CASE STUDY
We were looking for a solution that supported our digital shift and provided the desired flexibility , availability and confidentiality . The switch to a cloud-based security service met our demand for security and enabled the network redesign to local Internet breakouts at the same time . The use of Zscaler Internet Access and Zscaler Private Access has changed the operational model of the whole IT department as we are now able to monitor all data streams in a single consolidated view , which has reduced the administrative burden enormously .
What business benefits have you seen since migrating over to the Zscaler Zero Trust Exchange platform and how resilient is your security posture today ?
When you are in charge of bringing a transformation strategy to life you continuously have to sell your vision to the business stakeholders and align technology with the business strategy . In the case of Zscaler ’ s Zero Trust , it was easy to convince the C-level as the platform provided the answer to many business cases . Mergers and acquisitions is one example of such a business case where Zscaler helped to unlock additional potential . Integrating the networks of two organisations is a very specialised and time-consuming process and really not the ideal situation from a security perspective as we are looking for more loosely connected scenarios . As a serial acquirer , Sandvik has now matured the process of delivering full connectivity to the applications of a bought organisation within a few hours by deploying Zscaler Private Access .
How connected and secure are your remote workers since the rollout and how does this allow for seamless operations across the business ?
When the pandemic started we were actually able to move our 42,000 global employees to Zscaler Private Access over a single weekend , which showcases the agility of a cloud-based model . Today , we don ’ t need to have the users on the network anymore . We are able to grant access on an application level , based on business policies .
The same strategy that is applied to user access can also be applied to IoT and OT environments and this is a tremendous shift in how we can secure the core of the company . Our mining equipment and machinery , such as our autonomously driven mining trucks , will become more and more data-driven . We are in the process of changing the way we operate our OT-infrastructure as well – with Zscaler enabling us to secure those workloads from the machines and other connected devices .
How important is Zero Trust for secure business performance ?
As an engineering company with operations in 160 countries , managing users and devices remotely can sometimes be challenging . With a Zero Trust-based security infrastructure we have found a way to combine new technologies with our business strategy of constant innovation . New approaches allow us to stay ahead of the game and with Zscaler we can unlock new potential and therefore we are constantly evaluating new opportunities for our business . p
www . intelligentcio . com INTELLIGENTCIO EUROPE 65