Skip to main content
TrustRadius
Zscaler Internet Access

Zscaler Internet Access

Overview

What is Zscaler Internet Access?

Zscaler Internet Access is delivered as a security stack as a service from the cloud, and is designed to eliminate the cost and complexity of traditional secure web gateway approaches, and provide easily scaled protection to all offices or users,…

Read more
Recent Reviews

TrustRadius Insights

Zscaler Internet Access has proven to be a valuable tool for users in securing their endpoint-to-server traffic and protecting against …
Continue reading
Read all reviews
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Zscaler Internet Access?

Zscaler Internet Access is delivered as a security stack as a service from the cloud, and is designed to eliminate the cost and complexity of traditional secure web gateway approaches, and provide easily scaled protection to all offices or users, regardless of location, and minimize network and…

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

87 people also want pricing

Alternatives Pricing

What is GoodAccess?

GoodAccess is a cloud VPN with zero-trust access controls specially designed for small and medium businesses. GoodAccess is a secure remote access solution that interconnects remote workers, applications, data centers, clouds, and offices via one resilient virtual network. No hardware or complex…

What is Hyper Private Access?

HPA is a Business VPN, or Virtual Private Network, presented as a secret, safe tunnel on the internet that companies can use to keep their online stuff private and secure.

Return to navigation

Product Demos

Microsoft Defender and ZIA Demo

YouTube

[Demo] VMWare Carbon Black and Zscaler in Action

YouTube
Return to navigation

Product Details

What is Zscaler Internet Access?

Zscaler Internet Access™ aims to define safe, fast internet and SaaS access, with a comprehensive cloud native security service edge (SSE) platform. ZIA includes multiple security engines, such as cloud firewall, intrusion prevention system (IPS), data loss prevention (DLP), bandwidth control, browser isolation, cloud access security broker (CASB), and sandbox. By detaching security and access controls from the network and delivering them from the cloud, ZIA can provide identical security and policy enforcement no matter where connections occur, in the headquarters, a branch office, or remote locations.

Zscaler Internet Access Features

  • Supported: Prevent Compromise
  • Supported: Stop Lateral Movement
  • Supported: Stop Data Loss

Zscaler Internet Access Video

Learn more about the incredible work Zscaler is doing at zscaler.com About Zscaler Zscaler (NASDAQ: ZS) accelerates digital transformation so that customers can be more agile, efficient, resilient, and secure. The Zscaler Zero Trust Exchange protects thousands of customers fr...
 Show More

Zscaler Internet Access Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo

Frequently Asked Questions

Zscaler Internet Access is delivered as a security stack as a service from the cloud, and is designed to eliminate the cost and complexity of traditional secure web gateway approaches, and provide easily scaled protection to all offices or users, regardless of location, and minimize network and appliance infrastructure.

Palo Alto Networks Next-Generation Firewalls - PA Series and Fortinet FortiGate are common alternatives for Zscaler Internet Access.

Reviewers rate Support Rating highest, with a score of 8.1.

The most common users of Zscaler Internet Access are from Enterprises (1,001+ employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(72)

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

Zscaler Internet Access has proven to be a valuable tool for users in securing their endpoint-to-server traffic and protecting against various threats. Users have praised the product's ability to provide VPN-secured remote access to corporate resources, safeguarding sensitive data from malware, phishing, and zero-day threats. Zscaler Internet Access is especially appreciated for its robust protection of popular cloud applications such as Office 365, Salesforce, and AWS, ensuring compliance and preventing unauthorized access.

Another key use case of Zscaler Internet Access is its capability to protect guest Wi-Fi networks and enforce web filtering policies for organizational compliance. Users have found this feature useful in preventing security breaches or inappropriate internet usage on guest networks. Additionally, the software's workstation and server policy updates are highly valued by users, as it enables them to keep their systems secure and up-to-date.

Furthermore, Zscaler Internet Access offers a range of benefits when it comes to monitoring and controlling network usage. Users appreciate the insights provided into bandwidth utilization and the acceleration of Azure services. They also find it convenient to monitor usage through log reports that can be exported on demand. The software's bandwidth control through load balancing is especially valuable for users who want to optimize network performance.

