Abhoy Kumar Sarkar, Regional Vice President - India, Zscaler
“We prioritize secure connectivity and simplification of network complexities to ensure our clients' peace of mind – which is why over 40% of Fortune 500 companies leverage our platform to protect their organizations.”
Abhoy Kumar Sarkar highlights Zscaler’s ZTNA solution, securing the remote workforce by enforcing zero trust principles like least privileged access. The approach ensures uncompromising protection against cyber threats, facilitating seamless remote operations.
Abhoy Kumar Sarkar, Regional Vice President, India at Zscaler, the cybersecurity landscape is characterized by a variety of threats, including ransomware, phishing, and AI-powered attacks. Sarkar emphasizes the importance of Zscaler Zero Trust Exchange, a purpose-built solution to combat evolving cyber threats. Over 40% of Fortune 500 companies leverage Zscaler's platform to protect their organizations. He emphasizes the significance of adhering to the highest standards of security, availability, confidentiality, and privacy to ensure transparency and accountability in all practices.
Abhoy points out, “We prioritize secure connectivity and simplification of network complexities to ensure our clients' peace of mind – which is why over 40% of Fortune 500 companies leverage our platform to protect their organizations. In fact, looking at our own backyard, we have helped more than 50% of IT services companies, four of the top private banks as well as the largest pharmaceutical company and the largest manufacturing conglomerate in India to secure its users and business operations.”
Abhoy Kumar Sarkar highlights the significance of Zscaler Zero Trust Exchange, ensuring the security of sensitive data. The platform is designed to minimize the attack surface, prevent compromise, eliminate lateral movement, and halt data loss. Zscaler prioritizes secure connectivity and simplification of network complexities to ensure clients' peace of mind. “Our commitment extends to responsible data handling. We share only a limited amount of personal data and do not process or store sensitive categories such as credit card or health information without authorization from the data controller. Our agreements with sub processors ensure compliance with data protection laws, maintaining trust and integrity in our operations,” he says.
See What’s Next in Tech With the Fast Forward Newsletter
Tweets From @varindiamag
Nothing to see here - yet
When they Tweet, their Tweets will show up here.