<<

DATA SHEET

Zscaler™ Intelligent Routing for Guest Wi-Fi Protection Simple-to-deploy DNS-based Wi-Fi security

Zscaler Intelligent Routing for Guest Wi-Fi Protection is an easy-to-use cloud-based service that provides carrier-grade security and compliance for guest Wi-Fi networks.

Offering open public Wi-Fi access—to your visitors, customers, volunteers, or employees—is an expected part of running your business. But in addition to the security risks, providing public Wi-Fi access for your guests may open you up to a host of legal liabilities and damage to your reputation if you fail to exercise reasonable care in stopping illegal or unwanted acts over your hotspots. Ensuring the security of your guests and minimizing your liability can be complex and expensive. Simplify your guest Wi-Fi security management and protect your users and your company with Zscaler Intelligent Routing for Guest Wi-Fi Protection.

Key Benefits

Protect your guests with fully automated Reduce complexity and costs to secure guest Wi-Fi carrier-grade security • Simple to deploy and manage across multiple locations, • Automatically block known malicious and unauthorized and can be set up in minutes by simply pointing your sites, allow reputable or permissible sites, and perform hotspots to our security cloud. deep analysis of suspicious sites to decide whether to • Comprehensive visibility and rich reporting from an block or allow them, even if encrypted by SSL. intuitive browser-based dashboard. • Use the arsenal of security capabilities available on • Policy management via a simple the Zscaler platform, including malicious URL filtering, point-and-click interface. antivirus/antispyware, deep content inspection, and • Carrier-grade security at the lowest TCO—a SaaS offering sandboxing/threat emulation. with no appliance hardware or software to manage. Prevent legal liabilities and reputation damage with powerful policy enforcement • Protect your organization by restricting the content and Our guest lounge had its access sites that your guest Wi-Fi users are allowed to access. terminated—all due to a rogue guest Wi-Fi user • Enable “Safe Search” feature, which ensures browser downloading copyrighted materials that led the results contain no inappropriate or offensive content copyright holder to complain to our ISP. We now or images. ensure Zscaler is enabled on all our lounges.” • Ensure compliance with U.S. and EU privacy laws, health and financial information confidentiality regulations, the – Top 10 Global Airline Child Internet Protection Act, and more. DATA SHEET

Features Deep content inspection blocks malicious active content DNS Server Deep content inspection is performed on suspicious Network traffic is automatically directed to the sites to block malicious active content, such as nearest Zscaler data center to deliver an exceptional browser exploits, vulnerable ActiveX controls, user experience. malicious JavaScript, and cross-site scripting.

Enforce allow/block policies by location SSL traffic inspection without performance deterioration Zscaler supports different web content policies to address local needs. Policies are enforced by location in real time. Today, between 66.5 percent and 80 percent of internet traffic is encrypted with SSL. Zscaler seamlessly inspects SSL traffic without any DNS security check deterioration in performance and without requiring Zscaler identifies suspicious sites using DNS techniques to any additional hardware or software. disguise attacks, such as fast-flux or cache poisoning.

Inline inspection teret The Zscaler security cloud scans suspicious internet traffic to detect and block a broad range of cyberthreats. le secto

Automatic blocking of malicious sites from a alcous Atrus real-time database lter Atsare

ee otet A rotecto Zscaler maintains a real-time database of known malicious secto abo objects and sites on the internet, and automatically blocks a te attempts to connect to them. uscous te AAA ecurt ec

Multiple security analysis engines block malware olc oou

We analyze your traffic using multiple security analysis Acast erer engines, augmented by threat feeds from dozens of leading Zscaler tellet out or uest rotecto out or uest tellet Zscaler threat-sharing partners, and automatically block any viruses, spyware, worms, Trojans, system monitors, or keyloggers we find.

ublc etor ser ece ocato

About Zscaler Zscaler was founded in 2008 on a simple but powerful concept: as applications move to the cloud, security needs to move there as well. Today, we are helping thousands of global organizations transform into cloud-enabled operations.

Zscaler, Inc. 120 Holger Way San Jose, CA 95134 +1 408.533.0288 www.zscaler.com © 2020 Zscaler, Inc. All rights reserved. Zscaler™ is either (i) a registered trademark or service mark or (ii) a trademark or service mark of Zscaler, Inc. in the United States and/or other countries. Any other trademarks are the properties of their respective owners.This product may be subject to one or      more U.S. or non-U.S. patents listed at www.zscaler.com/patents