Skip to main content
TrustRadius
Zscaler Internet Access

Zscaler Internet Access

Overview

What is Zscaler Internet Access?

Zscaler Internet Access is delivered as a security stack as a service from the cloud, and is designed to eliminate the cost and complexity of traditional secure web gateway approaches, and provide easily scaled protection to all offices or users,…

Read more
Recent Reviews

TrustRadius Insights

Zscaler Internet Access has proven to be a valuable tool for users in securing their endpoint-to-server traffic and protecting against …
Continue reading
Read all reviews
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Zscaler Internet Access?

Zscaler Internet Access is delivered as a security stack as a service from the cloud, and is designed to eliminate the cost and complexity of traditional secure web gateway approaches, and provide easily scaled protection to all offices or users, regardless of location, and minimize network and…

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

87 people also want pricing

Alternatives Pricing

What is GoodAccess?

GoodAccess is a cloud VPN with zero-trust access controls specially designed for small and medium businesses. GoodAccess is a secure remote access solution that interconnects remote workers, applications, data centers, clouds, and offices via one resilient virtual network. No hardware or complex…

What is Hyper Private Access?

HPA is a Business VPN, or Virtual Private Network, presented as a secret, safe tunnel on the internet that companies can use to keep their online stuff private and secure.

Return to navigation

Product Demos

Microsoft Defender and ZIA Demo

YouTube

[Demo] VMWare Carbon Black and Zscaler in Action

YouTube
Return to navigation

Product Details

What is Zscaler Internet Access?

Zscaler Internet Access™ aims to define safe, fast internet and SaaS access, with a comprehensive cloud native security service edge (SSE) platform. ZIA includes multiple security engines, such as cloud firewall, intrusion prevention system (IPS), data loss prevention (DLP), bandwidth control, browser isolation, cloud access security broker (CASB), and sandbox. By detaching security and access controls from the network and delivering them from the cloud, ZIA can provide identical security and policy enforcement no matter where connections occur, in the headquarters, a branch office, or remote locations.

Zscaler Internet Access Features

  • Supported: Prevent Compromise
  • Supported: Stop Lateral Movement
  • Supported: Stop Data Loss

Zscaler Internet Access Video

Learn more about the incredible work Zscaler is doing at zscaler.com About Zscaler Zscaler (NASDAQ: ZS) accelerates digital transformation so that customers can be more agile, efficient, resilient, and secure. The Zscaler Zero Trust Exchange protects thousands of customers fr...
 Show More

Zscaler Internet Access Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo

Frequently Asked Questions

Zscaler Internet Access is delivered as a security stack as a service from the cloud, and is designed to eliminate the cost and complexity of traditional secure web gateway approaches, and provide easily scaled protection to all offices or users, regardless of location, and minimize network and appliance infrastructure.

Palo Alto Networks Next-Generation Firewalls - PA Series and Fortinet FortiGate are common alternatives for Zscaler Internet Access.

Reviewers rate Support Rating highest, with a score of 8.1.

The most common users of Zscaler Internet Access are from Enterprises (1,001+ employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(72)

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

Zscaler Internet Access has proven to be a valuable tool for users in securing their endpoint-to-server traffic and protecting against various threats. Users have praised the product's ability to provide VPN-secured remote access to corporate resources, safeguarding sensitive data from malware, phishing, and zero-day threats. Zscaler Internet Access is especially appreciated for its robust protection of popular cloud applications such as Office 365, Salesforce, and AWS, ensuring compliance and preventing unauthorized access.

Another key use case of Zscaler Internet Access is its capability to protect guest Wi-Fi networks and enforce web filtering policies for organizational compliance. Users have found this feature useful in preventing security breaches or inappropriate internet usage on guest networks. Additionally, the software's workstation and server policy updates are highly valued by users, as it enables them to keep their systems secure and up-to-date.

