Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

8/13/2008
08:45 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Startup Of The Week: Zscaler

Promising to replace a hodgepodge of security applications and appliances, entrepreneur Jay Chaudhry's new company offers security as a service.

Cloud computing gets knocked for being inherently insecure--after all, your corporate data is stored outside the firewall--but serial entrepreneur Jay Chaudhry is turning that logic on its head. Chaudhry's new company, Zscaler, has just launched security as a service, an alternative to on-premises security software and appliances.
--John Foley

ZSCALER


Jay Chaudhry, founder and CEO

Cloud security is at an "inflection point," says Chaudhry

HEADQUARTERS: Santa Clara, Calif.

PRODUCTS: Web filtering, antivirus, and other IT security functions offered as an online service

PRINCIPALS: Jay Chaudhry, founder and CEO; K. Kailash, founder and CTO

INVESTORS: Private investors

EARLY CUSTOMERS: Hinda Incentives, Weather Channel


BREAKING CONVENTION
Enterprise security typically has involved a range of applications and appliances (firewalls, gateways, network access control, VPNs) for establishing a secure perimeter, with scanning tools (antivirus, anti-spyware) for any malware or intruders that get through. Zscaler eliminates the need for some of that gear by routing traffic through its own security infrastructure.

SECRET SAUCE
Two key elements of Zscaler's distributed, multitenant architecture are the company's Single-Scan, Multi-Action gateways and NanoLog log-reduction technology. SSMA minimizes latency as Zscaler's various applications filter traffic, while NanoLog compresses Web log size as much as 50 times. Together, they bring speed and scalability to the process of applying a company's IT policies to incoming and outgoing Web traffic. Zscaler functionality comes in four modules: Secure, Manage, Comply, and Analyze.

THE THREATS
Zscaler's service addresses threats posed by "user-initiated" Internet access, including viruses, spyware, bots, phishing, and peer-to-peer networks. It also offers URL filtering to block access to prohibited sites and manage access to social networking, blogging, and other Web 2.0 sites and applications. Zscaler protects against data leakage and supports IT policy compliance by monitoring HTTP traffic. Monthly subscription fees range from $1 to $5 per user, depending on services used.

BRAIN TRUST
Chaudhry has started a half-dozen companies, including AirDefense, CipherTrust, and SecureIT. Kailash, who also worked at AirDefense and CipherTrust, began his career at Wipro when it was a startup.

TIMELINE
Timeline Chart

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/21/2020
Cybersecurity Bounces Back, but Talent Still Absent
Simone Petrella, Chief Executive Officer, CyberVista,  9/16/2020
Meet the Computer Scientist Who Helped Push for Paper Ballots
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/16/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Latest Comment: Exactly
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-4590
PUBLISHED: 2020-09-21
IBM WebSphere Application Server Liberty 17.0.0.3 through 20.0.0.9 running oauth-2.0 or openidConnectServer-1.0 server features is vulnerable to a denial of service attack conducted by an authenticated client. IBM X-Force ID: 184650.
CVE-2020-4731
PUBLISHED: 2020-09-21
IBM Aspera Web Application 1.9.14 PL1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 188055.
CVE-2020-4315
PUBLISHED: 2020-09-21
IBM Business Automation Content Analyzer on Cloud 1.0 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the i...
CVE-2020-4579
PUBLISHED: 2020-09-21
IBM DataPower Gateway 2018.4.1.0 through 2018.4.1.12 could allow a remote attacker to cause a denial of service by sending a specially crafted HTTP/2 request with invalid characters. IBM X-Force ID: 184438.
CVE-2020-4580
PUBLISHED: 2020-09-21
IBM DataPower Gateway 2018.4.1.0 through 2018.4.1.12 could allow a remote attacker to cause a denial of service by sending a specially crafted a JSON request with invalid characters. IBM X-Force ID: 184439.