” upon download to non-corporate
owned devices
Prevent corporate data leakage based on
classification
Assess risk in each transaction and identify
anomalies in your cloud environment that may
indicate a breach.
Behavioral analytics
Enhance behavioral analytics with insights
from the Microsoft Intelligent Security
Graph to identify anomalies and attacks.
Threat intelligence
Customize detections based on your findings.
Customization
Gain useful insights from user, file, activity, and
location logs. Pivot on users, file, activities and
locations.
Advanced investigation & multiple views
Remediate threats and security issues
with a single click.
Single-click remediation
Why Cloud App Security is different
Discover SaaS apps & assess risk
Identify more than 15,000 apps and assess their
risk based on 60 different parameters, including
regulatory compliance.
Gain unified information protection
Set granular control policies and enforce them
on your cloud apps and data—whether from
Microsoft or other vendors—using powerful
remediation actions.
Control and limit access in real time
Set granular access- and activity-level policies,
such as allowing access from an unmanaged
device while blocking downloads of sensitive
data.
Support your compliance
journey with key regulations
Discover and control data in the cloud with
granular policies to help you comply with
regulations such as Payment Card Industry (PCI)
and General Data Protection Regulation (GDPR).
Detect & mitigate ransomware attacks
Identify potential ransomware activity with a
built-in template that can search for unique file
extensions, suspend suspect users, and prevent
further encryption of user files.
Integrate with your existing
SIEM & DLP solutions
Preserve your usual workflow and set a
consistent policy across on-premises and cloud
activities while automating security procedures.
©2017 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION18
MCAS and Zscaler Use Cases
©2017 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION.
Users: Identify and Control Restricted Apps
Protect users and data
using closed loop control
(Zscaler)
Restricted Apps
Discover risky cloud usage
(Zscaler + Microsoft Cloud
App Security)
©2017 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION.
Users and Data: Securely Enable Permitted Apps
Permitted Apps
DLP to block sensitive data
(e.g. Source code uploaded to GitHub)
(Zscaler)
Granular visibility
(e.g. GitHub repositories in use)
(Microsoft Cloud App Security)
Visibility into mobile users
(e.g. GitHub use from a coffee shop)
(Zscaler)
Granular DLP
(e.g. Allow uploads to
permitted GitHub repositories,
block uploads to others)
(Zscaler & Microsoft Cloud App Security)
Detect and prevent malware
(e.g. malware distributed via personal email)
(Zscaler)
©2017 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION.
Data: Securely Enable Adoption of Sanctioned Apps
Sanctioned Apps
Enforce DLP and collaboration controls
(e.g. Prevent sharing files from OneDrive with
unauthorized domains)
(Microsoft Cloud App Security)
Encrypt data using customer-controlled keys
(e.g. Encrypt PII within Salesforce)
(Microsoft Cloud App Security)
Audit data and configuration,
identify violations
(Microsoft Cloud App Security)
Enforce access control policies on
managed/unmanaged devices
(e.g. Block download of a Salesforce
report to an unmanaged device)
(Zscaler + Microsoft Cloud App Security)
UEBA to protect against malicious insiders,
negligent use, and compromised accounts
(e.g. Download customer list from Salesforce)
(Microsoft Cloud App Security)
Data exfiltration by malware and
malicious insiders to shadow apps
(e.g. Download customer list from
Salesforce and upload to ZippyShare)
(Zscaler)
Predictable user experience
(e.g. Guaranteed bandwidth for
O365 vs. YouTube)
(Zscaler)
©2017 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION.
Zscaler and MCAS Integration
©2017 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION.
Setting up Zscaler & Microsoft Cloud App Security Integration
Microsoft
Cloud App
Security
Tenant Bonding Tenant Bonding
SSO
Zscaler NSS Log Forwarding
Create Unsanctioned
App PolicyAPI Polling
Unsanctioned Apps
URL category
SSO
Enforce
Policy
End User
PAC/ZApp
Planned with 5.6
©2017 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION.
Solution Demo
©2017 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION.
Thank You!
Questions and Next Steps
25
Dhawal Sharma
Director, Product Management at Zscaler
dhawal@zscaler.com
Zscaler Cloud App Control
zscaler.com/cloudapp
Microsoft Cloud App Security
aka.ms/Cloudappsecurity
Overcoming the Challenges of
Architecting for the Cloud
Slow Office 365 Deployment?
Let Zscaler help you get in the fast lane!
zscaler.com/webcasts
Niv Goldenberg
Group Program Manager at Microsoft
Niv.Goldenberg@microsoft.com
Learn more about Microsoft Cloud App Security
zscaler.com/webcasts
Other On-Demand Webcasts
©2017 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION.
June 25-27, 2018
The Cosmopolitan, Las Vegas
Register at zenithlive.zscaler.com
Join the conversation at
community.zscaler.com

