Zenith Live 2024
Logotype for Zscaler Inc

Zscaler (ZS) Zenith Live 2024 summary

Event summary combining transcript, slides, and related documents.

Logotype for Zscaler Inc

Zenith Live 2024 summary

2 Feb, 2026

Strategic platform expansion and innovation

  • Platform now covers users, workloads, IoT, OT, and B2B, with a focus on Zero Trust, AI-driven insights, and 150+ integrations.

  • Serviceable addressable market has grown from $72B to $96B, driven by data protection, Zero Trust factories, and actionable insights applications.

  • Acquisitions like Airgap and Avalor enhance factory IoT/OT security and unified vulnerability management.

  • AI cloud and Data Fabric initiatives harmonize 400B daily transactions for real-time, contextual risk scoring and analytics.

  • Zero Trust SD-WAN and device segmentation enable secure, simplified connectivity for branches, factories, and IoT/OT devices.

Data protection and Zero Trust networking

  • Data protection portfolio now addresses structured/unstructured data, all channels, and all data states, consolidating legacy DLP and CASB solutions.

  • Addressable market for data protection has doubled to $20B, with large wins in banking, financial services, and technology sectors.

  • Zero Trust Networking disrupts legacy SD-WAN and firewall models, enabling secure, agentless connectivity for all devices, including IoT/OT.

  • Airgap acquisition brings Zero Trust to LAN, expanding the opportunity to secure billions of additional devices and critical infrastructure.

  • Inline inspection and threat prevention protect sensitive data from both external and insider threats in real time.

Risk management and security posture

  • Risk360 provides holistic, AI-driven risk assessment, with a risk score of 24.1, well below the peer average of 50.0.

  • Data loss and lateral propagation risks are below peer benchmarks due to advanced segmentation and less risky app usage.

  • Financial risk exposure is $9.7M, much lower than the peer average of $39M, reflecting strong security controls.

  • Key recommendations include discontinuing VPNs, implementing posture checks, and reviewing SaaS access.

  • Weekly CISO reports and cybersecurity maturity assessments support ongoing risk management and compliance.

Partial view of Summaries dataset, powered by Quartr API
AI can get things wrong. Verify important information.
All investor relations material. One API.
Learn more