User compromise is one of the toughest security challenges. Zscaler Zero Trust Exchange integrates phishing prevention controls into an overall Zero Trust architecture, which disrupts each stage of attacks and minimizes damage.
The system notably provides for the prevention of compromises thanks to complete SSL inspection at scale., Threat analysis using native integration of threat intelligence and IPS signature detection, AI/ML phishing detection and policy-defined high-risk URL categories commonly used for phishing, such as newly observed and newly registered domains. It also provides for the elimination of lateral movements by connecting users directly to applications, and not to the network, in order to limit the range of action of a potential incident. Blocking compromised users and insider threats is enabled with inline application inspection and built-in deception capabilities to deceive and detect attackers. Stopping data loss through inspection of data in motion and at rest prevents theft by an active attacker.