More Related Content

PDF
Microsoft Azure Overview | Cloud Computing Tutorial with Azure | Azure Traini...
PDF
S10_Microsoft 365 E5 Compliance で実現する機密情報の検出・分類・保護 - Microsoft Information P...
PDF
Microsoft 365 Enterprise Security with E5 Overview
PPTX
Microsoft Azure Technical Overview
PDF
Introduction to Azure IaaS
PDF
Microsoft Azure Sentinel
PDF
Microsoft Defender and Azure Sentinel
PPTX
Microsoft Defender for Endpoint
Microsoft Azure Overview | Cloud Computing Tutorial with Azure | Azure Traini...
S10_Microsoft 365 E5 Compliance で実現する機密情報の検出・分類・保護 - Microsoft Information P...
Microsoft 365 Enterprise Security with E5 Overview
Microsoft Azure Technical Overview
Introduction to Azure IaaS
Microsoft Azure Sentinel
Microsoft Defender and Azure Sentinel
Microsoft Defender for Endpoint

What's hot (20)

PPTX
Azure security and Compliance
PPTX
Aws overview
PDF
Azure SQL Database Managed Instance - technical overview
PDF
Understanding Azure AD
PDF
Microsoft 365 Compliance
PDF
Microsoft Azure Cloud Services
PDF
AZ-900 Azure Fundamentals.pdf
PDF
AI for security or security for AI - Sergey Gordeychik
PPTX
Full cloud computing ppt
PDF
AWS Summit Seoul 2023 | SK와 함께하는 AWS Migration Journey & App Modernization 전략
PDF
AWS Summit Seoul 2023 | 비즈니스 경쟁에서 승리하기 위한 AWS AI/ML 서비스
PDF
Microsoft Azure Overview
PPTX
SC-900 Intro
ODP
Introduction to Amazon Web Services
PDF
Microsoft 365 Security Overview
PDF
AWS Summit Seoul 2023 | KB의 통합 음성 AI서비스의 현재와 미래 - 하이브리드 클라우드 기반의 똑똑한 AI상담원 콜봇
PDF
Introduction to Azure
PPTX
Azure Security Fundamentals
PDF
Amazon OpenSearch - Use Cases, Security/Observability, Serverless and Enhance...
PDF
Azure Active Directory | Microsoft Azure Tutorial for Beginners | Azure 70-53...
Azure security and Compliance
Aws overview
Azure SQL Database Managed Instance - technical overview
Understanding Azure AD
Microsoft 365 Compliance
Microsoft Azure Cloud Services
AZ-900 Azure Fundamentals.pdf
AI for security or security for AI - Sergey Gordeychik
Full cloud computing ppt
AWS Summit Seoul 2023 | SK와 함께하는 AWS Migration Journey & App Modernization 전략
AWS Summit Seoul 2023 | 비즈니스 경쟁에서 승리하기 위한 AWS AI/ML 서비스
Microsoft Azure Overview
SC-900 Intro
Introduction to Amazon Web Services
Microsoft 365 Security Overview
AWS Summit Seoul 2023 | KB의 통합 음성 AI서비스의 현재와 미래 - 하이브리드 클라우드 기반의 똑똑한 AI상담원 콜봇
Introduction to Azure
Azure Security Fundamentals
Amazon OpenSearch - Use Cases, Security/Observability, Serverless and Enhance...
Azure Active Directory | Microsoft Azure Tutorial for Beginners | Azure 70-53...
Ad

Similar to Maximize your cloud app control with Microsoft MCAS and Zscaler (20)

