Skip to main content
TrustRadius
Zscaler Deception

Zscaler Deception

Overview

What is Zscaler Deception?

Zscaler Deption is a solution designed to detect sophisticated threats that bypass traditional defenses with the world's only zero trust platform with integrated deception capabilities.

Read more
Recent Reviews
Read all reviews
Return to navigation

Product Details

What is Zscaler Deception?

Zscaler Deception leverages the Zero Trust Exchange to blanket the environment with decoys and false user paths that lure attackers and detect advanced attacks without operational overhead or false positives. Because the platform is cloud-native, the solution can scale the user's deployment quickly and without disruption.

Zscaler Deception Features

  • Supported: Detect compromised users with application decoys and endpoint lures that intercept and reveal stealthy adversaries.
  • Supported: Prevent lateral movement with realistic decoys that divert attackers and alert security teams with high confidence.
  • Supported: Stop ransomware spread with decoys in the cloud, network, endpoints, and active directory that detect ransomware at every stage of the attack chain.

Zscaler Deception Integrations

Zscaler Deception Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo

Zscaler Deception Downloadables

Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(5)

Reviews

(1-1 of 1)
Companies can't remove reviews or game the system. Here's why
Score 9 out of 10
Vetted Review
Verified User
Incentivized
At my company we use both ZIA(kind of like a proxy out to the public internet) and ZPA (enterprise VPN). ZPA is faster than the VPN we used to use. ZIA is good because it allows to set up policies to blacklist certain URLs. ZPA is cloud based and uses the zero-trust model so user data cannot be seen internally.
  • Zero Trust
  • Honeypots/nets etc.
  • Fast GUI
  • Cannot use internal DNS
  • Much tuning needed
  • Access typically limited to internal apps
Zscaler Deception Technology is well suited for companies that want to provide private access to their internal apps without using a VPN. Zscaler integrates zero trust into their honey tools that is good for detecting lateral movement. With Zscaler you allow only your employees to be able to access internal apps so detecting a bad actor is much easier.
  • We haven't fully implemented Zscaler to the whole company yet due to the lack of DNS visibility.
Elastic Security (Elastic SIEM + Elastic Agent) (formerly endgame)
Return to navigation