Andrew Bonwick
Vice President of Product Development at Relm Insurance
Madhav Sheth
CEO of Ai+ Smartphone
Stephen Rose
CEO Render Networks


Zscaler, a global cloud security provider, today (Wednesday, July 9) announced the launch of Zscaler Cellular, an AI-powered extension of its Zero Trust Exchange platform designed to secure Internet of Things (IoT) and Operational Technology (OT) devices using cellular connectivity. The new solution enables Zero Trust communication through a simple SIM card, eliminating the need for additional software or legacy VPN infrastructure.
Also Read: Airtel Business Launches Zero Trust Architecture-Based Security Solution with Zscaler
Zero Trust via SIM Card
Zscaler Cellular provides connectivity for distributed IoT/OT deployments by automatically connecting devices to available cellular networks worldwide. Each device is isolated in its own virtual enclave, with all inbound and outbound traffic routed through Zscaler’s cloud-native Zero Trust Exchange platform. This approach significantly reduces the attack surface while ensuring visibility and policy enforcement across all endpoints.
“With the introduction of Zscaler Cellular, we have extended the power of the Zero Trust Exchange to IoT and OT devices with an easy ‘install and go’ SIM card that securely connects to any cellular network. This innovative solution provides customers with resilient connectivity, isolates each device to remove the attack surface, and ensures all inbound and outbound connections are protected through the Zero Trust Exchange,” said Nathan Howe, Group Vice President of Emerging Technologies at Zscaler.
According to Zscaler, as enterprises rapidly deploy IoT/OT devices across diverse environments, traditional firewall and VPN-based security models fail to meet the demands of today’s mobile and distributed organizations, leaving devices exposed to cyber threats. Legacy approaches rely on costly infrastructure that cannot scale and cellular networks by themselves aren’t designed to enforce Zero Trust principles, resulting in security blind spots and expanding attack surfaces.