Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

Key Use Cases-How Zscaler's Platform Monitors Data Sharing Between Apps and Users

Truth in IT
01/27/2024
54
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Look, we we spend, um, a lot of time, right, uh, with our work applications. So it's not uncommon for people to use their personal, their work device to, to access personal applications, whether they're checking their email or, um, or, or maybe their personal Dropbox or Box or whatever it is. Sometimes maybe that's a bit of a shadow IT issue, right? I'm trying to circumvent, um, a flow, uh, meaning maybe there's a limit on the company, um, uh, right, repository or I don't have access to it or whatever. Um, and I tend to use my own Dropbox or Box, right? So some of it happens as well. So these are, these are interesting use cases. Um, and look at the end of the day, um, we just need to see what, what is happening, um, and be able to apply the right policies against these use cases to one, um, ensure that the company doesn't lose data, but two also let employees continue to do what they're doing, um, and not, you know, and put the right, uh, the right policies in place to ensure that sensitive company sensitive data, um, does not leave the organization. Okay. So let's let's dig a little deeper into some of these use cases. Right. So we we do need what what's called at this point is tenancy restrictions. So meaning, I want to be able to access Gmail. But I have a company Gmail and a personal Gmail or I want to be able to access Box, but I have my own personal Box account. And there's a, there's the company Box account, right? Um, and, and that kind of tenancy restriction is incredibly important, uh, for organizations to be able to do. It's a granular way to, to control that sensitive data and still allow users to go about their day to day business, right? Now, um, the there are multiple ways to get this done also, including, uh, having a solid endpoint solution, right? Um, if if we think about it, I mean, endpoint is really the device that allows us to connect to everything. Um, it's where we create data, it's where we type things out with our keyboard. So, having that visibility and control starting with the endpoint is incredibly important. So let me go through a couple of of just quick use cases there, right? So the ability to control um, data going from my personal email or right, um, to my work email, um, and again, I mentioned I've done this, uh, accidentally in the past where I would, I cc myself and I've accidentally cc'd my personal Gmail, um, as I'm working, right? That's a really interesting use case that you should have some policies around. The exact same thing, um, with work. Now, I want to allow, um, uh, my partners to be able to, uh, to, for instance, share sensitive data, um, but I also want to have different policies for different types of users, my employees versus versus my partners. Right. Um, so that's a user base, um, um, app control function there. And then if we think about this, at the end of the day, um, as I was saying, right, we need to have, understand what is that data to begin with. So having DLP that identifies that data and understands what kind of sensitivity that data has in it is, is also important. OK. Now, here's where it gets a little interesting. Um, we are in a world of collaboration and and both, uh, you know, you, employees, partners, vendors, contractors. Right. The list goes on, um, eh for BYO and BYO doesn't always necessarily mean contractors, vendors, etc. It could also happen from a merger and an acquisition perspective where we just acquired another company and all those devices now are BYO, as far as I'm concerned. They're unmanaged devices. I don't trust them. Um, but I have to give them access to my environment. The use cases here are endless um, and uh, browser isolation is, is the solution. Um, and browser isolation is this incredibly powerful, um, way of allowing access to any user, any device to cloud applications, but restricting what kind of access they have to those cloud applications through a, an intelligent browser, okay. Let's talk about those use cases. So um, so for instance, um, we just acquired a, a a new company. They're all employees. Um, and I'm going to give them browser isolation access to all my sensitive data such as Salesforce, as an example. Now they will have access to that data. They can view that data. They can run their reports. But we're going to do things such as block the ability to take screenshots of it, right? We're going to fingerprint that screenshot. If you try to take it, we're going to, uh, be be able to put restrictions on the downloading of that, of, of that, um, uh, application or report or whatever, that sensitive data. Now, this is powerful both for partners. Um, you've got right, you've got that, uh, partner use case where now I can allow temporary contractors. I can even do things such as, hey, um, you're a contractor for three months. I'm going to set your your access to these specific applications, and I'm going to create this portal just for my for my new contractors or partners or employees, whatever. Um, and it's like an IDP, right. And, uh, um, a a a a internal application portal where you can log in to these different applications. So, now I don't have to give you access to my entire organization, through VPN, for instance, I'm going to give you a portal where you can access specific sensitive applications or specific applications. And I'm going to add additional policies within these applications. Right. So that browser isolation, um, is absolutely key for you to operationalize. If we think about what organization do we know that doesn't have partners, contractors, vendors that they deal with that they need to provide access to, right? Um, and that should be thought about as a foundational aspect of your data protection solution.

Discover how Zscaler's advanced tenancy restrictions and browser isolation technologies empower businesses to maintain data security and control while enabling seamless collaboration. Learn the significance of implementing fine-grained policies for data loss prevention (DLP) in a world where BYOD and cross-organizational teamwork are the norms. Watch this insightful exploration into protecting sensitive data across various user groups—from employees to contractors—without hindering productivity. Ideal for IT security professionals seeking innovative solutions that cater to an increasingly mobile and interconnected workforce. Stay ahead with Zscaler's cutting-edge endpoint security and cloud application strategies.