PPTX
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
PPTX
What Comes After VPN?
PPTX
Faster, simpler, more secure remote access to apps in aws
PDF
Cloud Application Security --Symantec
PDF
netskope-casb-for-microsoft-365.pdf
PDF
netskope-casb-for-microsoft-365.pdf
PPTX
Migration to microsoft_azure_with_zscaler
PPTX
Microsoft Cloud Application Security Overview
PDF
Cloud App Security Customer Presentation.pdf
PPTX
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
PDF
EveryCloud_Company_Intro_Piece
PDF
EveryCloud_Company_Intro_Piece
PDF
Securing Your Cloud Applications
PPTX
01-Chapter 01-Introduction to CASB and Netskope.pptx
PDF
Cloud Security (CASB) for Slack
PDF
Microsoft Cloud App Security CASB
PPTX
Rethinking Cybersecurity for the Digital Transformation Era
PPTX
casb_by_.pptx
PPTX
Key Capibilities.pptx
PDF
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
What Comes After VPN?
Faster, simpler, more secure remote access to apps in aws
Cloud Application Security --Symantec
netskope-casb-for-microsoft-365.pdf
netskope-casb-for-microsoft-365.pdf
Migration to microsoft_azure_with_zscaler
Microsoft Cloud Application Security Overview
Cloud App Security Customer Presentation.pdf
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
EveryCloud_Company_Intro_Piece
EveryCloud_Company_Intro_Piece
Securing Your Cloud Applications
01-Chapter 01-Introduction to CASB and Netskope.pptx
Cloud Security (CASB) for Slack
Microsoft Cloud App Security CASB
Rethinking Cybersecurity for the Digital Transformation Era
casb_by_.pptx
Key Capibilities.pptx
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Ad

More from Zscaler (20)

PPTX
Zscaler mondi webinar
PPTX
3 reasons-sdp-is-replacing-vpn-in-2019
PPTX
Top 5 predictions webinar
PPTX
Three ways-zero-trust-security-redefines-partner-access-ch
PPTX
Office 365 kelly services
PPTX
Ma story then_now_webcast_10_17_18
PPTX
Get an office 365 expereience your users will love v8.1
PPTX
Three ways-zero-trust-security-redefines-partner-access-v8
PPTX
Schneider electric powers security transformation with one simple app copy
PDF
Top 5 mistakes deploying o365
PDF
Three Key Steps for Moving Your Branches to the Cloud
PPTX
How sdp delivers_zero_trust
PDF
Zenith Live - Security Lab - Phantom
PPTX
Moving from appliances to cloud security with phoenix children's hospital
PPTX
O365 quick with fast user experience
PPTX
Office 365 deployment
PPTX
Dissecting ssl threats
PPTX
SD-WAN plus cloud security
PPTX
The secure, direct to-internet branch
PPTX
The evolution of IT in a cloud world
Zscaler mondi webinar
3 reasons-sdp-is-replacing-vpn-in-2019
Top 5 predictions webinar
Three ways-zero-trust-security-redefines-partner-access-ch
Office 365 kelly services
Ma story then_now_webcast_10_17_18
Get an office 365 expereience your users will love v8.1
Three ways-zero-trust-security-redefines-partner-access-v8
Schneider electric powers security transformation with one simple app copy
Top 5 mistakes deploying o365
Three Key Steps for Moving Your Branches to the Cloud
How sdp delivers_zero_trust
Zenith Live - Security Lab - Phantom
Moving from appliances to cloud security with phoenix children's hospital
O365 quick with fast user experience
Office 365 deployment
Dissecting ssl threats
SD-WAN plus cloud security
The secure, direct to-internet branch
The evolution of IT in a cloud world

Recently uploaded (20)

PDF
System and Network Administration Chapter 2
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PPTX
ai tools demonstartion for schools and inter college
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PPTX
Essential Infomation Tech presentation.pptx
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PDF
Understanding Forklifts - TECH EHS Solution
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PDF
medical staffing services at VALiNTRY
PDF
top salesforce developer skills in 2025.pdf
PDF
Digital Strategies for Manufacturing Companies
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
System and Network Administration Chapter 2
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
Which alternative to Crystal Reports is best for small or large businesses.pdf
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
ai tools demonstartion for schools and inter college
Operating system designcfffgfgggggggvggggggggg
wealthsignaloriginal-com-DS-text-... (1).pdf
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
Design an Analysis of Algorithms I-SECS-1021-03
Upgrade and Innovation Strategies for SAP ERP Customers
Essential Infomation Tech presentation.pptx
Wondershare Filmora 15 Crack With Activation Key [2025
VVF-Customer-Presentation2025-Ver1.9.pptx
Understanding Forklifts - TECH EHS Solution
Odoo Companies in India – Driving Business Transformation.pdf
medical staffing services at VALiNTRY
top salesforce developer skills in 2025.pdf
Digital Strategies for Manufacturing Companies
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
Adobe Illustrator 28.6 Crack My Vision of Vector Design

