Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

Key Use Cases-How Zscaler's Platform Monitors Data Sharing Between Apps and Users

Truth in IT
01/27/2024
54
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Look, we we spend, um, a lot of time, right, uh, with our work applications. So it's not uncommon for people to use their personal, their work device to, to access personal applications, whether they're checking their email or, um, or, or maybe their personal Dropbox or Box or whatever it is. Sometimes maybe that's a bit of a shadow IT issue, right? I'm trying to circumvent, um, a flow, uh, meaning maybe there's a limit on the company, um, uh, right, repository or I don't have access to it or whatever. Um, and I tend to use my own Dropbox or Box, right? So some of it happens as well. So these are, these are interesting use cases. Um, and look at the end of the day, um, we just need to see what, what is happening, um, and be able to apply the right policies against these use cases to one, um, ensure that the company doesn't lose data, but two also let employees continue to do what they're doing, um, and not, you know, and put the right, uh, the right policies in place to ensure that sensitive company sensitive data, um, does not leave the organization. Okay. So let's let's dig a little deeper into some of these use cases. Right. So we we do need what what's called at this point is tenancy restrictions. So meaning, I want to be able to access Gmail. But I have a company Gmail and a personal Gmail or I want to be able to access Box, but I have my own personal Box account. And there's a, there's the company Box account, right? Um, and, and that kind of tenancy restriction is incredibly important, uh, for organizations to be able to do. It's a granular way to, to control that sensitive data and still allow users to go about their day to day business, right? Now, um, the there are multiple ways to get this done also, including, uh, having a solid endpoint solution, right? Um, if if we think about it, I mean, endpoint is really the device that allows us to connect to everything. Um, it's where we create data, it's where we type things out with our keyboard. So, having that visibility and control starting with the endpoint is incredibly important. So let me go through a couple of of just quick use cases there, right? So the ability to control um, data going from my personal email or right, um, to my work email, um, and again, I mentioned I've done this, uh, accidentally in the past where I would, I cc myself and I've accidentally cc'd my personal Gmail, um, as I'm working, right? That's a really interesting use case that you should have some policies around. The exact same thing, um, with work. Now, I want to allow, um, uh, my partners to be able to, uh, to, for instance, share sensitive data, um, but I also want to have different policies for different types of users, my employees versus versus my partners. Right. Um, so that's a user base, um, um, app control function there. And then if we think about this, at the end of the day, um, as I was saying, right, we need to have, understand what is that data to begin with. So having DLP that identifies that data and understands what kind of sensitivity that data has in it is, is also important. OK. Now, here's where it gets a little interesting. Um, we are in a world of collaboration and and both, uh, you know, you, employees, partners, vendors, contractors. Right. The list goes on, um, eh for BYO and BYO doesn't always necessarily mean contractors, vendors, etc. It could also happen from a merger and an acquisition perspective where we just acquired another company and all those devices now are BYO, as far as I'm concerned. They're unmanaged devices. I don't trust them. Um, but I have to give them access to my environment. The use cases here are endless um, and uh, browser isolation is, is the solution. Um, and browser isolation is this incredibly powerful, um, way of allowing access to any user, any device to cloud applications, but restricting what kind of access they have to those cloud applications through a, an intelligent browser, okay. Let's talk about those use cases. So um, so for instance, um, we just acquired a, a a new company. They're all employees. Um, and I'm going to give them browser isolation access to all my sensitive data such as Salesforce, as an example. Now they will have access to that data. They can view that data. They can run their reports. But we're going to do things such as block the ability to take screenshots of it, right? We're going to fingerprint that screenshot. If you try to take it, we're going to, uh, be be able to put restrictions on the downloading of that, of, of that, um, uh, application or report or whatever, that sensitive data. Now, this is powerful both for partners. Um, you've got right, you've got that, uh, partner use case where now I can allow temporary contractors. I can even do things such as, hey, um, you're a contractor for three months. I'm going to set your your access to these specific applications, and I'm going to create this portal just for my for my new contractors or partners or employees, whatever. Um, and it's like an IDP, right. And, uh, um, a a a a internal application portal where you can log in to these different applications. So, now I don't have to give you access to my entire organization, through VPN, for instance, I'm going to give you a portal where you can access specific sensitive applications or specific applications. And I'm going to add additional policies within these applications. Right. So that browser isolation, um, is absolutely key for you to operationalize. If we think about what organization do we know that doesn't have partners, contractors, vendors that they deal with that they need to provide access to, right? Um, and that should be thought about as a foundational aspect of your data protection solution.

Discover how Zscaler's advanced tenancy restrictions and browser isolation technologies empower businesses to maintain data security and control while enabling seamless collaboration. Learn the significance of implementing fine-grained policies for data loss prevention (DLP) in a world where BYOD and cross-organizational teamwork are the norms. Watch this insightful exploration into protecting sensitive data across various user groups—from employees to contractors—without hindering productivity. Ideal for IT security professionals seeking innovative solutions that cater to an increasingly mobile and interconnected workforce. Stay ahead with Zscaler's cutting-edge endpoint security and cloud application strategies.

