SlideShare a Scribd company logo
1 ©2018 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION
Transform your branch and security
architecture for the cloud
The secure, direct-to-internet branch
Zeus Kerravala | Principal Analyst | ZK Research
Bill Lapp | Vice President of Customer Success | Zscaler
2
To ask a question
• Type your questions into the chat box in the
Webex panel or email us at
communications@zscaler.com
• We’ll try to get to all questions during the Q&A
session. If we do not get to your question, we’ll
make sure to follow up afterwards
• At the end of the webcast – please let us know
how we did!
©2018 Zscaler, Inc. All rights reserved.
Ask your question here…
© 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING
About ZK Research
Founded by 30+ year veteran industry analyst
Zeus Kerravala
Exclusive focus on network and
communications technology that are in market
transitions
Background on Kerravala
•10+ years as a Yankee Group Analyst
•15+ years in corporate IT and consulting
•Holds many technical certifications
•Regular contributor on Network World,
NoJitter, Tech Target, CSO Online and more
3
© 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING
The Digital Era Has Arrived
• Agility is everything in the
digital era
• Businesses need to adapt to
market shifts faster than the
competition
• Digital building blocks are
network centric
• DX has raised the value of the
network
4
© 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING
Digital Is Happening…
5
84%
13% 3%
Does your organization have a
digital transformation
initiative underway?
Yes
No
Unsure
... But uncertainty remains
• 51% of CxOs do not
know what their
industry will look like in
2020
• 48% fear their company
could be obsolete within
5 years
• 71% of businesses have
seen new competitors
emerge in past 5 years
© 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING
IT Needs A New Operating Model
• Legacy IT is manually intensive
• A digital business requires an agile,
modernized infrastructure
• DevOps and agile development require IT to
move with speed
• Migrating to a cloud architecture is requisite
for the shift to digital
• The cloud is a core digital enabler
6
IT Needs A New Operating Model
© 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING
Public Clouds Are Rising
• Cloud will grow at
18% CAGR from ’15-
’21
• Rest of IT ~ 3%
• 80% of Global 2000
has at least 20% of
IT running in the
cloud today
• Workloads in
clouds will outpace
legacy workloads
by 2019
36.9 46
55.3
67.7 75.8
86.5
97.2
10.5
13.6
15.9
18.6
22.1
26.9
31.2
10.1
12
14.9
17.6
19.9
22.5
26.4
0
20
40
60
80
100
120
140
160
180
2015 2016 2017 2018 2019 2020 2021
SaaS PaaS IaaS
The cloud is the right compute model for the digital era
© 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING
The Challenges With Legacy Networks
• Designed for client server and best
effort traffic
• Not optimized for cloud first
businesses
• Security was placed at a single point
• Internet traffic is backhauled across
the WAN – twice!
• Inefficient use of bandwidth and
poor performance 8
© 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING
WAN Modernization Is Mandatory
• Businesses have spent billions
increasing the level of app and
compute agility
• A lack of network agility is holding
organizations back
• SDNs have modernized data center
networks
• WANs need to be modernized
9
© 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING
Introducing SD-WANs
• Separation of control and data
plane puts innovation in SW
• “Active-active” architectures
• Cloud optimized
• Makes direct to cloud access from
branches possible
• High resiliency
• Optimizes application
performance
10
© 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING
Poll question 1:
• What is the status of SD-WAN within your
organization?
• No interest
• Currently researching
• Partially deployed
• Fully deployed
11
© 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING
Security Challenges With SD-WAN
• Perimeter security is no longer
sufficient
• ACLs are complex and time
consuming to set up
• Perimeter is continually changing
• Local Interent breakout creates new
security risks
• VPNs are spotty and frustrates users
12
© 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING
The Complexity Of Today’s WANs
13
WANs were orderly
but inflexible
WANs are agile but
chaotic
© 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING
Poll question 2:
• What best describes your opinion of local Internet
breakout in branch offices?
