Skip to main content
TrustRadius
Zscaler Internet Access

Zscaler Internet Access

Overview

What is Zscaler Internet Access?

Zscaler Internet Access is delivered as a security stack as a service from the cloud, and is designed to eliminate the cost and complexity of traditional secure web gateway approaches, and provide easily scaled protection to all offices or users,…

Read more
Recent Reviews

TrustRadius Insights

Zscaler Internet Access has proven to be a valuable tool for users in securing their endpoint-to-server traffic and protecting against …
Continue reading
Read all reviews
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Zscaler Internet Access?

Zscaler Internet Access is delivered as a security stack as a service from the cloud, and is designed to eliminate the cost and complexity of traditional secure web gateway approaches, and provide easily scaled protection to all offices or users, regardless of location, and minimize network and…

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

86 people also want pricing

Alternatives Pricing

What is GoodAccess?

GoodAccess is a cloud VPN with zero-trust access controls specially designed for small and medium businesses. GoodAccess is a secure remote access solution that interconnects remote workers, applications, data centers, clouds, and offices via one resilient virtual network. No hardware or complex…

What is Hyper Private Access?

HPA is a Business VPN, or Virtual Private Network, presented as a secret, safe tunnel on the internet that companies can use to keep their online stuff private and secure.

Return to navigation

Product Demos

Microsoft Defender and ZIA Demo

YouTube

[Demo] VMWare Carbon Black and Zscaler in Action

YouTube
Return to navigation

Product Details

What is Zscaler Internet Access?

Zscaler Internet Access™ aims to define safe, fast internet and SaaS access, with a comprehensive cloud native security service edge (SSE) platform. ZIA includes multiple security engines, such as cloud firewall, intrusion prevention system (IPS), data loss prevention (DLP), bandwidth control, browser isolation, cloud access security broker (CASB), and sandbox. By detaching security and access controls from the network and delivering them from the cloud, ZIA can provide identical security and policy enforcement no matter where connections occur, in the headquarters, a branch office, or remote locations.

Zscaler Internet Access Features

  • Supported: Prevent Compromise
  • Supported: Stop Lateral Movement
  • Supported: Stop Data Loss

Zscaler Internet Access Video

Learn more about the incredible work Zscaler is doing at zscaler.com About Zscaler Zscaler (NASDAQ: ZS) accelerates digital transformation so that customers can be more agile, efficient, resilient, and secure. The Zscaler Zero Trust Exchange protects thousands of customers fr...
 Show More

Zscaler Internet Access Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo

Frequently Asked Questions

Zscaler Internet Access is delivered as a security stack as a service from the cloud, and is designed to eliminate the cost and complexity of traditional secure web gateway approaches, and provide easily scaled protection to all offices or users, regardless of location, and minimize network and appliance infrastructure.

Palo Alto Networks Next-Generation Firewalls - PA Series and Fortinet FortiGate are common alternatives for Zscaler Internet Access.

Reviewers rate Support Rating highest, with a score of 8.1.

The most common users of Zscaler Internet Access are from Enterprises (1,001+ employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(72)

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

Zscaler Internet Access has proven to be a valuable tool for users in securing their endpoint-to-server traffic and protecting against various threats. Users have praised the product's ability to provide VPN-secured remote access to corporate resources, safeguarding sensitive data from malware, phishing, and zero-day threats. Zscaler Internet Access is especially appreciated for its robust protection of popular cloud applications such as Office 365, Salesforce, and AWS, ensuring compliance and preventing unauthorized access.

Another key use case of Zscaler Internet Access is its capability to protect guest Wi-Fi networks and enforce web filtering policies for organizational compliance. Users have found this feature useful in preventing security breaches or inappropriate internet usage on guest networks. Additionally, the software's workstation and server policy updates are highly valued by users, as it enables them to keep their systems secure and up-to-date.

Furthermore, Zscaler Internet Access offers a range of benefits when it comes to monitoring and controlling network usage. Users appreciate the insights provided into bandwidth utilization and the acceleration of Azure services. They also find it convenient to monitor usage through log reports that can be exported on demand. The software's bandwidth control through load balancing is especially valuable for users who want to optimize network performance.

While Zscaler Internet Access has received positive feedback for its functionality and ease of use, there are some areas where users have raised concerns. Some users feel that the content filtration features are limited and may not meet their specific requirements. Additionally, a few users have mentioned that the software starts automatically when booting the system, which can be seen as a drawback by some. However, they also appreciate that they have the ability to disable the software when needed.

Overall, Zscaler Internet Access has become an integral part of many organizations' security infrastructure. It replaces traditional hardware appliances and complex VPN implementations, providing a cloud-based solution that simplifies administration, improves control, and increases visibility. With its wide range of use cases, from securing remote access to protecting cloud applications and enforcing web filtering policies, Zscaler Internet Access offers comprehensive security and peace of mind for users.

Users have made several recommendations for Zscaler based on their experiences with the product. The most common recommendations include:

  1. Users highly recommend Zscaler as a secure solution for organizations, emphasizing its effectiveness in securing data and protecting against threats. They mention that it is suitable for companies of any size and praise its pricing criteria.

  2. Many users recommend Zscaler for its user-friendly internet security system. They find it easy to use and appreciate its simplicity in enforcing web policies and securing networks. Users also highlight the simplicity of deployment and the convenience of policy configuration and DLP features.

  3. Users often recommend Zscaler as a reliable cloud-based platform for web and mobile security solutions. They consider it as the best-in-market option, particularly for managing web traffic with advanced threat detection. They also endorse Zscaler Internet Access as a one-stop solution for secure access to corporate resources.

Overall, users suggest researching and implementing Zscaler to benefit their own companies and encourage others to try out this product before making a decision. Some users do mention that they haven't encountered any issues with Zscaler, but there are also suggestions to improve the user-friendliness of the dashboard and reporting features.

