Zero Trust Insights
Filter by Content Types
- No options
116 results found
Accelerate Zero Trust Adoption with ExtraHop RevealX
ExtraHop RevealX provides continuous telemetry, deep protocol‑level visibility, and automated analytics to power your zero trust adoption.
Blog
•Nov 18, 2025
Zero Trust Principles
Not just a single solution, a zero trust implementation is an integrated approach for continuous validation of authorized users across your entire organization. A zero trust security framework focuses on protecting critical assets through a layered, continuously monitored and adaptable architecture that minimizes risks and containment in case of breaches.
Blog
•Nov 18, 2025
SASE Architecture: Cisco Viptela SD-WAN With Zscaler (SSE) Lab
Secure Access Service Edge (SASE), coined by Gartner in 2019, is a solution that blends networking and security into cloud scale architecture that optimizes end user performance and improves security for an organization. With the Zscaler and SD-WAN integration, you can rapidly gain access to cloud-delivered security in minutes. This market leading API automation makes it very fast and agile to deploy and manage the network and security environment of hundreds or even thousands of remote sites.
Advanced Configuration Lab
•440 launches
When AI Starts to Act on Its Own, Who's in Control?
As artificial intelligence moves from prediction to action, a new security frontier is taking shape. In this episode, Zscaler's Head of AI Innovation Phil Tee and WWT's VP of Global Cyber Chris Konrad explore the rise of autonomous agents, the evolution of Zero Trust and what it means to secure AI itself. From poisoned prompts to quantum threats, they warn the biggest risk isn't just deploying AI — it's trusting it. A sharp, real-world look at how enterprises can protect their future as machines begin to make decisions of their own.
Video
•0:57
•Nov 5, 2025
Zscaler - Zero Trust Branch (ZTB) and Airgap
Zscaler, the leader in cloud security, brings together several of their technologies in their Zero Trust Exchange to implement, improve, and bolster your zero trust architecture (ZTA) within your organization. Utilizing their Zero Trust Exchange at the core of their technologies, it weave together secure internet access with Zscaler Internet Access (ZIA), private network access using Zscaler Private Access (ZPA) eliminating the need for traditional VPNs, data loss protection (DLP) and cloud access security broker (CASB) incorporated in Zscaler Data Protection, and network segmentation implementing Zscaler Airgap - their agentless micro-segmentation technology, all to reduce your attack surface and combining this all into a single enhanced platform. In this learning path, we are going to focus on our Zero Trust Branch and Airgap technologies and how they can together, improve your ZTA.
Learning Path
Zscaler Zero Trust Branch - Branch Connector and Airgap
In this lab, we will look at how the Zscaler Zero Trust Exchange unifies our ability to deploy a zero trust methodology. First we will take you on a tour of the working consoles that relate to Zscaler Branch Connector and Airgap technologies. We will view all the policies and rule sets that make up the Zscaler Internet Access and Zscaler Private Access giving our organization granular control over user and device access both internally (East-West traffic) and externally (North-South traffic). This is a read only lab and you will be able to try the access set up already and view all the Zscaler modules and their settings.
Advanced Configuration Lab
•52 launches
The Life of a Security Girl
In honor of Cybersecurity Awareness Month, we're calling out all the masterminds to show that understanding your digital defense shouldn't feel like you just need to tolerate it. Instead, we'll map essential concepts to Taylor Swift's newest hits so you can shake it off and finally realize that having a security strategy is your ultimate getaway car to safety, ensuring your data is always safe and sound.
Blog
•Oct 23, 2025
Partner POV | Backing Up Your Data Isn't Enough. Only Complete Cyber Resilience Will Protect Your Agency From Ransomware.
Ransomware disrupts lives, not just organizations. Prevention isn't enough; agencies need a proactive cyber resilience strategy. Rubrik bridges gaps between IT teams, ensuring data integrity and rapid recovery. Embrace zero-trust, immutable backups, and threat monitoring to safeguard critical data and maintain operational continuity.
Partner Contribution
•Oct 21, 2025
Cisco's True Universal ZTNA
In today's dynamic digital landscape, organizations are tasked with delivering seamless, secure access to applications and data across a hybrid, multi-device world.
Video
•1:55
•Oct 10, 2025
Unlocking Zero Trust: The Role of OAuth in Security Architecture
In today's cloud-centric, BYOD-driven and distributed microservices landscape, traditional security measures such as VPNs and perimeter defenses struggle to keep pace with the increasing need for enterprise security. Implicitly trusting entities within a network poses significant risks, necessitating a paradigm shift. Enter Zero Trust—an approach that requires independent security for every enterprise asset and authenticates and authorizes user and process identities at every level. This lab explores the critical role of OAuth in enabling a Zero Trust architecture and allows lab users to implement & test the OAuth Solution.
Advanced Configuration Lab
•58 launches
Practical Magic: Let's Build Zero Trust
How do you implement a security concept that feels like magic? The answer isn't an illusion; it's a practical craft. We're moving beyond theory to provide the blueprint: 5 concrete steps that build this powerful idea into a tangible, resilient defense for your organization.
Blog
•Oct 10, 2025
Partner POV | Check Point and Nutanix Advance Cloud Network Security
As hybrid cloud environments expand, Check Point CloudGuard Network Security's integration with Nutanix Cloud Infrastructure 7.3 enhances security through seamless service insertion and firewall chaining. This collaboration simplifies zero trust architecture, micro-segmentation, and compliance, offering dynamic, scalable protection without added complexity, empowering organizations to secure their networks efficiently.
Partner Contribution
•Oct 9, 2025