Zscaler cloud security essentials: discover how to securely embrace cloud efficiency, intelligence, and agility with Zscaler /
Harness the capabilities of Zscaler to deliver a secure, cloud-based, scalable web proxy and provide a zero-trust network access solution for private enterprise application access to end users. Many organizations are moving away from on-premises solutions to simplify administration and reduce expens...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham :
Packt Publishing,
2021.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Harness the capabilities of Zscaler to deliver a secure, cloud-based, scalable web proxy and provide a zero-trust network access solution for private enterprise application access to end users. Many organizations are moving away from on-premises solutions to simplify administration and reduce expensive hardware upgrades. This book uses real-world examples of deployments to help you explore Zscaler, an information security platform that offers cloud-based security for both web traffic and private enterprise applications.You'll start by understanding how Zscaler was born in the cloud, how it evolved into a mature product, and how it continues to do so with the addition of sophisticated features that are necessary to stay ahead in today's corporate environment. The book then covers Zscaler Internet Access and Zscaler Private Access architectures in detail, before moving on to show you how to map future security requirements to ZIA features and transition your business applications to ZPA. As you make progress, you'll get to grips with all the essential features needed to architect a customized security solution and support it. Finally, you'll find out how to troubleshoot the newly implemented ZIA and ZPA solutions and make them work efficiently for your enterprise.By the end of this Zscaler book, you'll have developed the skills to design, deploy, implement, and support a customized Zscaler security solution. This book is for security engineers, security architects, security managers, and security operations specialists who may be involved in transitioning to or from Zscaler or want to learn about deployment, implementation, and support of a Zscaler solution. Anyone looking to step into the ever-expanding world of zero-trust network access using the Zscaler solution will also find this book useful. |
Beschreibung: | 1 online resource |
ISBN: | 1800567367 9781800567368 |
Internformat
MARC
LEADER | 00000cam a2200000Mi 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1252912812 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 210511s2021 enk o 000 0 eng d | ||
040 | |a UKAHL |b eng |e rda |e pn |c UKAHL |d EBLCP |d UKMGB |d OCLCO |d N$T |d OCLCO |d OCLCQ |d IEEEE |d OCLCF |d OCLCO |d OCLCL | ||
015 | |a GBC177902 |2 bnb | ||
016 | 7 | |a 020196385 |2 Uk | |
020 | |a 1800567367 | ||
020 | |a 9781800567368 |q (electronic bk.) | ||
020 | |z 9781800567986 (pbk.) | ||
035 | |a (OCoLC)1252912812 | ||
037 | |a 9781800567368 |b Packt Publishing Pvt. Ltd | ||
037 | |a 10163125 |b IEEE | ||
050 | 4 | |a QA76.585 | |
082 | 7 | |a 004.6782 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Devarasetty, Ravi, |e author. | |
245 | 1 | 0 | |a Zscaler cloud security essentials |b discover how to securely embrace cloud efficiency, intelligence, and agility with Zscaler / |c Ravi Devarasetty. |
264 | 1 | |a Birmingham : |b Packt Publishing, |c 2021. | |
300 | |a 1 online resource | ||
336 | |a text |2 rdacontent | ||
337 | |a computer |2 rdamedia | ||
338 | |a online resource |2 rdacarrier | ||
520 | |a Harness the capabilities of Zscaler to deliver a secure, cloud-based, scalable web proxy and provide a zero-trust network access solution for private enterprise application access to end users. Many organizations are moving away from on-premises solutions to simplify administration and reduce expensive hardware upgrades. This book uses real-world examples of deployments to help you explore Zscaler, an information security platform that offers cloud-based security for both web traffic and private enterprise applications.You'll start by understanding how Zscaler was born in the cloud, how it evolved into a mature product, and how it continues to do so with the addition of sophisticated features that are necessary to stay ahead in today's corporate environment. The book then covers Zscaler Internet Access and Zscaler Private Access architectures in detail, before moving on to show you how to map future security requirements to ZIA features and transition your business applications to ZPA. As you make progress, you'll get to grips with all the essential features needed to architect a customized security solution and support it. Finally, you'll find out how to troubleshoot the newly implemented ZIA and ZPA solutions and make them work efficiently for your enterprise.By the end of this Zscaler book, you'll have developed the skills to design, deploy, implement, and support a customized Zscaler security solution. This book is for security engineers, security architects, security managers, and security operations specialists who may be involved in transitioning to or from Zscaler or want to learn about deployment, implementation, and support of a Zscaler solution. Anyone looking to step into the ever-expanding world of zero-trust network access using the Zscaler solution will also find this book useful. | ||