• No interest in it
• We like the idea but securing it is too complex
• We like the idea and are planning to deploy it
• We are currently using local internet breakout but struggle
with the security
• We are currently using local internet breakout and have
the security problem under control
14
© 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING
A Better Solution: Secure Cloud Access
15
Secure cloud
access provider
Home office
Branch office
Other workers
Other cloud
© 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING
Understanding Secure Cloud Access
• Users connect to a secure cloud access
provider
• Cloud provider has secure connections to
cloud services
• Apps are segmented without having to
implement network segmentation
• Internet can be used for transport without the
security risks
• Users only access what they are permitted to
by business policy
16
© 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING
Benefits Of Secure Cloud Access
• Faster, higher quality experience for users
• Reduced attack surface
• Granular application access control
• Easier to manage than ACLs and VLANs
• Improved performance
• Obviates the needs for VPNs
• Increased visibility into apps and activity
17
© 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING
What To Look For In A Solution Provider
• Global visibility for users and apps
• Secure, private access
• Integrated security
• Single pane of glass
• Micro-segmentation capabilities
• Health monitoring
• Customer provided keys
18
© 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING
Summary
• Digital transformation is changing the business
landscape faster than ever
• The cloud is a key enabler of digital transformation
• Cloud drives significantly different traffic patterns
than client server computing
• SD-WANs can transform the WANs
• A different security model is needed today
• Secure cloud access is the answer
19
©2018 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION20
©2018 Zscaler, Inc. All rights reserved. Zscaler™, SHIFT™, Direct-to-Cloud™ and ZPA™ are trademarks or registered trademarks of Zscaler, Inc.
in the United States and/or other countries. All other trademarks are the property of their respective owners.
A Transformation Journey
Powered by Zscaler
©2018 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION21
Zscaler enables secure IT transformation to the cloud
Internet and VPN Gateway
Ext. FW / IPS
URL Filtering
Antivirus
DLP
SSL
Sandbox
Global LB
DDoS
Ext FW/IPS
RAS (VPN)
Internal FW
Internal LB
SaaSOpen Internet
External
APPS
Data CenterIaaS
Internal
Internal (cloud or data center)
Connect a user to an authorized
private app (not network)
Fast and secure policy-based access to apps and services over the Internet
Any device, any location, on-net or off-net
External (open Internet or SaaS)
Nothing bad comes in,
nothing good leaks out
Zscaler
Internet Access
Zscaler
Private Access
HQMOBILE
BRANCHIOT
©2018 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION22
The Complex Infrastructure of a Large Global Organization
Open internet
MPLS
MPLS MPLS
MPLS
• 9 Data Centers
• 8 internet egress points
managed by 6 different teams
• 8 email systems managed by 6
different teams
900 locations across
22 countries
10,000 Users
3,000 Remote Users on
5 VPN solutions
17 MPLS providers with
various configurations
Unreliable | Difficult to Manage | Lack of Visibility
Poor End-User Experience | Significant CAPEX and OPEX
Fail-Over
EMEA DC
Fail-Over
NA DC
©2018 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION23
Cloud Transformation Journey – Phase 1
Four initiatives – 9 months
1. WAN vendor consolidation
2. SD WAN at 870 branches
3. Embrace Office 365 and phase-
out local email servers
4. Local internet breakouts with
appliances
30 Country &
Regional HQs
870 Branch
Locations
MPLS
WAN Vendor
9 Data Centers
Open Internet
IPSEC-to-MPLS architecture
(No MPLS at braches)
Branch office users were still complaining their internet experience was poor.
MPLS
WAN Vendor
SaaS
Benefits
• Cost savings
• Better internet experience at
country and regional HQs
• Simplified IT by standardizing
email/SharePoint and
reducing MPLS vendors from
17 to 1
1
4
MPLS
WAN Vendor
2
3
©2018 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION24
Cloud Transformation Journey – Phase 2
One initiative – 9 months
1. Implement local internet
breakouts in all branches
30 Country &
Regional HQs
870 Branch
Locations
9 Data Centers
MPLS
WAN Vendor
Open Internet
Option 1: Deploy branch
firewalls in 870 locations.
Option 2: Implement Zscaler
Cloud Security Platform.
XX
Office 365 required more than just traditional proxy ports.
Visibility provided by Zscaler led to courageous conversations on OSI Models Layers 8,9,10.
