A Powerful Combination: Active Defense, the Bridge to Zero Trust
The end of May marked a monumental juncture for Zscaler as we continued to extend the Company’s cybersecurity reach with our intent to acquire Smokescreen Technologies, a leader in active defense technology.
This week, I am excited to report that the Smokescreen deal has closed, and we are proceeding to integrate its leading-edge active defense capabilities into the Zscaler Zero Trust Exchange. In contrast to traditional network traffic analysis tools, which are noisy and prone to false positives, active defense uses elaborate decoys and honeytraps to block the most sophisticated threats with high accuracy as attackers attempt to traverse corporate networks.
The appeal of active defense is how it turns the tables on would-be attackers. Security teams don’t have to hunt for network threats, rather the bad actors are lured to honeytraps, dramatically slowing their progression in order for security teams to quarantine the threats. While the ultimate answer is to migrate to a Zero Trust architecture thus eliminating the risk of network access, active defense is founded on the similar concept of trusting nothing and assumes that the network is already breached. This offers organizations a pragmatic path to Zero Trust and provides a simple, yet effective way for them to identify and remove attackers who may already be expanding laterally while compromising resources on the corporate network.
I invite you to learn more about Smokescreen’s active defense technology at Zenith Live 2021. The Zscaler ThreatLabZ experts will also share more in-depth research into emerging attacks, dissect recent attack chains, and provide clear guidance on how to better secure your enterprise from sophisticated threats targeting your software supply chain. You’ll also get an exclusive preview into Zscaler’s protection suite that unifies our threat intelligence, cybersecurity experts, and innovative technology to help defend your organization against the most advanced attackers.
Forward-Looking Statements
Blog posts on this site may contain forward-looking statements that are based on beliefs, assumptions and on information currently available to our management. These statements, including but not limited to statements relating to our products, customers, business development activities and business results, are subject to the safe harbor provisions created by the Private Securities Litigation Reform Act of 1995. You can identify these forward-looking statements by terminology such as “will,” “expects,” “believes,” “anticipates,” “intends,” “estimates” and similar statements. A significant number of factors could cause actual results to differ materially from statements made in blog posts on this site. Additional risks and uncertainties are set forth in our filings made with the Securities and Exchange Commission (“SEC”), which are available on our website at ir.zscaler.com and on the SEC's website at www.sec.gov. Any forward-looking statements in these blogs are based on the limited information currently available to Zscaler as of the date thereof, which is subject to change, and Zscaler will not necessarily update the information, even if new information becomes available in the future.
Jay, thanks for sharing!
Chief Technology Officer | Advisor to Fintech Startups | Board member | Public Speaker
3 年Congratulations
Entrepreneur, Private Investor, and Company Builder
3 年Congratulations Jay Chaudhry Sahir Hidayatullah Brad Thomas Active Defense is indeed the bridge to Zero Trust!
CXO Advisory: Cybersecurity Consulting and Delivery Leader @ TCS | Executive Core Commitee - Global Cybersecurity Association | VCISO | Speaker| Top 100 CISO Awards | Board of Studies-Meenakshi Sundararajan Engg. College
3 年congratulations Jay!
operator, client advocate, solver of challenges
3 年Roi Abutbul sure sounds familiar. What a trend!