Analytics
2/19/2014
11:48 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Zscaler and BT Deliver Real-Time Advanced Threat Detection

BT’s solution powered by Zscaler provides real-time detection and alerts for advanced threat monitoring and regulatory compliance

SAN JOSE, Calif., February,19th, 2014 – Zscaler, the global security cloud for the mobile enterprise and BT, one of the world's leading providers of communications services and solutions, today announced a joint solution to enable real-time advanced threat monitoring of the Zscaler Global Security Cloud via the BT Assure Threat Monitoring service.

The proliferation of cloud and mobile devices can introduce security risks that are not fully realized by organizations or their employees. This new enhancement to the BT Assure portfolio will help customers align business processes with security, delivering continuous coverage and threat intelligence while enabling the productivity benefits of BYOD and cloud initiatives.

The new solution seamlessly integrates Zscaler Web logs in real-time with BT Assure Threat Monitoring to provide advanced threat monitoring, security data analysis and regulatory compliance.

Mark Hughes, CEO, BT Security, said: "Global organizations are challenged to determine the root cause of data breaches by a lack of tools, time and skilled security analysts available to them to interpret the data. Additionally, the complexity of new technologies, including cloud applications, creates new vulnerabilities. This joint solution from BT and Zscaler provides a unified front against security risks, enabling organizations to focus on their core business."

Zscaler combines granular visibility, analytics and control with advanced threat protection from modern malware, including zero-day attacks and botnets, for any user on any device in any location, including complex cloud and mobile environments.

BT Assure Threat Monitoring provides advanced threat monitoring, security intelligence and analytics of Web logs. So the integrated service delivers unparalleled detection, alerting, reporting, log retention and analytics of advanced security threats and suspicious activity that may have otherwise gone unnoticed, enabling organizations to obtain a comprehensive view of enterprise environments and emerging threats in real time.

"As technology is increasingly commoditized, silos emerge that prevent organizations from realizing the full potential of individual point solutions," said Jay Chaudhry, CEO, Zscaler. "Collaboration between organizations such as BT and Zscaler enables enterprises to cross this chasm, aligning business processes with security to drive the next wave of innovation."

About BT BT is one of the world's leading providers of communications services and solutions, serving customers in more than 170 countries. Its principal activities include the provision of networked IT services globally; local, national and international telecommunications services to its customers for use at home, at work and on the move; broadband, TV and internet products and services; and converged fixed/mobile products and services. BT consists principally of four lines of business: BT Global Services, BT Retail, BT Wholesale and Openreach.

For the year ended 31 March 2013, BT Group's reported revenue was £18,103m with reported profit before taxation of £2,315m.

British Telecommunications plc (BT) is a wholly-owned subsidiary of BT Group plc and encompasses virtually all businesses and assets of the BT Group. BT Group plc is listed on stock exchanges in London and New York.

For more information, visit www.btplc.com

About Zscaler Zscaler is transforming enterprise networking and security with the world's largest Direct-to-Cloud Network, which securely enables the productivity benefits of cloud, mobile and social technologies without the cost and complexity of traditional on-premise appliances and software.

The Zscaler Direct-to-Cloud Network processes daily more than 12 billion transactions from more than 12 million users in 180 countries across 100 global data centers with near-zero latency. Learn why more than 4,500 global enterprises choose Zscaler to enable end-user productivity, enforce security policy and streamline WAN performance. Visit us at www.zscaler.com

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-9676
Published: 2015-02-27
The seg_write_packet function in libavformat/segment.c in ffmpeg 2.1.4 and earlier does not free the correct memory location, which allows remote attackers to cause a denial of service ("invalid memory handler") and possibly execute arbitrary code via a crafted video that triggers a use after free.

CVE-2014-9682
Published: 2015-02-27
The dns-sync module before 0.1.1 for node.js allows context-dependent attackers to execute arbitrary commands via shell metacharacters in the first argument to the resolve API function.

CVE-2015-0655
Published: 2015-02-27
Cross-site scripting (XSS) vulnerability in Unified Web Interaction Manager in Cisco Unified Web and E-Mail Interaction Manager allows remote attackers to inject arbitrary web script or HTML via vectors related to a POST request, aka Bug ID CSCus74184.

CVE-2015-0884
Published: 2015-02-27
Unquoted Windows search path vulnerability in Toshiba Bluetooth Stack for Windows before 9.10.32(T) and Service Station before 2.2.14 allows local users to gain privileges via a Trojan horse application with a name composed of an initial substring of a path that contains a space character.

CVE-2015-0885
Published: 2015-02-27
checkpw 1.02 and earlier allows remote attackers to cause a denial of service (infinite loop) via a -- (dash dash) in a username.

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.