Skip Navigation
Get a Demo
 
 
 
 
 
 
 
 
 

24/7 Threat Detection and Response

Red Canary & Zscaler

Get new insights from your ZIA telemetry and automatically update policies to contain threats.

Get a demo

Red Canary integrates with Zscaler to accelerate investigations and give you the quickest path from detection to protection.

Red Canary and Zscaler integration infographic

Quicker context for investigations

See relevant ZIA web logs and insights directly in Red Canary—eliminating console-hopping, filtering out activity ZIA already blocked, and giving analysts the context they need to quickly validate true threats.

Screenshot of how investigation insights look in the tool

Screenshot of how triggers look in the tool

Trigger network-level protection

Initiate ZIA response actions from Red Canary or set them to trigger automatically.

  • Add domains, URLs, or IPs to block lists
  • Apply browser isolation or conditional access policies
  • Add malicious file hashes to the ZIA Sandbox denylist

Saving time icon

Accelerate investigations

Make the jump from “logs” to “insights” without swiveling

Streamlining icon

Streamline response

Take the quickest path from detection to protection

Focus Icon

Focus on true positives

Immediately see if ZIA has already blocked activity


Datasheet

Red Canary and ZIA

Blog

Use Response Actions to Update Zscaler Policies and Block Threats

Security gaps? We got you.

Sign up for our monthly email newsletter for expert insights on MDR, threat intel, and security ops—straight to your inbox.


 
 
Back to Top