Maximize your cloud app control with Microsoft MCAS and Zscaler

  • 1. ©2017 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION0 ZSCALER CONFIDENTIAL INFORMATION Maximize your cloud app control with Microsoft MCAS and Zscaler Dhawal Sharma | Director of Product Management at Zscaler Niv Goldenberg | Group Program Manager at Microsoft
  • 2. ©2017 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION1 To ask a question • Type your questions into the chat box in the Webex panel or email us at communications@zscaler.com • We’ll try to get to all questions during the Q&A session. If we do not get to your question, we’ll make sure to follow up afterwards • At the end of the webcast – please let us know how we did! ©2017 Zscaler, Inc. All rights reserved. Ask your question here…
  • 3. ©2017 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION. HQ Branch Branch Branch Branch Branch Branch BranchBranch Home, Coffee Shop Airport, Hotel SaaS Open Internet IaaS Cloud and Mobility Break Network Security The Internet is Your New Corporate Network “GE will run 70 percent of its workload in the cloud by 2020” Jim Fowler, CIO “The Internet will be our new corporate network by 2020” Frederik Janssen, Head of Infrastructure “Office 365 was built to be accessed via direct Internet connection” How do you secure a network (Internet) you don’t control? EMEAAPJ
  • 4. ©2017 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION. Cloud and mobility break network security HQ EMEA Branch APJ Branch Branch Branch Branch Branch BranchBranch Zscaler enables secure network and application transformation NEW SECURITY MODEL Secure the Network Securely connect users to apps Direct to Internet Broadband / Wi-Fi / LTE / 5G NEW NETWORK MODEL OLD SECURITY MODEL Hub-and-Spoke MPLS / VPN OLD NETWORK MODEL Secure the Corporate Network SaaS Open Internet IaaS Home, Coffee Shop Airport, Hotel
  • 5. On average, an organization has 28 cloud storage apps and 41 collaboration apps routinely used by its employees. On-premises
  • 6. But Office 365 Deployments are stuck in the slow lane! A deployment survey of over 200 customers had problems accessing business-critical applications including Office 365. 45% Many were plagued by bandwidth and network latency issues on a daily and weekly basis 70%Weekly issues reported 33%Daily issues reported Despite appliance upgrades, after deployment:
  • 7. ©2017 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION. Categorize Cloud Apps Into Categories • After discovery, categorize cloud services (CSP) using risk ratings and company policies • Separate cloud services into sanctioned, permitted, and restricted services • Enforce appropriate controls for each category Sanctioned Apps Permitted Apps Restricted Apps
  • 8. ©2017 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION. Zscaler Provides CASB Functions for Inline Content Internet & Shadow Apps (managed devices and on-premise) Allow enterprises to securely enable cloud apps by providing Cloud App Visibility, Content Inspection, Security and Cloud App Compliance Visibility App Logging & Discovery Threat Prevention Stop Malware Data Protection DLP & Encryption Compliance UEBA, Access Controls User Experience Bandwidth Control, Peering Vision HQMobile BranchIOT Inline Policy Controls
  • 9. © 2017 Riverbed Technology. All rights reserved. 8 Cloud App Security
  • 10. ©2017 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION9 Microsoft Cloud Application Security (MCAS) Overview
  • 11. A comprehensive, intelligent security solution that brings visibility, real-time controls and security to your cloud applications. ControlDiscover Protect Integrates with your SIEM, Identity and Access Management, DLP and Information Protection solutions
  • 12. Discover and assess risks Protect your information Detect threats Control access in real time Identify cloud apps on your network, gain visibility into shadow IT, and get risk assessments and ongoing analytics. Get granular control over data and use built-in or custom policies for data sharing and data loss prevention. Identify high-risk usage and detect unusual behavior using Microsoft threat intelligence and research. Manage and limit cloud app access based on conditions and session context, including user identity, device, and location. 101010101 010101010 101010101 01011010 10101
  • 13. Get anomalous usage alerts, new app and trending apps alerts. On-going analytics Discover 15K+ cloud apps in use across your networks and sensitive data they store. Discovery of cloud apps and data Assess cloud app risk based on ~60 security and compliance risk factors. Cloud app risk assessment Protect your employees’ privacy while discovering cloud apps in your environment. Log anonymization Investigate cloud use profiles of specific users, machines, apps and groups. Advanced investigation tools
  • 14. Control access to cloud apps as well as to sensitive data within these apps based on user, location, device, and app (any SAML-based app, any OS). Context-aware session policies Limit activities performed within user sessions in SaaS apps based on user identity, location, device state, and detected sign-in risk level. Unique integration with Azure Active Directory Enforce browser-based “view only” mode for low-trust sessions. Classify, label, and protect on download. Gain visibility into unmanaged device activity. Investigate & enforce app and data restrictions
  • 15. Set granular policies to control data in the cloud—either automated or based on file label—using out-of-the-box policies or ones you customize. Granular Data loss prevention (DLP) policies Control and protect sensitive files through policies and governance to comply with regulations (e.g., GDPR, HIPAA, PCI, SOX). Compliance policies Identify policy violations, enforce actions such as quarantine and permissions removal. Policy enforcement Apply protection, including encryption and classification, to files with sensitive information Native protection – at rest and inline