SaaS
Benefits
• Reduction in branch user internet
complaints (less pushback)
• Avoided the cost and overhead of
deploying 870 security appliances
• 60% reduction in Data Center
bandwidth requirements
• Enhanced Security Posture – SSL
inspection, cloud sandbox, DLP,
and SIEM integration
©2018 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION25
Cloud Transformation Journey – Phase 3
Three initiatives
1. Implement Zscaler Cloud Firewall
and Bandwidth Control for O365
2. Reduce security appliance
requirements at country /
regional HQs
3. Protect mobile users
30 Country &
Regional HQs
870 Branch
Locations
9 Data Centers
MPLS
WAN Vendor
Open Internet
Delivered a consistent end-user experience to IaaS and SaaS applications at all branch and HQ locations,
but the mobile user was still struggling
SaaS
Benefits
• Eliminated security appliances in
country & regional HQs
• Better Office 365 user
experiences in all locations
• Reduced risk by providing
identical security controls to
mobile workers
©2018 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION26
9 Data Centers
MPLS
WAN Vendor
Open Internet
SaaS IaaS
5 Data Centers
Cloud Transformation Journey – Phase 4
Three initiatives – 12 months
1. Migrate apps to IaaS – re-
platform critical apps to be
browser accessible
2. Deploy virtual NGFWs and load
balancers to eliminate traffic
tromboning
3. Consolidate data centers
30 Country &
Regional HQs
870 Branch
Locations
VM
Virtual NGFWs and load balancers were expensive, didn’t scale, and micro-segmentation challenges.
User confusion on when to use VPN and when they could use a browser.
Benefits
• Reduced data center costs
• Reference Architecture to provide
users better access re-platformed
apps (No VPN)
©2018 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION27
MPLS
WAN Vendor
Open Internet
SaaS
5 Data Centers
IaaS
VM
Cloud Transformation Journey – Phase 5
Two initiatives – 6 months
1. Seamless End-User Experience -
Implement Zscaler Private Access
2. Reference Architecture for a
Zero-Trust Network Model
30 Country &
Regional HQs
870 Branch
Locations
Future-proof app delivery strategy with positive end-user experience.
Benefits
• Simplified access to all
applications
• Eliminated the cost and
complexity of virtual firewalls
and load balancers in IaaS
• Enhanced security posture – app
microsegmentation, reduced
inbound attack surface,
enablement of zero-trust
network model
©2018 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION28
Transformation Journey – Summary
Cost Savings
8% of Overall IT Spend
(Optimized Network/Security Arch, DC
Consolidation, O365, etc.)
Cost Avoidance
$2.7M in appliance sprawl
Network transformation – SDWAN at 870 locations and deployment of 30 local breakouts with appliances
Network transformation – ZIA deployed to support local internet breakouts in 870 branch offices
Global collaboration tools – Successfully deployed Office 365 with Cloud FW and Bandwidth Control
Data center transformation – Moved apps to Azure/AWS and consolidated data centers
Application access transformation –Eliminated VPN, zero-trust network model, positive end-user experience
1
2
3
4
5
Benefits
Agile IT environment
Consistent end-user experience
Reduced business risk
©2018 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION29
Zscaler: The market leader in cloud security
Most Discerning Enterprise Customers
2,700 CUSTOMERS
Over 80 of the Fortune 500
54% International
Global Partners
100
Data centers
35B
Daily requests
185
Countries served
Largest Cloud Security Platform in the World
Mature Global Cloud Operations
Experienced Team with Pioneers in Cloud Security
Unparalleled Cloud Scale
©2018 Zscaler, Inc. All rights reserved.30
Let Zscaler empower your next IT project
Corporate deployment
of Office 365
Securing
SD-WAN transformation
VPN Replacement or
Securing App Access in AWS or Azure
Enhancing Security or
Replacing Traditional Proxies
Next Steps
Technical Workshop Proof of Concept Executive Briefing in San Jose, CA
©2018 Zscaler, Inc. All rights reserved.
June 25-27, 2018
The Cosmopolitan, Las Vegas
Register today at
zenithlive.zscaler.com
Join the conversation at
community.zscaler.com
©2018 Zscaler, Inc. All rights reserved.
Visit zscaler.com/transform to learn more
Thank You!
Questions and Next Steps
Zeus Kerravala
Principal Analyst,
ZK Research
zeus@zkresearch.com
Twitter @zkerravala
Bill Lapp
Vice President,
Customer Success, Zscaler
blapp@zscaler.com
Twitter @robilium
©2018 Zscaler, Inc. All rights reserved.
