Zscaler is set to be the industry’s first security vendor to integrate active defence into a Zero Trust architecture

Zscaler will acquire Smokescreen in order to enhance Zscaler Zero Trust Exchange with advanced active defence Capabilities.

Zscaler, the leader in cloud security, today announced that it has entered into a definitive agreement to acquire Smokescreen Technologies, a leader in active defence and deception technology. Smokescreen’s cutting edge capabilities will be integrated into the Zscaler Zero Trust Exchange™, further building upon Zscaler’s ability to precisely detect the most sophisticated, highly targeted attacks, ransomware, and lateral movement attempts. Additionally, Smokescreen will help provide rich threat intelligence and telemetry for the Zscaler team to proactively hunt for emerging adversary tactics and techniques. The transaction is subject to standard closing conditions and is expected to close during Zscaler’s fiscal fourth-quarter ending July 31, 2021.

proactive, not reactive

“Alert volume has never been higher. Security teams can’t separate the signal from the noise to take a proactive stance against the most stealthy attackers,” said Sahir Hidayatullah, CEO at Smokescreen. “As analysts lose time chasing ghosts, the role of active defence has never been more critical. By taking the fight to the attacker, leading them down false paths with decoys deployed across networks, endpoints, and applications, and gathering the highest-fidelity security telemetry, we can dramatically speed up threat hunting and containment. We are thrilled to join Zscaler and look forward to integrating our technology into the world’s leading zero trust platform.”

In contrast to traditional reactive security measures, active defence uses proactive tactics to thwart the most advanced attackers with high-confidence detections across the lifecycle of an attack. It allows businesses to rebalance the defensive equation in their favour, identifying intrusions before attackers compromise vital company data and resources. Smokescreen is fully aligned with MITRE Shield, a framework for organisations to effectively apply active defence in their security operations workflows.

READ MORE:

“Today’s most sophisticated cyber threats, like the recent Colonial Pipeline ransomware attack, require immediate, high-confidence detections to drive effective response,” said Jay Chaudhry, CEO, chairman and founder, Zscaler. “Zscaler is proud to be the industry’s first security vendor to extend a zero trust architecture with integrated active defence and deception capabilities. With the addition of Smokescreen to our Zero Trust Exchange, our customers will be able to change the economics of cyberattacks by making them far more costly, complex and difficult for the adversary both before and during their attempted intrusions. I am pleased to welcome the Smokescreen team to the Zscaler family, and I look forward to our continued innovations in cybersecurity.”

For more news from Top Business Tech, don’t forget to subscribe to our daily bulletin!

Follow us on LinkedIn and Twitter

Amber Donovan-Stevens

Amber is a Content Editor at Top Business Tech

Tech and Business Outlook: US Confident, European Sentiment Mixed

Viva Technology • 11th February 2025

The VivaTech Confidence Barometer, now in its second edition, reveals strong confidence among tech executives regarding the impact of emerging technologies on business competitiveness, particularly AI, which is expected to have the most significant impact in the near future. Surveying tech leaders from Europe and North America, 81% recognize their companies as competitive internationally, with...

How smart labels are transforming supply chains

Sharath Muddaiah • 27th January 2025

As e-commerce continues to rise globally, the impact of just-in-time manufacturing and rising consumer expectations mean the need for real-time visibility has never been greater. Smart labels directly address this demand, offering solutions to long-standing challenges like shipment delays, theft, and the lack of traceability. With the smart label market projected to grow from $14.1...

The rise of loyalty apps

Sue Azari • 17th January 2025

Increased choice and a consumer more price sensitive than ever before, has made customers far more likely to shop around for the best deals. Price is now the number one factor in brand consideration. In an effort to bag a bargain, loyalty programs have become increasingly popular with consumers, with nine out of ten in...

Rocket launch challenges Elon Musk’s space dominance

Professor Sultan Mahmud • 16th January 2025

Amazon founder Jeff Bezos’s space company has blasted its first rocket into orbit in a bid to challenge the dominance of Elon Musk’s SpaceX. The New Glenn rocket launched from Cape Canaveral Space Force Station in Florida at 02:02 local time (07:02 GMT). It firmly pits the world’s two richest men against each other in...

Giesecke+Devrient launches new Smart Label at CES 2025

Giesecke Devrient • 06th January 2025

G+D has today launched the G+D Smart Label, its innovative tracking solution that transforms any package into an IoT device. Ultra-thin and only slightly larger than a credit card, the new Smart Label proposition has been jointly developed by G+D in conjunction with its hardware partner, Sensos to enable cost-effective, accurate location tracking for a...

Choose an AI solution to transform beyond technology

Kit Cox • 09th December 2024

The first step is knowing exactly what your business wants to achieve with AI; think faster, smarter and more efficient. Once you know what you are working towards, you can start looking for a solution that can help you make it a reality. AI integration can feel like a daunting task at the beginning, so...

A Roadmap to Security and Privacy Compliance

John Lynch Director of Kiteworks • 04th December 2024

Only by understanding the current regulatory environment and implementing robust data protection measures, can organisations enhance their security posture, ensure compliance, and build resilience against the latest cyber threats. This article provides a comprehensive roadmap of how to do it.