Statements (64)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:computer
|
gptkbp:bfsLayer |
4
|
gptkbp:bfsParent |
gptkb:Zscaler
|
gptkbp:communication |
HTTP/ HTTPS
|
gptkbp:deployment |
Data Centers
Global enterprises |
gptkbp:developed_by |
gptkb:Zscaler,_Inc.
|
gptkbp:enables |
gptkb:Zero_Trust_Network_Access
Secure application access Secure access to legacy applications Secure access to private applications |
gptkbp:enhances |
User experience
|
gptkbp:facilitates |
Secure remote access
secure application access |
https://www.w3.org/2000/01/rdf-schema#label |
Zscaler App Connector
|
gptkbp:integrates_with |
gptkb:Zscaler_Internet_Access
|
gptkbp:is_available_in |
Multiple regions
|
gptkbp:is_available_on |
Multiple platforms
|
gptkbp:is_compatible_with |
Various operating systems
Third-party security tools Multiple cloud environments |
gptkbp:is_designed_for |
Digital transformation initiatives
Remote workforces |
gptkbp:is_designed_to |
Reduce attack surface
|
gptkbp:is_integrated_with |
Identity providers
SIEM solutions |
gptkbp:is_optimized_for |
Cloud-native applications
Mobile users |
gptkbp:is_part_of |
gptkb:Zscaler's_Zero_Trust_model
gptkb:Zscaler_Cloud_Security_Platform Zscaler's cloud-native architecture Zscaler's security architecture Zscaler's security ecosystem |
gptkbp:is_scalable |
Large user bases
|
gptkbp:is_used_by |
Enterprises
|
gptkbp:is_used_for |
Risk management
Compliance requirements |
gptkbp:is_used_in |
Hybrid cloud environments
|
gptkbp:is_utilized_in |
IT departments
|
gptkbp:managed_by |
Zscaler Admin Portal
|
gptkbp:offers |
Incident response capabilities
Application visibility User activity monitoring Real-time threat protection |
gptkbp:operates |
Virtual Machines
|
gptkbp:provides |
Centralized management
User authentication Network segmentation Policy enforcement Data loss prevention Application performance optimization Secure access to applications |
gptkbp:reduces |
Latency for users
|
gptkbp:requires |
Internet connectivity
|
gptkbp:setting |
High availability
User segmentation |
gptkbp:supports |
API security
Multi-factor authentication Single sign-on Containerized applications Cloud applications Endpoint security solutions Saa S applications |
gptkbp:uses |
TLS encryption
|