Quarterly Business Review Report


Quarterly Business Review Report

The Quarterly Business Review (QBR) Report provides customers with extensive insight into how Zscaler is helping protect their network quarter-to-quarter. It helps customers to observe emerging traffic trends and the types of threats that Zscaler is blocking.

A new QBR is generated on the first weekend of every month and they are securely stored as a PowerPoint file in the Zscaler cloud. Up to 15 reports are stored. Admins can download their reports by going to Analytics > Quarterly Business Review Reports. If you do not see the QBR, you can reach out to your support team or open a support ticket to have it enabled. 

Report Sections

The report is divided into five sections.

  1.  Quarterly Snapshot
  2.  Protecting All Users and Locations
  3. Application Visibility & Control
  4. Security Value Provided
  5. Customer Support

The Quarterly Snapshot (Traffic) page provides you the number of users protected, along with graphs highlighting the following information.

  •    Transactions Processed
  •    Bandwidth Use
  •    Bandwidth per User

The Transactions Processed, Bandwidth Use, and Bandwidth per User are all compared to the data for the previous quarter as well as the data for the same quarter in the last year.

The Quarterly Snapshot (Security) page provides you information on the total number of transactions, the number of threats blocked per day, and the percentage of threats blocked. It also provides information on the following:

  •    Threats Stopped
  •    Policy Blocks

The Threats Stopped and Policy Blocks are all compared to the data for the previous quarter as well as the data for the same quarter in the last year.

The Traffic Trends for Zscaler Cloud page provides information showing the trends in traffic Traffic Volume and Number of Transactions measured over the quarter. In also provides an analysis of how these measures have changed over the quarter and over the year.

The Local Internet Breakout page provides information on the number of locations and sub-locations in your network and shows the bandwidth percentage used by the top seven locations. There is also a graph showing how much data each one of the top seven locations uses.

The Road Warriors page shows you how many road warriors are being protected, how much bandwidth they use, and the top threats that were blocked for them.

The Visibility & Security for Mobile Traffic page shows which percentage of users use a mobile device. It also provides graphs showing Top Mobile Device Platforms, Top Locations by Mobile Traffic, and Top Mobile Apps.

The Peer and Cloud Comparison of Application Categories provides an analysis of your organization's use of recreational and productivity apps compares to peers and the cloud average.

Peer average is derived from organizations within the same industry vertical, geography and with a similar size.

The Top Business and Collaboration Apps page shows what percentage of your total bandwidth is being used by business and collaboration apps as well as what the top applications (measured in bytes) are.

The Top Social, Streaming & File Sharing Apps page shows what percentage of your total bandwidth is being used by business and collaboration apps as well as what the top applications (measured in bytes) are.

The Top Social, Streaming & File Sharing Apps page shows what percentage of your total bandwidth is being used by business and collaboration apps as well as what the top applications (measured in bytes) are.

There are three pages in the QBR that detail information about Office 365. 

The Your Office 365 Growth page provides the percent by which your Office 365 traffic has grown over the last quarter. In also provides information on the Traffic Volume Trend, a quarterly comparison of the amount of data used by Office 365 apps compared to peers and the cloud average, and the traffic volume per app.

The Traffic Trend for Office 365 Applications page shows a trend graph for four Office 365 apps measured over the last six months

The Top Locations for Office 365 page says which locations use the most Office 365 traffic.

The Threats Blocked by Threat Category page measures what percent of blocked traffic fell into the Advanced Threat, Viruses and Spyware, and Cloud Sandbox categories. It also compares this to peers and to the cloud average.

The Anti-Virus and Advanced Threat Protection page shows the top anti-virus threats blocked and the top advanced threats blocked.

The Botnet Callback Distribution pages explain the percentage of total threats blocked that were botnet callbacks, the top locations with botnet callbacks, and the top named threats by callbacks. 

There are up to three Malware Case Study pages. Each page has a description of the malware, as well as details of an impacted transaction.

The Cloud Sandbox page has a funnel diagram with the following information:

  • Total Transactions: These are the total transactions conducted by users in your organization over the quarter.
  • Transactions with Files: These are the transactions where users attempted to download files.
  • Files that required Sandbox: These are files that were sent to the Sandbox for analysis. Either they were known files, with a unique MD5 and a verdict associated with it, or they were unknown files that were submitted to the Sandbox for offline analysis.
  • Files unique to your org: These are the files submitted by your org to the Sandbox for offline analysis.
  • Malicious Files: These are the files submitted by your org to the Sandbox for analysis and found to be malicious.

There is also a breakdown of the file type of the malicious files blocked.

The Proxy Latency page has a breakdown of the latency experienced by your customers.

Zscaler Support Incidents shows the times when you contacted Zscaler support. There is also an additional page showing which licenses you have and what they provide you with.