Categories:
  • » Cybersecurity Webinars » Backup & Recovery
  • » Cybersecurity Webinars
  • » Cybersecurity Webinars » Zero Trust
  • » Webinar Library » Zscaler
Channels:
  • Zscaler Highlights: Reducing Risky User Behaviors
News:
Events:
Tags:
  • zscaler
  • security
  • edge
  • data
  • protection
  • dlp
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Key Use Cases-How Zscaler's Platform Monitors Data Sharing Between Apps and Users

              Upcoming Webinar Calendar

              • 12/02/2025
                01:00 PM
                12/02/2025
                The Invisible Threat: How Polymorphic Malware is Outsmarting Your Email Security
                https://www.truthinit.com/index.php/channel/1629/the-invisible-threat-how-polymorphic-malware-is-outsmarting-your-email-security/
              • 12/02/2025
                01:00 PM
                12/02/2025
                Begin Your Journey with Netwrix
                https://www.truthinit.com/index.php/channel/1631/begin-your-journey-with-netwrix/
              • 12/04/2025
                12:00 PM
                12/04/2025
                Insights from an OSC and C3PAO Assessor on CMMC Level 2 Evaluation
                https://www.truthinit.com/index.php/channel/1557/insights-from-an-osc-and-c3pao-assessor-on-cmmc-level-2-evaluation/
              • 12/09/2025
                01:00 PM
                12/09/2025
                Energize Your Connections with Netskope and Presidio Insights
                https://www.truthinit.com/index.php/channel/1553/energize-your-connections-with-netskope-and-presidio-insights/
              • 12/10/2025
                01:00 PM
                12/10/2025
                The Next Generation of Managed Data Security Services
                https://www.truthinit.com/index.php/channel/1620/cyera-the-next-generation-of-managed-data-security-services/
              • 12/10/2025
                10:00 PM
                12/10/2025
                Maximize Revenue Opportunities with Druva’s Microsoft Expansion in APAC.
                https://www.truthinit.com/index.php/channel/1624/maximize-revenue-opportunities-with-druvas-microsoft-expansion-in-apac/
              • 12/11/2025
                05:00 AM
                12/11/2025
                Maximizing Revenue Opportunities with Druva’s Microsoft Expansion in EMEA
                https://www.truthinit.com/index.php/channel/1625/maximizing-revenue-opportunities-with-druvas-microsoft-expansion-in-emea/
              • 12/11/2025
                12:00 PM
                12/11/2025
                Secureframe: Addressing the Top 5 Compliance Challenges for Startup Leaders and Solutions
                https://www.truthinit.com/index.php/channel/1526/addressing-the-top-5-compliance-challenges-for-startup-leaders-and-solutions/
              • 12/11/2025
                01:00 PM
                12/11/2025
                Enhance Your Strategy: Boost Revenue with Druva’s Microsoft Expansion.
                https://www.truthinit.com/index.php/channel/1623/enhance-your-strategy-boost-revenue-with-druvas-microsoft-expansion/
              • 12/16/2025
                01:00 PM
                12/16/2025
                HUMAN Dialogue: Discovering the Depths of Page-Level Performance Intelligence
                https://www.truthinit.com/index.php/channel/1630/human-dialogue-discovering-the-depths-of-page-level-performance-intelligence/
              • 12/18/2025
                11:00 AM
                12/18/2025
                Trend Micro Webinar: Smarter Decision Making via Network Intelligence
                https://www.truthinit.com/index.php/channel/1372/unlocking-network-intelligence-for-smarter-risk-decisions/
              • 12/18/2025
                12:00 PM
                12/18/2025
                360View: 2026 IT Predictions & Emerging Trends
                https://www.truthinit.com/index.php/channel/933/360view-2026-it-predictions-emerging-trends/
              • 12/18/2025
                01:00 PM
                12/18/2025
                Insightful Perspectives on IconAds, SlopAds, and AI Threats in 2026
                https://www.truthinit.com/index.php/channel/1649/insightful-perspectives-on-iconads-slopads-and-ai-threats-in-2026/

              Upcoming Spotlight Events

              • Dec
                02

                The Invisible Threat: How Polymorphic Malware is Outsmarting Your Email Security

                12/02/202501:00 PM ET
                • Dec
                  10

                  The Next Generation of Managed Data Security Services

                  12/10/202501:00 PM ET
                  More events

                  Upcoming Industry Events

                  • Dec
                    04

                    Insights from an OSC and C3PAO Assessor on CMMC Level 2 Evaluation

                    12/04/202512:00 PM ET
                    • Dec
                      09

                      Energize Your Connections with Netskope and Presidio Insights

                      12/09/202501:00 PM ET
                      • Dec
                        10

                        Maximize Revenue Opportunities with Druva’s Microsoft Expansion in APAC.

                        12/10/202510:00 PM ET
                        More events

                        Upcoming 360 View Events

                        • Dec
                          18

                          360View: 2026 IT Predictions & Emerging Trends

                          12/18/202512:00 PM ET
                          More events

                          Recent Spotlight Events

                          • Nov
                            20

                            Rethinking Hybrid Access: Securing Users, Vendors, and Infrastructure in the Zero Trust Era

                            11/20/202501:00 PM ET
                            • Nov
                              18

                              Microsoft Advanced Group Policy Management (AGPM) End of Life: Your Practical Migration Playbook

                              11/18/202501:00 PM ET
                              • Oct
                                22

                                Cut Ticket Resolution Time in Half with Smarter IT Documentation

                                10/22/202501:00 PM ET
                                More events

                                Recent Industry Events

                                • Nov
                                  20

                                  CMMC Certification: Next Steps for Continuous Monitoring and Management

                                  11/20/202512:00 PM ET
                                  • Nov
                                    19

                                    Deep Packet Inspection (DPI) Insights within Endpoint Protector Learning Lab

                                    11/19/202511:00 AM ET
                                    • Nov
                                      18

                                      HUMAN Dialogue: Cultivating Trust Amidst the Rise of Agentic Commerce

                                      11/18/202501:00 PM ET
                                      More events
                                      Truth in IT
                                      • Sponsor
                                      • About Us
                                      • Terms of Service
                                      • Privacy Policy
                                      • Contact Us
                                      • Preference Management
                                      Desktop version
                                      Standard version