Furthermore, Zscaler Internet Access offers a range of benefits when it comes to monitoring and controlling network usage. Users appreciate the insights provided into bandwidth utilization and the acceleration of Azure services. They also find it convenient to monitor usage through log reports that can be exported on demand. The software's bandwidth control through load balancing is especially valuable for users who want to optimize network performance.

While Zscaler Internet Access has received positive feedback for its functionality and ease of use, there are some areas where users have raised concerns. Some users feel that the content filtration features are limited and may not meet their specific requirements. Additionally, a few users have mentioned that the software starts automatically when booting the system, which can be seen as a drawback by some. However, they also appreciate that they have the ability to disable the software when needed.

Overall, Zscaler Internet Access has become an integral part of many organizations' security infrastructure. It replaces traditional hardware appliances and complex VPN implementations, providing a cloud-based solution that simplifies administration, improves control, and increases visibility. With its wide range of use cases, from securing remote access to protecting cloud applications and enforcing web filtering policies, Zscaler Internet Access offers comprehensive security and peace of mind for users.

Users have made several recommendations for Zscaler based on their experiences with the product. The most common recommendations include:

  1. Users highly recommend Zscaler as a secure solution for organizations, emphasizing its effectiveness in securing data and protecting against threats. They mention that it is suitable for companies of any size and praise its pricing criteria.

  2. Many users recommend Zscaler for its user-friendly internet security system. They find it easy to use and appreciate its simplicity in enforcing web policies and securing networks. Users also highlight the simplicity of deployment and the convenience of policy configuration and DLP features.

  3. Users often recommend Zscaler as a reliable cloud-based platform for web and mobile security solutions. They consider it as the best-in-market option, particularly for managing web traffic with advanced threat detection. They also endorse Zscaler Internet Access as a one-stop solution for secure access to corporate resources.

Overall, users suggest researching and implementing Zscaler to benefit their own companies and encourage others to try out this product before making a decision. Some users do mention that they haven't encountered any issues with Zscaler, but there are also suggestions to improve the user-friendliness of the dashboard and reporting features.

Attribute Ratings

Reviews

(1-3 of 3)
Companies can't remove reviews or game the system. Here's why
Adil Khan Robin | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We secured endpoint-to-server traffic with Zscaler Internet Access and a network adapter. It provides VPN-secured remote access to corporate resources, protecting against malware, phishing, and zero-day threats. It also protects Office 365, Salesforce, and AWS, protecting sensitive data and enforcing cloud application compliance. We treasure Zscaler's workstation and server policy updates. It also protects guest Wi-Fi networks and enforces web filtering policies for organizational compliance.
  • Cloud-based security software provides web filtering, antivirus, anti-malware, advanced threat protection, and data loss prevention.
  • It scales quickly and allows central security policy management.
  • It looks for security threats and reports them in real-time, which helps organizations act quickly.
  • Subscription-based, internet-connected.
  • It's less customizable than on-premises security.
  • Its cloud-based nature limits its security features.
Zscaler Internet Access is an internet tunnel that pairs with the network adapter to secure traffic between servers and workstations. It can refresh policies automatically and log intrusions but does not broadcast intrusions. Cloud-based Zscaler Internet Access is easy to deploy and scale, with no hardware or software needed. In a hybrid model, Zscaler Internet Access performs some security functions on-premises and others in the cloud, allowing organizations to keep infrastructure. There is a slight learning curve from VPN and appliance architecture to this paradigm.
  • Scalability.
  • SSL inspection.
  • Data loss prevention.
  • Cloud sandboxing.
  • Web filtering.
  • Centralized management.
  • Real-time monitoring and reporting.
Zero Trust Security (8)
86.25%
8.6
Continuous Verification
80%
8.0
Secure Web Gateways
90%
9.0
Network Flow Control
90%
9.0
Network Traffic Analysis
90%
9.0
Segmentation Leveraging
80%
8.0
Admin Access Control
90%
9.0
Network Data Encryption
90%
9.0
Network Topology Mapping
80%
8.0
Threat Intelligence (7)
84.28571428571429%
8.4
Network Analytics
90%
9.0
Threat Recognition
90%
9.0
Vulnerability Classification
80%
8.0
Automated Alerts and Reporting
90%
9.0
Threat Analysis
80%
8.0
Threat Intelligence Reporting
80%
8.0
Automated Threat Identification
80%
8.0
Identity Management (1)
80%
8.0
Multi-Factor Authentication
80%
8.0
Endpoint Security (1)
80%
8.0
Endpoint Detection and Response (EDR)
80%
8.0
  • It removes the requirement that businesses have hardware and infrastructure located on their premises, which results in cost savings.
  • Secure internet access and reduced security incidents can save money on remediation, legal fees, and brand damage and boost employee productivity.
  • Its DLP features can save businesses money by helping them meet the requirements of laws protecting sensitive information, such as GDPR, CCPA, and HIPAA.
Zscaler Intenet Access outperformed the competition due to its lightning-fast policy delivery and cross-compatibility. It is easy to track employee usage and block unnecessary websites, reducing company internet usage. Zscalar installed on every system increases cloud-based software bandwidth, decreasing user turnaround time and increasing efficiency.
December 04, 2019

