The world’s only
Data Fabric for Security

Diagram showing the data sources layer, the data fabric and AI services layer, and the apps layer.

Note: UVM supports any combination of first-party and third-party data (no Zscaler dependency)

The Data Fabric for Security provides the foundational capabilities that fuel current and future Zscaler applications. The data model at the heart of the data fabric is both opinionated — that is, built to serve security use cases — and flexible, providing the ability to add any data source needed.

Today, the data fabric fuels Zscaler-built applications. We envision a future where customers will be able to build their own applications on top of this powerful Data Fabric for Security.

Key capabilities of the
Data Fabric for Security

Ingest

The data fabric can take in data from any source, with support for JSON, JSONL, CSV, ZIP, XML, ZST, and ZSTD formats. We support 150+ pre-built connectors, and we simply need to provide credentials to connect to that source. For new sources, we can pull in a data file, to support a Proof of Value for example, and it takes only a couple weeks to develop new connectors.

Harmonize and Map

The data fabric normalizes entities of the same type but named differently. It also maps the source data to the entity name in the data model, and customers can add any entity to the model at any time.

Deduplicate

Multiple tools will report on the same assets, vulnerabilities, users, and so on, so the data fabric identifies and deduplicates these findings. As a result, customers gain an accurate view into asset count, CVE count, and other factors, and the system consolidates the same needed remediations into a single work item.

Correlate and Enrich

The data fabric recognizes when multiple tools are sharing details related to the same entity, such as an EDR tool sharing the OS version running on a given endpoint and an asset management tool sharing the device name. The data fabric correlates the info related to the same entity, enriching the collective understanding about that entity.

Learn how the Data Fabric drives Unified Vulnerability Management

Want to learn more?

Request a demo