Zscaler review.
March 30, 2025

Zscaler review.

Anonymous | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Software Version

Business

Overall Satisfaction with Zscaler Internet Access

Zscaler helps us block malicious internet traffic. Our organization has many users who have access to the Internet on company-provided devices, which include sensitive data. Having Zscaler installed on all the devices gives us a sense of priority when users try to access something that is blocked.

Pros

  • All the devices can be managed under single umbrella.
  • If needed, the IP address can be added to bypass zscaler traffic.
  • Malicious website can be blocked.

Cons

  • The implementation of the application can be improved.
  • At times, the zscaler even blocks google.com which can be frustrating.
  • Need more technical skills to work on the application.
  • Positive impact as we have managed to mitigate the risk of internet traffic.
The application is easy to install and configure on all Windows devices. To troubleshoot any internet issue, we can easily collect all the relevant logs from Zscaler and check the exact issue. The only problem is with the uninstall, as a dedicated crew needs to provide the password.

Do you think Zscaler Internet Access delivers good value for the price?

Yes

Are you happy with Zscaler Internet Access's feature set?

Yes

Did Zscaler Internet Access live up to sales and marketing promises?

I wasn't involved with the selection/purchase process

Did implementation of Zscaler Internet Access go as expected?

Yes

Would you buy Zscaler Internet Access again?

Yes

Zscaler is suitable for all organisations as the internet traffic can be managed very well without any concern. All the devices can be available under a single umbrella, which is easier to manage. The application can be managed via a console, but installation can only be done with the help of a dedicated crew as it needs a one-time password.

Zscaler Internet Access Feature Ratings

Continuous Verification
8
Secure Web Gateways
9
Network Flow Control
10
Network Traffic Analysis
9
Segmentation Leveraging
8
Admin Access Control
9
Network Data Encryption
9
Network Analytics
8
Threat Recognition
10
Vulnerability Classification
10
Automated Alerts and Reporting
8
Threat Analysis
9
Threat Intelligence Reporting
9
Automated Threat Identification
9

Comments

More Reviews of Zscaler Internet Access