Analytics
2/19/2014
11:48 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Zscaler and BT Deliver Real-Time Advanced Threat Detection

BT’s solution powered by Zscaler provides real-time detection and alerts for advanced threat monitoring and regulatory compliance

SAN JOSE, Calif., February,19th, 2014 – Zscaler, the global security cloud for the mobile enterprise and BT, one of the world's leading providers of communications services and solutions, today announced a joint solution to enable real-time advanced threat monitoring of the Zscaler Global Security Cloud via the BT Assure Threat Monitoring service.

The proliferation of cloud and mobile devices can introduce security risks that are not fully realized by organizations or their employees. This new enhancement to the BT Assure portfolio will help customers align business processes with security, delivering continuous coverage and threat intelligence while enabling the productivity benefits of BYOD and cloud initiatives.

The new solution seamlessly integrates Zscaler Web logs in real-time with BT Assure Threat Monitoring to provide advanced threat monitoring, security data analysis and regulatory compliance.

Mark Hughes, CEO, BT Security, said: "Global organizations are challenged to determine the root cause of data breaches by a lack of tools, time and skilled security analysts available to them to interpret the data. Additionally, the complexity of new technologies, including cloud applications, creates new vulnerabilities. This joint solution from BT and Zscaler provides a unified front against security risks, enabling organizations to focus on their core business."

Zscaler combines granular visibility, analytics and control with advanced threat protection from modern malware, including zero-day attacks and botnets, for any user on any device in any location, including complex cloud and mobile environments.

BT Assure Threat Monitoring provides advanced threat monitoring, security intelligence and analytics of Web logs. So the integrated service delivers unparalleled detection, alerting, reporting, log retention and analytics of advanced security threats and suspicious activity that may have otherwise gone unnoticed, enabling organizations to obtain a comprehensive view of enterprise environments and emerging threats in real time.

"As technology is increasingly commoditized, silos emerge that prevent organizations from realizing the full potential of individual point solutions," said Jay Chaudhry, CEO, Zscaler. "Collaboration between organizations such as BT and Zscaler enables enterprises to cross this chasm, aligning business processes with security to drive the next wave of innovation."

About BT BT is one of the world's leading providers of communications services and solutions, serving customers in more than 170 countries. Its principal activities include the provision of networked IT services globally; local, national and international telecommunications services to its customers for use at home, at work and on the move; broadband, TV and internet products and services; and converged fixed/mobile products and services. BT consists principally of four lines of business: BT Global Services, BT Retail, BT Wholesale and Openreach.

For the year ended 31 March 2013, BT Group's reported revenue was £18,103m with reported profit before taxation of £2,315m.

British Telecommunications plc (BT) is a wholly-owned subsidiary of BT Group plc and encompasses virtually all businesses and assets of the BT Group. BT Group plc is listed on stock exchanges in London and New York.

For more information, visit www.btplc.com

About Zscaler Zscaler is transforming enterprise networking and security with the world's largest Direct-to-Cloud Network, which securely enables the productivity benefits of cloud, mobile and social technologies without the cost and complexity of traditional on-premise appliances and software.

The Zscaler Direct-to-Cloud Network processes daily more than 12 billion transactions from more than 12 million users in 180 countries across 100 global data centers with near-zero latency. Learn why more than 4,500 global enterprises choose Zscaler to enable end-user productivity, enforce security policy and streamline WAN performance. Visit us at www.zscaler.com

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-4725
Published: 2014-07-27
The MailPoet Newsletters (wysija-newsletters) plugin before 2.6.7 for WordPress allows remote attackers to bypass authentication and execute arbitrary PHP code by uploading a crafted theme using wp-admin/admin-post.php and accessing the theme in wp-content/uploads/wysija/themes/mailp/.

CVE-2014-4726
Published: 2014-07-27
Unspecified vulnerability in the MailPoet Newsletters (wysija-newsletters) plugin before 2.6.8 for WordPress has unspecified impact and attack vectors.

CVE-2014-2363
Published: 2014-07-26
Morpho Itemiser 3 8.17 has hardcoded administrative credentials, which makes it easier for remote attackers to obtain access via a login request.

CVE-2014-2625
Published: 2014-07-26
Directory traversal vulnerability in the storedNtxFile function in HP Network Virtualization 8.6 (aka Shunra Network Virtualization) allows remote attackers to read arbitrary files via crafted input, aka ZDI-CAN-2023.

CVE-2014-2626
Published: 2014-07-26
Directory traversal vulnerability in the toServerObject function in HP Network Virtualization 8.6 (aka Shunra Network Virtualization) allows remote attackers to create files, and consequently execute arbitrary code, via crafted input, aka ZDI-CAN-2024.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.