June 25-27, 2018
The Cosmopolitan, Las Vegas
Register today at
zenithlive.zscaler.com
Join the conversation at
community.zscaler.com
©2018 Zscaler, Inc. All rights reserved.
©2018 Zscaler, Inc. All rights reserved. Zscaler™, SHIFT™, Direct-to-Cloud™ and ZPA™ are trademarks or registered trademarks of Zscaler, Inc.
in the United States and/or other countries. All other trademarks are the property of their respective owners.

More Related Content

PPTX
SD-WAN plus cloud security
PPTX
Rethinking Cybersecurity for the Digital Transformation Era
PPTX
Zero trust for everybody: 3 ways to get there fast
PDF
An Introduction to VMware NSX
PDF
Aryaka Bringing SASE to Life with a Zero Trust WAN.pdf
PPTX
EDR(End Point Detection And Response).pptx
PPTX
Transform your enterprise branch with secure sd-wan
PPT
Palo alto networks next generation firewalls
SD-WAN plus cloud security
Rethinking Cybersecurity for the Digital Transformation Era
Zero trust for everybody: 3 ways to get there fast
An Introduction to VMware NSX
Aryaka Bringing SASE to Life with a Zero Trust WAN.pdf
EDR(End Point Detection And Response).pptx
Transform your enterprise branch with secure sd-wan
Palo alto networks next generation firewalls

What's hot (20)

PDF
Succeeding with Secure Access Service Edge (SASE)
PDF
Microsoft Defender and Azure Sentinel
PDF
SD WAN Overview | What is SD WAN | Benefits of SD WAN
PPTX
Ise 1 2-bdm-v4
PPTX
CASB: Securing your cloud applications
PDF
What is SASE
PDF
Cloud computing understanding security risk and management
PDF
Endpoint Detection & Response - FireEye
PPTX
SC-900 Capabilities of Microsoft Compliance Solutions
PDF
Microsoft Zero Trust
PDF
Cloud migration strategies
PDF
Understanding SASE
PDF
Netskope Overview
PDF
PaloAlto Enterprise Security Solution
PDF
An introduction to Defender for Business
PDF
VMware Tanzu Introduction
PDF
Introduction to Microsoft 365 Enterprise
PDF
Infrastructure as Code
PDF
Modern Devices Management
PDF
Azure cloud migration simplified
Succeeding with Secure Access Service Edge (SASE)
Microsoft Defender and Azure Sentinel
SD WAN Overview | What is SD WAN | Benefits of SD WAN
Ise 1 2-bdm-v4
CASB: Securing your cloud applications
What is SASE
Cloud computing understanding security risk and management
Endpoint Detection & Response - FireEye
SC-900 Capabilities of Microsoft Compliance Solutions
Microsoft Zero Trust
Cloud migration strategies
Understanding SASE
Netskope Overview
PaloAlto Enterprise Security Solution
An introduction to Defender for Business
VMware Tanzu Introduction
Introduction to Microsoft 365 Enterprise
Infrastructure as Code
Modern Devices Management
Azure cloud migration simplified
Ad

Similar to The secure, direct to-internet branch (20)

PDF
Three Key Steps for Moving Your Branches to the Cloud
PPTX
PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...
PPTX
Rethinking Cybersecurity for the Digital Transformation Era
PDF
Digital Businesses Need to Rethink Their Network Strategies
PPTX
The evolution of IT in a cloud world
PPTX
Cloud vs. On-Premises Security: Can you afford not to switch?
PPTX
Faster, simpler, more secure remote access to apps in aws
PPTX
The evolving CIO|CISO relationship
PPTX
Virtualized Firewall: Is it the panacea to secure distributed enterprises?
PPTX
Ma story then_now_webcast_10_17_18
PPTX
Migration to microsoft_azure_with_zscaler
PPTX
Alpha & Omega's Managed Security
PPTX
Overcoming the Challenges of Architecting for the Cloud
PPTX
Moving from appliances to cloud security with phoenix children's hospital
PPTX
Top 5 predictions webinar
PDF
ztna-2-0-report.pdf
PPTX
What Comes After VPN?
PPTX
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
PDF
zscaler-aws-zero-trust.pdf
PPTX
The greatest SDWAN sales slidedeck ever created
Three Key Steps for Moving Your Branches to the Cloud
PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...
