Canada markets close in 3 hours 2 minutes

Zscaler, Inc. (ZS)

NasdaqGS - NasdaqGS Real Time Price. Currency in USD
Add to watchlist
185.70-0.38 (-0.20%)
As of 12:57PM EDT. Market open.
Full screen
Trade prices are not sourced from all markets
Previous Close186.08
Open183.71
Bid186.66 x 900
Ask186.68 x 1000
Day's Range181.43 - 188.34
52 Week Range64.86 - 230.88
Volume689,136
Avg. Volume1,972,345
Market Cap25.244B
Beta (5Y Monthly)0.80
PE Ratio (TTM)N/A
EPS (TTM)-1.45
Earnings DateMay 26, 2021 - May 31, 2021
Forward Dividend & YieldN/A (N/A)
Ex-Dividend DateN/A
1y Target Est237.71
  • Zscaler Advances Zero Trust Security for the Digital Business Disrupting Decades of Legacy IT Security and Networking Models
    GlobeNewswire

    Zscaler Advances Zero Trust Security for the Digital Business Disrupting Decades of Legacy IT Security and Networking Models

    Security Innovations, Resources for CxOs and IT Practitioners, and Zero Trust Deployment Programs Overcome Security Barriers to Accelerate Digital TransformationSAN JOSE, Calif., April 20, 2021 (GLOBE NEWSWIRE) -- Zscaler, Inc. (NASDAQ: ZS), the leader in cloud security, today announced innovations for the Zscaler Zero Trust Exchange™ platform and new programs designed to secure digital businesses. New security solutions, resources for IT execs and practitioners, and deployment guides to expedite zero trust adoption are redefining the rules of IT security for today’s internet-driven, cloud-first businesses. The combination of these offerings provides digital businesses a holistic approach to securing modern organizations and the pragmatic skills and blueprints needed to be competitive. Digital transformation has fundamentally changed the way modern businesses innovate and operate. This seismic shift has been accelerated by enterprises’ move to cloud-based SaaS models and the internet becoming the new corporate network -- shattering 30 years of IT networking and security principles. While direct-to-internet connectivity for access to cloud applications and workloads has democratized information flow and improved business agility, it has also destroyed the castle-and-moat security architecture exposing businesses to new threat vectors resulting in more large-scale security breaches. Zero trust starts with validating user identity combined with business policy enforcement based on contextual data from user, device, app and content to deliver authorized direct access to applications and resources. This means that no entity (user or application) is inherently trusted. Built on three fundamental tenets, the Zscaler Zero Trust Exchange makes the cloud safe by securely connecting the right users to the right applications. Connect users and applications to resources, not the corporate network, preventing lateral movement of threats, thus reducing security and business risk. Make applications invisible to the internet. Applications protected behind the Zero Trust Exchange are not visible and cannot be discovered, thus eliminating the attack surface. Use a proxy architecture, not a passthrough firewall, for content inspection and security. The only way to ensure effective cyber threat defense and data protection is by requiring content inspection, including encrypted traffic, and policy enforcement, before it reaches its intended destination. Platform: New Security Solutions to Take Advantage of the Most Advanced Zero Trust PlatformStudies show that 77% of IT security teams believe they will move to a hybrid working model1 resulting in the need for new and advanced security requirements. The introduction of three innovations for the Zero Trust Exchange platform helps IT security teams bring zero trust security to every digital business, strengthens safe web access, and dramatically simplifies the adoption of zero trust policies. Extending Cloud-Native Zero Trust On-Premises – The new Zscaler ZPA™ Private Service Edge software makes ZPA the only cloud-native solution that spans both cloud and on-premises environments. Hosted by the customer but managed by Zscaler, it securely brokers users to private applications and removes the need for on-premises network segmentation. This makes ZPA Private Service Edge ideal for on-premises environments and locations subject to internet access challenges by providing local brokering between on-premises users and latency-sensitive applications, resulting in greater performance for users, less complexity for network admins, and less risk for business data. ZPA Private Service Edge is generally available today. Mitigating Web-based Attacks and Data Leakage – A majority of external attacks target users through their web browsers, making browsers a large surface area for threats. Zscaler’s new, natively integrated Cloud Browser Isolation solution creates an isolated browsing session that enables users to access any webpage on the internet without allowing sensitive data to flow down to the local device or the corporate network. Users do not directly access active web content, preventing the delivery of malicious code. Cloud Browser Isolation allows customers to offer a safer web experience while helping ensure sophisticated attacks, ransomware, or data exfiltration will not impact endpoints or targeted users.Simplifying Security Policies Through Automation – New