Zscaler Private Access and Data Protection
June 05, 2025

Zscaler Private Access and Data Protection

Anonymous | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User

Overall Satisfaction with Zscaler Data Protection

INVISTA uses Zscaler Data Protection to grant access to specific applications where our critical data is housed. The business case is around ensuring that our intellectual property is protected in all forms and in all applications.

Pros

  • Remote Access
  • User specific access to data within applications via policy
  • INVISTA also hopes to leverage this to do microsegmentation

Cons

  • tenant to tenant connectivity
  • devices that are shared and may not always be tied to a single / specific user
  • play well or better with other app management tools like Intune
  • It has had a positive impact on protection of intellectual property
  • It had a negative impact on us as tenant to tenant connectivity needs to get better.
  • Positive news in how it integrates with our identity provider
Our end users have had minimal issues with the Zscaler Private Access / Zscaler Data Protection application. The biggest fight seems to be with mobile devices that are shared.
Zscaler Data protection must be used in conjunction with other Zscaler tools where the others are stand alone. It is mainly the cost that drove us to look at Zscaler's product again, although, we do still use Proof point for DLP and email security

Do you think Zscaler Data Security delivers good value for the price?

Yes

Are you happy with Zscaler Data Security's feature set?

No

Did Zscaler Data Security live up to sales and marketing promises?

I wasn't involved with the selection/purchase process

Did implementation of Zscaler Data Security go as expected?

I wasn't involved with the implementation phase

Would you buy Zscaler Data Security again?

Yes

Zscaler Data protection / Zscaler private access is great for remote worker scenarios where people will be running from, untrusted networks. Data protection is also very valuable for applications where we want to limit by identity those individuals that should even have access to the application.

Zscaler Data Security Feature Ratings

Classification Scanning
9
Policy Based Protection
10
Data Breach Reporting
4
Data Patterning
4
Incident Response
5
Data Access Control
8
Data Encryption
8

Comments

More Reviews of Zscaler Data Security