  • 16. User manually classifies a file in Office apps, Cloud App Security reads classification from the file to give admins visibility to cloud activities on this data: Upload, sharing & download. Sharing control based on user input Proxy automatically encrypts files labeled as “internal” upon download to non-corporate owned devices Prevent corporate data leakage based on classification
  • 17. Assess risk in each transaction and identify anomalies in your cloud environment that may indicate a breach. Behavioral analytics Enhance behavioral analytics with insights from the Microsoft Intelligent Security Graph to identify anomalies and attacks. Threat intelligence Customize detections based on your findings. Customization Gain useful insights from user, file, activity, and location logs. Pivot on users, file, activities and locations. Advanced investigation & multiple views Remediate threats and security issues with a single click. Single-click remediation
  • 18. Why Cloud App Security is different Discover SaaS apps & assess risk Identify more than 15,000 apps and assess their risk based on 60 different parameters, including regulatory compliance. Gain unified information protection Set granular control policies and enforce them on your cloud apps and data—whether from Microsoft or other vendors—using powerful remediation actions. Control and limit access in real time Set granular access- and activity-level policies, such as allowing access from an unmanaged device while blocking downloads of sensitive data. Support your compliance journey with key regulations Discover and control data in the cloud with granular policies to help you comply with regulations such as Payment Card Industry (PCI) and General Data Protection Regulation (GDPR). Detect & mitigate ransomware attacks Identify potential ransomware activity with a built-in template that can search for unique file extensions, suspend suspect users, and prevent further encryption of user files. Integrate with your existing SIEM & DLP solutions Preserve your usual workflow and set a consistent policy across on-premises and cloud activities while automating security procedures.
  • 19. ©2017 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION18 MCAS and Zscaler Use Cases
  • 20. ©2017 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION. Users: Identify and Control Restricted Apps Protect users and data using closed loop control (Zscaler) Restricted Apps Discover risky cloud usage (Zscaler + Microsoft Cloud App Security)
  • 21. ©2017 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION. Users and Data: Securely Enable Permitted Apps Permitted Apps DLP to block sensitive data (e.g. Source code uploaded to GitHub) (Zscaler) Granular visibility (e.g. GitHub repositories in use) (Microsoft Cloud App Security) Visibility into mobile users (e.g. GitHub use from a coffee shop) (Zscaler) Granular DLP (e.g. Allow uploads to permitted GitHub repositories, block uploads to others) (Zscaler & Microsoft Cloud App Security) Detect and prevent malware (e.g. malware distributed via personal email) (Zscaler)
  • 22. ©2017 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION. Data: Securely Enable Adoption of Sanctioned Apps Sanctioned Apps Enforce DLP and collaboration controls (e.g. Prevent sharing files from OneDrive with unauthorized domains) (Microsoft Cloud App Security) Encrypt data using customer-controlled keys (e.g. Encrypt PII within Salesforce) (Microsoft Cloud App Security) Audit data and configuration, identify violations (Microsoft Cloud App Security) Enforce access control policies on managed/unmanaged devices (e.g. Block download of a Salesforce report to an unmanaged device) (Zscaler + Microsoft Cloud App Security) UEBA to protect against malicious insiders, negligent use, and compromised accounts (e.g. Download customer list from Salesforce) (Microsoft Cloud App Security) Data exfiltration by malware and malicious insiders to shadow apps (e.g. Download customer list from Salesforce and upload to ZippyShare) (Zscaler) Predictable user experience (e.g. Guaranteed bandwidth for O365 vs. YouTube) (Zscaler)
  • 23. ©2017 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION. Zscaler and MCAS Integration
  • 24. ©2017 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION. Setting up Zscaler & Microsoft Cloud App Security Integration Microsoft Cloud App Security Tenant Bonding Tenant Bonding SSO Zscaler NSS Log Forwarding Create Unsanctioned App PolicyAPI Polling Unsanctioned Apps URL category SSO Enforce Policy End User PAC/ZApp Planned with 5.6
  • 25. ©2017 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION. Solution Demo
  • 26. ©2017 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION. Thank You! Questions and Next Steps 25 Dhawal Sharma Director, Product Management at Zscaler dhawal@zscaler.com Zscaler Cloud App Control zscaler.com/cloudapp Microsoft Cloud App Security aka.ms/Cloudappsecurity Overcoming the Challenges of Architecting for the Cloud Slow Office 365 Deployment? Let Zscaler help you get in the fast lane! zscaler.com/webcasts Niv Goldenberg Group Program Manager at Microsoft Niv.Goldenberg@microsoft.com Learn more about Microsoft Cloud App Security zscaler.com/webcasts Other On-Demand Webcasts
  • 27. ©2017 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION. June 25-27, 2018 The Cosmopolitan, Las Vegas Register at zenithlive.zscaler.com Join the conversation at community.zscaler.com

