Analytics
2/19/2014
11:48 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Zscaler and BT Deliver Real-Time Advanced Threat Detection

BT’s solution powered by Zscaler provides real-time detection and alerts for advanced threat monitoring and regulatory compliance

SAN JOSE, Calif., February,19th, 2014 – Zscaler, the global security cloud for the mobile enterprise and BT, one of the world's leading providers of communications services and solutions, today announced a joint solution to enable real-time advanced threat monitoring of the Zscaler Global Security Cloud via the BT Assure Threat Monitoring service.

The proliferation of cloud and mobile devices can introduce security risks that are not fully realized by organizations or their employees. This new enhancement to the BT Assure portfolio will help customers align business processes with security, delivering continuous coverage and threat intelligence while enabling the productivity benefits of BYOD and cloud initiatives.

The new solution seamlessly integrates Zscaler Web logs in real-time with BT Assure Threat Monitoring to provide advanced threat monitoring, security data analysis and regulatory compliance.

Mark Hughes, CEO, BT Security, said: "Global organizations are challenged to determine the root cause of data breaches by a lack of tools, time and skilled security analysts available to them to interpret the data. Additionally, the complexity of new technologies, including cloud applications, creates new vulnerabilities. This joint solution from BT and Zscaler provides a unified front against security risks, enabling organizations to focus on their core business."

Zscaler combines granular visibility, analytics and control with advanced threat protection from modern malware, including zero-day attacks and botnets, for any user on any device in any location, including complex cloud and mobile environments.

BT Assure Threat Monitoring provides advanced threat monitoring, security intelligence and analytics of Web logs. So the integrated service delivers unparalleled detection, alerting, reporting, log retention and analytics of advanced security threats and suspicious activity that may have otherwise gone unnoticed, enabling organizations to obtain a comprehensive view of enterprise environments and emerging threats in real time.

"As technology is increasingly commoditized, silos emerge that prevent organizations from realizing the full potential of individual point solutions," said Jay Chaudhry, CEO, Zscaler. "Collaboration between organizations such as BT and Zscaler enables enterprises to cross this chasm, aligning business processes with security to drive the next wave of innovation."

About BT BT is one of the world's leading providers of communications services and solutions, serving customers in more than 170 countries. Its principal activities include the provision of networked IT services globally; local, national and international telecommunications services to its customers for use at home, at work and on the move; broadband, TV and internet products and services; and converged fixed/mobile products and services. BT consists principally of four lines of business: BT Global Services, BT Retail, BT Wholesale and Openreach.

For the year ended 31 March 2013, BT Group's reported revenue was £18,103m with reported profit before taxation of £2,315m.

British Telecommunications plc (BT) is a wholly-owned subsidiary of BT Group plc and encompasses virtually all businesses and assets of the BT Group. BT Group plc is listed on stock exchanges in London and New York.

For more information, visit www.btplc.com

About Zscaler Zscaler is transforming enterprise networking and security with the world's largest Direct-to-Cloud Network, which securely enables the productivity benefits of cloud, mobile and social technologies without the cost and complexity of traditional on-premise appliances and software.

The Zscaler Direct-to-Cloud Network processes daily more than 12 billion transactions from more than 12 million users in 180 countries across 100 global data centers with near-zero latency. Learn why more than 4,500 global enterprises choose Zscaler to enable end-user productivity, enforce security policy and streamline WAN performance. Visit us at www.zscaler.com

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0607
Published: 2014-07-24
Unrestricted file upload vulnerability in Attachmate Verastream Process Designer (VPD) before R6 SP1 Hotfix 1 allows remote attackers to execute arbitrary code by uploading and launching an executable file.

CVE-2014-1419
Published: 2014-07-24
Race condition in the power policy functions in policy-funcs in acpi-support before 0.142 allows local users to gain privileges via unspecified vectors.

CVE-2014-2360
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules allow remote attackers to execute arbitrary code via packets that report a high battery voltage.

CVE-2014-2361
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules, when BreeZ is used, do not require authentication for reading the site security key, which allows physically proximate attackers to spoof communication by obtaining this key after use of direct hardware access or manual-setup mode.

CVE-2014-2362
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules rely exclusively on a time value for entropy in key generation, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by predicting the time of project creation.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.