Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud

Key Use Cases-How Zscaler's Platform Monitors Data Sharing Between Apps and Users

Truth in IT
01/27/2024
54
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Look, we we spend, um, a lot of time, right, uh, with our work applications. So it's not uncommon for people to use their personal, their work device to, to access personal applications, whether they're checking their email or, um, or, or maybe their personal Dropbox or Box or whatever it is. Sometimes maybe that's a bit of a shadow IT issue, right? I'm trying to circumvent, um, a flow, uh, meaning maybe there's a limit on the company, um, uh, right, repository or I don't have access to it or whatever. Um, and I tend to use my own Dropbox or Box, right? So some of it happens as well. So these are, these are interesting use cases. Um, and look at the end of the day, um, we just need to see what, what is happening, um, and be able to apply the right policies against these use cases to one, um, ensure that the company doesn't lose data, but two also let employees continue to do what they're doing, um, and not, you know, and put the right, uh, the right policies in place to ensure that sensitive company sensitive data, um, does not leave the organization. Okay. So let's let's dig a little deeper into some of these use cases. Right. So we we do need what what's called at this point is tenancy restrictions. So meaning, I want to be able to access Gmail. But I have a company Gmail and a personal Gmail or I want to be able to access Box, but I have my own personal Box account. And there's a, there's the company Box account, right? Um, and, and that kind of tenancy restriction is incredibly important, uh, for organizations to be able to do. It's a granular way to, to control that sensitive data and still allow users to go about their day to day business, right? Now, um, the there are multiple ways to get this done also, including, uh, having a solid endpoint solution, right? Um, if if we think about it, I mean, endpoint is really the device that allows us to connect to everything. Um, it's where we create data, it's where we type things out with our keyboard. So, having that visibility and control starting with the endpoint is incredibly important. So let me go through a couple of of just quick use cases there, right? So the ability to control um, data going from my personal email or right, um, to my work email, um, and again, I mentioned I've done this, uh, accidentally in the past where I would, I cc myself and I've accidentally cc'd my personal Gmail, um, as I'm working, right? That's a really interesting use case that you should have some policies around. The exact same thing, um, with work. Now, I want to allow, um, uh, my partners to be able to, uh, to, for instance, share sensitive data, um, but I also want to have different policies for different types of users, my employees versus versus my partners. Right. Um, so that's a user base, um, um, app control function there. And then if we think about this, at the end of the day, um, as I was saying, right, we need to have, understand what is that data to begin with. So having DLP that identifies that data and understands what kind of sensitivity that data has in it is, is also important. OK. Now, here's where it gets a little interesting. Um, we are in a world of collaboration and and both, uh, you know, you, employees, partners, vendors, contractors. Right. The list goes on, um, eh for BYO and BYO doesn't always necessarily mean contractors, vendors, etc. It could also happen from a merger and an acquisition perspective where we just acquired another company and all those devices now are BYO, as far as I'm concerned. They're unmanaged devices. I don't trust them. Um, but I have to give them access to my environment. The use cases here are endless um, and uh, browser isolation is, is the solution. Um, and browser isolation is this incredibly powerful, um, way of allowing access to any user, any device to cloud applications, but restricting what kind of access they have to those cloud applications through a, an intelligent browser, okay. Let's talk about those use cases. So um, so for instance, um, we just acquired a, a a new company. They're all employees. Um, and I'm going to give them browser isolation access to all my sensitive data such as Salesforce, as an example. Now they will have access to that data. They can view that data. They can run their reports. But we're going to do things such as block the ability to take screenshots of it, right? We're going to fingerprint that screenshot. If you try to take it, we're going to, uh, be be able to put restrictions on the downloading of that, of, of that, um, uh, application or report or whatever, that sensitive data. Now, this is powerful both for partners. Um, you've got right, you've got that, uh, partner use case where now I can allow temporary contractors. I can even do things such as, hey, um, you're a contractor for three months. I'm going to set your your access to these specific applications, and I'm going to create this portal just for my for my new contractors or partners or employees, whatever. Um, and it's like an IDP, right. And, uh, um, a a a a internal application portal where you can log in to these different applications. So, now I don't have to give you access to my entire organization, through VPN, for instance, I'm going to give you a portal where you can access specific sensitive applications or specific applications. And I'm going to add additional policies within these applications. Right. So that browser isolation, um, is absolutely key for you to operationalize. If we think about what organization do we know that doesn't have partners, contractors, vendors that they deal with that they need to provide access to, right? Um, and that should be thought about as a foundational aspect of your data protection solution.

Discover how Zscaler's advanced tenancy restrictions and browser isolation technologies empower businesses to maintain data security and control while enabling seamless collaboration. Learn the significance of implementing fine-grained policies for data loss prevention (DLP) in a world where BYOD and cross-organizational teamwork are the norms. Watch this insightful exploration into protecting sensitive data across various user groups—from employees to contractors—without hindering productivity. Ideal for IT security professionals seeking innovative solutions that cater to an increasingly mobile and interconnected workforce. Stay ahead with Zscaler's cutting-edge endpoint security and cloud application strategies.

Categories:
  • » Cybersecurity » Backup & Recovery
  • » Cybersecurity
  • » Cybersecurity » Zero Trust
Channels:
  • Zscaler Highlights: Reducing Risky User Behaviors
News:
Events:
Tags:
  • zscaler
  • security
  • edge
  • data
  • protection
  • dlp
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated

            Video's comments: Key Use Cases-How Zscaler's Platform Monitors Data Sharing Between Apps and Users

            Upcoming Spotlight Events

            • Jun
              24

              Agentic AI Ransomware: What You Need to Know

              06/24/202501:00 PM ET
              • Jul
                29

                QR Codes Exposed: From Convenience to Cybersecurity Nightmare

                07/29/202501:00 PM ET
                More events

                Upcoming 360 View Events

                • Jun
                  18

                  360View: The Data Resilience Imperative – Securing, Scaling & Optimizing Enterprise Data

                  06/18/202512:00 PM ET
                  • Jul
                    24

                    360View: API Security & the Expanding Attack Surface

                    07/24/202512:00 PM ET
                    • Aug
                      21

                      360View: HCI, Cloud, and Virtualization: What’s Next?

                      08/21/202512:00 PM ET
                      More events

                      Upcoming Industry Events

                      • Jun
                        24

                        Tactics, Entry Points, and Real-World Insights on Ransomware Threats

                        06/24/202501:00 PM ET
                        • Jun
                          25

                          Anticipating Evolving Threats: Strategies for Detection, Response, and Resilience

                          06/25/202501:00 PM ET
                          • Jun
                            26

                            Mastering Modern Security with Wallarm's Advanced API Solutions

                            06/26/202501:00 PM ET
                            More events

                            Recent Industry Events

                            • May
                              29

                              Dispelling Misconceptions Surrounding API Security

                              05/29/202501:00 PM ET
                              • May
                                08

                                Strengthening API Security through NIST SP 800-228 Guidelines

                                05/08/202501:00 PM ET
                                • Apr
                                  17

                                  Critical Insights on the Discovery, Disclosure, and Impact of an Android Vulnerability

                                  04/17/202502:40 AM ET
                                  More events
                                  Truth in IT
                                  • Advertise
                                  • About Us
                                  • Terms of Service
                                  • Privacy Policy
                                  • Contact Us
                                  • Be Our Guest
                                  • Preference Management
                                  Desktop version
                                  Standard version