Zscaler Zero Trust SD Wan Datasheet

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

Data Sheet

Zscaler Zero Trust SD-WAN


Securely connect branches, factories and data centers and extend
zero trust security to servers and IoT/OT devices in any location.

Hybrid work and cloud transformation have upended


perimeter-based network and security models, with Zscaler Zero Trust SD-WAN:
private applications moving to the cloud and users
accessing applications over the public internet, on any • Enables zero trust everywhere for all users, devices,

device, from any location. servers, and IoT/OT, regardless of location

• Improves application performance by sending branch


In today’s landscape, many enterprises also leverage
traffic directly to the Zero Trust Exchange and trusted
IoT/OT devices across various locations—including application traffic directly across the internet with
branches, factories, and data centers—to streamline direct internet breakout
their operations. Additionally, a considerable number
• Prevents lateral threat movement: zero trust builds
of customers rely on server-to-client workload a foundation for secure connectivity that enables
communication. Traditional approaches that depend on east-west segmentation
legacy WANs, mesh VPNs, and firewalls to manage
• Eliminates the attack surface by connecting branches
application access have become ineffective in a world and data centers through Zero Trust Exchange
that prioritizes cloud and mobile technologies. independent of the underlying transport

However, as organizational requirements have evolved, • Enables shadow IoT device discovery and
classification with automatic device classification
legacy WAN solutions struggle to keep pace.
based on traffic profiles
SD-WAN presents various challenges, such as
limited security through network-based access, an • Simplifies secure access to OT resources with
clientless browser-based access to SSH/RDP/VNC
expansive attack surface, extensive lateral movement
ports on OT assets
privileges, and routing complexities. Layering on zero
trust principles to this network often requires adding • Enforces finely-grained forwarding policies for
internet and non-internet traffic using ZIA or ZPA
additional firewall appliances, adding cost
and complexity. • Introduces plug-and-play deployment: zero touch
provisioning (ZTP) simplifies deployment and reduces
time to integration

© 2023 Zscaler, Inc. All rights reserved.


SaaS Internet Public Cloud

Broadband Router

Client Connector

Data Center Campus / Factory Medium Branch Small Branch


Users, Servers and IoT/OT Users, IoT Users
Privileged remote access, no VPN Remote printing Café-like experience
SSH / RDP / VNC, Session Recording

Figure 1: Zero Trust SD-WAN

Zero Trust SD-WAN securely connects your branches, factories, and data centers without the complexity
of VPNs, ensuring zero trust access between users, IoT/OT devices, and applications based on
organizational policies.

Traditional SD-WAN is not Zero Trust

Organizations face several challenges when using legacy network and security architectures to connect a
branch to the internet or to their other applications in a public cloud or data center environment, including:

• Greater risk of lateral threats and internet-based attacks from using legacy, network-centric
connectivity solutions such as site-to-site VPNs, firewalls, or traditional SD-WANs. These solutions
overextend a customer’s trusted network across the internet to other clouds and on-premises
environments, increasing the attack surface. A patchwork of security appliances, tools, and non-
standard policies lead to increased security risk due to known and unknown gaps in security coverage.

© 2023 Zscaler, Inc. All rights reserved. Data Sheet 2


Figure 2: Greater risk of lateral threats and internet-based attacks with traditional SD-WANs

• Increased complexity due to complicated • Poor performance and scalability due to


routing, multiple network hops and appliances, the increasing number of network and
and fragmented policy management from security services within branch and data
introducing legacy models to the cloud. center environments, traffic hairpinning and
Managing this complexity is a difficult task for chokepoints for centralized security inspection
networking and security teams as they struggle and control.
to standardize connectivity and enforce security • High costs due to legacy network and security
policy across branch, cloud, and data centers. appliances (e.g., firewalls, IPS, routers, and
• Lack of visibility across branch, data center, other point products), overprovisioning of
and cloud connectivity paths, which creates network services to compensate for lack
network and security blind spots. of scalability, and increased use of cloud
native services.

© 2023 Zscaler, Inc. All rights reserved. Data Sheet 3


How Zero Trust SD-WAN works

Zero Trust SD-WAN enables organizations to build a thin branch by eliminating multiple products such as
routers, firewalls and VPNs with a simple plug-and-play device that can be deployed quickly using only an
internet connection. This allows organizations to reduce the complexity associated with managing multiple
devices and optimize the overall functionality of the branch. Zero Trust SD-WAN dramatically simplifies
branch communications with zero trust network overlay that allows for flexible forwarding and simple
policy management by using the proven ZIA and ZPA policy framework.

Branch traffic can be securely forwarded directly to the Zero Trust Exchange, where ZIA or ZPA
policies can be applied for full security inspection and access identity-based control of branch and data
center communications. Trusted application traffic can be sent directly across the internet with direct
internet breakout. This unique approach provides three key advantages:

• You move away from network-based site- no need for legacy products such as Squid
to-site VPN connectivity to identity and proxies, NAT gateways, IPSs and so on
application-based communication for true, • You provide distributed, scalable connectivity
zero trust security wherever it’s needed, with centralized,
• You eliminate a legacy castle-and-moat automated policy management to simplify
architecture without compromising security; branch and data center communications

