Zscaler Airgap: True Zero Trust Microsegmentation

  Рет қаралды 5,401

Zscaler Inc.

Zscaler Inc.

Күн бұрын

Discover how the Airgap agentless architecture ensures comprehensive safeguarding for vital business infrastructure through meticulous transaction authorization and endpoint segmentation. Enhance compliance, mitigate risks, and elevate machine uptime significantly, all while benefiting from extensive visibility in both east-west and north-south directions.

Пікірлер: 5
@adamwhite3811
@adamwhite3811 4 күн бұрын
I really dont understand the /32 and how this connects. If the host needs to get somewhere, and it is not seen as the same segment, then it needs to look at its routing table, will arp for the next hop and send the traffic. In this case, the zscaler is not on the same segment, so how does this work? What does it arp for? how does it send the packet there through the OSI stack? It still needs some kind of reachability. My only guess is that there is some proxying or tunneling of the traffic and the /32 is not really a /32, but isolated through some mechanism from talking to anything but the zscaler device. Would be nice to not have to guess, and actually, you know, have it explained, would take less than a minute. Also since someone else was nitpicking, I might as well do it too. If you are going to draw networking symbols, drawing a core with a traditional router picture, that implies L3, that firewall hanging off is all but useless
@mgortega17
@mgortega17 Ай бұрын
1:58 "Firewalls do a really good job of...what? Like that...north to south segmentation, but the east to west story has been a little bit trickier." After he just drew out the typical datacenter architecture (with users and OT in it? What kind of datacenter is this?) and placed a firewall segmenting the (2) VLANs in his example (by assigning the FW with a VLAN interface for each segment)...which would 100% instinctively do east west inspection. How is that tricky? How about this as the intro: "Zscaler does a really good job of...what? Like that...northbound inspection, but there hasn't really been an east to west story for us." I think that would be a more accurate statement. Another accurate statement @4:46..."I'm not a network guy". Truth. Maybe Airgap will help you be better networking guys/gals over there at Zscaler. Up until now, the network has always been pretty irrelevant for Zscaler (marketing).
@RbNetEngr
@RbNetEngr Ай бұрын
A few comments: 1. You did not provide any real details here. You imply that the ZScaler Airgap ‘client’ locks down each individual host, and the Airgap box (physical or virtual) manages the policy to lock down each host. But you didn’t provide enough details here. 2. Unlike NSX, which applies policy to the virtual NIC shim that is not part of the VM, Airgap looks to be installed on the hosts. So, what would stop a bad actor from disabling or removing Airgap from that host? 3. Nitpick. You started out by drawing the Core of what you said was a Data Center, and the first thing you drew was a User VLAN. Generally, user VLANs are out in the campus, or branch locations, and NOT in the Data Center. So, does the Airgap solution ONLY apply to Data Centers (as a replacement for functionality provided by NSX or similar), or is it also something that could/would be deployed on a campus or branch network as well? 4. If this IS a solution for Data Center, Campus and Branch/Remote Office networks, does each location need a LOCAL ZScaler Airgap “policy box” to manage policy? Or would a smaller number of distributed or centralized “policy boxes” be deployed to manage policy for remote networks? And if the “policy boxes” are remote, what happens to policy enforcement and application if the Airgap-equipped hosts lose communication with the “policy boxes”?
@routeypackets2842
@routeypackets2842 28 күн бұрын
So it appears to be a router on a stick, but still sharing the same broadcast domain? There aren't really details here but I'm trying to understand how you are truly isolating the clients on a same VLAN from each other, it can't just be at a layer 3 level, you blocking ARP's etc? They running clients? Just changing a host to a /32 would certainly contain that host but what about misconfiguration or bad actors also attached to that VLAN?
@Ruchikun
@Ruchikun 8 күн бұрын
I mean. Zscaler pretends it's not just vpn/firewalling but in the end... Everyone relies on the same basic tech :p private vlans have been a thing for aaaaaages
The Zscaler Tech Sessions: Seven Elements of Zero Trust
20:22
Zscaler Inc.
Рет қаралды 10 М.
Subnet Mask - Explained
17:55
PowerCert Animated Videos
Рет қаралды 2,6 МЛН
Неприятная Встреча На Мосту - Полярная звезда #shorts
00:59
Полярная звезда - Kuzey Yıldızı
Рет қаралды 2 МЛН
$10,000 Every Day You Survive In The Wilderness
26:44
MrBeast
Рет қаралды 138 МЛН
Василиса наняла личного массажиста 😂 #shorts
00:22
Денис Кукояка
Рет қаралды 6 МЛН
Hyperconvergence - Simple Is Beautiful
14:09
Tech Enthusiast
Рет қаралды 141 М.
Zscaler + Crowdstrike Partnership
11:44
Zscaler Inc.
Рет қаралды 1,6 М.
Zscaler - SASE (ZTNA) - Season 2 - Episode 5
44:13
Security Architecture Podcast
Рет қаралды 3,2 М.
Implementing Zero Trust Architecture: A Step-by-Step Guide Part 1
37:45
STOP using VPN, embrace Zero-Trust networking!
24:11
Christian Lempa
Рет қаралды 88 М.
Zscaler Data Protection Platform with Brian Deitch
12:02
Zscaler Inc.
Рет қаралды 4,8 М.
Cybersecurity Architecture: Networks
27:31
IBM Technology
Рет қаралды 95 М.
Why Implement Zero Trust
6:57
IBM Technology
Рет қаралды 29 М.
Zscaler for Users Demo
25:24
Zscaler Inc.
Рет қаралды 45 М.
TOP-18 ФИШЕК iOS 18
17:09
Wylsacom
Рет қаралды 785 М.
Apple watch hidden camera
0:34
_vector_
Рет қаралды 63 МЛН
МОЩНЕЕ ТВОЕГО ПК - iPad Pro M4 (feat. Brickspacer)
28:01
ЗЕ МАККЕРС
Рет қаралды 82 М.
DC Fast 🏃‍♂️ Mobile 📱 Charger
0:42
Tech Official
Рет қаралды 484 М.