Editor's Notes

  • #4: As users moved out side corporate networks and applications moved out of data center into SaaS and IaaS platforms, Internet became your corporate network. By 2020, many progressive CIOs like at Siemens and GE will adapt Internet as corporate network and start getting rid of the whole DMZ or corporate ‘moat and castles’ they have built since 1990s.
  • #6: Statistic source: ** http://www.computing.co.uk/ctg/news/2321750/more-than-80-per-cent-of-employees-use-non-approved-saas-apps-report https://www.mcafee.com/us/solutions/lp/cloud-security-report.html
  • #10: “We are the perfect complement”  We are the Ying and the Yang. Riverbed provides the SD WAN to allow local internet breakout and banch internet offload, which Zscaler secures the new perimeter i.e. Internet with its 100+ data centers.
  • #13: Purpose of slide: Describe Cloud App Security at a high level Key takeaways Microsoft Cloud App Security is a comprehensive service providing deep visibility, granular controls and enhanced threat protection for your cloud apps. It identifies 14,000+ cloud applications in your network—from all devices—and provides ongoing risk assessment and analytics. No agents required: information is collected from your firewalls and proxies to give you complete visibility and context for cloud usage and shadow IT.
  • #17: Purpose of slide: Describe integration of Cloud App Security and Azure Information Protection Key takeaways Through integration with Azure Information Protection, you can use the Cloud App Security portal to set policies for files sharing – based on their level of sensitivity to the business as set by Azure Information Protection. Integration of Azure Information Protection and Cloud App Security extends visibility into sensitive data at it moves to cloud locations. Cloud App Security admins can configure policies to read Azure Information Protection labels and take appropriate actions or raise alerts. When there is a violation against your policies, you will receive an alert. After you have thoroughly investigated and learned about this violation, you can use governance actions to protect your data in the cloud apps right away. Every insight is actionable, allowing you to remediate with a single click or implement data sharing and granular usage policies. For instance, you can: Put files into quarantine so only user can access the file Restrict sharing (i.e. make a link private) Send notifications to users who shared these sensitive files
  • #18: Purpose of slide: Describe how Cloud App Security assists with threat detection Key takeaways In addition to the capabilities we outlined earlier, Cloud App Security helps you to protect your data in cloud apps from cybersecurity threats. You can identify anomalies in your cloud usage that may be indicative of a data breach. Cloud App Security advanced machine learning heuristics learn how each user interacts with each SaaS application and, through behavioral analysis, assesses the risks in each transaction. This includes simultaneous logins from two countries, the sudden download of terabytes of data, or multiple failed login attempts that may signify a brute force attack. Anomaly detection draws from Microsoft’s vast amount of threat intelligence and security research data. Cloud App Security benefits from Microsoft’s holistic, agile security platform, and is informed by insights from Microsoft Intelligent Security Graph.