Rethinking Cybersecurity for the Digital Transformation Era
Digital Businesses Need to Rethink Their Network Strategies
The evolution of IT in a cloud world
Cloud vs. On-Premises Security: Can you afford not to switch?
Faster, simpler, more secure remote access to apps in aws
The evolving CIO|CISO relationship
Virtualized Firewall: Is it the panacea to secure distributed enterprises?
Ma story then_now_webcast_10_17_18
Migration to microsoft_azure_with_zscaler
Alpha & Omega's Managed Security
Overcoming the Challenges of Architecting for the Cloud
Moving from appliances to cloud security with phoenix children's hospital
Top 5 predictions webinar
ztna-2-0-report.pdf
What Comes After VPN?
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
zscaler-aws-zero-trust.pdf
The greatest SDWAN sales slidedeck ever created
Ad

More from Zscaler (19)

PPTX
Zscaler mondi webinar
PPTX
3 reasons-sdp-is-replacing-vpn-in-2019
PPTX
Three ways-zero-trust-security-redefines-partner-access-ch
PPTX
Office 365 kelly services
PPTX
Get an office 365 expereience your users will love v8.1
PPTX
Three ways-zero-trust-security-redefines-partner-access-v8
PPTX
Schneider electric powers security transformation with one simple app copy
PDF
Top 5 mistakes deploying o365
PPTX
How sdp delivers_zero_trust
PDF
Zenith Live - Security Lab - Phantom
PPTX
O365 quick with fast user experience
PPTX
Office 365 deployment
PPTX
Dissecting ssl threats
PPTX
Adopting A Zero-Trust Model. Google Did It, Can You?
PPTX
Top reasons o365 deployments fail
PPT
GDPR - are you ready?
PPTX
Secure remote access to AWS your users will love
PPTX
Maximize your cloud app control with Microsoft MCAS and Zscaler
PPTX
DNS Security, is it enough?
Zscaler mondi webinar
3 reasons-sdp-is-replacing-vpn-in-2019
Three ways-zero-trust-security-redefines-partner-access-ch
Office 365 kelly services
Get an office 365 expereience your users will love v8.1
Three ways-zero-trust-security-redefines-partner-access-v8
Schneider electric powers security transformation with one simple app copy
Top 5 mistakes deploying o365
How sdp delivers_zero_trust
Zenith Live - Security Lab - Phantom
O365 quick with fast user experience
Office 365 deployment
Dissecting ssl threats
Adopting A Zero-Trust Model. Google Did It, Can You?
Top reasons o365 deployments fail
GDPR - are you ready?
Secure remote access to AWS your users will love
Maximize your cloud app control with Microsoft MCAS and Zscaler
DNS Security, is it enough?

Recently uploaded (20)

PDF
Triggering QUIC, presented by Geoff Huston at IETF 123
PPTX
SAP Ariba Sourcing PPT for learning material
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PDF
Paper PDF World Game (s) Great Redesign.pdf
PPT
tcp ip networks nd ip layering assotred slides
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PDF
Testing WebRTC applications at scale.pdf
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
DOCX
Unit-3 cyber security network security of internet system
PPTX
artificial intelligence overview of it and more
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PPTX
QR Codes Qr codecodecodecodecocodedecodecode
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PPTX
Funds Management Learning Material for Beg
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
Triggering QUIC, presented by Geoff Huston at IETF 123
SAP Ariba Sourcing PPT for learning material
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
Paper PDF World Game (s) Great Redesign.pdf
tcp ip networks nd ip layering assotred slides
Cloud-Scale Log Monitoring _ Datadog.pdf
Testing WebRTC applications at scale.pdf
An introduction to the IFRS (ISSB) Stndards.pdf
Module 1 - Cyber Law and Ethics 101.pptx
Tenda Login Guide: Access Your Router in 5 Easy Steps
Decoding a Decade: 10 Years of Applied CTI Discipline
Unit-3 cyber security network security of internet system
artificial intelligence overview of it and more
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
INTERNET------BASICS-------UPDATED PPT PRESENTATION
QR Codes Qr codecodecodecodecocodedecodecode
Slides PPTX World Game (s) Eco Economic Epochs.pptx
Funds Management Learning Material for Beg
Slides PDF The World Game (s) Eco Economic Epochs.pdf

The secure, direct to-internet branch

  • 1. 1 ©2018 Zscaler, Inc. All rights reserved. ZSCALER CONFIDENTIAL INFORMATION Transform your branch and security architecture for the cloud The secure, direct-to-internet branch Zeus Kerravala | Principal Analyst | ZK Research Bill Lapp | Vice President of Customer Success | Zscaler
