Menu
  • Home
  • Radar Console
    • About the Radar
    • Go to Radar Console
    • Vulnerability Details
    • Overall Alerts
  • The Product Directory
    • About the Product Directory
  • CND Community
    • Contact Us
    • Blog
    • Packet Headers
    • Other Charts
    • Security Cartoons
  • Home
  • Radar Console
    • About the Radar
    • Go to Radar Console
    • Vulnerability Details
    • Overall Alerts
  • The Product Directory
    • About the Product Directory
  • CND Community
    • Contact Us
    • Blog
    • Packet Headers
    • Other Charts
    • Security Cartoons

Zscaler Guest Wifi Protection

Securing Guest Wifi networks presents unique challenges - unknown/unauthenticated users, varied devices and operating systems, the need for a smooth user experience - all coupled with minimal resources and in-house manpower to manage the solution.

Zscaler Guest Wifi Protection provides:

  • Ease of use. Zscaler Guest Wifi Protection can be set up under 5 minutes. You can create and enforce policy with a few simple clicks, and our intuitive and user-friendly reporting portal ensures that you have full visibility into your guest Wifi traffic at all times.
  • Smooth user experience, cost effectively. You want to provide a smooth user experience, but also need to keep expenses under control. With Zscaler Guest Wifi Protection, you can monitor network utilization in real time, and adjust policies at the global or site level to provide a positive user experience.
  •  Fully automated, deep security.  Zscaler Guest Wifi Protection intelligently routes your traffic based on the policy you set, and security intelligence  from our network of 12M+ users, as well as, security feeds from best-of-breed industry partners. Known malicious and unauthorized sites are blocked, known reputable or permissible sites are allowed, and suspicious sites are sent to the full security platform to look for advanced and zero-day threats.

Zscaler Guest Wifi Protection also enforces “safe search” on major search engines, thereby ensuring that your guest Wifi users will be protected from inappropriate and harmful content that may returned on a search engine results page (for example when searching for images), and protecting your organization from legal liability.

Rating
0 vote
Favoured:
0

Listing Details

Vendor
Zscaler
Website
Visit the Product Site
Pricing Model
Commercial
Modified
2015-03-18
Owner
michelemjordan
Created
2015-03-18
Tags
wifi guest, guest policy, network access control
  • 783.jpg
RecommendReport
  • Web Application FW +
  • Cloud Security Services
  • Static Code Analysis
  • Boundary Guards +
  • Network Anomoly Detection +
  • Scanning Products +
  • Network Access Control
  • Server Security Products +
  • Endpoint Security +
  • Forensic Solutions +
  • Malware Protection +
  • Patch Management +
  • Reputational Intelligence
  • Insider Threat Solutions
  • Phishing Assessment
  • Virtualisation Security
  • SIEM
  • Vulnerability Alert Services
  • Security Training +
  • Security Conferences
  • Password Managers
  • TSCM Bug Sweeping +
  • Geeky Gadgets
  • Visio Stencils
  • Uncategorised

CND Services - Assessing Your Security

  • Risk Assessment
  • Cyber Profile Assessment
  • Cyber Essentials
  • Vulnerability Assessment
  • Web App Scanning
  • Penetration Testing
  • Red Teaming
  • Phishing Assessment
  • Security Compliance
  • Firewall Audit
  • Forensic Readiness
  • vCISO
  • Aviation vCRSM
  • Maritime vCySO

CND Services - Preventing an Attack

  • Superyacht Cyber
  • Secure Cloud Configuration
  • Security Architecture
  • IDS & IPS
  • Blockchain Security
  • Data Loss Prevention
  • System Security Hardening
  • Insider Threat Prevention
  • Cisco Advanced Security
  • Vulnerability Management

CND Services - Detecting an Attack

  • Splunk Services
  • SIEM
  • XDR
  • MDR
  • EDR
  • Building a SOC
  • SOC Maturity
  • Staffing a SOC
  • Cloud Security Monitoring
  • Insider Threat Detection
  • GPG13 Protective Monitoring
  • Cyber Threat Intelligence
  • Branded Radar Console

CND Services - Responding to Incidents

  • Breach Triage
  • Incident Response
  • Incident Support
  • Breach Impact
  • Root Cause Analysis
  • Breach Remediation
  • Risk Assessment
  • Forensic Readiness
  • IR Planning

CND Services - Managed Security

  • Managed SOC
  • Managed Cyber Education
  • Managed Phishing Assessments
  • vCISO
  • Vulnerability Assessments
  • Vulnerability Management
  • XDR
  • MDR
  • EDR
  • Managed SIEM

CND Services - Superyacht Services

  • Complete IMO Cyber
  • Superyacht Intelligence
  • Cyber Assessment
  • Cyber Plan & Policies
  • Cyber Monitoring
  • Cyber Officer CySO
  • Maritime Blog

CND Services - Recruitment

   

© Computer Network Defence Limited 2023

Privacy Notice
Terms & Conditions
Send us a Message