PingOne from Ping Identity vs. Zscaler Private Access

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
PingOne from Ping Identity
Score 8.2 out of 10
N/A
The PingOne Cloud Platform from Ping Identity in Denver, Colorado is an identity management and access solution (IAM) for enterprises. Features of the products include single sign-on, multi-factor authentication, user management with directory, provisioning and deprovisioning. The solution is presented as a comprehensive, standards-based platform that allows users and devices to securely access any service, application or API from any device. Designed for hybrid IT environments, it can be…
$20,000
per year
Zscaler Private Access
Score 8.9 out of 10
N/A
Zscaler Private Access™ (ZPA) gives users secure access to private apps and OT devices while enabling zero trust connectivity for workloads.N/A
Pricing
PingOne from Ping IdentityZscaler Private Access
Editions & Modules
Essential
$20,000
per year
Plus
$40,000
per year
Premium
Contact Sales
No answers on this topic
Offerings
Pricing Offerings
PingOne from Ping IdentityZscaler Private Access
Free Trial
YesNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoYes
Entry-level Setup FeeNo setup feeNo setup fee
Additional DetailsTry PingOne for Customers for free. Sign up for a free 30-day trial of PingOne for customers.
More Pricing Information
Community Pulse
PingOne from Ping IdentityZscaler Private Access
Features
PingOne from Ping IdentityZscaler Private Access
Identity Management
Comparison of Identity Management features of Product A and Product B
PingOne from Ping Identity
9.0
8 Ratings
10% above category average
Zscaler Private Access
9.1
10 Ratings
2% above category average
ID-Management Access Control10.06 Ratings00 Ratings
ID Management Single-Sign On (SSO)10.08 Ratings00 Ratings
Multi-Factor Authentication9.08 Ratings9.110 Ratings
Password Management10.06 Ratings00 Ratings
Account Provisioning and De-provisioning8.05 Ratings00 Ratings
ID Management Workflow Automation9.04 Ratings00 Ratings
ID Risk Management7.05 Ratings00 Ratings
Endpoint Security
Comparison of Endpoint Security features of Product A and Product B
PingOne from Ping Identity
-
Ratings
Zscaler Private Access
9.0
6 Ratings
1% below category average
Endpoint Detection and Response (EDR)00 Ratings9.06 Ratings
Threat Intelligence
Comparison of Threat Intelligence features of Product A and Product B
PingOne from Ping Identity
-
Ratings
Zscaler Private Access
8.6
11 Ratings
10% above category average
Network Analytics00 Ratings8.811 Ratings
Threat Recognition00 Ratings8.99 Ratings
Vulnerability Classification00 Ratings8.97 Ratings
Automated Alerts and Reporting00 Ratings8.210 Ratings
Threat Analysis00 Ratings8.67 Ratings
Threat Intelligence Reporting00 Ratings8.17 Ratings
Automated Threat Identification00 Ratings8.59 Ratings
Zero Trust Security
Comparison of Zero Trust Security features of Product A and Product B
PingOne from Ping Identity
-
Ratings
Zscaler Private Access
9.1
11 Ratings
4% above category average
Continuous Verification00 Ratings8.911 Ratings
Secure Web Gateways00 Ratings9.211 Ratings
Network Flow Control00 Ratings9.110 Ratings
Network Traffic Analysis00 Ratings9.09 Ratings
Segmentation Leveraging00 Ratings9.010 Ratings
Admin Access Control00 Ratings9.19 Ratings
Network Data Encryption00 Ratings9.211 Ratings
Network Topology Mapping00 Ratings9.011 Ratings
Best Alternatives
PingOne from Ping IdentityZscaler Private Access
Small Businesses
Dashlane Password Manager
Dashlane Password Manager
Score 9.0 out of 10
ThreatLocker
ThreatLocker
Score 9.4 out of 10
Medium-sized Companies
OneLogin by One Identity
OneLogin by One Identity
Score 9.6 out of 10
Palo Alto Networks Prisma Access
Palo Alto Networks Prisma Access
Score 8.3 out of 10
Enterprises
OneLogin by One Identity
OneLogin by One Identity
Score 9.6 out of 10
Palo Alto Networks Prisma Access
Palo Alto Networks Prisma Access
Score 8.3 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
PingOne from Ping IdentityZscaler Private Access
Likelihood to Recommend
7.9
(8 ratings)
9.1
(15 ratings)
Usability
9.0
(1 ratings)
9.1
(10 ratings)
Support Rating
8.6
(4 ratings)
-
(0 ratings)
User Testimonials
PingOne from Ping IdentityZscaler Private Access
Likelihood to Recommend
Ping Identity
Really like [this] solution, it fits our requirements 100%. There are unlimited possibilities to extend the product, either by creating additional adapters or selectors. We really like the policy management level in PingFederate. It's extremely helpful when we can specify customer journey per many different requirements like user location, application type etc. As well, both StepUp and TopDown authentication flows were implemented [easily].
Read full review
Zscaler