505 | 0 | |a Table of Contents Security for the Modern Enterprise with Zscaler Understanding the modular Zscaler Architecture Delving into ZIA Policy Features Understanding Traffic Forwarding and User Authentication Options Architecting and Implementing Your ZIA solution Troubleshooting and Optimizing your ZIA solution Introducing ZTNA with Zscaler Private Access (ZPA) Using ZPA to provide secure application access Transitioning your business applications to ZPA Architecting and Implementing your ZPA solution. | |
610 | 2 | 0 | |a Zscaler (Firm) |
650 | 0 | |a Cloud computing |x Security measures. | |
650 | 0 | |a Cloud computing |x Industrial applications. | |
650 | 6 | |a Infonuagique |x Sécurité |x Mesures. | |
650 | 6 | |a Infonuagique |x Applications industrielles. | |
650 | 7 | |a Cloud computing |x Security measures |2 fast | |
758 | |i has work: |a Zscaler Cloud Security Essentials (Text) |1 https://id.oclc.org/worldcat/entity/E39PCYdYv8PKhtvDTpt96JDFQV |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |z 9781800567986 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2928549 |3 Volltext |
938 | |a ProQuest Ebook Central |b EBLB |n EBL6629191 | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH38637783 | ||
938 | |a EBSCOhost |b EBSC |n 2928549 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1252912812 |
---|---|
_version_ | 1816882544366321664 |
adam_text | |
any_adam_object | |
author | Devarasetty, Ravi |
author_facet | Devarasetty, Ravi |
author_role | aut |
author_sort | Devarasetty, Ravi |
author_variant | r d rd |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.585 |
callnumber-search | QA76.585 |
callnumber-sort | QA 276.585 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Table of Contents Security for the Modern Enterprise with Zscaler Understanding the modular Zscaler Architecture Delving into ZIA Policy Features Understanding Traffic Forwarding and User Authentication Options Architecting and Implementing Your ZIA solution Troubleshooting and Optimizing your ZIA solution Introducing ZTNA with Zscaler Private Access (ZPA) Using ZPA to provide secure application access Transitioning your business applications to ZPA Architecting and Implementing your ZPA solution. |
ctrlnum | (OCoLC)1252912812 |
dewey-full | 004.6782 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.6782 |
dewey-search | 004.6782 |
dewey-sort | 14.6782 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04284cam a2200505Mi 4500</leader><controlfield tag="001">ZDB-4-EBA-on1252912812</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |||||||||||</controlfield><controlfield tag="008">210511s2021 enk o 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">UKAHL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">UKAHL</subfield><subfield code="d">EBLCP</subfield><subfield code="d">UKMGB</subfield><subfield code="d">OCLCO</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IEEEE</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBC177902</subfield><subfield code="2">bnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">020196385</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1800567367</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781800567368</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781800567986 (pbk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1252912812</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">9781800567368</subfield><subfield code="b">Packt Publishing Pvt. Ltd</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">10163125</subfield><subfield code="b">IEEE</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.585</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">004.6782</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Devarasetty, Ravi,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Zscaler cloud security essentials</subfield><subfield code="b">discover how to securely embrace cloud efficiency, intelligence, and agility with Zscaler /</subfield><subfield code="c">Ravi Devarasetty.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham :</subfield><subfield code="b">Packt Publishing,</subfield><subfield code="c">2021.