Zscaler WebSecurity

WeCloud offers the world's largest global security cloud from Zscaler to deliver a 100% cloud-based Internet security solution. The solution is based on a patented multi-node architecture that provides all the benefits of proactive, real-time security without the need to deploy and manage any hardware, software or agents.

With Zscaler's global proxy network, the IT department can promptly deliver an Internet Usage Policy adapted for users, groups, locations or activities - to anyone, anywhere and on any device.

WeCloud Zscaler WebSecurity

WebSecurity Full Content Inspection and Web filtering including anti-virus scanning of both incoming and outgoing traffic. Replaces traditional proxy solutions without the need for investment in hardware or unnecessary and expensive backhauling of web traffic.

Advanced Security Zscaler's unique APT protection includes Behavioral Analysis as well as full bi-directional deep packet analysis and automatically blocks attacks while logging all transactions in granular detail. 

Cloud Application Control Create and manage detailed policies for how cloud applications such as Dropbox, GMail and Office365 are used in your organization.

Bandwith Management Control how bandwidth is allocated between different Web applications, streaming, downloading or uploading large files to ensure that traffic for business critical apps is prioritized over that from non-business critical activities. 

Data Loss Prevention Create a corporate policy for both internal and external users allowing you to regulate and examine what information can be uploaded to the cloud based on HIIPA, GLBA, PCI, SOX and more.

Mobile Security Zscaler Mobile Security protects against browser based threats like phishing and spyware, as well as app-based threats and security/privacy risks from malicious or rogue apps.


  • Benefits
  • ScreenShots
  • System Requirements
Real time protection
  • Instant protection against threats and vulnerabilities without the need for manual updates
  • Secure, control and manage Web 2.0 applications and social media
  • Secure smartphones and tablets without the need for additional software
Quick and easy implementation
  • No local software requirement
  • Forward Traffic using PAC, GRE, IPSec
  • Simple Active Directory or SAML authentication
Minimal impact on performance and user experience
  • Near-Zero-Latency
  • Automatic connection to nearest datacenter
  • Control your network traffic
Real-time protection
  • No updating or downloading of local signature files
  • Protect Mobile users with the same high level of security outside the network as inside the network
  • All new threats are matched instantly against the constantly updated realtime database
Global coverage
  • The world's largest security cloud
  • Five 9s availability (Maximum 5.26 minutes annual downtime)
  • Near-Zero Latency - no noticeable impact on performance

Compatible with all systems
With an external solution there's no need to worry about compatibility issues. The service works with all computers, mobile phones and operating systems without the need for additional software or updates.

Integrate with ActiveDirectory or SAML 2.0
By connecting  with Active Directory or SAML 2.0, you can easily authenticate your users and take advantage of already existing groups and structure when you create rules for your web traffic.

Traffic Forwarding
GRE Tunnels: Set up rules for a firewall or router to create a secure GRE tunnel to the nearest proxy node. This is the preferred method of traffic when connecting from a fixed location because the GRE tunnels support both HTTP and HTTPS traffic, and they also support alternative nodes should the first node become unavailable.

Web Proxy Chaining: Web Proxy Chaining: An existing web proxy (eg, Blue Coat, Microsoft ISA, Squid) is configured to forward traffic to the node like the previously configured proxy.

Port Forwarding: Firewalls (such as Check Point & Juniper gateways) often allow HTTP traffic to be forwarded to an external host – in this case the nearest proxy node.

Browser Proxy Configuration: For users inside or outside the corporate network, the browser may itself be configured to forward traffic to a number of  nodes using a PAC file.

For configuration of a larger number of workstations a manual browser configuration is not practical. By using Microsoft Active Directory GPO you can create a proxy configuration and automatically push out the settings to the workstations.

When defining a proxy configuration in a browser you should use Zscalers dynamic hostname. Zscalers "GeoIP technology" will automatically identify the geographic location and return the IP address of the node that is geographically closest to the user who made the request.

For more flexibility and better control WeCloud recommend that you use a Proxy Auto Configuration File (PAC) to configure the proxy settings in the browser. The PAC file is stored in the cloud, freely accessible, and directs the browser dynamically to which node should handle the traffic.