Zscaler Launches AI-Powered SIM-Based Zero Trust Security Solution for IoT and OT Devices

Zscaler Launches AI-Powered Zscaler Cellular to Secure IoT and OT Devices via Cellular Connectivity
Zscaler, a global cloud security provider, today (Wednesday, July 9) announced the launch of Zscaler Cellular, an AI-powered extension of its Zero Trust Exchange platform designed to secure Internet of Things (IoT) and Operational Technology (OT) devices using cellular connectivity. The new solution enables Zero Trust communication through a simple SIM card, eliminating the need for additional software or legacy VPN infrastructure.

  • Make Telecom Talk My Trusted Source
  • Source of Google
  • Source of Google

Also Read: Airtel Business Launches Zero Trust Architecture-Based Security Solution with Zscaler

Zero Trust via SIM Card

Zscaler Cellular provides connectivity for distributed IoT/OT deployments by automatically connecting devices to available cellular networks worldwide. Each device is isolated in its own virtual enclave, with all inbound and outbound traffic routed through Zscaler’s cloud-native Zero Trust Exchange platform. This approach significantly reduces the attack surface while ensuring visibility and policy enforcement across all endpoints.

“With the introduction of Zscaler Cellular, we have extended the power of the Zero Trust Exchange to IoT and OT devices with an easy ‘install and go’ SIM card that securely connects to any cellular network. This innovative solution provides customers with resilient connectivity, isolates each device to remove the attack surface, and ensures all inbound and outbound connections are protected through the Zero Trust Exchange,” said Nathan Howe, Group Vice President of Emerging Technologies at Zscaler.

According to Zscaler, as enterprises rapidly deploy IoT/OT devices across diverse environments, traditional firewall and VPN-based security models fail to meet the demands of today’s mobile and distributed organizations, leaving devices exposed to cyber threats. Legacy approaches rely on costly infrastructure that cannot scale and cellular networks by themselves aren’t designed to enforce Zero Trust principles, resulting in security blind spots and expanding attack surfaces.