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Harness the capabilities of Zscaler to deliver a secure, cloud-based, scalable web proxy and provide a zero-trust network access solution for private enterprise application access to end users. Many organizations are moving away from on-premises solutions to simplify administration and reduce expensive hardware upgrades. This book uses real-world examples of deployments to help you explore Zscaler, an information security platform that offers cloud-based security for both web traffic and private enterprise applications.You'll start by understanding how Zscaler was born in the cloud, how it evolved into a mature product, and how it continues to do so with the addition of sophisticated features that are necessary to stay ahead in today's corporate environment. The book then covers Zscaler Internet Access and Zscaler Private Access architectures in detail, before moving on to show you how to map future security requirements to ZIA features and transition your business applications to ZPA. As you make progress, you'll get to grips with all the essential features needed to architect a customized security solution and support it. Finally, you'll find out how to troubleshoot the newly implemented ZIA and ZPA solutions and make them work efficiently for your enterprise.By the end of this Zscaler book, you'll have developed the skills to design, deploy, implement, and support a customized Zscaler security solution. This book is for security engineers, security architects, security managers, and security operations specialists who may be involved in transitioning to or from Zscaler or want to learn about deployment, implementation, and support of a Zscaler solution. Anyone looking to step into the ever-expanding world of zero-trust network access using the Zscaler solution will also find this book useful.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Table of Contents Security for the Modern Enterprise with Zscaler Understanding the modular Zscaler Architecture Delving into ZIA Policy Features Understanding Traffic Forwarding and User Authentication Options Architecting and Implementing Your ZIA solution Troubleshooting and Optimizing your ZIA solution Introducing ZTNA with Zscaler Private Access (ZPA) Using ZPA to provide secure application access Transitioning your business applications to ZPA Architecting and Implementing your ZPA solution.</subfield></datafield><datafield tag="610" ind1="2" ind2="0"><subfield code="a">Zscaler (Firm)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cloud computing</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cloud computing</subfield><subfield code="x">Industrial applications.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Infonuagique</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Infonuagique</subfield><subfield code="x">Applications industrielles.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cloud computing</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Zscaler Cloud Security Essentials (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCYdYv8PKhtvDTpt96JDFQV</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">9781800567986</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2928549</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL6629191</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH38637783</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">2928549</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-on1252912812 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:30:18Z |
institution | BVB |
isbn | 1800567367 9781800567368 |
language | English |
oclc_num | 1252912812 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource |
psigel | ZDB-4-EBA |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | Packt Publishing, |
record_format | marc |
spelling | Devarasetty, Ravi, author. Zscaler cloud security essentials discover how to securely embrace cloud efficiency, intelligence, and agility with Zscaler / Ravi Devarasetty. Birmingham : Packt Publishing, 2021. 1 online resource text rdacontent computer rdamedia online resource rdacarrier Harness the capabilities of Zscaler to deliver a secure, cloud-based, scalable web proxy and provide a zero-trust network access solution for private enterprise application access to end users. Many organizations are moving away from on-premises solutions to simplify administration and reduce expensive hardware upgrades. This book uses real-world examples of deployments to help you explore Zscaler, an information security platform that offers cloud-based security for both web traffic and private enterprise applications.You'll start by understanding how Zscaler was born in the cloud, how it evolved into a mature product, and how it continues to do so with the addition