Securing the AI Era: Accelerating Zero Trust with Infosys Cyber Next and Zscaler

Cloud & SaaS adoption, AI sprawl, and AI-driven threats are expanding the attack surface while boards demand productivity gains – not more tools. Zscaler’s Zero Trust platform and Infosys’s Cyber Next – powered by the Infosys Topaz AI fabric, meet this inflection point: a proven Zero Trust foundation paired with Agentic AI services to accelerate time-to-value, streamline operations and maximize ROI.

Together, we help enterprises shift from perimeter-centric security to an adaptive Zero Trust operating model—enabling secure-by-design application access, continuous data protection, protected workloads & AI, café-like branches, and AI-powered detection and response. The result: greater agility, faster M&A integration and better cost efficiency. This joint offering gives the C‑suite a path to modernize securely while unlocking measurable transformation.

The Market Gap: Why Legacy Security is Failing

Business runs on connected processes—from lead to cash to procure to pay—but modernization hits a wall: legacy platforms, fragmented data, and scarce skills.

Secure access and data protection remain scattered, branches are box‑bound, data centers stay perimeter‑tied, data controls vary across SaaS and AI workflows, and operations drown in noise. Routine changes remain manual, creating alert overload, slow SLAs, and human error.  The Security sprawl is real – leading to overlapping controls and inconsistent enforcement.

For CIOs and CISOs, this sprawl hides risk – policy drift, blind spots in encrypted traffic, over‑privileged access, and inflates TCO through appliance refreshes, backhauling, fragmented licenses, and the integration tax of stitching tools together.

Legacy, perimeter-based security was built for a hub-and-spoke world, not any-to-any connectivity. Policies tied to IPs and locations can’t segment by identity and app, and lateral movement persists. Siloed tools fragment data protection and visibility across SaaS, cloud, and AI services.

Manual operations can’t match the volume and speed of internet threats. The result: a model that cannot sustain least‑privilege, consistent control, or great user experience in today’s pervasive, AI‑first landscape.

Introducing the Joint Offering: Infosys Cyber Next powered by Zscaler

Introducing Cyber Next powered by Zscaler—the joint Infosys + Zscaler offering that accelerates secure transformation. It simplifies the move to Zero Trust by unifying secure access, data protection, workloads security, and AI governance with AI-enabled future-ready Zero Trust platform which produces rich telemetry that powers detection and response. This is backed by Infosys’ deep domain expertise and cutting-edge AI-driven services that accelerates time‑to‑value.

Built around three pillars:

  1. Unified Visibility: End‑to‑end insights across any-to-any connections across the enterprise.
  2. Data & AI Guardrails Everywhere: Consistent, policy-driven protection for Users, devices, SaaS, cloud, branches, DCs, and AI.
  3. Agentic Ops: AI‑assisted automation that improves SLA, eliminates human error and reduces MTTR with human‑in‑the‑loop workflows
Technical Integration: How It Works

At the heart of this joint offering is the deep integration between the Zscaler Zero Trust Exchange and Infosys Cyber Next powered by Topaz Fabric, delivering a cohesive Zero Trust operating model rather than a collection of point integrations.

Zscaler Zero Trust Exchange provides the cloud‑native enforcement layer, brokering all user‑to‑internet, user‑to‑app, workload‑to‑workload, and machine‑to‑machine connections based on identity, context, and policy—without extending the network. This generates high‑fidelity telemetry across web traffic, SaaS usage, private applications, cloud workloads, branches, and endpoints.

Infosys Cyber Next, built on the Topaz AI Fabric, consumes this pervasive telemetry to construct a unified security context graph—correlating threat intelligence, posture signals, policy violations, data loss events, risky application behavior, and identity context into a single source of truth for observability and response.