APIs automatically create policies for newly discovered services and revokes user access based on time settings. Machine learning (ML) enhancements allow for auto-segmentation of application workloads. These innovations speed up the time it takes to set policies and simplifies micro-segmentation - freeing up time to focus on other vital projects. People: Elevating the Role of IT Executives and Delivering Advanced Skills for Security Practitioners Elevating the Role of IT Executives – The newly formed REvolutionaries forum is an online CXO community for IT leaders to learn techniques for advancing their zero trust strategy, engage in executive-only events, and evaluate the maturity of their digital transformation journey. Offering Advanced Skills Training for Security Practitioners – To train IT practitioners on best practices for using zero trust services, Zscaler has formed the Zero Trust Academy, a certification training program focused on securing access to private apps, SaaS apps, and the internet with Zscaler solutions. Process: Validated Designs and Blueprints to Facilitate Zero Trust Deployments Building a Programmatic Path to Zero Trust - Zscaler’s Zero Trust Ecosystem of technology partners have made it easier for IT practitioners to modernize their legacy security models. New joint validated designs provide the blueprints with prescriptive guidance for security architects to simplify rapid deployments of zero trust security architectures. Visit the Zscaler Zero Trust Ecosystem to access resources from global partners and market leaders, such as CrowdStrike, IBM Security, Microsoft, Okta, Ping Identity, SailPoint, SentinelOne, Splunk, and VMware CarbonBlack across identity management, endpoint security, and security operations. “The accelerated adoption of digital transformation compounded with more employees working from anywhere has opened the floodgates to targeted cyber attacks. Security teams face challenges everyday posed by managed and unmanaged endpoints and identities, streams of unfiltered data, and the complexity of managing user access to critical business applications,” said Amol Kulkarni, chief product officer at CrowdStrike. “CrowdStrike’s Zero Trust Assessment provides continuous, real-time security device posture assessments and Zscaler’s frictionless integration with ZTA provides an identity and data-centric approach for dynamic conditional access to applications. The integration delivers customers a holistic zero trust solution that encompasses data, people, devices, workloads and networks.” “As enterprises continue to adopt a cloud-first strategy, a cloud-native zero trust security model has become a necessity,” said Sendur Sellakumar, CPO and SVP of Cloud, Splunk. “Splunk and Zscaler have jointly developed design guides and robust product integrations to help IT security teams prevent and detect attacks, dynamically control policy and risk, and accelerate threat response in alignment with zero trust best practices.” A complete list of quotes from our supporting partners can be found at https://www.zscaler.com/partners/technology/zero-trust-quotes. Industry Analyst Quote“Thanks to cloud and mobility, our infrastructure, applications and data are everywhere, and as a result of the growing work-from-home (WFH) phenomenon, users are now more scattered than ever,” said Eric Hanselman, Principal Research Analyst, 451 Research, part of S&P Global Market Intelligence. “Perimeter-based controls are thus quickly becoming obsolete, making the zero trust approach of using a cloud-native architecture to disperse security controls for performance and scale the more appealing way to protect businesses.2” Additional Information ESG Research Report: The State of Zero-trust Security Strategies - https://www.esg-global.com/research/esg-research-report-the-state-of-zero-trust-security-strategies To learn more about this announcement see https://www.zscaler.com/zero-trust-moment. About ZscalerZscaler (NASDAQ: ZS) accelerates digital transformation so customers can be more agile, efficient, resilient, and secure. The Zscaler Zero Trust Exchange platform protects thousands of customers from cyberattacks and data loss by securely connecting users, devices, and applications in any location. Distributed across more than 150 data centers globally, the SASE-based Zero Trust Exchange is the world’s largest in-line cloud security platform. Zscaler™ and the other trademarks listed at https://www.zscaler.com/legal/trademarks are either (i) registered trademarks or service marks or (ii) trademarks or service marks of Zscaler, Inc. in the United States and/or other countries. Any other trademarks are the properties of their respective owners. Media Contact:Natalia Wodeckipress@zscaler.com 1 2021 VPN Risk Report, Cybersecurity Insiders, https://info.zscaler.com/resources-industry-reports-vpn-risk-report-cybersecurity-insiders 2 451 Research, part of S&P Global Market Intelligence, 2021 Trends in Information Security, December, 2020

  • Zscaler (ZS) to Buy Trustdome to Boost Cloud Protection Portfolio
    Zacks

    Zscaler (ZS) to Buy Trustdome to Boost Cloud Protection Portfolio

    The acquisition will not only help Zscaler (ZS) tap into the Israeli market where it plans to expand presence, but will also embolden its CSPM platform.

