[go: up one dir, main page]

0% found this document useful (0 votes)
38 views22 pages

Zscaler Data Protection Overview

The Zscaler Data Protection Platform offers a comprehensive solution for securing data across various channels, including SaaS, cloud, and endpoints, utilizing a unified approach to data loss prevention (DLP). It emphasizes zero trust networking, risk management, and AI-powered insights to enhance security while reducing costs and complexity. The platform aims to address the shortcomings of traditional point products by providing integrated features for data protection and compliance management.

Uploaded by

ryanckhe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views22 pages

Zscaler Data Protection Overview

The Zscaler Data Protection Platform offers a comprehensive solution for securing data across various channels, including SaaS, cloud, and endpoints, utilizing a unified approach to data loss prevention (DLP). It emphasizes zero trust networking, risk management, and AI-powered insights to enhance security while reducing costs and complexity. The platform aims to address the shortcomings of traditional point products by providing integrated features for data protection and compliance management.

Uploaded by

ryanckhe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

Zscaler Data Protection

A Complete Platform for


Securing Data on all Channels
Zscaler Platform – Comprehensive and Integrated Solutions

Cyber Protection Data Protection

AppCloaking (Minimize attack surface) Internet SaaS Cloud DC Secure Data-in-Motion


Inline Threat Protection (Prevent compromise) Secure SaaS, Cloud, Endpoint Data
Segmentation (Prevent lateral movement) Secure BYOD

Zero Trust Zero Trust AI


Exchange Exchange Fabric

Zscaler Platform
Zero Trust Networking Risk Management
Zero Trust for Branch (like a Café) Risk Scoring (Risk360)
Zero Trust for Cloud Attack Surface Mgmt.
Zero Trust for Devices (IoT/OT) Vulnerability Mgmt.
End-to-end Performance Resolution Breach Prediction

Workforce Workloads IoT / OT B2B

2024 Zscaler, Inc. All rights reserved


Costs Savings Operations Improved Leader in Data Protection

$2.1 M 37 %
annual savings faster deployments

385 % ROI 22 % more


over three years efficient IT teams

Risk Reduced

173 % more
incidents identified

27 % faster
data loss resolution 2024 Zscaler, Inc. All rights reserved
3IT
Data protection point products fall short

Network DLP

DSPM The Problem with


Web Proxy
Point Products:

Complex
Administration & Workflows

Alert Overload
SSPM Dataalerting
Inconsistent Endpoint DLP
Siloed
No correlation

CASB Email DLP

2024 Zscaler, Inc. All rights reserved


Zscaler Data Protection Platform: Unified and Comprehensive
Reduce cost & complexity while maintaining compliance

Secure SaaS Data Secure Cloud Data (DSPM)


SaaS Internet Cloud
Unified SaaS Security Data Discovery
API API Buckets, VMs & DBs with sensitive data
- CASB: Control shadow IT & sharing
- SSPM: Misconfigurations & compliance
Posture Control
- Supply Chain: Secure integrations Misconfigurations & vulnerabilities

Microsoft CoPilot Security Zscaler Actionable Insights


Control sensitive data access & output Data Protection Correlate, prioritize, auto-remediate

Auto Data Discovery


AI-Powered classification for faster visibility

Secure Data in Motion

Internet & Email DLP Gen AI Security UEBA & Adaptive Access
Structured, unstructured, images Prompt visibility & blocking Respond to risky anomalies

Secure Endpoint Data Secure BYOD (VDI Alternative)


Data
Cloud BYOD
Center
Endpoint DLP Browser Isolation
Secure USB drives, printing, network shares Isolate data w/o VDI or enterprise browsers
Users, Workloads, IoT/OT Traffic

Workflow Automation
Streamline Incidents & coach users

2024 Zscaler, Inc. All rights reserved


Secure Data-in-Motion – Unified DLP Policy
Public
Internet SaaS
Cloud

Flexible Configuration Options


Inline, Real-time Enforcement Allow, Block, Warn, Justify
Unified Policy Engine
Contextual Consistently Applied, Globally Block E.g., source code going to GitHub
• Cloud App Control
• Tenancy Restrictions Enable secure Generative AI use: block
Cloud uploads that violate DLP policies
Classification Browser
• Structured: EDM
Allow, Notify and Educate end-users uploading
• Unstructured: IDM
documents labeled confidential to OneDrive
• Images: OCR

Third-Party Integration Prevent Data Loss Stream Pixels


• Microsoft Tag Enforcement (AIP/MIP) Inline DLP, TLS Inspection Browser Isolation (SaaS & Public Cloud)
All Ports and Protocols Prevent download, copy, paste, print
Email: MAPI over HTTPS
Pre-defined & Custom Dictionaries
• PII, Source Code, Credit Card, 100+ more
• Regex and ML-based

Prevent Loss to Unmanaged Devices


VDI Alternative

Unmanaged Device E.g., access SAP from BYOD (steam pixels)


