NC Protect vs. Zscaler Private Access

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
NC Protect
Score 0.0 out of 10
N/A
NC Protect delivers dynamic, attribute-based access control (ABAC) and data protection that adjusts with users’ context to protect sensitive information against accidental and malicious data loss and misuse. It ensures only the right people – access the right information – at the right time – enforcing the principles of zero trust at the data layer in enterprise collaboration applications. Discover, classify and secure sensitive unstructured data including files, email messages and…N/A
Zscaler Private Access
Score 8.7 out of 10
N/A
Zscaler Private Access (ZPA) is a ZTNA as a service, that takes a user- and application-centric approach to private application access. A cloud-delivered service, ZPA is built to ensure that only authorized users have access to specific private applications by creating secure segments of one between individual devices and apps.N/A
Pricing
NC ProtectZscaler Private Access
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
NC ProtectZscaler Private Access
Free Trial
NoNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details
More Pricing Information
Community Pulse
NC ProtectZscaler Private Access
Top Pros

No answers on this topic

Top Cons

No answers on this topic

Features
NC ProtectZscaler Private Access
Threat Intelligence
Comparison of Threat Intelligence features of Product A and Product B
NC Protect
-
Ratings
Zscaler Private Access
10.0
1 Ratings
19% above category average
Network Analytics00 Ratings10.01 Ratings
Automated Alerts and Reporting00 Ratings10.01 Ratings
Zero Trust Security
Comparison of Zero Trust Security features of Product A and Product B
NC Protect
-
Ratings
Zscaler Private Access
10.0
1 Ratings
12% above category average
Continuous Verification00 Ratings10.01 Ratings
Secure Web Gateways00 Ratings10.01 Ratings
Network Flow Control00 Ratings10.01 Ratings
Network Data Encryption00 Ratings10.01 Ratings
Network Topology Mapping00 Ratings10.01 Ratings
Best Alternatives
NC ProtectZscaler Private Access
Small Businesses
ThreatLocker
ThreatLocker
Score 9.0 out of 10
ThreatLocker
ThreatLocker
Score 9.0 out of 10
Medium-sized Companies
Palo Alto Networks Prisma Access
Palo Alto Networks Prisma Access
Score 8.6 out of 10
Palo Alto Networks Prisma Access
Palo Alto Networks Prisma Access
Score 8.6 out of 10
Enterprises
Palo Alto Networks Prisma Access
Palo Alto Networks Prisma Access
Score 8.6 out of 10
Palo Alto Networks Prisma Access
Palo Alto Networks Prisma Access
Score 8.6 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
NC ProtectZscaler Private Access
Likelihood to Recommend
-
(0 ratings)
8.0
(5 ratings)
User Testimonials
NC ProtectZscaler Private Access
Likelihood to Recommend
archTIS
No answers on this topic
Zscaler
Well Suited: - Work from home scenario - While working with confidential data - While working with financial data - Office intranet Less Suited: - Reduces internet speed - If the user gets a password, can exit/close the app.
Read full review
Pros
archTIS
No answers on this topic
Zscaler
  • Access control for overall organization, follows the ZTNA model.
  • Better speed for remote users compared with legacy remote solutions.
  • Better visibility on ZScaler portal, thus better control from central space.
Read full review
Cons
archTIS
No answers on this topic
Zscaler
  • Sometimes the interface crashes and I need to kill it and restart
  • It can unintentionally block some services like dropbox
  • I don't get a notification when I need to re-authenticate
Read full review
Alternatives Considered
archTIS
No answers on this topic
Zscaler
Both are good but sometimes relationship and cost is the factor to decide the final vendor.
Read full review
Return on Investment
archTIS
No answers on this topic
Zscaler
  • Overall positive Impact.
Read full review
ScreenShots

NC Protect Screenshots

Screenshot of Dynamically applied digital security watermarks prevent data loss and aid in forensics.Screenshot of NC Protect works natively with Microsoft collaboration and security products to augment native features to hide sensitive files from unauthorized users and apply other unique security features to enforce read-only access,  redact sensitive or classified information, and trim the application ribbon.