SSL Inspection

With Zscaler, you’ll multiply your security
not the number of your appliances.

A majority of global network Internet traffic is now encrypted with SSL, with some estimates suggesting up to 80% by the end of 2016. This shift is leaving organizations vulnerable to some of the most serious threats. In fact, we found that over 54% of the malware we discovered was hidden behind SSL, which we blocked. Did you? Zscaler sits between users and the Internet, inspecting every byte of traffic—even if it’s encrypted or compressed—so we can catch hidden threats before they get into your network.
Stop SSL-encrypted threats flying under the radar. Without going over your budget. Request A Demo

Can you inspect SSL-encrypted
traffic for all users? Hackers are
betting you can’t.

As the overall percentage of encrypted traffic explodes, it is becoming vital to do SSL inspection to ensure security. Hackers are increasingly using SSL to conceal device infections, shroud data exfiltration, and hide botnet Command & Control communications. Firewalls were not designed to handle decryption, and performance grinds to a halt when they try. Dedicated appliances are extremely costly. And ignoring the issue is becoming increasingly dangerous.

While the technology is the same for all vendors, only Zscaler’s high-performance architecture enables it at scale, without latency. Zscaler’s cloud security platform is built on a proxy architecture—long understood as the best way to handle SSL inspection. Unlike firewalls, Zscaler SSL inspection is built in, not bolt on, so there’s no hardware to buy, no software to install, and no infrastructure to maintain. Your users won’t see a performance hit, regardless of where they are or what devices they are using. And you’ll get the benefit of Zscaler’s “cloud effect,” which means that once we identify a threat across any of our 15 million users, we propagate protection across all 15 million users. You’ll be able to stop threats before they hit your network, stop botnet connections, and remediate infected devices before they wreak havoc.

Zscaler makes it easy to comply with regulations by
inspecting all SSL-encrypted traffic

Prove your compliance to auditors in just a few clicks,
while protecting your users’ privacy.
Privacy Controls
Privacy Controls
By Location
By Location
For all users, including mobile users
For all users, including mobile users
zscaler ssl inspection policy panel

Use your own PKI for SSL inspection

In addition to the Zscaler root CA, customers can deploy a self-signed Intermediate CA for SSL inspection. Customers can also refresh Intermediate CA at periodic intervals with an API for enhanced certificate security.

Benefits

An elastic solution
you don’t have to worry about growing volume of encryption. Just point your traffic at Zscaler, and we’ll see it all.
A constantly updated infrastructure
we’ll take care of ensuring that the solution works with the latest keys and encryption schemes.
Transparent to you
and to your users—the only ones who will know you’re using Zscaler are the hackers!
Full SSL inspection
Full SSL inspection for all users across all devices—including mobile and BYOD.
The Zscaler difference
You can select types of traffic that you do not wish to inspect—such as financial or healthcare connections—that you do not inspect, to maintain privacy.
The Zscaler difference
With Zscaler, you will no longer be blind to over 54% of threats.
Learn how Zscaler can protect your organization Request A Demo

ZSCALER’S INTEGRATED SECURITY FUNCTIONS WORK TOGETHER IN REAL TIME, PROVIDING COMPREHENSIVE PROTECTION

Find hidden threats and prevent data loss with SSL inspection.

ACCESS CONTROL

  • CLOUD FIREWALL

  • URL FILTERING

  • BANDWIDTH CONTROL

  • DNS FILTERING

THREAT PREVENTION

  • ADVANCED PROTECTION

  • CLOUD SANDBOX

  • ANTI-VIRUS

  • DNS SECURITY

DATA PROTECTION

  • DATA LOSS PREVENTION

  • CLOUD APPS (CASB)

  • FILE TYPE CONTROLS

POWERED BY PATENTED TECHNOLOGIES

SSMATM

All security engines fire with each content scan – only microsecond delay

ByteScanTM

Each outbound/inboud byte scanned, native SSL scanning

PageRiskTM

Risk of each object computed inline, dynamically

NanologTM

50:1 compression, real time global log consolidation

PolicyNowTM

Polices follow the user for same on-premise, off-premise protection
Interested in seeing how awesome Z Services can be for your business? Request A Demo