While Zscaler Internet Access has received positive feedback for its functionality and ease of use, there are some areas where users have raised concerns. Some users feel that the content filtration features are limited and may not meet their specific requirements. Additionally, a few users have mentioned that the software starts automatically when booting the system, which can be seen as a drawback by some. However, they also appreciate that they have the ability to disable the software when needed.

Overall, Zscaler Internet Access has become an integral part of many organizations' security infrastructure. It replaces traditional hardware appliances and complex VPN implementations, providing a cloud-based solution that simplifies administration, improves control, and increases visibility. With its wide range of use cases, from securing remote access to protecting cloud applications and enforcing web filtering policies, Zscaler Internet Access offers comprehensive security and peace of mind for users.

Users have made several recommendations for Zscaler based on their experiences with the product. The most common recommendations include:

  1. Users highly recommend Zscaler as a secure solution for organizations, emphasizing its effectiveness in securing data and protecting against threats. They mention that it is suitable for companies of any size and praise its pricing criteria.

  2. Many users recommend Zscaler for its user-friendly internet security system. They find it easy to use and appreciate its simplicity in enforcing web policies and securing networks. Users also highlight the simplicity of deployment and the convenience of policy configuration and DLP features.

  3. Users often recommend Zscaler as a reliable cloud-based platform for web and mobile security solutions. They consider it as the best-in-market option, particularly for managing web traffic with advanced threat detection. They also endorse Zscaler Internet Access as a one-stop solution for secure access to corporate resources.

Overall, users suggest researching and implementing Zscaler to benefit their own companies and encourage others to try out this product before making a decision. Some users do mention that they haven't encountered any issues with Zscaler, but there are also suggestions to improve the user-friendliness of the dashboard and reporting features.

Attribute Ratings

Reviews

(1-5 of 5)
Companies can't remove reviews or game the system. Here's why
Raman Ahuja | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
Zscaler is used by our organization to secure our devices from internet content. This is being used by each and every department of our organization. It takes away the need of installing multiple applications to secure the workstations while interacting with the internet and simply replaces it with a Zscaler application that provides the capabilities of different applications via the cloud.
  • Since it's cloud-based, it's completely on-demand and scalable without any additional hardware required.
  • Deployment is fairly straightforward.
  • Customer support is prompt and tickets are resolved in a quick turnaround time.
  • Chat or email support is not available. Only option is to either call them or raise a ticket by logging into their website.
  • Pricing is not transparent and quote based.
  • Access to websites is a little too slow with Zscaler monitoring on.
Zscaler is suited for organizations where a lot of employees work remotely and need to access a lot of cloud-based applications. It enables an organization to filter out content and applications that don't adhere to policies. It provides a scalable on-demand solution with over 150 data centers to allow users to have low latency in connection.
  • Our hardware costs have gone down since Zscaler is cloud-based and provides on-demand scalability.
  • Threat management has improved as any malware once detected is immediately blocked for the entire network.
  • User experience has improved as they have a faster connectivity to external apps.
Since they don't have a direct mailing support system and also sometimes I felt that the knowledge level of executives dealing with support was not up to the mark.
Zscaler is a mandatory solution required by almost every large organization with a workforce working remotely or using cloud-based apps. Its deployment is relatively easy and it keeps on working in the background without actively bothering the user. Apart from a few weird messages which a user is unable to comprehend, Zscaler is able to provide fast and safe access to the internet and other external applications.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
Zscaler is being used for content filtering on out Internet. We have most everything going through Zscaler but we do have some workstations and servers that do not use Zscaler. We do hear some complaints from employees from time to time but security is a pain so it's normal.
  • Great at content filtering based on categories, countries, etc.
  • The sandbox feature of Zscaler is a huge plus.
  • Having the ability do decrypt SSL traffic works well.
  • Filtering through the logging can be a bit troublesome.
  • I can't remember the exact reason but we preferred to do an IPSEC tunnel back to Zscaler but instead had to use a GRE Tunnel
  • The reporting feature could use some improvement. Clean, clear reports would be nice.
As far as content filtering goes, Zscaler has met all of our needs. We feel that is doing the job well but we also feel like we could get more out of it. The ability for a downloaded file to be ran in a sandbox before delivering to the use is an awesome feature. The end user gets frustrated that they have to wait up to 10 minutes to receive their download but from a security standpoint it is working well.
  • Protecting our environment from potential hackers or malware is a top priority.
  • End users complaining about being blocked to known good sites has been a negative.
  • Ease of use from an IT standpoint after installation has been a huge positive.
Initially when we researched Cisco Umbrella we felt that Zscaler came out ahead. Umbrella has made huge improvements since then that we are planning to evaluate again.
I cannot give a fair rating for this as I have not had to contact Zscaler support. There was one time we had to contact them because we needed to check if they were having issues on their end. Our ISP was actually the problem but support seemed very friendly.
Cisco 3504 WLAN Controller, Cisco 4000 Series Integrated Services Routers (ISR 4000), Cisco 1000 Series Aggregation Services Routers (ASR 1000)
January 24, 2020