On top of this foundation, Infosys introduces Agentic AI services that automate and operationalize Zero Trust at scale:

  • AI agents integrate directly with native Zscaler APIs to orchestrate secure access (ZIA/ZPA), application segmentation, posture validation, and exception handling.
  • A built‑in responsible AI moderation layer, leveraging Zscaler’s AI security and data protection controls, enforces guardrails against data leakage, prompt injection, hallucinations, and policy violations across AI workflows.
  • Continuous learning loops transform billions of daily transactions into adaptive detection and response signals, enabling “AI‑assisted defense” without overwhelming security teams.
  • Infosys Cyber Next Quantum Layer functions as the Orchestration and Intelligence layer above Zscaler’s PQC ready Platform, delivering an end‑to‑end Enterprise Quantum Risk Management capability. It ingests cryptographic telemetry from Zero Trust Exchange and elevates it into unified PQC visibility and a comprehensive crypto inventory spanning applications, APIs, PKI, TLS endpoints, IPSec tunnels, and OT environments.

Infosys Cyber Next systematically models both Harvest Now, Decrypt Later (HNDL) confidentiality risks and Trust Now, Forge Later (TNFL) integrity risks, correlating assets, data sensitivity, trust chains, and infrastructure dependencies thus enabling quantified risk scoring, threat‑driven prioritization, and guided remediation—transforming raw cryptographic signals into actionable quantum risk intelligence and migration readiness

The result is pervasive visibility with consistent, policy‑driven enforcement—across users, devices, applications, workloads, and AI assets—while maintaining the scale, performance, and reliability required for global enterprises.

Value Realization: ROI & Risk Reduction

By converging platform‑level Zero Trust enforcement with AI‑driven operational services, the joint Infosys–Zscaler offering delivers measurable value across efficiency, risk, and cost dimensions.

  • Operational Efficiency: Agentic AI automates large portions of the Zscaler operational lifecycle—policy creation, tunnel provisioning, application onboarding, posture validation, and exception handling. Customers have seen up to 90% reduction in manual configuration effort, enabling teams to move from days to minutes for site and application onboarding while reducing human error and SLA breaches.
  • Risk Reduction & Compliance Simplification: A unified security context graph enables continuous verification, attack‑path awareness, and real‑time enforcement of least‑privilege access. Consistent policies across users, SaaS, cloud workloads, and AI workflows simplify alignment with regulatory and data‑sovereignty requirements—while reducing blind spots caused by fragmented tools and telemetry.
  • Platform & Tool Consolidation: By replacing network-centric and siloed security controls with cloud-delivered Zero Trust platform, enterprises can retire overlapping network security, remote access, data security, SecOps, cloud and AI security controls. This consolidation eliminates point products and  reduces hardware refresh cycles, backhauling costs, and SOC operational overhead—driving TCO savings of up to 40% in security operations.

Together, these outcomes shift security from reactive cost control to a scalable, resilience‑driven capability that supports cloud, AI, and business transformation at speed.

Conclusion

As enterprises adopt AI, modernize applications, and operate across highly distributed environments, security must evolve from a protective afterthought into a business accelerant. Infosys Cyber Next powered by Zscaler delivers this shift—combining a proven Zero Trust platform with AI‑driven services that automate operations, reduce risk exposure, and accelerate time‑to‑value. By embedding Zero Trust into day‑to‑day operations and AI workflows, organizations can innovate faster, integrate acquisitions more securely, and scale globally without accumulating architectural or operational debt.

Authors and Contributors

Authors:

Varun Soni, Industry Principal – Cybersecurity, Infosys

Email: varun.soni@infosys.com

Rakesh Kumar, Cybersecurity Solutions Architect, Zscaler

Email: kumarr@zscaler.com

Contributor:

Aditya Yerramilli, Principal Consultant, Infosys

Email: Aditya.Yerramilli@infosys.com

Further reading

Author Details

Varun Soni

Varun is a cybersecurity leader with over 21 years of experience helping global enterprises manage cyber risk and build resilience. His career spans consulting, solutioning, and delivery across diverse cyber domains, with a strong track record of leading large-scale transformations across industry sectors. At Infosys for 5 years, in his current role Varun is leading strategic partner associations helping drive business growth through the partner ecosystem. Prior to Infosys, he was working with HCLTech for 14 years in Cyber CoE and leadership role. A strong advocate of continuous learning, Varun actively explores AI and emerging technologies to shape future-ready security solutions. He holds niche cyber certifications such as CISSP, CISM, CCSK, and is an active voice in cybersecurity industry forums. Outside of work, he balances it all with yoga, sports, and theatre

Leave a Comment

Your email address will not be published. Required fields are marked *