Zpedia

Explore our full glossary

Zpedia

Explore our article library to learn about today’s essential security concepts, strategies, and technologies.

zscaler-zpedia-article-library
Zero Trust

Adopting a zero trust architecture is the most effective way to enforce policy, control risk, and verify identity and context.

Cyberthreat Protection

Threats are always evolving, and so are the solutions and strategies built to stop them.

Hybrid Workforce

Supporting today’s workers is as much about empowering them as it is keeping them safe.

Network Security

As the needs of today’s networks change, so has the very definition of network security.

Cloud Security

Amid the massive benefits and risks of the cloud, the right cloud security is paramount.

Data Protection

As the lifeblood of the modern enterprise, data must be secure anywhere it lives or flows.

Digital Experience Monitoring

Gain complete visibility over your environment, and identify and resolve performance issues with ease.

SecOps and Endpoint Security

Secure access to your most vulnerable assets should enable your business, not slow it down.

01 / 05

Explore Zpedia

Filter by

Category

What Is a Data Lake?

Hybrid Workforce, 

Data Protection 

Read the Article

What Is Cyber Asset Attack Surface Management (CAASM)?

Zero Trust, 

Cyberthreat Protection, 

Cloud Security, 

Data Protection 

Read the Article

What Is Artificial Intelligence (AI) in Cybersecurity?

Zero Trust, 

Cyberthreat Protection, 

Network Security, 

Data Protection, 

SecOps and Endpoint Security 

Read the Article

What Is a Zero Day Vulnerability?

Cyberthreat Protection, 

Network Security, 

Cloud Security, 

Data Protection, 

SecOps and Endpoint Security 

Read the Article

What Is Multifactor Authentication (MFA)?

Zero Trust, 

Hybrid Workforce, 

Data Protection, 

SecOps and Endpoint Security 

Read the Article

What Is Identity and Access Management (IAM)?

Zero Trust, 

Hybrid Workforce, 

Data Protection, 

SecOps and Endpoint Security 

Read the Article

VPN Security: Are VPNs Safe?

Zero Trust, 

Cyberthreat Protection, 

Hybrid Workforce, 

Data Protection, 

SecOps and Endpoint Security 

Read the Article

What Are Insider Threats?

Zero Trust, 

Cyberthreat Protection, 

Network Security, 

Data Protection, 

SecOps and Endpoint Security 

Read the Article

What Is the Monte Carlo Simulation?

Zero Trust, 

Cyberthreat Protection, 

Data Protection, 

SecOps and Endpoint Security 

Read the Article

What Is a Man-in-the-Middle (MiTM) Attack?

Cyberthreat Protection, 

Network Security, 

Cloud Security, 

Data Protection, 

SecOps and Endpoint Security 

Read the Article

What Is Privileged Remote Access (PRA)?

Zero Trust, 

Cyberthreat Protection, 

Hybrid Workforce, 

Data Protection, 

SecOps and Endpoint Security 

Read the Article

What Is Continuous Threat Exposure Management (CTEM)?

Cyberthreat Protection, 

Data Protection, 

SecOps and Endpoint Security 

Read the Article

What Is Vishing?

Cyberthreat Protection, 

Network Security, 

Cloud Security, 

Data Protection, 

SecOps and Endpoint Security 

Read the Article

What Is a Disaster Recovery Plan (DRP)?

Cyberthreat Protection, 

Cloud Security, 

Data Protection 

Read the Article

What Is External Attack Surface Management?

Cyberthreat Protection, 

Network Security, 

Cloud Security, 

Data Protection, 

SecOps and Endpoint Security 

Read the Article