Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • DRAW

Securing Cellular IoT & Mobile Devices with Zscaler

Zscaler
05/19/2026
1
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Zscaler Cellular extends Zero Trust security to cellular-connected IoT and mobile devices by inserting a control layer between SIM cards and mobile networks, eliminating visibility gaps.
  • Traditional cellular connectivity operates as a "black box" with no visibility into traffic or control over how devices access applications, creating security and compliance risks.
  • The platform ensures all traffic from cellular devices—vehicles, industrial IoT, phones—passes through Zscaler policy enforcement before reaching destination applications, providing unified global security control.

Summary

Nathan Howe, who leads innovation at Zscaler, introduces Zscaler Cellular, a new platform designed to secure cellular-connected IoT and mobile devices. The presentation contrasts traditional cellular connectivity—where devices like vehicles, solar panels, wind farms, and phones connect through mobile networks as a "black box" with no visibility or control—with Zscaler's approach. Zscaler Cellular positions a security control layer directly above the mobile network, ensuring all traffic from SIM-connected devices passes through Zscaler's policy enforcement before reaching destination applications. This architecture extends Zscaler's existing Zero Trust Exchange capabilities (ZIA and ZPA) to cellular connectivity, providing organizations with unified policy control across all cellular-connected assets globally. The solution addresses visibility gaps, unauthorized access risks, and data misuse concerns inherent in traditional cellular connectivity models, enabling businesses to protect IoT deployments, mobile workforces, and connected infrastructure with consistent security policies regardless of location or mobile network operator.

Chapters

0:00 - Introduction to Zscaler Cellular
0:23 - Traditional Cellular Connectivity Risks
1:24 - Zscaler Cellular Architecture
2:19 - Global Protection and Control

Key Quotes

0:29 "Maybe it's a vehicle, maybe it's an energy farm like solar panels or a wind farm."
1:04 "You don't know what's going on, you don't know what information is being used or misused."
1:46 "Zscaler sits at a layer directly above it, meaning that every single thing coming in and out of that SIM, everything goes through the control layer that Zscaler has built."

Categories:
  • » Webinar Library » Zscaler
  • » Cybersecurity » Network Security
  • » Cybersecurity » Zero Trust
  • » Data Protection
Channels:
News:
Events:
Tags:
  • OT
  • IoT Security
  • Zero Trust
  • SASE
  • SSE
  • Network Security
  • Demo
  • Technical Deep Dive
  • Cellular IoT Security
  • Zero Trust for Mobile Networks
  • SIM-based Device Protection
  • Industrial IoT Connectivity
  • Mobile Network Visibility
  • SASE for Cellular
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Securing Cellular IoT & Mobile Devices with Zscaler

              Upcoming Webinar Calendar

              • 05/20/2026
                08:00 AM
                05/20/2026
                Establishing a Robust AI Governance Framework for GenAI Throughout the Deployment Lifecycle
                https://www.truthinit.com/index.php/channel/1937/establishing-a-robust-ai-governance-framework-for-genai-throughout-the-deployment-lifecycle/
              • 05/20/2026
                10:00 PM
                05/20/2026
                Establishing a Robust AI Governance Framework for GenAI Throughout Its Lifecycle
                https://www.truthinit.com/index.php/channel/1953/establishing-a-robust-ai-governance-framework-for-genai-throughout-its-lifecycle/
              • 05/21/2026
                11:00 AM
                05/21/2026
                Risk in Real Time Demo Series: The Autonomous Era - Orchestrating a Resilient Enterprise
                https://www.truthinit.com/index.php/channel/1372/risk-in-real-time-demo-series-the-autonomous-era-orchestrating-a-resilient-enterprise/
              • 05/27/2026
                04:00 AM
                05/27/2026
                Rivoluziona i rischi dell'AI in opportunità con Netskope AI Security
                https://www.truthinit.com/index.php/channel/1925/rivoluziona-i-rischi-dellai-in-opportunità-con-netskope-ai-security/
              • 05/27/2026
                10:00 AM
                05/27/2026
                Adopting AI: From Illusion to Intentional Control
                https://www.truthinit.com/index.php/channel/1924/harnessing-ai-transitioning-from-illusion-to-purposeful-mastery/
              • 05/28/2026
                01:00 PM
                05/28/2026
                Harnessing AI for Smaller Teams: Strategies for Secure Implementation
                https://www.truthinit.com/index.php/channel/1951/harnessing-ai-for-smaller-teams-strategies-for-secure-implementation/
              • 06/02/2026
                01:00 PM
                06/02/2026
                Spring of Satori: Delving into Recent Findings and 2026's Threat Landscape
                https://www.truthinit.com/index.php/channel/1930/spring-of-satori-delving-into-recent-findings-and-2026s-threat-landscape/
              • 06/16/2026
                07:00 AM
                06/16/2026
                Transforming Data Risk into Actionable Priorities: What Needs Fixing First?
                https://www.truthinit.com/index.php/channel/1952/transforming-data-risk-into-actionable-priorities-what-needs-fixing-first/
              • 06/25/2026
                05:00 AM
                06/25/2026
                Transition from Shadow AI to Regulated AI Access
                https://www.truthinit.com/index.php/channel/1975/transitioning-from-shadow-ai-to-regulated-ai-access-strategies/

              Upcoming Events

              • May
                20

                Establishing a Robust AI Governance Framework for GenAI Throughout the Deployment Lifecycle

                05/20/202608:00 AM ET
                • May
                  20

                  Establishing a Robust AI Governance Framework for GenAI Throughout Its Lifecycle

                  05/20/202610:00 PM ET
                  • May
                    21

                    Risk in Real Time Demo Series: The Autonomous Era - Orchestrating a Resilient Enterprise

                    05/21/202611:00 AM ET
                    • May
                      27

                      Rivoluziona i rischi dell'AI in opportunità con Netskope AI Security

                      05/27/202604:00 AM ET
                      • May
                        27

                        Adopting AI: From Illusion to Intentional Control

                        05/27/202610:00 AM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version