Zscaler Zero Trust SD Wan Datasheet
Zscaler Zero Trust SD Wan Datasheet
Zscaler Zero Trust SD Wan Datasheet
However, as organizational requirements have evolved, • Enables shadow IoT device discovery and
classification with automatic device classification
legacy WAN solutions struggle to keep pace.
based on traffic profiles
SD-WAN presents various challenges, such as
limited security through network-based access, an • Simplifies secure access to OT resources with
clientless browser-based access to SSH/RDP/VNC
expansive attack surface, extensive lateral movement
ports on OT assets
privileges, and routing complexities. Layering on zero
trust principles to this network often requires adding • Enforces finely-grained forwarding policies for
internet and non-internet traffic using ZIA or ZPA
additional firewall appliances, adding cost
and complexity. • Introduces plug-and-play deployment: zero touch
provisioning (ZTP) simplifies deployment and reduces
time to integration
Broadband Router
Client Connector
Zero Trust SD-WAN securely connects your branches, factories, and data centers without the complexity
of VPNs, ensuring zero trust access between users, IoT/OT devices, and applications based on
organizational policies.
Organizations face several challenges when using legacy network and security architectures to connect a
branch to the internet or to their other applications in a public cloud or data center environment, including:
• Greater risk of lateral threats and internet-based attacks from using legacy, network-centric
connectivity solutions such as site-to-site VPNs, firewalls, or traditional SD-WANs. These solutions
overextend a customer’s trusted network across the internet to other clouds and on-premises
environments, increasing the attack surface. A patchwork of security appliances, tools, and non-
standard policies lead to increased security risk due to known and unknown gaps in security coverage.
Zero Trust SD-WAN enables organizations to build a thin branch by eliminating multiple products such as
routers, firewalls and VPNs with a simple plug-and-play device that can be deployed quickly using only an
internet connection. This allows organizations to reduce the complexity associated with managing multiple
devices and optimize the overall functionality of the branch. Zero Trust SD-WAN dramatically simplifies
branch communications with zero trust network overlay that allows for flexible forwarding and simple
policy management by using the proven ZIA and ZPA policy framework.
Branch traffic can be securely forwarded directly to the Zero Trust Exchange, where ZIA or ZPA
policies can be applied for full security inspection and access identity-based control of branch and data
center communications. Trusted application traffic can be sent directly across the internet with direct
internet breakout. This unique approach provides three key advantages:
• You move away from network-based site- no need for legacy products such as Squid
to-site VPN connectivity to identity and proxies, NAT gateways, IPSs and so on
application-based communication for true, • You provide distributed, scalable connectivity
zero trust security wherever it’s needed, with centralized,
• You eliminate a legacy castle-and-moat automated policy management to simplify
architecture without compromising security; branch and data center communications
Small-Medium
Type Small-Medium branch Medium-Large branch Branch and Data Center
branches
Throughput/
200 Mbps 500 Mbps 1 Gbps KVM, ESXi
hypervisor
Physical ports 4x RJ45 GbE 6x RJ45 GbE 6x RJ45 GbE, 2x SFP N/A
Granular forwarding
policy for internet,
private applications,
and direct WAN traffic
Leverage URL filtering,
file type control & cloud
firewall policies for
internet bound traffic
Zero Trust ZPA policies
for IoT devices, servers
Centralized visibility
and logging
FEATURE DETAILS
Capabilities
Zero touch provisioning and • Zero touch provisioning with pre-defined templates
automated deployment • Fully automated deployment
• Dynamic discovery of branch office geo-location
Granular forwarding policy • Options to send the traffic to ZIA, ZPA, or Direct across the internet
for internet and private • Flexible traffic selection criteria location, sublocation, location group, 5 tuple, or FQDN
application traffic
Unified zero trust policies • Unified policy for user-to-application, IoT device-to-application, and server-to-server
through ZPA’s enhanced policy to include new client types
• Location and geo-based policies
• Security policy enablement that includes IPS, SSL proxy, URL filtering, and data protection
• Full security stack with posture configured for IoT/OT and servers
High availability • Two instances of Zero Trust SD-WAN operating in HA mode provide additional support for
traffic bursts and redundancy in case of a hardware failure
• Active-passive fault tolerance using a virtual IP address (VIP) based on common address
redundancy protocol (CARP)
• Active-active circuits (single appliance)
• Active-active circuits (dual appliance when balancing FHRP)
Centralized visibility • Centralized dashboard for device health and traffic monitoring
and granular logging • Available filtering for cloud, data center, and branch deployments
• Detailed logging of every session and transaction for all ports and protocols–including all
public and private DNS transactions
• Full integration with Nanolog Streaming Service infrastructure with option to stream logs to
customer owned SIEM
On-device firewall policies • Granular access control for local LAN to LAN (east-west) traffic
• L3/L4 Access Control Lists (ACLs)
Application aware path • Dynamic path selection for mission-critical SaaS or private applications
selection • Intelligent Zscaler POP connectivity
• Built-in SLA monitoring and failover
Zscaler Data Centers/POPs • Zscaler has built its cloud security platform in more than 150 data centers across the world –
strategically placed where customers are located
• Built-in availability with seamless failover to next available service PoP
+1 408.533.0288 Zscaler, Inc. (HQ) • 120 Holger Way • San Jose, CA 95134 zscaler.com