Skip to main content
TrustRadius
Zscaler Internet Access

Zscaler Internet Access

Overview

What is Zscaler Internet Access?

Zscaler Internet Access™ (ZIA) is a secure web gateway (SWG), delivering cloud native cyberthreat protection and zero trust access to the internet and SaaS apps.

Read more

Learn from top reviewers

Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Zscaler Internet Access?

Zscaler Internet Access™ (ZIA) is a secure web gateway (SWG), delivering cloud native cyberthreat protection and zero trust access to the internet and SaaS apps.

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

100 people also want pricing

Alternatives Pricing

What is Hyper Private Access?

HPA is a Business VPN, or Virtual Private Network, presented as a secret, safe tunnel on the internet that companies can use to keep their online stuff private and secure.

Return to navigation

Product Demos

CSR on Why Zscaler

YouTube

AutoNation Leverages Zero Trust Exchange Platform

YouTube

Zscaler Internet Access Demo

YouTube
Return to navigation

Features

Identity Management

Identity management software manages information about the identity of software users and controls access to corporate resources

5.5
Avg 8.9

Endpoint Security

Endpoint security software protects enterprise connected devices from malware and cyber attacks.

9.7
Avg 9.3

Threat Intelligence

Features for categories that leverage threat intelligence in network security

9.5
Avg 8.9

Zero Trust Security

Network and application access that abides by zero trust policies, where users are given access only to what they need and on an individual case basis.

9.6
Avg 9.3
Return to navigation

Product Details

What is Zscaler Internet Access?

Zscaler Internet Access™ (ZIA) is a secure web gateway (SWG), delivering cloud native cyberthreat protection and zero trust access to the internet and SaaS apps.


Enterprises worldwide have spent billions on firewalls, yet breaches are increasing. The problem is simple: traditional firewall-centric architectures are no longer effective against cyberthreats.


Built on the principle of least privilege, Zscaler’s proxy architecture enables full TLS/SSL inspection at scale, with connections brokered between users and applications based on identity, context, and business policies.


Benefits:

• Preventing cyberthreats and data loss:

Protects organization against advanced threats with a suite of cyberthreat and data protection services, enriched by real-time updates sourced from 500 trillion daily threat signals from the Zscaler security cloud.

• User experience:

Fast Internet and SaaS experience to boost productivity and increase business agility.

• Modernization of security architecture:

Zscaler replaces costly, complex, and slow appliances with a fully cloud-native zero trust platform.

Zscaler Internet Access Features

Zero Trust Security Features

  • Supported: Continuous Verification
  • Supported: Secure Web Gateways
  • Supported: Network Flow Control
  • Supported: Network Traffic Analysis
  • Supported: Segmentation Leveraging
  • Supported: Admin Access Control
  • Supported: Network Data Encryption

Threat Intelligence Features

  • Supported: Network Analytics
  • Supported: Threat Recognition
  • Supported: Vulnerability Classification
  • Supported: Automated Alerts and Reporting
  • Supported: Threat Analysis
  • Supported: Threat Intelligence Reporting
  • Supported: Automated Threat Identification

Additional Features

  • Supported: Prevent Compromise
  • Supported: Stop Lateral Movement
  • Supported: Stop Data Loss

Zscaler Internet Access Screenshots

Screenshot of Stop Advanced Threats and Data Loss
Zscaler Internet Access (ZIA) is a cloud native security service edge (SSE) solution that builds on a decade of secure web gateway leadership. Offered as a scalable SaaS platform through the world’s largest security cloud, it replaces legacy network security solutions, preventing advanced attacks and data loss with a comprehensive zero trust approach. ZIA is integrated seamlessly into the Zscaler Zero Trust Exchange™ to provide superior defense-in-depth, secure connectivity, end user experience, and administrative visibility and control.

Zscaler Internet Access Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo
Supported LanguagesEnglish, Spanish, French, German, Chinese, Japanese

Frequently Asked Questions

Zscaler Internet Access™ (ZIA) is a secure web gateway (SWG), delivering cloud native cyberthreat protection and zero trust access to the internet and SaaS apps.

Palo Alto Networks Next-Generation Firewalls - PA Series and Fortinet FortiGate are common alternatives for Zscaler Internet Access.

Reviewers rate Segmentation Leveraging highest, with a score of 9.9.

The most common users of Zscaler Internet Access are from Enterprises (1,001+ employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews From Top Reviewers

(1-5 of 17)

Better cloud security product!

Rating: 9 out of 10
January 15, 2020
Vetted Review
Verified User
Zscaler Internet Access
5 years of experience
As technology is evolving, so are the threats increasing day by day. Security is the first priority of an organization, leads us to use Zscaler Internet Access this fantastic product. Good security product. Reporting and managing are straightforward. Employees can work securely from remote locations. The use of the SSO technique is beneficial. The best feature I like is filtering and the scanning, which it does. Kudos!! to the team for bringing such a product in the market.
  • Reporting is easy
  • Easy to use
Cons
  • Few times turn on button does not work smoothly
  • Support needs to be improved
Zscaler Internet Access being on the cloud makes it the most desirable product to be used worldwide. Best suited for small scale industries. But, it can also be ideal for large scale industries.

