Proofpoint Shadow vs. Zscaler Deception

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Proofpoint Shadow
Score 0.0 out of 10
N/A
Proofpoint Shadow, formerly Illusive Shadow, is an agentless, undetectable deception technology that creates a hostile environment for attackers, stopping lateral movement and access to critical assets.N/A
Zscaler Deception
Score 8.0 out of 10
N/A
Zscaler Deption is a solution designed to detect sophisticated threats that bypass traditional defenses with the world's only zero trust platform with integrated deception capabilities.N/A
Pricing
Proofpoint ShadowZscaler Deception
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Proofpoint ShadowZscaler Deception
Free Trial
NoNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details
More Pricing Information
Community Pulse
Proofpoint ShadowZscaler Deception
Best Alternatives
Proofpoint ShadowZscaler Deception
Small Businesses

No answers on this topic

No answers on this topic

Medium-sized Companies
InsightIDR
InsightIDR
Score 8.7 out of 10
InsightIDR
InsightIDR
Score 8.7 out of 10
Enterprises
InsightIDR
InsightIDR
Score 8.7 out of 10
InsightIDR
InsightIDR
Score 8.7 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Proofpoint ShadowZscaler Deception
Likelihood to Recommend
-
(0 ratings)
9.7
(3 ratings)
User Testimonials
Proofpoint ShadowZscaler Deception
Likelihood to Recommend
Proofpoint
No answers on this topic
Zscaler
Zscaler Deception Technology is well suited for companies that want to provide private access to their internal apps without using a VPN. Zscaler integrates zero trust into their honey tools that is good for detecting lateral movement. With Zscaler you allow only your employees to be able to access internal apps so detecting a bad actor is much easier.
Read full review
Pros
Proofpoint
No answers on this topic
Zscaler
  • Improve risk and compliance program.
  • Agent deployment is easy.
  • Improve decision making.
Read full review
Cons
Proofpoint
No answers on this topic
Zscaler
  • Cannot use internal DNS
  • Much tuning needed
  • Access typically limited to internal apps
Read full review
Alternatives Considered
Proofpoint
No answers on this topic
Zscaler
Read full review
Return on Investment
Proofpoint
No answers on this topic
Zscaler
  • Improved threat detection.
  • Lesser false positive alerts.
Read full review
ScreenShots

Zscaler Deception Screenshots

Screenshot of Deception: A complete cyber deception platform