Internet security moves to the cloud
Start-up Zscaler provides a host of security services
Network World - FRAMINGHAM — A start-up that dishes up an in-the-cloud security service says it also eliminates capital outlay for security gear and reduces ongoing support costs.
Zscaler imposes security policy as defined by customers and logs security activity for reporting and forensic analysis by customers. The service provides antivirus and antispyware and can block the activity of bots, peer-to-peer networks, malicious content and phishing, the company said.
The service applies policies only to outbound Internet traffic on the fly and can eliminate the need for multiple single-function devices at the edge of corporate networks, says the company's founder, Jay Chaudhry. He is also the founder of Cipher Trust (now part of Secure Computing), AirDefense (now part of Motorola) and SecureIT (now part of VeriSign).
Customers proxy outbound Internet traffic to the nearest Zscaler gateway, where it is scanned and cleaned, Chaudhry says.
The Weather Channel has tested the service and may sign up for it within the month, says John Penrod, CISO for the TV network. He says he is being cautious about how the service affects performance as perceived by users, but so far he has seen latency of less than 1 second imposed on traffic filtered by Zscaler.
The company claims that its screening is 40 times faster than individual products that would perform the same functions.
Penrod says the reporting platform was not complete when he started testing the service, and he plans to delve into that this month.
He says he was looking for something to filter instant messaging, spam and phishing and had considered buying a secure Web gateway from Blue Coat. (Compare secure Web gateways.) But he says that the initial cost of the appliance plus administration and maintenance for five years would cost more than the service. The Weather Channel has a total of about 800 users at six sites.
To engage the service, customers point traffic that goes through edge devices such as firewalls and routers toward Zscaler gateways. For remote-access users, they change browser settings to direct traffic at the gateways.
Currently these gateways are located in Atlanta, Chicago, New York and Washington, with a central storage facility in San Jose and a mirror site in Fremont, Calif.
Other gateways are planned for elsewhere in the U.S. and Europe, Chaudhry says. The deployment follows the model of Akamai's media worldwide distribution network, he says.
Zscaler relies on two other unnamed vendors for its signature-based antivirus software and its URL database, but the rest of its technology is home-grown.
That includes a high-performance proxy engine, a software architecture that allows a single instance of security applications that can handle multiple users' traffic, compression technology that reduces logs by fiftyfold, and a global network.
- EndPoint Interactive eGuide In this eGuide, Network World, Computerworld, and CIO examine two endpoint trends - BYOD and collaboration - and offer tips and advice on...
- Reducing the cost and complexity of endpoint management IBM now offers simpler, more affordable solutions for improving endpoint security, patch compliance, lifecycle management and power management within midsized organizations. Read this...
- Big Data, Big Mess: Sound Risk Intelligence Through Complete Context This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All Endpoint Security White Papers | Webcasts