Cloud security made easy

Rating: 8 out of 10
January 31, 2020
JI
Vetted Review
Verified User
Zscaler Internet Access
2 years of experience
It is being used across the entire organization to secure users working on-premise as well as remotely. It has replaced the traditional hub and spoke appliance hardware and complex VPN implementations. It is designed to allow us to secure our assets in a mixed on-premise /cloud environment. More and more security is required as many of our applications become cloud-based.
  • Zscaler allows us to grow our network without a great deal of additional hardware infrastructure.
  • It secures cloud-based applications without the data center having to perform complex configurations.
  • We are slowly moving away from VPN as our primary security mechanism and this permits this.
Cons
  • Securing third party access is a bit complex to implement. These are our third party partners who require access to our data center on a temporary basis.
  • It is a bit of a learning curve to transform from the VPN and appliance architecture to this model.
It is well suited to companies that don't have a large network department and security office. Large enterprises may have too many layers of personnel to make the transition as seamless as it could be.

Zscaler - minimise the risk of crypto mining exploits

Rating: 10 out of 10
March 06, 2018
Vetted Review
Verified User
Zscaler Internet Access
4 years of experience
Zscaler Web Security is being used globally throughout the entire organisation and 50+ countries. Zscaler makes life easier and more productive for our employees.
How? because via SSO an employee can easily access the internet from any device and do so with very little restrictions.
Why? because Zscaler clearly demonstrates how their ability to scan websites in real-time detects malware and vulnerabilities that would otherwise gone unnoticed.
  • Zscaler is truly a cloud service, leveraging the capacity and throughput expected from the cloud along with the resilience
  • Zscaler takes away some of the risks imposed with older machines or poor patching by automatically restricting content to vulnerable agents
  • Zscaler works in the background and does not interfere with normal user operations. It does so consistently, wherever the individual works in the world
Cons
  • The pre-baked reports within Zscaler could do with a refresh, add some new reports in-tune with new threats. IE: show me any examples of crypto mining detected in the org
  • Zscaler could make it easier to clean out expired accounts or those of ex-employees to get a more accurate reading of activity
  • Failover monitoring for GRE tunnels could be improved although it does work
The absolute benefit of Zscaler is that it was born in the cloud and thus has no hybrid hangovers such as working with legacy proxy servers. Thus it is a clean system to configure and deploy.
It is a cloud service therefore you need to consider latency and internet traffic flows between your location and their pop. Zscaler have a large footprint to minimize that impact but it is worth examining with your ISP because the most obvious traffic route is not always the result you get.
The net result is that your optimum connection is within a different country which helps performance but geo-location / google searches could confuse people

"Ability to scale, administration simplicity, real-time reporting, and analytics."

Rating: 9 out of 10
April 17, 2023
AK
Vetted Review
Verified User
Zscaler Internet Access
1 year of experience
We secured endpoint-to-server traffic with Zscaler Internet Access and a network adapter. It provides VPN-secured remote access to corporate resources, protecting against malware, phishing, and zero-day threats. It also protects Office 365, Salesforce, and AWS, protecting sensitive data and enforcing cloud application compliance. We treasure Zscaler's workstation and server policy updates. It also protects guest Wi-Fi networks and enforces web filtering policies for organizational compliance.
  • Cloud-based security software provides web filtering, antivirus, anti-malware, advanced threat protection, and data loss prevention.
  • It scales quickly and allows central security policy management.
  • It looks for security threats and reports them in real-time, which helps organizations act quickly.
Cons
  • Subscription-based, internet-connected.
  • It's less customizable than on-premises security.
  • Its cloud-based nature limits its security features.
Zscaler Internet Access is an internet tunnel that pairs with the network adapter to secure traffic between servers and workstations. It can refresh policies automatically and log intrusions but does not broadcast intrusions. Cloud-based Zscaler Internet Access is easy to deploy and scale, with no hardware or software needed. In a hybrid model, Zscaler Internet Access performs some security functions on-premises and others in the cloud, allowing organizations to keep infrastructure. There is a slight learning curve from VPN and appliance architecture to this paradigm.

Hassle-free content filtering via Zscaler

Rating: 8 out of 10
September 07, 2020
RA
Vetted Review
Verified User
Zscaler Internet Access
2 years of experience
Zscaler is used by our organization to secure our devices from internet content. This is being used by each and every department of our organization. It takes away the need of installing multiple applications to secure the workstations while interacting with the internet and simply replaces it with a Zscaler application that provides the capabilities of different applications via the cloud.
  • Since it's cloud-based, it's completely on-demand and scalable without any additional hardware required.
  • Deployment is fairly straightforward.
  • Customer support is prompt and tickets are resolved in a quick turnaround time.
Cons
  • Chat or email support is not available. Only option is to either call them or raise a ticket by logging into their website.
  • Pricing is not transparent and quote based.
  • Access to websites is a little too slow with Zscaler monitoring on.
Zscaler is suited for organizations where a lot of employees work remotely and need to access a lot of cloud-based applications. It enables an organization to filter out content and applications that don't adhere to policies. It provides a scalable on-demand solution with over 150 data centers to allow users to have low latency in connection.
Return to navigation