Zero Trust Insights
Filter by Content Types
- No options
114 results found
When AI Starts to Act on Its Own, Who's in Control?
As artificial intelligence moves from prediction to action, a new security frontier is taking shape. In this episode, Zscaler's Head of AI Innovation Phil Tee and WWT's VP of Global Cyber Chris Konrad explore the rise of autonomous agents, the evolution of Zero Trust and what it means to secure AI itself. From poisoned prompts to quantum threats, they warn the biggest risk isn't just deploying AI — it's trusting it. A sharp, real-world look at how enterprises can protect their future as machines begin to make decisions of their own.
Video
•0:57
•Nov 5, 2025
Zscaler Zero Trust Branch - Branch Connector and Airgap
In this lab, we will look at how the Zscaler Zero Trust Exchange unifies our ability to deploy a zero trust methodology. First we will take you on a tour of the working consoles that relate to Zscaler Branch Connector and Airgap technologies. We will view all the policies and rule sets that make up the Zscaler Internet Access and Zscaler Private Access giving our organization granular control over user and device access both internally (East-West traffic) and externally (North-South traffic). This is a read only lab and you will be able to try the access set up already and view all the Zscaler modules and their settings.
Advanced Configuration Lab
•48 launches
Zscaler - Zero Trust Branch (ZTB) and Airgap
Zscaler, the leader in cloud security, brings together several of their technologies in their Zero Trust Exchange to implement, improve, and bolster your zero trust architecture (ZTA) within your organization. Utilizing their Zero Trust Exchange at the core of their technologies, it weave together secure internet access with Zscaler Internet Access (ZIA), private network access using Zscaler Private Access (ZPA) eliminating the need for traditional VPNs, data loss protection (DLP) and cloud access security broker (CASB) incorporated in Zscaler Data Protection, and network segmentation implementing Zscaler Airgap - their agentless micro-segmentation technology, all to reduce your attack surface and combining this all into a single enhanced platform. In this learning path, we are going to focus on our Zero Trust Branch and Airgap technologies and how they can together, improve your ZTA.
Learning Path
The Life of a Security Girl
In honor of Cybersecurity Awareness Month, we're calling out all the masterminds to show that understanding your digital defense shouldn't feel like you just need to tolerate it. Instead, we'll map essential concepts to Taylor Swift's newest hits so you can shake it off and finally realize that having a security strategy is your ultimate getaway car to safety, ensuring your data is always safe and sound.
Blog
•Oct 23, 2025
Partner POV | Backing Up Your Data Isn't Enough. Only Complete Cyber Resilience Will Protect Your Agency From Ransomware.
Ransomware disrupts lives, not just organizations. Prevention isn't enough; agencies need a proactive cyber resilience strategy. Rubrik bridges gaps between IT teams, ensuring data integrity and rapid recovery. Embrace zero-trust, immutable backups, and threat monitoring to safeguard critical data and maintain operational continuity.
Partner Contribution
•Oct 21, 2025
Cisco's True Universal ZTNA
In today's dynamic digital landscape, organizations are tasked with delivering seamless, secure access to applications and data across a hybrid, multi-device world.
Video
•1:55
•Oct 10, 2025
Practical Magic: Let's Build Zero Trust
How do you implement a security concept that feels like magic? The answer isn't an illusion; it's a practical craft. We're moving beyond theory to provide the blueprint: 5 concrete steps that build this powerful idea into a tangible, resilient defense for your organization.
Blog
•Oct 10, 2025
Unlocking Zero Trust: The Role of OAuth in Security Architecture
In today's cloud-centric, BYOD-driven and distributed microservices landscape, traditional security measures such as VPNs and perimeter defenses struggle to keep pace with the increasing need for enterprise security. Implicitly trusting entities within a network poses significant risks, necessitating a paradigm shift. Enter Zero Trust—an approach that requires independent security for every enterprise asset and authenticates and authorizes user and process identities at every level. This lab explores the critical role of OAuth in enabling a Zero Trust architecture and allows lab users to implement & test the OAuth Solution.
Advanced Configuration Lab
•55 launches
Partner POV | Check Point and Nutanix Advance Cloud Network Security
As hybrid cloud environments expand, Check Point CloudGuard Network Security's integration with Nutanix Cloud Infrastructure 7.3 enhances security through seamless service insertion and firewall chaining. This collaboration simplifies zero trust architecture, micro-segmentation, and compliance, offering dynamic, scalable protection without added complexity, empowering organizations to secure their networks efficiently.
Partner Contribution
•Oct 9, 2025
Partner POV | AI-powered App Segmentation: Unlocking Zero Trust at Scale
Imagine a castle surrounded by strong stone walls and a deep moat designed to keep unwanted visitors out. The drawbridge is tightly guarded, and all of the focus is placed on making sure no one from the outside gets in. But what happens when someone crosses the bridge? Inside the castle walls, it's a free for all. There are no locked doors, no security for treasures, and no checks on where people roam. Similarly, in many IT environments, once a user connects to the network, they often gain broad access to applications and data, with little control over what happens inside.
Partner Contribution
•Aug 29, 2025
Akamai Guardicore Centra Foundations Lab
The Akamai Guardicore Centra Foundations Lab aims to give people a hands-on experience with the central segmentation solution through a variety of use cases.
Foundations Lab
•178 launches
Partner POV | Fortinet and CrowdStrike Joint Solution
Delivering AI-powered protection, adaptive zero-trust access, and accelerated threat detection and response across your entire digital infrastructure
Partner Contribution
•Aug 25, 2025