Research Blogs Feed 09月29日
Zscaler AI模型训练不使用客户数据
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

Zscaler在其AI模型训练中不使用客户数据。每位客户拥有其Zscaler日志中的专有信息或个人数据(用户名、电子邮件地址、设备ID等)。我们仅使用不包含客户或个人数据的元数据或数据来训练AI模型。Zscaler的架构基础是数据隔离,每个客户的租户都是自包含的,其数据在其租户内受其控制,敏感信息永远不会离开该边界。客户可以在隔离环境中利用其自身数据,例如日志、交易和遥测数据,以改善其组织的成果,而无需牺牲隐私、安全或合规性。

🔒 Zscaler在其AI模型训练中不使用客户数据。每位客户拥有其Zscaler日志中的专有信息或个人数据,这些数据永远不会离开其租户边界。

📊 Zscaler仅使用不包含客户或个人数据的元数据或数据来训练AI模型。客户的日志、交易和遥测数据在其隔离环境中用于改善其组织的成果。

🔄 Zscaler通过利用平台中聚合的信号知识,而不是个人客户数据,来加强检测和建模。每个租户都能从全球智能中获益,同时保持其数据的严格边界。

🔐 Zscaler的架构基础是数据隔离,每个客户的租户都是自包含的,其数据在其租户内受其控制,敏感信息永远不会离开该边界。

📈 Zscaler能够从每天超过50亿笔交易中学习,利用网络效应而不会牺牲客户隐私。客户受益于Zscaler处理的大量信号,因为这使得我们能够识别全球威胁趋势并提供弹性、实时的防御。

There was a question recently posted about how Zscaler trains AI models. We wanted to provide accurate information on how we train our AI models. Zscaler does not use customer data to train its AI models. Each customer owns their proprietary information or personal data (user names, email addresses, device IDs, etc.) in the Zscaler logs. We only use data or metadata that does not contain customer or personal data for AI model training.Organizations want to safely unlock the value of artificial intelligence and machine learning, but they also need to ensure that this does not come at the expense of privacy, security and compliance controls. This becomes particularly charged when we consider the potential of training AI using proprietary data or personal data. The foundation of our architectural approach is data containment. Every customer’s tenant is self-contained: their data lives within their tenancy, under their control. Sensitive information never leaves that boundary. This is not just a principle: it’s a design choice by Zscaler that governs how we build, scale, and deliver value. This is how Zscaler can ensure that customer data is never used to train an AI model beyond a given tenant.Within that contained environment, customers can harness the power of their own data. Logs, transactions, and telemetry generated by their use of our platform are used to improve outcomes for their organization alone. This means customers benefit directly from their own signals, whether it’s for risk modeling, AI copilots, or policy enforcement, without having to trade away autonomy or privacy or security.Leveraging Data ResponsiblyA common concern is whether preserving privacy limits the ability to benefit from large-scale insights. Here’s where an important distinction comes in: personal data remains private, secured, and not included as model training data while metadata that does not contain proprietary information or personal data is used to enrich each tenant’s environment.Think of it like water flowing through pipes: while the content of the water belongs entirely to each customer, the knowledge of how the water moves (its pressure, velocity, and patterns) can inform the system without ever extracting the water itself. Similarly, Zscaler’s platform can use traffic patterns and telemetry that does not contain personal data, and aggregated signals to strengthen AI models and improve the overall environment while still enforcing the guarantee that sensitive data never leaves a customer’s tenancy.Zscaler’s ability to learn from over half a trillion transactions per day leverages a network effect without sacrificing customers’ privacy (specifically and technically a logarithmic utility). Customers benefit from the sheer breadth of signals Zscaler processes because it allows us to recognize global threat trends and provide resilient, real-time defenses. At the same time, customer-specific data is never exposed outside of respective tenancy.Instead, Zscaler leverages the aggregate knowledge of signals across the platform, never tied to an individual customer’s data, to strengthen detection and modeling. Each tenant gains from this global intelligence while maintaining strict boundaries for its own data.To re-emphasize: customers’ proprietary information or personal data in the Zscaler logs is never shared outside of the customer boundary. A Core Security Principle Rooted in Shannon’s Information TheoryThere is deep alignment of our approach with Shannon’s Information Theory, a topic I will delve into more in a future blog. Zscaler views data along a continuum that stretches from low entropy, high-information states such as clear text, through progressively higher entropy forms like ciphertext, and ultimately to encryption and the extreme of pure randomness. At Zscaler, our architectural principle begins with data control. Sensitive classes of data never leave a tenant boundary in any form including customer data. Beyond that, we apply a disciplined progression toward maximum entropy wherever possible, ensuring that only the minimum necessary information is exposed. Techniques such as anonymization, tokenization, de-identification, and other data strategies are not applied as afterthoughts but as deliberate mechanisms to elevate entropy while still preserving just enough structure for essential operations, such as AI modeling and training at the platform level. This approach ensures that the system operates at the highest entropy state consistent with utility, minimizing information exposure while maximizing privacy, trust, and compliance. This is how Zscaler unlocks the value of artificial intelligence but still ensures privacy and compliance for all customers.

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

Zscaler AI模型训练 数据隐私 数据隔离 网络安全
相关文章