icon-breach-predictor.svg
Breach Predictor

Using Zscaler Breach Predictor

This guide takes you through the basic high-level steps for how to use Zscaler Breach Predictor and provides links to more information. Because Breach Predictor uses data from other Zscaler tools, you should familiarize yourself with how Zscaler Internet Access (ZIA) and Zscaler Sandbox work so that you can better understand the log data that Breach Predictor uses to identify threats to your organization. Additionally, as a major part of its predictive intelligence, Breach Predictor relies on the MITRE ATT&CK framework to give you a clear picture of your overall security posture. Zscaler recommends reading the following articles before you begin using Breach Predictor:

To use Zscaler Breach Predictor, complete the following steps:

Related Articles
What Is Zscaler Breach Predictor?Understanding Zscaler Breach PredictorUsing Zscaler Breach Predictor