DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Tech News

Zscaler Launches Zscaler Cellular TO Secure Communications For IoT And OT Devices

DigitalCIO Bureau by DigitalCIO Bureau
July 8, 2025
in Tech News
0
Report Finds a 400% Increase in IoT and OT Malware Attacks
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Zscaler has extended the AI-powered Zscaler Zero Trust Exchange platform with the launch of Zscaler Cellular. This easy to install innovation enables Zero Trust communication for IoT and OT devices using only a cellular SIM card—eliminating the need for additional software or ineffective VPN connections. Zscaler Cellular delivers resilient connectivity by ensuring IoT/OT devices automatically connect to any cellular network globally, while providing zero attack surface by isolating each device on its own private island, with all connections securely routed through the Zscaler platform.

“Zscaler pioneered Zero Trust architecture; first with the introduction of Zero Trust for Users, then with Zero Trust for Cloud, followed by Zero Trust for Branch,” said Nathan Howe, Group VP of Emerging Technologies at Zscaler. “With the introduction of Zscaler Cellular, we have extended the power of the Zero Trust Exchange to IoT and OT devices with an easy ‘install and go’ SIM card that securely connects to any cellular network. This innovative solution provides customers with resilient connectivity, isolates each device to remove the attack surface, and ensures all inbound and outbound connections are protected through the Zero Trust Exchange.”

As enterprises rapidly deploy IoT/OT devices across diverse environments, traditional firewall and VPN-based security models fail to meet the demands of today’s mobile and distributed organizations, leaving devices exposed to cyber threats. Legacy approaches rely on costly infrastructure that cannot scale and cellular networks by themselves aren’t designed to enforce Zero Trust principals resulting in security blind spots and expanding attack surfaces.

“Zscaler Cellular solved our long-standing challenge: how to effectively secure the IoT and mobile devices that we deploy at clients’ and customers’ properties,” said Brian Shelby, Director of IT Infrastructure and Cybersecurity at Maverick Transportation. “We need to operate these tablets, time-tracking devices, and more on sites where we have no control over the networking options provided or the operating environment, and without adding software agents or using remote access VPNs. The solution allowed us to create device-bound authentication through Zscaler. This became our test case, and after equipping kiosks with Zscaler Cellular, our Zero Trust policies are enforced through the Zscaler Cellular Edge. The lines are gone, the employee experience is better, our business is still protected, and we don’t need a software agent or VPN on the device.”

Partnering with Telcos to Build a Foundation for Zero Trust Security at Scale

Zscaler partners with leading telecommunications companies to bring advanced Zero Trust security to cellular-connected devices. By leveraging the Zscaler Zero Trust Exchange platform with telecom infrastructure, Zscaler Cellular delivers secure, scalable, and seamless connectivity for IoT and OT devices. Through solutions like Zscaler Cellular and Zscaler Cellular Edge, and collaborations with providers such as Stacuity and BT, enterprises gain managed security services that address the unique challenges of securing distributed, cellular-connected environments. These partnerships ensure organizations can extend Zero Trust principles across global cellular networks, reducing risks and enabling secure digital transformation at scale.

“Zscaler Cellular represents a significant advancement in IoT and mobile security,” said Zeus Kerravala, founder and principal analyst, ZK Research. “By leveraging Zero Trust with cellular networks, Zscaler helps eliminate longstanding visibility and control gaps that have plagued enterprises for years. It’s the first solution I’ve seen that brings cloud-scale security to every connected device—with the simplicity of activating a SIM.”

Tags: Zscaler
Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

Trend Micro Closes Vulnerabilities in Apex Central

by DigitalCIO Bureau
January 9, 2026
0
Financial organizations receive an average of 2200+ application security vulnerability alerts every month: Dynatrace CISO Regional Bank 2023 report

The National Cyber ​​Security Centre (NCSC) is warning of vulnerabilities in Trend Micro Apex Central. These vulnerabilities could potentially cause a Denial-of-Service (DoS) attack. Updates addressing the vulnerability...

Read moreDetails

Aditya Birla Ventures invests in GenAI Company Articul8 AI

by DigitalCIO Bureau
January 9, 2026
0
AMD Acquires Open-Source AI Software Expert Nod.ai

Aditya Birla Ventures has announced its investment in the first tranche of Articul8 AI, Inc.’s oversubscribed Series B financing round. Articul8 AI, an enterprise generative AI (GenAI) software...

Read moreDetails

Snowflake Acquires Observe

by DigitalCIO Bureau
January 9, 2026
0
CRISIL To Acquire Bridge To India Energy

Snowflake has signed a definitive agreement to acquire Observe, a leader in AI-powered observability. With this acquisition, Snowflake will deliver the next generation of AI-powered observability, built on open standards...

Read moreDetails

CrowdStrike Acquires Identity Security Startup SGNL

by DigitalCIO Bureau
January 9, 2026
0
CrowdStrike Launches on Amazon Business

CrowdStrike has signed a definitive agreement to acquire SGNL, a leader in Continuous Identity. This acquisition will accelerate CrowdStrike’s leadership in Next-Gen Identity Security, enabling access for human, non-human (NHI),...

Read moreDetails

Veeam Closes Security Vulnerabilities in Backup & Replication Software

by DigitalCIO Bureau
January 8, 2026
0
Veeam Updates Ransomware Protection and Security for Kubernetes with New Release of Kasten by Veeam K10 V6.5 

Veeam is addressing several security vulnerabilities in its Backup & Replication software. These include a critical vulnerability that could allow remote code execution. The vulnerability, designated CVE-2025-59470, has...

Read moreDetails
Next Post
IBM Rolls out IBM Power11 Servers

IBM Rolls out IBM Power11 Servers

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

Trend Micro Named a Leader in Attack Surface Management in New Report

Trend Micro introduces Agentic SIEM

August 26, 2025
CleverTap Unveils Signed Call For Trusted and Contextual Customer Engagement 

CleverTap Unveils Signed Call For Trusted and Contextual Customer Engagement 

December 9, 2023
Agentic AI Reshaping CX

Agentic AI Reshaping CX

June 6, 2025

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Barracuda Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud IBM Infographics Internet of Things (IoT) Kaspersky Microsoft New Relic NTT DATA NVIDIA Palo Alto Networks Panel Discussion Qlik Salesforce ServiceNow Sophos Tenable Trend Micro Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?