Zscaler Operations Manual

Free blog posts on effective Zscaler operations. 

Kevin Peterson, CISSP

Kevin Peterson is the founder and cybersecurity practice lead at ZecurityAscent. His background includes: 3.5 years at Zscaler as Director, Security & Network Transformation; 8 years at McKesson (Fortune 5), the last 2 as a business unit security officer / cloud application security lead across all business units (introduced Zscaler); and 7.5 years at Juniper Networks as Sr. Product Manager for the Pulse Secure SSL VPN. Adding to this is his own professional brand as an author, blogger, speaker, InfraGard board member, former police officer, pilot, and United States Air Force veteran.
Find me on:

Recent Posts

ZPA Loves Microsoft SCCM

As major global companies continue to march toward Zero Trust Network Access (ZTNA), there are a few applications out there that, at least initially, seem to be incompatible with each other. One such pairing is with Microsoft's System Center Configuration Manager ...
CyberSecurity Zscaler ZPA

Sharpening Up Web Meetings with Zscaler Internet Access

If you ever want to see me really swing into action, just even hint that users are having a less-than-optimal experience with their web meetings (Skype for Business, Microsoft Teams, Zoom, WebEx, Kontiki, BlueJeans...). This is the moment where I pretty much drop ...
CyberSecurity Zscaler ZIA

Zscaler Cloud Firewall: Default Deny in 3 Easy Steps

Enhancing Cloud Firewall Security Every now and then I walk into a Zscaler Internet Access (ZIA) customer environment where the default firewall rule is set to allow, rather than deny. Generally this is a holdover from the pre-sales proof-of concept (PoC). It's ...
CyberSecurity Zscaler ZIA Zscaler Internet Access
1