Accelerate the transformation towards Zero Trust access by bringing VoIP, Server to client and other legacy applications over to Zscaler Private Access (ZPA).

Customer Challenges

The traditional architecture of on-premises VoIP systems, such as Cisco Jabber, Genesys, and Avaya Call Manager, as well as server-to-client applications like SCCM and network-connected applications including follow-me printers and active FTP, fundamentally relies on direct IP-to-IP communication.This setup requires the source and destination IP addresses to interact without intermediaries like proxies or NAT devices. However, this approach stands in contrast to the principles of Zero Trust security models.
Organizations require dedicated time and resources to effectively migrate or modernize their applications while ensuring secure access to these resources.
Relying on legacy VPN solutions to meet these needs often results in increased operational costs, added complexity, and heightened security risks.

Introducing the VPN service (for legacy apps) designed to manage exception traffic, specifically for VoIP and S2C applications, while facilitating the transition to a zero trust network architecture.

This solution ensures continued access to applications that are not immediately adaptable to zero trust access, thereby minimizing disruption during the migration process to critical applications.

The Zscaler Private Access (ZPA) achieves this by establishing an alternate path (Second Tunnel) from the Zscaler Client Connector (ZCC) to the Zero Trust Exchange (ZTE).

High-level solution design:

Network Connectors (NC) can be deployed in datacenter/campus locations hosting VoIP servers and other server-to-client (S2C) systems. These connectors initiate an outbound connection to the ZTE, establishing a secure tunnel between the connector and the ZTE.
Zscaler Client Connector (ZCC) builds a secondary tunnel specifically for users authorized for VPN services, also connecting to the ZTE. The ZCC is configured to forward traffic through this alternative path based on the configuration parameters set by the administrator.
ZTE integrates the connection between the ZCC and the NC, creating an end-to-end encrypted pathway that facilitates secure communication for these applications.

ZPA now supports VoIP and other server-to-client (S2C) applications. This enables customers to move all their applications and streamlines operations by consolidating their secure remote access solution with Zscaler Private Access.

Check out the latest product innovations with ZPA in addition to network connectivity. And read the Forrester Total Economic Impact study to learn how ZPA customers have realized 289% ROI.

Contact your regional sales team to learn more about the solution and get a free 30 day trial to explore the solution.  

​[#item_full_content] [[{“value”:”Accelerate the transformation towards Zero Trust access by bringing VoIP, Server to client and other legacy applications over to Zscaler Private Access (ZPA).

Customer Challenges

The traditional architecture of on-premises VoIP systems, such as Cisco Jabber, Genesys, and Avaya Call Manager, as well as server-to-client applications like SCCM and network-connected applications including follow-me printers and active FTP, fundamentally relies on direct IP-to-IP communication.This setup requires the source and destination IP addresses to interact without intermediaries like proxies or NAT devices. However, this approach stands in contrast to the principles of Zero Trust security models.
Organizations require dedicated time and resources to effectively migrate or modernize their applications while ensuring secure access to these resources.
Relying on legacy VPN solutions to meet these needs often results in increased operational costs, added complexity, and heightened security risks.

Introducing the VPN service (for legacy apps) designed to manage exception traffic, specifically for VoIP and S2C applications, while facilitating the transition to a zero trust network architecture.

This solution ensures continued access to applications that are not immediately adaptable to zero trust access, thereby minimizing disruption during the migration process to critical applications.

The Zscaler Private Access (ZPA) achieves this by establishing an alternate path (Second Tunnel) from the Zscaler Client Connector (ZCC) to the Zero Trust Exchange (ZTE).

High-level solution design:

Network Connectors (NC) can be deployed in datacenter/campus locations hosting VoIP servers and other server-to-client (S2C) systems. These connectors initiate an outbound connection to the ZTE, establishing a secure tunnel between the connector and the ZTE.
Zscaler Client Connector (ZCC) builds a secondary tunnel specifically for users authorized for VPN services, also connecting to the ZTE. The ZCC is configured to forward traffic through this alternative path based on the configuration parameters set by the administrator.
ZTE integrates the connection between the ZCC and the NC, creating an end-to-end encrypted pathway that facilitates secure communication for these applications.

ZPA now supports VoIP and other server-to-client (S2C) applications. This enables customers to move all their applications and streamlines operations by consolidating their secure remote access solution with Zscaler Private Access.

Check out the latest product innovations with ZPA in addition to network connectivity. And read the Forrester Total Economic Impact study to learn how ZPA customers have realized 289% ROI.

Contact your regional sales team to learn more about the solution and get a free 30 day trial to explore the solution.”}]]