Secure Internet Traffic for your users in the office and remote
December 20, 2024

Secure Internet Traffic for your users in the office and remote

Anonymous | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Software Version

Business

Overall Satisfaction with Zscaler Internet Access

We have rolled out Zscaler Internet Access to all our user endpoints, including desktops and laptops. The Zscaler Client Connector allows all internet traffic to be routed through Zscaler PoPs and filtered based on the policies that we have configured. It protects the endpoints from malicious internet traffic even when working remotely.

Pros

  • Protect the end device from malicious internet traffic even when users work remotely
  • Enforce the policies centrally from the Zscaler dashboard
  • Disable user's ability to turn off the Zscaler Internet Access protection

Cons

  • Improve internet connectivity speeds when connected to certain PoPs
  • Improve customer service time to resolve tickets
  • Improved the security posture on our user endpoints' internet traffic
  • Enforce DLP policies
  • Enforce Web filter policies - access to certain sites and also based on time of day
The dashboard and admin portal are easy to understand and administer. The Zscaler Internet Access agent auto updates and integrates with most single sign-on solutions. No additional steps are needed from the user - auto-connect can be enabled.
Zscaler Internet Access was easier to setup, administer and manage. Both met our technical requirements. The sales rep and engineer was easier to work with.

Do you think Zscaler Internet Access delivers good value for the price?

Yes

Are you happy with Zscaler Internet Access's feature set?

Yes

Did Zscaler Internet Access live up to sales and marketing promises?

Yes

Did implementation of Zscaler Internet Access go as expected?

Yes

Would you buy Zscaler Internet Access again?

Yes

Zscaler Internet Access is well-suited for organizations needing to secure their endpoints' internet traffic when the endpoints are not in the office. Zscaler Internet Access can be implemented using the Zscaler Client Connector agent installed on the endpoints OR by establishing an IPSec tunnel from the office firewall to Zscaler PoPs. IT can easily enforce web filter policies and Data Loss Prevention policies on their user endpoints.

Zscaler Internet Access Feature Ratings

Continuous Verification
10
Secure Web Gateways
9
Network Flow Control
9
Network Traffic Analysis
9
Segmentation Leveraging
Not Rated
Admin Access Control
9
Network Data Encryption
9
Network Analytics
10
Threat Recognition
10
Vulnerability Classification
9
Automated Alerts and Reporting
9
Threat Analysis
10
Threat Intelligence Reporting
10
Automated Threat Identification
9

Comments

More Reviews of Zscaler Internet Access