Zero Trust SD-WAN use cases

Site-to-site VPN replacement quickly connect to private applications in another,


Connect branches directly to private applications without disruption.
without extending your WAN or relying on VPNs,
Direct internet access enablement for branches
both of which increase a network’s attack surface.
On-premises networking and security models
Applications are hidden from discovery behind the
become less effective as organizations migrate
branches, and access is restricted via the
their apps to the cloud and build cloud
Zero Trust Exchange to a set of named entities.
native apps. Zscaler Zero Trust SD-WAN is a
Identity, context, and policy adherence of the
purpose-built solution for branch transformation,
specified participants are all verified before access
ushering in a new model that enables branches to
is allowed, prohibiting lateral movement elsewhere
communicate with any destination securely and
in the network.
independently from the underlying network.
Mergers and acquisitions
Zero trust for server, IoT/OT connectivity
Merging two separate networks is challenging and
IoT/OT assets need to be regularly accessed by
time-consuming. Problems range from IP overlaps
employees and third-party vendors to maximize
and routing issues to increased security risk from
production uptime and avoid disruptions from
an enlarged network attack surface. With Zero
equipment and process failures.
Trust SD-WAN, networks can remain separate
and branch locations in one environment can

© 2023 Zscaler, Inc. All rights reserved. Data Sheet 4


Zero Trust SD-WAN for IoT/OT provides fully networks, and the result is an increase in device
isolated, clientless remote desktop access to vulnerability and a broader attack surface. Zscaler
RDP and SSH target systems—without having to identifies and classifies devices to give IT teams
install a client on their device using jump hosts deeper visibility into behavior for better access
and legacy VPNs. control policies.

Shadow IoT/OT discovery and visibility


IT teams face blind spots as unsanctioned,
undiscoverable devices connect to branch office

Z-Connector Plug & Play Appliances

FEATURE ZT 400 ZT 600 ZT 800 ZT VM

Small-Medium
Type Small-Medium branch Medium-Large branch Branch and Data Center
branches
Throughput/
200 Mbps 500 Mbps 1 Gbps KVM, ESXi
hypervisor

Physical ports 4x RJ45 GbE 6x RJ45 GbE 6x RJ45 GbE, 2x SFP N/A

Zero touch provisioning

Granular forwarding
policy for internet,
private applications,
and direct WAN traffic
Leverage URL filtering,
file type control & cloud
firewall policies for
internet bound traffic
Zero Trust ZPA policies
for IoT devices, servers

Centralized visibility
and logging

© 2023 Zscaler, Inc. All rights reserved. Data Sheet 5


ZSCALER ZERO TRUST SD-WAN CAPABILITIES

FEATURE DETAILS

Capabilities

Zero touch provisioning and • Zero touch provisioning with pre-defined templates
automated deployment • Fully automated deployment
• Dynamic discovery of branch office geo-location

Granular forwarding policy • Options to send the traffic to ZIA, ZPA, or Direct across the internet
for internet and private • Flexible traffic selection criteria location, sublocation, location group, 5 tuple, or FQDN
application traffic

Unified zero trust policies • Unified policy for user-to-application, IoT device-to-application, and server-to-server
through ZPA’s enhanced policy to include new client types
• Location and geo-based policies
• Security policy enablement that includes IPS, SSL proxy, URL filtering, and data protection
• Full security stack with posture configured for IoT/OT and servers

High availability • Two instances of Zero Trust SD-WAN operating in HA mode provide additional support for
traffic bursts and redundancy in case of a hardware failure
• Active-passive fault tolerance using a virtual IP address (VIP) based on common address
redundancy protocol (CARP)
• Active-active circuits (single appliance)
• Active-active circuits (dual appliance when balancing FHRP)

Centralized visibility • Centralized dashboard for device health and traffic monitoring
and granular logging • Available filtering for cloud, data center, and branch deployments
• Detailed logging of every session and transaction for all ports and protocols–including all
public and private DNS transactions
• Full integration with Nanolog Streaming Service infrastructure with option to stream logs to
customer owned SIEM

WAN interface termination • Dual ISP connectivity (Ethernet)


• Multi-homing with a single appliance

LAN interface management • Multiple L3 LAN Networks


• 802.1q/VLAN tagging support
• DHCP Server
• DNS gateway

On-device firewall policies • Granular access control for local LAN to LAN (east-west) traffic
• L3/L4 Access Control Lists (ACLs)

Application aware path • Dynamic path selection for mission-critical SaaS or private applications
selection • Intelligent Zscaler POP connectivity
• Built-in SLA monitoring and failover

Routing • Static routing

Zscaler Data Centers/POPs • Zscaler has built its cloud security platform in more than 150 data centers across the world –
strategically placed where customers are located
• Built-in availability with seamless failover to next available service PoP

About Zscaler © 2023 Zscaler, Inc. All rights reserved. Zscaler™,


Zero Trust Exchange™, Zscaler Internet Access™,
Zscaler (NASDAQ: ZS) accelerates digital transformation so that customers can be more agile, efficient, resilient, ZIA™, Zscaler Private Access™, ZPA™ and
and secure. The Zscaler Zero Trust Exchange protects thousands of customers from cyberattacks and data loss other trademarks listed at zscaler.com/legal/
trademarks are either (i) registered trademarks or
by securely connecting users, devices, and applications in any location. Distributed across more than 150 data service marks or (ii) trademarks or service marks
centers globally, the SSE-based Zero Trust Exchange is the world’s largest inline cloud security platform. of Zscaler, Inc. in the United States and/or other
countries. Any other trademarks are the properties
Learn more at zscaler.com or follow us on Twitter @zscaler.
of their respective owners.

+1 408.533.0288 Zscaler, Inc. (HQ) • 120 Holger Way • San Jose, CA 95134 zscaler.com

You might also like