Managed Device

6
Zscaler Content Inspection: Advanced classification technologies

PaaS/
Internet SaaS
Data Storage
Indexed Document Matching (IDM)
Exact Data Match (EDM)
Secure high-value forms like tax, medical
Secure high-value data like PCI, PII, or manufacturing forms
Inventory Codes or Membership #’s
ZERO TRUST • Index unstructured data
• index structured data EXCHANGE
• Send hashes to Zscaler for blocking
• Send hashes to Zscaler for blocking JPG | BMP Document • Works to secure source code and trade
• Helps reduce false positives PNG | TIFF Labels
secrets as well
(read | write)

Hashes
Only

Optical Character Recognition (OCR) Third-party Tagging Integrations


Block sensitive data found in screen Zscaler Integrate with document tagging in
shots or image files Index Tool Microsoft Purview (MIP)

• Extract text from images • Ingest defined labels into Zscaler Cloud
• Scan and block with DLP engine Name Credit Card Soc Document • Enforce inline blocking for sensitive labels
• Works on embedded images (MSWord) Jim Smith 4716653795988590 409-49-2027 • Write missing sensitive labels for data at rest
Jane Doe 5163272601356640 679-10-1537

Custom structured data High value forms


Granular policies for Cloud App Control

Flexible actions like:


• View but no uploads
• Define by tenant profile
Simple Setup • Enforce browser isolation for safe
Get started quickly with data access
App Categories

Granular Controls
Define apps (like ChatGPT) and
enforce by users, groups or risk profile

11
AI/ML Powered Auto data discovery and classification

Discovered data leaving the organization

AI-Powered
Data Discovery

Data Timelines Top Users Top Data Destinations

See all data risks with ease

Accelerated deployments –
no administration needed!

Pivot to policy creation


in a few clicks
Discover Shadow IT Apps and Third-party integrations
Advanced Shadow IT
• Discovery Risky Apps & SaaS Integrations
• Revoke access and stop data loss

Comprehensive Catalog
Unsanctioned
Integration
• 90k Apps and SaaS based services
Risky SaaS • 130k browser extensions
App Platform • In-depth risk attributes from
research and API sandboxing

API

Unsanctioned
Access

Dangerous Cloud
App Usage
Secure Data in Motion: Stop Email Data Loss with Email DLP

Email DLP

Google M365

Block
DLP Quarantine
2 Notify User
Action
Encrypt (Purview)
SMTP
Relay 1
3
MTA
(optional)

Zscaler SmartHost

Unified Policy
Central DLP simplifies protection

In-depth inspection
Secure full email & attachment

Fast Deployment
Easily added to email architecture

2024 Zscaler, Inc. All rights reserved


14
Secure Endpoint Data: A Streamlined Approach to Endpoint DLP

Secure all data with Public


Internet SaaS
single agent (ZCC) Cloud

Supported endpoint channels: Benefits


Removable Storage Consistent Alerting Everywhere
External HD, flash drive, SD cards, etc Unified policy across endpoint, inline & cloud

Printing Centralized Quick Deployment


Network, local, print to PDF, etc. Leverage existing Zscaler DLP policy
DLP Policy

Network Shares Retire Device Agents


Reduce device footprint - better user experience
Personal Cloud Storage
Faster Incident Management
Single Agent Forensics, dashboards & workflow automation
Light weight,
high performance

Windows and MacOS Support

2024 Zscaler, Inc. All rights reserved


15
Secure SaaS Data: Reduce Risks with a SaaS Security Platform

Unified SaaS Security


SaaS
Bring together everything for SaaS security into one place:
Platforms
and Apps

Posture Management (SSPM)


Fix dangerous misconfigurations and control posture drift

App Governance (Supply Chain)


Control SaaS Sprawl and reduce 3rd party access to data

Unified Data Security (API CASB)


Discover and secure sensitive data
SaaS Security

Identity Security
Identify user risks, suspicious activities, and improve posture

Improved context, correlation and risk reduction

2024 Zscaler, Inc. All rights reserved


16
Secure Data in Motion: Protect Data from Gen AI

Gen AI security with prompt visibility


Block data
Generative AI:
Types of Gen AI Security NEW!
Get prompt visibility
data risks
DLP Inspection
Block sensitive data
Internal
source code

Confidential
content

Control access
Sensitive
analysis Cloud App Control
User App Prompt DLP Engine
Block app or warn user
Define addition function
Browser Isolation Joe@acme.com ChatGPT Def addition (number 1, number 2): Source Code
Print (Addition result:”, result)
Isolate app and data
Create a customer email to his request
Sue@acme.com Gemi PCI
including to bill his credit card #

2024 Zscaler, Inc. All rights reserved


17
Secure SaaS Data: Enable Microsoft CoPilot while controlling data risks

Microsoft
M365 Copilot

Employee Records
How Zscaler Secures Copilot Data
CxO Documents
Acquisition Plans
Map risks
API Find and classify OneDrive data