  • 2. 2 To ask a question • Type your questions into the chat box in the Webex panel or email us at communications@zscaler.com • We’ll try to get to all questions during the Q&A session. If we do not get to your question, we’ll make sure to follow up afterwards • At the end of the webcast – please let us know how we did! ©2018 Zscaler, Inc. All rights reserved. Ask your question here…
  • 3. © 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING About ZK Research Founded by 30+ year veteran industry analyst Zeus Kerravala Exclusive focus on network and communications technology that are in market transitions Background on Kerravala •10+ years as a Yankee Group Analyst •15+ years in corporate IT and consulting •Holds many technical certifications •Regular contributor on Network World, NoJitter, Tech Target, CSO Online and more 3
  • 4. © 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING The Digital Era Has Arrived • Agility is everything in the digital era • Businesses need to adapt to market shifts faster than the competition • Digital building blocks are network centric • DX has raised the value of the network 4
  • 5. © 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING Digital Is Happening… 5 84% 13% 3% Does your organization have a digital transformation initiative underway? Yes No Unsure ... But uncertainty remains • 51% of CxOs do not know what their industry will look like in 2020 • 48% fear their company could be obsolete within 5 years • 71% of businesses have seen new competitors emerge in past 5 years
  • 6. © 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING IT Needs A New Operating Model • Legacy IT is manually intensive • A digital business requires an agile, modernized infrastructure • DevOps and agile development require IT to move with speed • Migrating to a cloud architecture is requisite for the shift to digital • The cloud is a core digital enabler 6 IT Needs A New Operating Model
  • 7. © 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING Public Clouds Are Rising • Cloud will grow at 18% CAGR from ’15- ’21 • Rest of IT ~ 3% • 80% of Global 2000 has at least 20% of IT running in the cloud today • Workloads in clouds will outpace legacy workloads by 2019 36.9 46 55.3 67.7 75.8 86.5 97.2 10.5 13.6 15.9 18.6 22.1 26.9 31.2 10.1 12 14.9 17.6 19.9 22.5 26.4 0 20 40 60 80 100 120 140 160 180 2015 2016 2017 2018 2019 2020 2021 SaaS PaaS IaaS The cloud is the right compute model for the digital era
  • 8. © 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING The Challenges With Legacy Networks • Designed for client server and best effort traffic • Not optimized for cloud first businesses • Security was placed at a single point • Internet traffic is backhauled across the WAN – twice! • Inefficient use of bandwidth and poor performance 8
  • 9. © 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING WAN Modernization Is Mandatory • Businesses have spent billions increasing the level of app and compute agility • A lack of network agility is holding organizations back • SDNs have modernized data center networks • WANs need to be modernized 9
  • 10. © 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING Introducing SD-WANs • Separation of control and data plane puts innovation in SW • “Active-active” architectures • Cloud optimized • Makes direct to cloud access from branches possible • High resiliency • Optimizes application performance 10
  • 11. © 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING Poll question 1: • What is the status of SD-WAN within your organization? • No interest • Currently researching • Partially deployed • Fully deployed 11
  • 12. © 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING Security Challenges With SD-WAN • Perimeter security is no longer sufficient • ACLs are complex and time consuming to set up • Perimeter is continually changing • Local Interent breakout creates new security risks • VPNs are spotty and frustrates users 12
  • 13. © 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING The Complexity Of Today’s WANs 13 WANs were orderly but inflexible WANs are agile but chaotic
  • 14. © 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING Poll question 2: • What best describes your opinion of local Internet breakout in branch offices? • No interest in it • We like the idea but securing it is too complex • We like the idea and are planning to deploy it • We are currently using local internet breakout but struggle with the security • We are currently using local internet breakout and have the security problem under control 14
  • 15. © 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING A Better Solution: Secure Cloud Access 15 Secure cloud access provider Home office Branch office Other workers Other cloud
