Zscaler Internet Access - Review
June 04, 2025

Zscaler Internet Access - Review

Anonymous | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Software Version

Business

Overall Satisfaction with Zscaler Internet Access

We use Zscaler Internet Access to provide internet security along with SSL Inspection features. It helps us organize our user access with varied use cases to help provide a uniform standard solution. It solves our availability issues. DLP is another feature that we use but only on a limited basis. We would like to maximum the usage with the type of custom applications we have.

Pros

  • URL Filtering
  • SSL Inspection
  • Location management
  • Device Postures
  • Redundancy

Cons

  • Data Loss Prevention
  • Unauthenticated devices with client connector
  • SSL Inspection
  • Network Traffic Analysis
  • Client Connector Control
  • Device Postures
I would give it a 10 if the DLP and File Control features are enhanced a lot more to be able to detect if any critical file is really being fetched and sent out.
We use Zscaler Internet Access along with Zscaler Private Access and they integrate really well. Zid is also something that we are planning to implement. Zscaler Digital Experience could not replace the tools we already have like Thousand Eyes as it provides the same data and visibility and not much enhanced.

Do you think Zscaler Internet Access delivers good value for the price?

Yes

Are you happy with Zscaler Internet Access's feature set?

Yes

Did Zscaler Internet Access live up to sales and marketing promises?

I wasn't involved with the selection/purchase process

Did implementation of Zscaler Internet Access go as expected?

Yes

Would you buy Zscaler Internet Access again?

Yes

Zscaler for internet access along with SSL Inspection to provide immense visibility into user traffic is amazing. Data Loss Prevention and File Control for home grown applications is where it gets limited.

Zscaler Internet Access Feature Ratings

Continuous Verification
10
Secure Web Gateways
10
Network Flow Control
10
Network Traffic Analysis
10
Segmentation Leveraging
7
Admin Access Control
9
Network Data Encryption
10
Network Analytics
10
Threat Recognition
6
Vulnerability Classification
6
Automated Alerts and Reporting
5
Threat Analysis
6
Threat Intelligence Reporting
6
Automated Threat Identification
6

Comments

More Reviews of Zscaler Internet Access