Limit CoPilot Discovery


Revoke excessive permissions on
Challenges with CoPilot: sensitive data

CoPilot Security Fix CoPilot Misconfigurations


Data Discovery Oversharing
Find and close issues that enable
Over-permissioned data oversharing
can be discovered in CoPilot
Prompt Visibility
Risky Prompt Output View and classify input prompts
CoPilot output overshares
Block Prompts with Sensitive Data
sensitive data too widely Prompt Output:
All Employees Inline DLP to Inspect and block
Salaries! sensitive data to CoPilot

2024 Zscaler, Inc. All rights reserved


Secure Cloud Data: Protect Clouds and Stop Breaches with DSPM

Map data stores Understand risks Policies and insights


Azure GCP • Buckets, VMs DBs • Discover sensitive data • Actionable insights
• Virtual machines • Entitlements to sensitive data • Correlate events
Databases Misconfigurations & Prioritize risks
AWS
• • •

vulnerabilities
• Data access patterns

Discover Map & Remediate


1 2 3
Services Track Risk Risk

Zscaler Data Security


Posture Management
(DSPM)

Define DLP once

Zscaler DLP

Integrated DLP to secure structured & unstructured data in public cloud

2024 Zscaler, Inc. All rights reserved


20
List of Detectors

Zscaler Detectors In / Out Explanation


Prompt Injection IN Detect and prevent malicious or unauthorized modifications to input prompts.

Invisible Text IN Identifies hidden or obscured text within digital content

Code Detection BOTH Filter and restrict the use of specific programming languages

Language Detection BOTH Detect and block unwanted languages across your platforms

Gibberish BOTH Identify and filter out nonsensical or meaningless text

Competition BOTH Prevent the inclusion of competitor names in the prompts submitted by users.

Topics BOTH Filter and control content by identifying and blocking specific topics.

Text BOTH Leverages customizable regular expressions to detect and block unwanted text patterns.

Detects and filter harmful language.


Toxicity BOTH

Secrets BOTH Detect and block sensitive information such as API keys, emails, passwords, and other confidential data .

Detect and block sensitive information such as API keys, emails, passwords, and other confidential data in real-
PII BOTH
time.

Refusal Out Tracks instances where large language models decline to provide responses or perform specific tasks

Malicious URL Out Flags potentially harmful or deceptive URLs generated within AI responses
Out
URL Reachability URLs are accessible and functioning correctly by continuously testing and verifying link status in real time
VDI Alternative: Agentless BYOD Access to SaaS & Private Web Apps

VDI or Enterprise Browser Agentless

Internet Private Internet Private


& SaaS Web App & SaaS Web App

Virtual Desktop
Infrastructure (VDI)
Public Secure access without
VDI costs and complexity
Servers (Sizing & Scaling)

Secure App Access & Storage


BYOD Portal: Available Apps
Non-persistent View/Share files across SaaS &
Instance
Data sent Private Web Apps
to device
Complex Powerful Data Protection
Management Isolated Browser secures data DLP, watermarking & control copy,
download and print
Data risk from
Costly 0-day browser vuln
Operations
Lower TCO
Data Security Fast Experience Agentless access without VDI cost
Air-gapped Secure turbo
Resource intensive & browsing Streaming
Broken User
Experience adoption friction

VDI 3rd Party Agentless BYOD


Agent Enterprise Browser

2024 Zscaler, Inc. All rights reserved


22
Streamline Incident Management with Workflow Automation

DLP Admin User People Manager & HR DLP Admin


Workflow Automation “It’s ok –
Data “Train user on Close Incident &
Justify incidents while Justification needed for Escalate Resolve
Incident correct policy” Create Workflow
enabling user coaching business”

Incident Notification:

A violation needs
your attention

Incident Link

Please provide
justification

It’s Ok.
Needed for business

Engage and coach


users on violations Automate repetitive tasks
Full Incident details and forensics (notifications, escalation, ect)

2024 Zscaler, Inc. All rights reserved


23
Top Initiatives for Data Protection

Secure Gen AI
Stop loss to shadow AI
Consolidated Unified
Data Protection SaaS Security

Web DLP, Email DLP, CASB, SSPM and


Endpoint DLP Supply Chain

Secure Public VDI Alternative


Cloud Data
Secure data with
DSPM Browser Isolation

Retire point products Stop data breaches Enforce regulatory compliance


2024 Zscaler, Inc. All rights
reserved
Selecting the right Data Protection Platform?

How granular is the policy engine


Granular policy engine helps reduce false positive

Are files process in memory or disk


Ensure that files are process in memory as Data is move out of your environment

How comprehensive is the Data Protection Platform


Inline DLP, CASB, endpoint DLP, email DLP, SaaS, IaaS, Private apps, BYOD

Can the DLP still work offline


Many endpoint DLP blocks all when endpoint is offline

2024 Zscaler, Inc. All rights reserved


Thank you!

You might also like