  • 16. © 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING Understanding Secure Cloud Access • Users connect to a secure cloud access provider • Cloud provider has secure connections to cloud services • Apps are segmented without having to implement network segmentation • Internet can be used for transport without the security risks • Users only access what they are permitted to by business policy 16
  • 17. © 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING Benefits Of Secure Cloud Access • Faster, higher quality experience for users • Reduced attack surface • Granular application access control • Easier to manage than ACLs and VLANs • Improved performance • Obviates the needs for VPNs • Increased visibility into apps and activity 17
  • 18. © 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING What To Look For In A Solution Provider • Global visibility for users and apps • Secure, private access • Integrated security • Single pane of glass • Micro-segmentation capabilities • Health monitoring • Customer provided keys 18
  • 19. © 2018 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING Summary • Digital transformation is changing the business landscape faster than ever • The cloud is a key enabler of digital transformation • Cloud drives significantly different traffic patterns than client server computing • SD-WANs can transform the WANs • A different security model is needed today • Secure cloud access is the answer 19
  • 20. ©2018 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION20 ©2018 Zscaler, Inc. All rights reserved. Zscaler™, SHIFT™, Direct-to-Cloud™ and ZPA™ are trademarks or registered trademarks of Zscaler, Inc. in the United States and/or other countries. All other trademarks are the property of their respective owners. A Transformation Journey Powered by Zscaler
  • 21. ©2018 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION21 Zscaler enables secure IT transformation to the cloud Internet and VPN Gateway Ext. FW / IPS URL Filtering Antivirus DLP SSL Sandbox Global LB DDoS Ext FW/IPS RAS (VPN) Internal FW Internal LB SaaSOpen Internet External APPS Data CenterIaaS Internal Internal (cloud or data center) Connect a user to an authorized private app (not network) Fast and secure policy-based access to apps and services over the Internet Any device, any location, on-net or off-net External (open Internet or SaaS) Nothing bad comes in, nothing good leaks out Zscaler Internet Access Zscaler Private Access HQMOBILE BRANCHIOT
  • 22. ©2018 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION22 The Complex Infrastructure of a Large Global Organization Open internet MPLS MPLS MPLS MPLS • 9 Data Centers • 8 internet egress points managed by 6 different teams • 8 email systems managed by 6 different teams 900 locations across 22 countries 10,000 Users 3,000 Remote Users on 5 VPN solutions 17 MPLS providers with various configurations Unreliable | Difficult to Manage | Lack of Visibility Poor End-User Experience | Significant CAPEX and OPEX Fail-Over EMEA DC Fail-Over NA DC
  • 23. ©2018 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION23 Cloud Transformation Journey – Phase 1 Four initiatives – 9 months 1. WAN vendor consolidation 2. SD WAN at 870 branches 3. Embrace Office 365 and phase- out local email servers 4. Local internet breakouts with appliances 30 Country & Regional HQs 870 Branch Locations MPLS WAN Vendor 9 Data Centers Open Internet IPSEC-to-MPLS architecture (No MPLS at braches) Branch office users were still complaining their internet experience was poor. MPLS WAN Vendor SaaS Benefits • Cost savings • Better internet experience at country and regional HQs • Simplified IT by standardizing email/SharePoint and reducing MPLS vendors from 17 to 1 1 4 MPLS WAN Vendor 2 3
  • 24. ©2018 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION24 Cloud Transformation Journey – Phase 2 One initiative – 9 months 1. Implement local internet breakouts in all branches 30 Country & Regional HQs 870 Branch Locations 9 Data Centers MPLS WAN Vendor Open Internet Option 1: Deploy branch firewalls in 870 locations. Option 2: Implement Zscaler Cloud Security Platform. XX Office 365 required more than just traditional proxy ports. Visibility provided by Zscaler led to courageous conversations on OSI Models Layers 8,9,10. SaaS Benefits • Reduction in branch user internet complaints (less pushback) • Avoided the cost and overhead of deploying 870 security appliances • 60% reduction in Data Center bandwidth requirements • Enhanced Security Posture – SSL inspection, cloud sandbox, DLP, and SIEM integration
