Zscaler Internet Access is a game changer
June 05, 2025

Zscaler Internet Access is a game changer

Anonymous | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User

Software Version

Business

Overall Satisfaction with Zscaler Internet Access

We use Zscaler Internet Access (ZIA) to protect internet access for users, servers and IOT across sites around the world. We are able to use posture checks and group membership to provide specific access to online applications. We are also able to enable strong DLP controls with all traffic passing the Zscaler infrastructure. The gives our organization rich visibility into the traffic flows and provides protection across a wide spectrum.

Pros

  • Provides access by group to internet sites or categories
  • Provides DLP on data leaving the organization
  • Provides coaching for sites that may be questionable without a full block

Cons

  • Continue enhancing the API/Terraform provider
  • Provide API access into the client to force a policy update
  • Single point of management for clients around the world
  • No on-prem infrastructure needed to back-haul for security
  • Unified policy on-prem or off-network
ZIA has opened up a unified portal for ensuring enforcement policy is the same no matter where the user is located.

Do you think Zscaler Internet Access delivers good value for the price?

Yes

Are you happy with Zscaler Internet Access's feature set?

Yes

Did Zscaler Internet Access live up to sales and marketing promises?

Yes

Did implementation of Zscaler Internet Access go as expected?

Yes

Would you buy Zscaler Internet Access again?

Yes

Zscaler Internet Access(ZIA) is great for user access since there is a client on each machine. This provides the needed protections for when people are on their home network so they cannot move data to personal devices. It also blocks risky categories and allows for integration with in-house developed systems to block sites.

Zscaler Internet Access Feature Ratings

Continuous Verification
9
Secure Web Gateways
10
Network Flow Control
9
Network Traffic Analysis
10
Segmentation Leveraging
10
Admin Access Control
10
Network Data Encryption
10
Network Analytics
10
Threat Recognition
10
Vulnerability Classification
9
Automated Alerts and Reporting
10
Threat Analysis
10
Threat Intelligence Reporting
10
Automated Threat Identification
10

Comments

More Reviews of Zscaler Internet Access