Likelihood to Recommend In an enterprise, where there is a threshold of many new users with whom there is a need to share the internet, Comodo Firewall can really ease the burden. Security of network and infrastructure increases with less cost compared to other alternatives. Allows advanced users to create advanced scenarios and deal with them.
Read full review Zscaler Internet Access is an internet tunnel that pairs with the network adapter to secure traffic between servers and workstations. It can refresh policies automatically and log intrusions but does not broadcast intrusions. Cloud-based Zscaler Internet Access is easy to deploy and scale, with no hardware or software needed. In a hybrid model, Zscaler Internet Access performs some security functions on-premises and others in the cloud, allowing organizations to keep infrastructure. There is a slight learning curve from VPN and appliance architecture to this paradigm.
Read full review Pros Beginner friendly UI Extensibility for pro users Very low on system resources Read full review Zscaler completely moved away from the traditional firewall setup to a hosted firewall solution. We don't have to worry about the hardware failing or maintaining it as part of our service plan compared to our on-premise firewall. Zscaler has a lot of data centres across the world where they are maintaining their solutions so mobile consultants will always be close to one of their data centres. Rolling out Zscaler solutions to our end customers' computers is actually pretty easy and hassle-free. As part of onboarding of new employees we can set up the Zscaler solution and push it to our end users' machines and get them connected to the cloud solutions. Zscaler does proper market research on the latest emerging threats and they keep their firewall patched and updated to the latest versions so the security team does not have to worry about keeping the firewall updated. Read full review Cons Provide package for Linux systems as well. Pricing is still not friendly for casual users. Allow API integration with web application. Read full review Chat or email support is not available. Only option is to either call them or raise a ticket by logging into their website. Pricing is not transparent and quote based. Access to websites is a little too slow with Zscaler monitoring on. Read full review Usability Zscaler is a mandatory solution required by almost every large organization with a workforce working remotely or using cloud-based apps. Its deployment is relatively easy and it keeps on working in the background without actively bothering the user. Apart from a few weird messages which a user is unable to comprehend, Zscaler is able to provide fast and safe access to the internet and other external applications.
Read full review Support Rating I cannot give a fair rating for this as I have not had to contact Zscaler support. There was one time we had to contact them because we needed to check if they were having issues on their end. Our ISP was actually the problem but support seemed very friendly.
Read full review Alternatives Considered Although
AWS WAF is really nice and convenient, it only runs on a web application level, no doubt it has no match in that particular segment, and it is prone to vendor locking. Comodo on the other hand provides better service on the system and network level. if you have to choose a better UI, Comodo is the best solution
Read full review Zscaler Intenet Access proved to be superior and the difference for us was the speed of policy delivery since your policy is applied in a web console and is effective in a matter of seconds. Another point to congratulate the solution is its compatibility with different platforms (macOS, Linux, Windows, Android, and iOS).
Read full review Return on Investment For enterprise level company, it has really great ROI. Not perfect fit for individual use or for small company. We streamlined the process of managing network security. Read full review ROI is there and it is safeguarding the data and user access to net. Being a cloud based can be scaled up when required. Third parties can be allowed based on the company IT policies (Clients or Vendors etc.) for business perspective. Read full review ScreenShots