Netskope Private Access is a zero trust access solution, that allows users to provide remote access to applications running in the public cloud and private data center environments, and avoid the need for remote users to use a VPN through the corporate network to gain access to private applications.
N/A
Zscaler Private Access
Score 8.9 out of 10
N/A
Zscaler Private Access™ (ZPA) gives users secure access to private apps and OT devices while enabling zero trust connectivity for workloads.
In comparison to Zscaler Private Access, Netskope Private Access provides more features and stability to the user environment. Netskope private access improves user experience in comparison to Zscaler Private Access. Cost-wise, Zscaler is cheaper than Netskope private access. …
Zscaler Private Access
No answer on this topic
Features
Netskope Private Access
Zscaler Private Access
Identity Management
Comparison of Identity Management features of Product A and Product B
Netskope Private Access
10.0
2 Ratings
12% above category average
Zscaler Private Access
9.1
10 Ratings
2% above category average
Multi-Factor Authentication
10.02 Ratings
9.110 Ratings
Endpoint Security
Comparison of Endpoint Security features of Product A and Product B
Netskope Private Access
7.5
3 Ratings
19% below category average
Zscaler Private Access
9.0
6 Ratings
1% below category average
Endpoint Detection and Response (EDR)
7.53 Ratings
9.06 Ratings
Threat Intelligence
Comparison of Threat Intelligence features of Product A and Product B
Netskope Private Access
6.8
4 Ratings
13% below category average
Zscaler Private Access
8.5
11 Ratings
9% above category average
Network Analytics
7.04 Ratings
8.811 Ratings
Threat Recognition
7.04 Ratings
8.99 Ratings
Vulnerability Classification
7.04 Ratings
8.97 Ratings
Automated Alerts and Reporting
7.74 Ratings
8.110 Ratings
Threat Analysis
6.04 Ratings
8.67 Ratings
Threat Intelligence Reporting
6.74 Ratings
8.17 Ratings
Automated Threat Identification
6.34 Ratings
8.59 Ratings
Zero Trust Security
Comparison of Zero Trust Security features of Product A and Product B
For more suitable scenarios, it is more flexible to deploy NPA with granular access to third-party vendors and contractors. works well in hybrid and multi-cloud private application access. good use cases with DLP, logging, and zero trust. we required improvement if the customer needs full network layer access, as some of the legacy applications may need full network access. also, can we achieve better performance for latency-sensitive or real-time traffic like voice, video?
Zscaler Private Access works really well in environments setup for FQDNs and where you know what users should/shouldn't be accessing on what ports. You can use Zscaler Private Access to figure out these kinds of features but that doesn't always mean you'll be correct. It also provides a consistent experience for users as they can access their materials anywhere. It also makes the user the last line of defense. If a user's account is compromised then the attacker has access to everything they already did. It doesn't work great in OT environments or Server based environments. Flows have to be initiated from the client and not the server for stuff to behave properly.
Application Segmentation and Listener Configuration - The way applications are defined and listened for is fundamental to ZPA, but can be a source of frustration, especially when dealing with legacy or non-HTTP protocols
The ZCC is the user's primary gateway, but its control over local system network behavior can sometimes clash with enterprise requirements.
As I said before, I find it´s UI very intuitive and it´s very easy to use and configure, everything is where it should be and allows for a good workflow. For the end user it´s only a login page that pops out automatically and close itself once it´s authenticated so it stay out of the way of the user.
The environment feels more secure, and we are seeing that users are adapting to it fast. The fact that we have tools to assist the users with their day-to-day access helps, as we can hand it off to the helpdesk without any escalations to the Network team. It is a work in progress for our agency, but we are seeing the benefits from the solution.
The support is good, but the problem is that even if you indicate that you prefer support in Spanish, the application indicates that it is available. I have never had a technician who spoke to me in Spanish.
The process was smooth and well managed. There was probably good technical coordination and support. There were only minor details that could be improved.
Well ZPA is a good solution, however everyone has their own advantage and disadvantages, with ZPA you can deploy ZTNA model, which will help you better control on access, however Palo Alto, Fortinet they are also market leading firewall solution, and you can not deny if they are not providing the same features.
Positive: We have now charged users internally for the service
Negative: Dealing with users who also have the Zscaler Client Connector for their company, can cause confusions
Negative: Enabling the Zscaler Internet Access entitlement has been a major headache for us because Zscaler Private Access users can't autheniticate through ZIA on a non corporate device.