  • 25. ©2018 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION25 Cloud Transformation Journey – Phase 3 Three initiatives 1. Implement Zscaler Cloud Firewall and Bandwidth Control for O365 2. Reduce security appliance requirements at country / regional HQs 3. Protect mobile users 30 Country & Regional HQs 870 Branch Locations 9 Data Centers MPLS WAN Vendor Open Internet Delivered a consistent end-user experience to IaaS and SaaS applications at all branch and HQ locations, but the mobile user was still struggling SaaS Benefits • Eliminated security appliances in country & regional HQs • Better Office 365 user experiences in all locations • Reduced risk by providing identical security controls to mobile workers
  • 26. ©2018 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION26 9 Data Centers MPLS WAN Vendor Open Internet SaaS IaaS 5 Data Centers Cloud Transformation Journey – Phase 4 Three initiatives – 12 months 1. Migrate apps to IaaS – re- platform critical apps to be browser accessible 2. Deploy virtual NGFWs and load balancers to eliminate traffic tromboning 3. Consolidate data centers 30 Country & Regional HQs 870 Branch Locations VM Virtual NGFWs and load balancers were expensive, didn’t scale, and micro-segmentation challenges. User confusion on when to use VPN and when they could use a browser. Benefits • Reduced data center costs • Reference Architecture to provide users better access re-platformed apps (No VPN)
  • 27. ©2018 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION27 MPLS WAN Vendor Open Internet SaaS 5 Data Centers IaaS VM Cloud Transformation Journey – Phase 5 Two initiatives – 6 months 1. Seamless End-User Experience - Implement Zscaler Private Access 2. Reference Architecture for a Zero-Trust Network Model 30 Country & Regional HQs 870 Branch Locations Future-proof app delivery strategy with positive end-user experience. Benefits • Simplified access to all applications • Eliminated the cost and complexity of virtual firewalls and load balancers in IaaS • Enhanced security posture – app microsegmentation, reduced inbound attack surface, enablement of zero-trust network model
  • 28. ©2018 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION28 Transformation Journey – Summary Cost Savings 8% of Overall IT Spend (Optimized Network/Security Arch, DC Consolidation, O365, etc.) Cost Avoidance $2.7M in appliance sprawl Network transformation – SDWAN at 870 locations and deployment of 30 local breakouts with appliances Network transformation – ZIA deployed to support local internet breakouts in 870 branch offices Global collaboration tools – Successfully deployed Office 365 with Cloud FW and Bandwidth Control Data center transformation – Moved apps to Azure/AWS and consolidated data centers Application access transformation –Eliminated VPN, zero-trust network model, positive end-user experience 1 2 3 4 5 Benefits Agile IT environment Consistent end-user experience Reduced business risk
  • 29. ©2018 Zscaler, Inc. All rights reserved. | ZSCALER CONFIDENTIAL INFORMATION29 Zscaler: The market leader in cloud security Most Discerning Enterprise Customers 2,700 CUSTOMERS Over 80 of the Fortune 500 54% International Global Partners 100 Data centers 35B Daily requests 185 Countries served Largest Cloud Security Platform in the World Mature Global Cloud Operations Experienced Team with Pioneers in Cloud Security Unparalleled Cloud Scale
  • 30. ©2018 Zscaler, Inc. All rights reserved.30 Let Zscaler empower your next IT project Corporate deployment of Office 365 Securing SD-WAN transformation VPN Replacement or Securing App Access in AWS or Azure Enhancing Security or Replacing Traditional Proxies Next Steps Technical Workshop Proof of Concept Executive Briefing in San Jose, CA
  • 31. ©2018 Zscaler, Inc. All rights reserved. June 25-27, 2018 The Cosmopolitan, Las Vegas Register today at zenithlive.zscaler.com Join the conversation at community.zscaler.com
  • 32. ©2018 Zscaler, Inc. All rights reserved. Visit zscaler.com/transform to learn more Thank You! Questions and Next Steps Zeus Kerravala Principal Analyst, ZK Research zeus@zkresearch.com Twitter @zkerravala Bill Lapp Vice President, Customer Success, Zscaler blapp@zscaler.com Twitter @robilium
  • 33. ©2018 Zscaler, Inc. All rights reserved. June 25-27, 2018 The Cosmopolitan, Las Vegas Register today at zenithlive.zscaler.com Join the conversation at community.zscaler.com
  • 34. ©2018 Zscaler, Inc. All rights reserved. ©2018 Zscaler, Inc. All rights reserved. Zscaler™, SHIFT™, Direct-to-Cloud™ and ZPA™ are trademarks or registered trademarks of Zscaler, Inc. in the United States and/or other countries. All other trademarks are the property of their respective owners.