Categories:
  • » Cybersecurity Webinars » Backup & Recovery
  • » Cybersecurity Webinars
  • » Cybersecurity Webinars » Zero Trust
  • » Webinar Library » Zscaler
Channels:
  • Zscaler Highlights: Reducing Risky User Behaviors
News:
Events:
Tags:
  • zscaler
  • security
  • edge
  • data
  • protection
  • dlp
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Key Use Cases-How Zscaler's Platform Monitors Data Sharing Between Apps and Users

              Upcoming Webinar Calendar

              • 02/03/2026
                04:00 AM
                02/03/2026
                De la visibilidad a la protección: asegurando la integridad de los datos sensibles
                https://www.truthinit.com/index.php/channel/1792/de-la-visibilidad-a-la-protección-asegurando-la-integridad-de-los-datos-sensibles/
              • 02/03/2026
                01:00 PM
                02/03/2026
                Evolution of Cloud Adaptability and AI Performance
                https://www.truthinit.com/index.php/channel/1760/evolution-of-cloud-adaptability-and-ai-performance/
              • 02/10/2026
                12:00 AM
                02/10/2026
                Transforming Secure Access Through Netskope One Private Access Solutions
                https://www.truthinit.com/index.php/channel/1802/transforming-secure-access-through-netskope-one-private-access-solutions/
              • 02/19/2026
                03:00 AM
                02/19/2026
                DACH Partner Insights - Breakfast Webinar on Keepit Solutions
                https://www.truthinit.com/index.php/channel/1786/dach-partner-insights-breakfast-webinar-on-keepit-solutions/
              • 02/19/2026
                10:00 AM
                02/19/2026
                Preparing for the Future: Strengthening Your Resilience Strategy Today
                https://www.truthinit.com/index.php/channel/1816/preparing-for-the-future-strengthening-your-resilience-strategy-today/
              • 02/19/2026
                01:00 PM
                02/19/2026
                The CISO Dilemma: Fostering Innovation & Security in the Age of AI
                https://www.truthinit.com/index.php/channel/1809/the-ciso-dilemma-fostering-innovation-security-in-the-age-of-ai/
              • 02/19/2026
                04:00 PM
                02/19/2026
                Real Talk w. IT Leaders: Top Trends in 2026
                https://www.truthinit.com/index.php/channel/1823/real-talk/
              • 03/03/2026
                01:00 PM
                03/03/2026
                Energize Your Connections with Netskope and Presidio Insights
                https://www.truthinit.com/index.php/channel/1803/energize-your-connections-with-netskope-and-presidio-insights/

              Upcoming Spotlight Events

              • Feb
                03

                Evolution of Cloud Adaptability and AI Performance

                02/03/202601:00 PM ET
                • Feb
                  19

                  The CISO Dilemma: Fostering Innovation & Security in the Age of AI

                  02/19/202601:00 PM ET
                  More events

                  Upcoming Industry Events

                  • Feb
                    03

                    De la visibilidad a la protección: asegurando la integridad de los datos sensibles

                    02/03/202604:00 AM ET
                    • Feb
                      10

                      Transforming Secure Access Through Netskope One Private Access Solutions

                      02/10/202612:00 AM ET
                      • Feb
                        19

                        Preparing for the Future: Strengthening Your Resilience Strategy Today

                        02/19/202610:00 AM ET
                        More events

                        Recent Spotlight Events

                        • Jan
                          27

                          AI & Quantum Attacks Exposed: Your Survival Guide for the Next-Gen Threat Era

                          01/27/202601:00 PM ET
                          • Jan
                            22

                            Netskope: Securing Access: Go Beyond VPN and NAC to Universal ZTNA

                            01/22/202601:00 PM ET
                            • Jan
                              20

                              Beyond The Basics: IT Service Delivery Workflows That Close the Efficiency Gap

                              01/20/202601:00 PM ET
                              More events

                              Recent Industry Events

                              • Jan
                                29

                                Transforming Secure Access through Netskope One Private Access Solutions

                                01/29/202612:00 PM ET
                                • Jan
                                  29

                                  Assessing Your Cybersecurity Strategy for 2026 After the 2025 Test

                                  01/29/202610:00 AM ET
                                  • Jan
                                    28

                                    Safeguarding Data in the Era of AI Using DSPM Techniques

                                    01/28/202610:00 AM ET
                                    More events
                                    Truth in IT
                                    • Sponsor
                                    • About Us
                                    • Terms of Service
                                    • Privacy Policy
                                    • Contact Us
                                    • Preference Management
                                    Desktop version
                                    Standard version