TrustRadius: an HG Insights company

Zscaler Private Access

Score8.9 out of 10

62 Reviews and Ratings

Features

Top Performing Features

  • Secure Web Gateways

    Provides user protection from malicious web-based attacks while implementing company-approved use policies.

    Category average: 8.8

  • Network Data Encryption

    Encrypting data so that only the network users with the proper privileges may see and access the data.

    Category average: 8.8

  • Multi-Factor Authentication

    Using multiple, independent components to gain access

    Category average: 8.8

  • Network Flow Control

    Controls the flow of network traffic between assets using privilege restrictions to hide assets from unauthorized users.

    Category average: 8.7

Identity Management

Identity management software manages information about the identity of software users and controls access to corporate resources

  • Multi-Factor Authentication

    Using multiple, independent components to gain access

    Category average: 8.8

Endpoint Security

Endpoint security software protects enterprise connected devices from malware and cyber attacks.

  • Endpoint Detection and Response (EDR)

    Continuous monitoring and response to advanced internet threats by endpoint agents.

    Category average: 8.9

Threat Intelligence

Features for categories that leverage threat intelligence in network security

  • Network Analytics

    Analyzes various data reports and logs (DNS, firewall, user data, security information etc.) to identify threats in a network.

    Category average: 8.2

  • Threat Recognition

    Detection and recognition of malicious software within a network that could pose a threat to sensitive information.

    Category average: 8

  • Vulnerability Classification

    Prioritizing vulnerabilities, to determine which vulnerabilities are most urgent and require a quicker resolution.

    Category average: 8.2

  • Automated Alerts and Reporting

    Systems in place to automatically alert, report, or notify of issues that may need timely remediation.

    Category average: 8.2

  • Threat Analysis

    Analyzing known factors such as behavior patterns, affected areas, and other specific features to more easily identify a threat.

    Category average: 8.6

  • Threat Intelligence Reporting

    Generates reports that display information on threats (such as name, type, frequency of attack, area affected, etc.)

    Category average: 8.4

  • Automated Threat Identification

    Leveraging multiple sources of information (such as threat intelligence databases) to automatically identify threats.

    Category average: 8.4

Zero Trust Security

Network and application access that abides by zero trust policies, where users are given access only to what they need and on an individual case basis.

  • Continuous Verification

    The ability to continuously validate users and services inside and outside a network before granting or keeping access to applications or data.

    Category average: 8.6

  • Secure Web Gateways

    Provides user protection from malicious web-based attacks while implementing company-approved use policies.

    Category average: 8.8

  • Network Flow Control

    Controls the flow of network traffic between assets using privilege restrictions to hide assets from unauthorized users.

    Category average: 8.7

  • Network Traffic Analysis

    Software that monitors network traffic and provides detailed reports on the users who access the network.

    Category average: 8.5

  • Segmentation Leveraging

    The ability to reduce the impact of an external attack by restricting the access of specified accounts, applications, or services during an attack.

    Category average: 8

  • Admin Access Control

    Administrator-defined access control privileges that are assigned based on a user's need to access certain applications or areas of the network.

    Category average: 9

  • Network Data Encryption

    Encrypting data so that only the network users with the proper privileges may see and access the data.

    Category average: 8.8

  • Network Topology Mapping

    The ability to map a network, in detail, to show performance metrics, device and software connections, and resource utilization.

    Category average: 8.5