Bittersweet Zscaler

Samuel Hadid | TrustRadius Reviewer
Score 7 out of 10
Vetted Review
Verified User
Incentivized
Zscaler is being used as a transparent proxy to prevent users from exhausting the bandwidth resources. There are some implementations customized for mobile networks and wired networks, where we have certain needs for a variety of devices and require coverage of others. Not implemented for networks where behavior/anomaly-based analysis is required.
  • Reverse Proxy
  • Forward Proxy
  • Protection
  • Poor mgmt. capabilities
  • Not so flexible
  • Hard to segment
  • Hard to implement as fault tolerant
I think the Zscaler platform is pretty well suited for short-scale networks/architectures since is hard to segment and a single error could bring down operations in your company - we've had a couple of those. At some point, the lack of flexibility has forced the implementation to take a whitelisting approach rather than a blacklisting/behavior/anomaly approach.
Zero Trust Security
N/A
N/A
Threat Intelligence
N/A
N/A
Identity Management
N/A
N/A
Endpoint Security
N/A
N/A
  • Outages
  • Too much effort time
  • Not flexible
The Zscaler solution was selected in order to fulfill the needs of the variety of networks that we manage since the device requirements are so varied. Also, it was required to be as transparent and non-intrusive as possible to improve efficiency. Also, the basic implementation was simple and fast enough.
While overall support was always nice and polite, most of the time it was hard to reach them and it took awhile for them to respond back in urgent cases. It was probably an isolated case but, still, it's hard to manage a tool without proper support from the vendor when in need.
Citrix Virtual Apps and Desktops (formerly XenDesktop), Metasploit, Nmap
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Zscaler handles our web filtering, web usage tracking, bandwidth control, etc.... everything that allows us to control and visualize what's going on in and out of our network, primarily for Cyber Security. Reports are available to track usage and help determine possible reasons for gaps in productivity. Bandwidth controls allow users to still utilize other sites, such as Youtube, but ensure that the usage doesn't bog down the rest of the company.
  • DAS program helps ensure that you get set up properly the first time around.
  • Reports are easily customizable from minute details that you may want as IT to high-level overviews for executive presentations.
  • Lots of capability.
  • No email support -- you must open tickets through their website.
  • Some support technicians need more experience.
If you're looking to ramp up your Cyber Security operations, Zscaler is a must-see. Their demos are great and the implementation is fairly painless. DAS helps you to get it set up and ensure success.
Zero Trust Security
N/A
N/A
Threat Intelligence
N/A
N/A
Identity Management
N/A
N/A
Endpoint Security
N/A
N/A
  • Zscaler is helping to track productivity.
  • Zscaler is helping us monitor bandwidth usage to sites that are less involved with the business.
  • Zscaler took 2-4 members of our team a substantial amount of time to get all of the details hammered out.
Return to navigation