of sophisticated features that are necessary to stay ahead in today's corporate environment. The book then covers Zscaler Internet Access and Zscaler Private Access architectures in detail, before moving on to show you how to map future security requirements to ZIA features and transition your business applications to ZPA. As you make progress, you'll get to grips with all the essential features needed to architect a customized security solution and support it. Finally, you'll find out how to troubleshoot the newly implemented ZIA and ZPA solutions and make them work efficiently for your enterprise.By the end of this Zscaler book, you'll have developed the skills to design, deploy, implement, and support a customized Zscaler security solution. This book is for security engineers, security architects, security managers, and security operations specialists who may be involved in transitioning to or from Zscaler or want to learn about deployment, implementation, and support of a Zscaler solution. Anyone looking to step into the ever-expanding world of zero-trust network access using the Zscaler solution will also find this book useful. Table of Contents Security for the Modern Enterprise with Zscaler Understanding the modular Zscaler Architecture Delving into ZIA Policy Features Understanding Traffic Forwarding and User Authentication Options Architecting and Implementing Your ZIA solution Troubleshooting and Optimizing your ZIA solution Introducing ZTNA with Zscaler Private Access (ZPA) Using ZPA to provide secure application access Transitioning your business applications to ZPA Architecting and Implementing your ZPA solution. Zscaler (Firm) Cloud computing Security measures. Cloud computing Industrial applications. Infonuagique Sécurité Mesures. Infonuagique Applications industrielles. Cloud computing Security measures fast has work: Zscaler Cloud Security Essentials (Text) https://id.oclc.org/worldcat/entity/E39PCYdYv8PKhtvDTpt96JDFQV https://id.oclc.org/worldcat/ontology/hasWork Print version: 9781800567986 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2928549 Volltext |
spellingShingle | Devarasetty, Ravi Zscaler cloud security essentials discover how to securely embrace cloud efficiency, intelligence, and agility with Zscaler / Table of Contents Security for the Modern Enterprise with Zscaler Understanding the modular Zscaler Architecture Delving into ZIA Policy Features Understanding Traffic Forwarding and User Authentication Options Architecting and Implementing Your ZIA solution Troubleshooting and Optimizing your ZIA solution Introducing ZTNA with Zscaler Private Access (ZPA) Using ZPA to provide secure application access Transitioning your business applications to ZPA Architecting and Implementing your ZPA solution. Zscaler (Firm) Cloud computing Security measures. Cloud computing Industrial applications. Infonuagique Sécurité Mesures. Infonuagique Applications industrielles. Cloud computing Security measures fast |
title | Zscaler cloud security essentials discover how to securely embrace cloud efficiency, intelligence, and agility with Zscaler / |
title_auth | Zscaler cloud security essentials discover how to securely embrace cloud efficiency, intelligence, and agility with Zscaler / |
title_exact_search | Zscaler cloud security essentials discover how to securely embrace cloud efficiency, intelligence, and agility with Zscaler / |
title_full | Zscaler cloud security essentials discover how to securely embrace cloud efficiency, intelligence, and agility with Zscaler / Ravi Devarasetty. |
title_fullStr | Zscaler cloud security essentials discover how to securely embrace cloud efficiency, intelligence, and agility with Zscaler / Ravi Devarasetty. |
title_full_unstemmed | Zscaler cloud security essentials discover how to securely embrace cloud efficiency, intelligence, and agility with Zscaler / Ravi Devarasetty. |
title_short | Zscaler cloud security essentials |
title_sort | zscaler cloud security essentials discover how to securely embrace cloud efficiency intelligence and agility with zscaler |
title_sub | discover how to securely embrace cloud efficiency, intelligence, and agility with Zscaler / |
topic | Zscaler (Firm) Cloud computing Security measures. Cloud computing Industrial applications. Infonuagique Sécurité Mesures. Infonuagique Applications industrielles. Cloud computing Security measures fast |
topic_facet | Zscaler (Firm) Cloud computing Security measures. Cloud computing Industrial applications. Infonuagique Sécurité Mesures. Infonuagique Applications industrielles. Cloud computing Security measures |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2928549 |
work_keys_str_mv | AT devarasettyravi zscalercloudsecurityessentialsdiscoverhowtosecurelyembracecloudefficiencyintelligenceandagilitywithzscaler |