Zscaler Private Access works really well in environments setup for FQDNs and where you know what users should/shouldn't be accessing on what ports. You can use Zscaler Private Access to figure out these kinds of features but that doesn't always mean you'll be correct. It also provides a consistent experience for users as they can access their materials anywhere. It also makes the user the last line of defense. If a user's account is compromised then the attacker has access to everything they already did. It doesn't work great in OT environments or Server based environments. Flows have to be initiated from the client and not the server for stuff to behave properly.
Read full review
Pros
Ping Identity
  • Based on open standards, we can use as much or as little of the Ping suite as we like, depending on which other technologies we've already implemented.
  • Continuous innovation and product enhancements have ensured their products continue to meet our rapidly evolving needs.
  • Ping Identity has been an outstanding partner, starting with the RFP process and continuing to this day, years after the sale. They are focused on our success at every level of the company and are highly responsive to our needs, issues, and product suggestions.
Read full review
Zscaler
  • Allows strong cyber security corporate policies
  • Very reliable VPN application that operates at 100% efficiency
  • Very easy to be configured with friendly user interface
Read full review
Cons
Ping Identity
  • There are times that the response time is quite slow.
  • Since this is built on Google Cloud, there are moments when we encounter errors when logging in or looping in Google.
  • UI could be improved.
Read full review
Zscaler
  • Granularity and Complexity of Policy Enforcement
  • Application Segmentation and Listener Configuration - The way applications are defined and listened for is fundamental to ZPA, but can be a source of frustration, especially when dealing with legacy or non-HTTP protocols
  • The ZCC is the user's primary gateway, but its control over local system network behavior can sometimes clash with enterprise requirements.
Read full review
Usability
Ping Identity
Easy to use; all UI's are user friendly and easy to learn.[The] possibility to use API is [a] big value as well. We really like integration with CyberArk; with it we can manage privileged accounts according to company standards without breaking any rules, and we can be 100% sure that only approved persons will have administrative access.
Read full review
Zscaler
The environment feels more secure, and we are seeing that users are adapting to it fast. The fact that we have tools to assist the users with their day-to-day access helps, as we can hand it off to the helpdesk without any escalations to the Network team. It is a work in progress for our agency, but we are seeing the benefits from the solution.
Read full review
Support Rating
Ping Identity
Ping's support is willing and attentive, but if I am in a position to engage them I am often at a point where most of the usual support engineers would not be in a position to answer the questions I have. However, Ping has been more than willing to engage their product and development teams with our organization as we take advanced deployment and use case challenges to them.
Read full review
Zscaler
No answers on this topic
Alternatives Considered
Ping Identity
This solution is selected before my time so, not much influence ,but product allow to customized and require decent ping skills to configure the solution. Okta and Other solutions are well suited in this category with some positive and some negative capabilities. it must say that Auth0 is the best option with Azure Identity to move ahead.
Read full review
Zscaler
Well ZPA is a good solution, however everyone has their own advantage and disadvantages, with ZPA you can deploy ZTNA model, which will help you better control on access, however Palo Alto, Fortinet they are also market leading firewall solution, and you can not deny if they are not providing the same features.
Read full review
Return on Investment
Ping Identity
  • it is positive with saving the cost
  • some drawback with aging solution
  • directory is solid and provide lots of cost saving
Read full review
Zscaler
  • Positive: We have now charged users internally for the service
  • Negative: Dealing with users who also have the Zscaler Client Connector for their company, can cause confusions
  • Negative: Enabling the Zscaler Internet Access entitlement has been a major headache for us because Zscaler Private Access users can't autheniticate through ZIA on a non corporate device.
Read full review
ScreenShots

Zscaler Private Access Screenshots

Screenshot of how ZPA provides access for all users while minimizing the attack surface, eliminating lateral movement, and stopping zero day threats. A cloud native service, ZPA can be deployed in just hours to replace legacy remote access tools like VPNs and VDIs.