Analytics
2/19/2014
11:48 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Zscaler and BT Deliver Real-Time Advanced Threat Detection

BT’s solution powered by Zscaler provides real-time detection and alerts for advanced threat monitoring and regulatory compliance

SAN JOSE, Calif., February,19th, 2014 – Zscaler, the global security cloud for the mobile enterprise and BT, one of the world's leading providers of communications services and solutions, today announced a joint solution to enable real-time advanced threat monitoring of the Zscaler Global Security Cloud via the BT Assure Threat Monitoring service.

The proliferation of cloud and mobile devices can introduce security risks that are not fully realized by organizations or their employees. This new enhancement to the BT Assure portfolio will help customers align business processes with security, delivering continuous coverage and threat intelligence while enabling the productivity benefits of BYOD and cloud initiatives.

The new solution seamlessly integrates Zscaler Web logs in real-time with BT Assure Threat Monitoring to provide advanced threat monitoring, security data analysis and regulatory compliance.

Mark Hughes, CEO, BT Security, said: "Global organizations are challenged to determine the root cause of data breaches by a lack of tools, time and skilled security analysts available to them to interpret the data. Additionally, the complexity of new technologies, including cloud applications, creates new vulnerabilities. This joint solution from BT and Zscaler provides a unified front against security risks, enabling organizations to focus on their core business."

Zscaler combines granular visibility, analytics and control with advanced threat protection from modern malware, including zero-day attacks and botnets, for any user on any device in any location, including complex cloud and mobile environments.

BT Assure Threat Monitoring provides advanced threat monitoring, security intelligence and analytics of Web logs. So the integrated service delivers unparalleled detection, alerting, reporting, log retention and analytics of advanced security threats and suspicious activity that may have otherwise gone unnoticed, enabling organizations to obtain a comprehensive view of enterprise environments and emerging threats in real time.

"As technology is increasingly commoditized, silos emerge that prevent organizations from realizing the full potential of individual point solutions," said Jay Chaudhry, CEO, Zscaler. "Collaboration between organizations such as BT and Zscaler enables enterprises to cross this chasm, aligning business processes with security to drive the next wave of innovation."

About BT BT is one of the world's leading providers of communications services and solutions, serving customers in more than 170 countries. Its principal activities include the provision of networked IT services globally; local, national and international telecommunications services to its customers for use at home, at work and on the move; broadband, TV and internet products and services; and converged fixed/mobile products and services. BT consists principally of four lines of business: BT Global Services, BT Retail, BT Wholesale and Openreach.

For the year ended 31 March 2013, BT Group's reported revenue was £18,103m with reported profit before taxation of £2,315m.

British Telecommunications plc (BT) is a wholly-owned subsidiary of BT Group plc and encompasses virtually all businesses and assets of the BT Group. BT Group plc is listed on stock exchanges in London and New York.

For more information, visit www.btplc.com

About Zscaler Zscaler is transforming enterprise networking and security with the world's largest Direct-to-Cloud Network, which securely enables the productivity benefits of cloud, mobile and social technologies without the cost and complexity of traditional on-premise appliances and software.

The Zscaler Direct-to-Cloud Network processes daily more than 12 billion transactions from more than 12 million users in 180 countries across 100 global data centers with near-zero latency. Learn why more than 4,500 global enterprises choose Zscaler to enable end-user productivity, enforce security policy and streamline WAN performance. Visit us at www.zscaler.com

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-0334
Published: 2014-10-31
Bundler before 1.7, when multiple top-level source lines are used, allows remote attackers to install arbitrary gems by creating a gem with the same name as another gem in a different source.

CVE-2014-2334
Published: 2014-10-31
Multiple cross-site scripting (XSS) vulnerabilities in the Web User Interface in Fortinet FortiAnalyzer before 5.0.7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-2336.

CVE-2014-2335
Published: 2014-10-31
Multiple cross-site scripting (XSS) vulnerabilities in the Web User Interface in Fortinet FortiManager before 5.0.7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-2336.

CVE-2014-2336
Published: 2014-10-31
Multiple cross-site scripting (XSS) vulnerabilities in the Web User Interface in Fortinet FortiManager before 5.0.7 and FortiAnalyzer before 5.0.7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-2334 and CVE-2014-2335.

CVE-2014-3366
Published: 2014-10-31
SQL injection vulnerability in the administrative web interface in Cisco Unified Communications Manager allows remote authenticated users to execute arbitrary SQL commands via a crafted response, aka Bug ID CSCup88089.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.