Zscaler secures AWS Security Competency status; delivers zero trust protection to authorized users and devices



Cloud security company Zscaler announced this week that Zscaler Private Access (ZPA) is the initial zero trust architecture to achieve Amazon Web Service (AWS) Security Competency status. The ZPA zero trust architecture securely connects authorized users and devices to named, internally managed applications without exposing the Amazon Virtual Private Cloud (VPC) to the internet.

With ZPA, applications connect to users via inside-out connections, making them invisible to unauthorized users and reducing the risk of internet-based attacks. Enterprises using ZPA can create micro-segmented architectures without virtualizing the security stack and creating complex firewall policies.  

AWS is enabling scalable, flexible, and cost-effective solutions from startups to global enterprises. To support the seamless integration and deployment of these solutions, AWS established the AWS Competency Program to help customers identify Consulting and Technology Partners in the Amazon Partner Network (APN) with deep industry experience and expertise.

The AWS Competency Program is designed to highlight APN Partners who have demonstrated technical proficiency and proven customer success in specialized solution areas. Attaining an AWS Competency allows partners to differentiate themselves to customers by showcasing expertise in a specific solution area.

“ZPA enables customers to not only secure application access, but also to transform their network architecture in order to achieve strategic improvements in their security posture with their apps that have migrated to cloud services, such as AWS,” said Punit Minocha, Senior Vice President Corporate and Business Development at Zscaler. “We’re excited to have achieved AWS Security Competency status, as it provides our customers and partners with additional confidence in the solution and in our ability to deliver secure connectivity for AWS customers.”

“By implementing a zero trust model in AWS, where access is based on policies that follow the user and applications remain dark to unauthorized users, we have streamlined access and strengthened security. Malware and botnets simply can’t attack what they can’t see,” said Tony Fergusson, IT Infrastructure Architect at MAN Energy Solutions. “With the rise in cloud adoption and mobility, enterprises need to change their network and security architectures to meet the need for secure, anywhere access and protect against increasingly sophisticated attacks.”

 

Leave a Reply

WWPI – Covering the best in IT since 1980