  • Zscaler Addresses Entitlement Gap for Cloud Workloads with Acquisition of Trustdome
    GlobeNewswire

    Zscaler Addresses Entitlement Gap for Cloud Workloads with Acquisition of Trustdome

    Trustdome’s CIEM Innovations to Strengthen Zscaler Zero Trust Exchange Cloud Protection Capabilities Delivering Customers a Simple, Secure Path to Embrace Public Cloud SAN JOSE, Calif., April 15, 2021 (GLOBE NEWSWIRE) -- Zscaler, Inc. (NASDAQ: ZS), the leader in cloud security, today announced that it has entered into a definitive agreement to acquire Trustdome, a leading innovator in Cloud Infrastructure Entitlement Management (CIEM). Trustdome’s development team and CIEM technology will be combined with Zscaler’s existing Cloud Security Posture Management (CSPM) platform, as part of Zscaler Cloud Protection (ZCP)™, providing a comprehensive solution for reducing public cloud attack surfaces and improving security posture. With this acquisition, Zscaler also expands its global footprint with its first development center in Israel, where the company plans to continue investment. “We are extending our vision for Zscaler Cloud Protection to help customers securely embrace public cloud platforms and services in today’s cloud-first world,” said Jay Chaudhry, CEO, chairman and founder, Zscaler, Inc. “The addition of Trustdome’s team and innovations in CIEM will strengthen our Cloud Protection portfolio by enforcing least privilege principles across multi-cloud environments while giving DevOps the freedom to innovate. I am very excited to welcome the Trustdome team to the Zscaler family, and look forward to growing Zscaler’s R&D presence in Israel.” Enterprise cloud environments can have hundreds of millions of discrete permissions granted to both humans and cloud services, including unused permissions, non-federated dormant accounts, and misconfigured permissions. Left unchecked, these permissions become an easy path for attackers to infiltrate cloud deployments. Trustdome’s CIEM platform helps solve this problem by providing full governance over who and what has access to data, applications and services in public cloud environments. “Entitlements and permissions are quickly becoming the biggest security challenge in the public cloud. The Trustdome team has built an innovative platform to solve this challenge while allowing development and DevOps teams to maintain speed and agility,” said Ofer Hendler, CEO of Trustdome. “We look forward to joining the Zscaler family and accelerating our innovation engine to solve the cloud protection challenges facing the enterprise.” The transaction is expected to close prior to the completion of Zscaler’s fiscal third quarter subject to the satisfaction of customary closing conditions. Terms of the transaction were not disclosed. For additional details, please read the official blog: Entitlements: The Most Overlooked Risk in the Public Cloud. Forward-Looking Statements This press release contains forward-looking statements that are based on our management's beliefs and assumptions and on information currently available to our management. These forward-looking statements include our intention to acquire Trustdome, the timing of when the acquisition will be completed and the expected benefits of the acquisition to Zscaler’s product offerings and to our customers. These forward-looking statements are subject to the safe harbor provisions created by the Private Securities Litigation Reform Act of 1995. A significant number of factors could cause actual results to differ materially from statements made in this press release, including those factors related to our ability to successfully integrate Trustdome technology into our cloud platform and our ability to retain key employees of Trustdome after the acquisition. Additional risks and uncertainties are set forth our most recent Quarterly Report on Form 10-Q filed with the Securities and Exchange Commission (“SEC”) on March 4, 2021, which is available on our website at ir.zscaler.com and on the SEC's website at www.sec.gov. Any forward-looking statements in this release are based on the limited information currently available to Zscaler as of the date hereof, which is subject to change, and Zscaler will not necessarily update the information, even if new information becomes available in the future. About Zscaler Zscaler (NASDAQ: ZS) accelerates digital transformation so customers can be more agile, efficient, resilient, and secure. The Zscaler Zero Trust Exchange protects thousands of customers from cyberattacks and data loss by securely connecting users, devices, and applications in any location. Distributed across more than 150 data centers globally, the SASE-based Zero Trust Exchange is the world’s largest in-line cloud security platform. Zscaler™ and the other trademarks listed at https://www.zscaler.com/legal/trademarks are either (i) registered trademarks or service marks or (ii) trademarks or service marks of Zscaler, Inc. in the United States and/or other countries. Any other trademarks are the properties of their respective owners. Media Contact:Pavel Raddapradda@zscaler.com Investor Relations Contact:Bill Choi, CFAir@zscaler.com