Zscaler Review

Score 8 out of 10
Vetted Review
Verified User
Incentivized
Zscaler is being used by the whole organization. We are using it for security - internet security, firewall, web security, etc. Also used for vulnerability management of user activity happening in cloud computing. It helps to simplify administration, improves control and increase visibility. It also increase the user performance.
  • Improves visibility.
  • Provides security.
  • It does not support iOS and android yet.
It effortlessly scales to the traffic needs of users, including the hard-to-examine SSL. With this solution, businesses and its users are well-protected against security issues in the cloud.
  • Enforces consistent policy.
  • Compressed lossless logs.
They reply as quick as possible and communication is very good.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
As technology is evolving, so are the threats increasing day by day. Security is the first priority of an organization, leads us to use Zscaler Internet Access this fantastic product. Good security product. Reporting and managing are straightforward. Employees can work securely from remote locations. The use of the SSO technique is beneficial. The best feature I like is filtering and the scanning, which it does. Kudos!! to the team for bringing such a product in the market.
  • Reporting is easy
  • Easy to use
  • Few times turn on button does not work smoothly
  • Support needs to be improved
Zscaler Internet Access being on the cloud makes it the most desirable product to be used worldwide. Best suited for small scale industries. But, it can also be ideal for large scale industries.
  • ROI is good if planned properly at the initial stage
Good
December 04, 2019

Bittersweet Zscaler

Samuel Hadid | TrustRadius Reviewer
Score 7 out of 10
Vetted Review
Verified User
Incentivized
Zscaler is being used as a transparent proxy to prevent users from exhausting the bandwidth resources. There are some implementations customized for mobile networks and wired networks, where we have certain needs for a variety of devices and require coverage of others. Not implemented for networks where behavior/anomaly-based analysis is required.
  • Reverse Proxy
  • Forward Proxy
  • Protection
  • Poor mgmt. capabilities
  • Not so flexible
  • Hard to segment
  • Hard to implement as fault tolerant
I think the Zscaler platform is pretty well suited for short-scale networks/architectures since is hard to segment and a single error could bring down operations in your company - we've had a couple of those. At some point, the lack of flexibility has forced the implementation to take a whitelisting approach rather than a blacklisting/behavior/anomaly approach.
Zero Trust Security
N/A
N/A
Threat Intelligence
N/A
N/A
Identity Management
N/A
N/A
Endpoint Security
N/A
N/A
  • Outages
  • Too much effort time
  • Not flexible
The Zscaler solution was selected in order to fulfill the needs of the variety of networks that we manage since the device requirements are so varied. Also, it was required to be as transparent and non-intrusive as possible to improve efficiency. Also, the basic implementation was simple and fast enough.
While overall support was always nice and polite, most of the time it was hard to reach them and it took awhile for them to respond back in urgent cases. It was probably an isolated case but, still, it's hard to manage a tool without proper support from the vendor when in need.
Citrix Virtual Apps and Desktops (formerly XenDesktop), Metasploit, Nmap
Return to navigation