Zero Trust Insights
Filter by Content Types
- No options
94 results found
Hands-On Lab Workshop: Zscaler Zero Trust – Branch Connector and Airgap
Join our virtual hands-on lab to explore Zscaler's Zero Trust Branch (ZTB) platform, focusing on Branch Connector and Airgap technologies. This session demonstrates how Zscaler's modern approach moves beyond legacy network architectures to enforce least-privilege access and advanced micro-segmentation. You'll see how each endpoint is isolated, dramatically reducing the attack surface and preventing lateral movement—crucial for containing breaches and limiting internal threats.
Participants will tour the Zscaler Internet Access (ZIA), Zscaler Private Access (ZPA), and Privileged Remote Access (PRA) consoles, and observe how policies and rule sets provide granular control over user and device access for both internal (East-West) and external (North-South) traffic. The lab is read-only, but you'll be able to view all Zscaler modules and their settings in action
Webinar
•Feb 5, 2026 • 11am
Check Point Targets Enterprise Ai cybersecurity And Zero Trust With Quantum Firewall Release
Check Point Software Technologies has rolled out a major update to its Quantum Firewall Software, introducing 20 new features aimed at helping enterprises secure Ai transformations, implement Zero Trust strategies and unify hybrid mesh network protection.
News
•Dec 9, 2025
Zero Trust with F5 BIG-IP APM, SSLO & WAF
In this lab we will be addressing a specific set of BIG-IP (versatility) characteristics: authentication and orchestration. In doing so, we will also be showing you some powerful capabilities of BIG-IP APM and SSL Orchestrator.
Advanced Configuration Lab
•41 launches
Partner POV | Closing the Zero Trust Collaboration Gap in Unified Communications
Zero Trust enhances security but can hinder collaboration by obscuring traffic details crucial for IT troubleshooting. Riverbed NPM+ bridges this gap, restoring visibility without compromising security. It ensures seamless user experiences in encrypted environments, reducing downtime and support costs, while maintaining productivity and executive confidence. Security and collaboration coexist harmoniously.
Partner Contribution
•Dec 2, 2025
Zero Trust and Identity: Why A Business Can't Afford to Ignore IAM
Identity isn't just a login—it's the backbone of trust. As cyber threats accelerate, safeguarding people, data and reputation demands more than passwords. This article reveals how Identity and Access Management powers Zero Trust security, with real-world lessons and practical guidance.
Blog
•Dec 1, 2025
Accelerate Zero Trust Adoption with ExtraHop RevealX
ExtraHop RevealX provides continuous telemetry, deep protocol‑level visibility, and automated analytics to power your zero trust adoption.
Blog
•Nov 18, 2025
Zero Trust Principles
Not just a single solution, a zero trust implementation is an integrated approach for continuous validation of authorized users across your entire organization. A zero trust security framework focuses on protecting critical assets through a layered, continuously monitored and adaptable architecture that minimizes risks and containment in case of breaches.
Blog
•Nov 18, 2025
SASE Architecture: Cisco Viptela SD-WAN With Zscaler (SSE) Lab
Secure Access Service Edge (SASE), coined by Gartner in 2019, is a solution that blends networking and security into cloud scale architecture that optimizes end user performance and improves security for an organization. With the Zscaler and SD-WAN integration, you can rapidly gain access to cloud-delivered security in minutes. This market leading API automation makes it very fast and agile to deploy and manage the network and security environment of hundreds or even thousands of remote sites.
Advanced Configuration Lab
•444 launches
When AI Starts to Act on Its Own, Who's in Control?
As artificial intelligence moves from prediction to action, a new security frontier is taking shape. In this episode, Zscaler's Head of AI Innovation Phil Tee and WWT's VP of Global Cyber Chris Konrad explore the rise of autonomous agents, the evolution of Zero Trust and what it means to secure AI itself. From poisoned prompts to quantum threats, they warn the biggest risk isn't just deploying AI — it's trusting it. A sharp, real-world look at how enterprises can protect their future as machines begin to make decisions of their own.
Video
•0:57
•Nov 5, 2025
Zscaler Zero Trust Branch - Branch Connector and Airgap
In this lab, we will look at how the Zscaler Zero Trust Exchange unifies our ability to deploy a zero trust methodology. First we will take you on a tour of the working consoles that relate to Zscaler Branch Connector and Airgap technologies. We will view all the policies and rule sets that make up the Zscaler Internet Access and Zscaler Private Access giving our organization granular control over user and device access both internally (East-West traffic) and externally (North-South traffic). This is a read only lab and you will be able to try the access set up already and view all the Zscaler modules and their settings.
Advanced Configuration Lab
•53 launches
Zscaler - Zero Trust Branch (ZTB) and Airgap
Zscaler, the leader in cloud security, brings together several of their technologies in their Zero Trust Exchange to implement, improve, and bolster your zero trust architecture (ZTA) within your organization. Utilizing their Zero Trust Exchange at the core of their technologies, it weave together secure internet access with Zscaler Internet Access (ZIA), private network access using Zscaler Private Access (ZPA) eliminating the need for traditional VPNs, data loss protection (DLP) and cloud access security broker (CASB) incorporated in Zscaler Data Protection, and network segmentation implementing Zscaler Airgap - their agentless micro-segmentation technology, all to reduce your attack surface and combining this all into a single enhanced platform. In this learning path, we are going to focus on our Zero Trust Branch and Airgap technologies and how they can together, improve your ZTA.
Learning Path
The Life of a Security Girl
In honor of Cybersecurity Awareness Month, we're calling out all the masterminds to show that understanding your digital defense shouldn't feel like you just need to tolerate it. Instead, we'll map essential concepts to Taylor Swift's newest hits so you can shake it off and finally realize that having a security strategy is your ultimate getaway car to safety, ensuring your data is always safe and sound.
Blog
•Oct 23, 2025