What this book covers
Chapter 1, Security for the Modern Enterprise with Zscaler, explains the evolution of the enterprise infrastructure and hence the need for unique, cloud-based, and scalable security solutions. It also introduces the two flagship products of Zscaler, namely, ZIA and ZPA.
Chapter 2, Understanding the Modular Zscaler Architecture, sets out the foundation for the reader by explaining the building blocks of the Zscaler cloud. It is very important to understand how the Zscaler cloud is architected in a modular fashion, and each component can scale without depending on the other components.
Chapter 3, Delving into ZIA Policy Features, gets right into the various web, mobile, and firewall features that are available with ZIA out of the box. A subset or all of the available features could be chosen by the Zscaler administrator of the enterprise.
Chapter 4, Understanding Traffic Forwarding and User Authentication Options, explains in detail the available options for forwarding the end user traffic to Zscaler. It also details the end user authentication options available to the enterprise and the process to choose the most appropriate option.
Chapter 5, Architecting and Implementing Your ZIA Solution, starts with the discovery of the current security posture within the enterprise, crafting a customized ZIA solution, and then implementing it across the enterprise.
Chapter 6, Troubleshooting and Optimizing Your ZIA Solution, provides practical troubleshooting tips for engineers supporting the ZIA solution and also provides ideas on how to get the most out of your deployed ZIA solution, such as reports and tweaking the dashboards.
Chapter 7, Introducing ZTNA with Zscaler Private Access (ZPA), introduces the concept of and the need for ZTNA. It also explains how ZPA aligns with the fundamental principles of ZTNA, and lists the components of ZPA architecture and agentless ZPA solutions.
Chapter 8, Exploring the ZPA Admin Portal and Basic Configuration, takes readers through a tour of the ZPA admin portal, configuration of the ZPA log servers, end user authentication with Azure AD and Okta, and ends with the configuration options for the ZCC app.
Chapter 9, Using ZPA to Provide Secure Application Access, continues with the configuration elements of the ZPA solution, including App Connector deployment and application configurations, and explores best practices for enterprise deployments.
Chapter 10, Architecting and Troubleshooting Your ZPA Solution, walks you through the process of developing a customized ZPA solution and provides ZPA troubleshooting tips to the enterprise engineers supporting the solution.