May 2017

Zscaler provides transparency around service availability and changes to our customers. Please refer to Zscaler’s service continuity customer notification policy for details.

Zurich Data Center Issue

We are investigating an issue with our Zurich data center. Traffic has been re-routed to the next closest datacenter while we investigate. We will post additional information on this incident as it is available.
Update: 5/27/2017 22:11:37 UTC - This incident has been resolved. Please contact Zscaler Support if you have additional questions.
Scheduled For: May 26, 2017 | 1:00 UTC - 3:00 UTC
San Jose DC Scheduled Maintenance

Zscaler will be performing planned maintenance in our San Jose IV (SJC4) datacenter on Thursday, May 25 at 6 pm PDT. (May 26 at 01:00 UTC)

This maintenance is expected to last up to a maximum of 2 hours. During such window customers' traffic to the San Jose DC might be affected.

Maintenance Window

Start time is May 25 at 6 pm PDT. (May 26 at 01:00 UTC)

End time is May 25 at 8 pm PDT. (May 26 at 03:00 UTC)


This activity has been completed.

Google Docs Phishing campaign – May 3, 2017

Update May 4, 2017: We  would like to clarify that Zscaler customer data, logs, policy data as well as cloud infrastructure were not impacted by this phishing campaign and do not utilized any Google services or applications.

An aggressive phishing campaign went viral earlier today, which impacted multiple Google users including enterprise Google deployments. A few Zscaler employees also received these phishing e-mails. The campaign involved an unsuspecting user receiving an email with a Google Doc link from one of their known contacts. If the user clicks on the link and further grants access, their contacts would be leveraged to send the same phishing e-mail with a link from the impacted user account.

The attack involved squatted domains that were recently registered and hosting the malicious web app. Zscaler implemented blocks for multiple domains tied to this campaign cloud wide within minutes of initial reports. Google was quick to resolve this issue and has posted official response here.

If you believe you clicked on such an email please go to g.co/SecurityCheckup as advised by Google Security team