Attribute Ratings

Reviews

(1-16 of 16)
Companies can't remove reviews or game the system. Here's why
Adil Khan Robin | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • Cloud-based security software provides web filtering, antivirus, anti-malware, advanced threat protection, and data loss prevention.
  • It scales quickly and allows central security policy management.
  • It looks for security threats and reports them in real-time, which helps organizations act quickly.
  • Subscription-based, internet-connected.
  • It's less customizable than on-premises security.
  • Its cloud-based nature limits its security features.
Score 6 out of 10
Vetted Review
Verified User
Incentivized
  • Zscaler completely moved away from the traditional firewall setup to a hosted firewall solution. We don't have to worry about the hardware failing or maintaining it as part of our service plan compared to our on-premise firewall. Zscaler has a lot of data centres across the world where they are maintaining their solutions so mobile consultants will always be close to one of their data centres.
  • Rolling out Zscaler solutions to our end customers' computers is actually pretty easy and hassle-free. As part of onboarding of new employees we can set up the Zscaler solution and push it to our end users' machines and get them connected to the cloud solutions.
  • Zscaler does proper market research on the latest emerging threats and they keep their firewall patched and updated to the latest versions so the security team does not have to worry about keeping the firewall updated.
  • My personal opinion about Zscaler is their idea is that all the services are online and are moving to the cloud but the truth is some of them have to stay on-premise and employees still need to work from an office. Zscaler simply doesn't have any on-premise solutions like an NGFW to provide a complete package. We are supporting Fortinet NGFW for our on-premise solution.
  • As mentioned earlier Zscaler being hosted online we don't get the full flexibility of managing our firewalls. Although it's a good thing we keep running into problems like when we want to allow list a service from a specific source IP Zscaler cannot provide a static IP for that. They route traffic through multiple IP addresses and the IP's keep changing every 15-20 minutes. So you cannot allow list a specific IP on the receiving end. The only way to move forward would be to allow an entire range of IP's which opens a security loophole on the receiving end.
  • For every small thing we have to keep opening a ticket with Zscaler. Their response rate is fast but still in a fast-moving world it's not fast enough. Especially since we need to get approval from our change control to get something done and then again we have to raise a ticket to get something done from the Zscaler side.
Score 10 out of 10
Vetted Review
Verified User
  • Access control based on cloud applications
  • Mitigation against data exfiltration
  • Web Content Filtering
  • Automatic authentication for Linux endpoints
  • Automatic authentication for macOS endpoints
  • knowledge base improvements for linux endpoints
Wojciech Poludniewski | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • Secure internet browsing
  • Bandwidth utilization insights
  • Encrypting traffic end-to-end
  • Accelerating traffic to Azure
  • Further reduction of false-positives
  • Easier initial setup
Score 10 out of 10
Vetted Review
Verified User
Incentivized
  • Speed - get access to your company tools without any hiccups or delay.
  • Secure - keeping data protected for the company and allowing access only to authorized people.
  • Ease of deployment - minimal setup needed and little to none connectivity issues.
  • Desktop notification - inform users if connection was terminated.
  • Guided help - show options for self-troubleshooting.
  • Self-install - instead of IT doing it for you, maybe you can do the installation on your own.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
  • Safe Internet access.
  • Cloud based hence can be scaled up when required.
  • Customization with respect to the company requirements and IT policies.
  • Costing of course is one of the areas.
  • Sometime blocking the genuine access also.
  • Solution for small company required.
Raman Ahuja | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
  • Since it's cloud-based, it's completely on-demand and scalable without any additional hardware required.
  • Deployment is fairly straightforward.
  • Customer support is prompt and tickets are resolved in a quick turnaround time.
  • Chat or email support is not available. Only option is to either call them or raise a ticket by logging into their website.
  • Pricing is not transparent and quote based.
  • Access to websites is a little too slow with Zscaler monitoring on.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
  • Great at content filtering based on categories, countries, etc.
  • The sandbox feature of Zscaler is a huge plus.
  • Having the ability do decrypt SSL traffic works well.
  • Filtering through the logging can be a bit troublesome.
  • I can't remember the exact reason but we preferred to do an IPSEC tunnel back to Zscaler but instead had to use a GRE Tunnel
  • The reporting feature could use some improvement. Clean, clear reports would be nice.
January 31, 2020

Cloud security made easy

Joseph Imbimbo | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
  • Zscaler allows us to grow our network without a great deal of additional hardware infrastructure.
  • It secures cloud-based applications without the data center having to perform complex configurations.
  • We are slowly moving away from VPN as our primary security mechanism and this permits this.
  • Securing third party access is a bit complex to implement. These are our third party partners who require access to our data center on a temporary basis.
  • It is a bit of a learning curve to transform from the VPN and appliance architecture to this model.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
  • DAS program helps ensure that you get set up properly the first time around.
  • Reports are easily customizable from minute details that you may want as IT to high-level overviews for executive presentations.
  • Lots of capability.
  • No email support -- you must open tickets through their website.
  • Some support technicians need more experience.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
  • Zscaler is truly a cloud service, leveraging the capacity and throughput expected from the cloud along with the resilience
  • Zscaler takes away some of the risks imposed with older machines or poor patching by automatically restricting content to vulnerable agents
  • Zscaler works in the background and does not interfere with normal user operations. It does so consistently, wherever the individual works in the world
  • The pre-baked reports within Zscaler could do with a refresh, add some new reports in-tune with new threats. IE: show me any examples of crypto mining detected in the org
  • Zscaler could make it easier to clean out expired accounts or those of ex-employees to get a more accurate reading of activity
  • Failover monitoring for GRE tunnels could be improved although it does work
Return to navigation