Zscaler Internet Access
June 04, 2025

Zscaler Internet Access

Anonymous | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User

Software Version

Business

Overall Satisfaction with Zscaler Internet Access

We utilize Zscaler Internet Access for all our on-site and remote users, enabling them to securely access the web. We have a huge number of Mac users, and we often run into issues with those users, but sometimes it's the ZCC agent and other times it's macOS itself.

Pros

  • Route traffic.
  • Provide blocks for malicious websites.
  • Prevents known malware downloads.

Cons

  • The web insights could be faster.
  • Easier to manage.
  • Quicker to implement changes.
  • Less downtime.
If this question pertains to the admin's overall usability, I think managing policies is straightforward. The GUI is very easy to learn and use. When it comes to users, the ZCC agent, for the most part, is out of sight, out of mind. When it's working well, users never mention the tool.
This tool was used at a prior employer. Symantec Blue coats require physical hardware in the data centers and managing PAC files to push to end users' devices. We attempted to enable SSL intercept on our BlueCoats, but the proxies crashed, forcing us to purchase additional hardware, which took time to deploy and manage.

Do you think Zscaler Internet Access delivers good value for the price?

Yes

Are you happy with Zscaler Internet Access's feature set?

Yes

Did Zscaler Internet Access live up to sales and marketing promises?

Yes

Did implementation of Zscaler Internet Access go as expected?

Yes

Would you buy Zscaler Internet Access again?

Yes

The management of Zscaler policies is far easier than that of other products I have managed, such as Symantec Blue Coat. I also like that there is no physical hardware for me to manage and keep up to date. Routing traffic with ZCC is superior to the old method of setting PAC files on the device.

Zscaler Internet Access Feature Ratings

Continuous Verification
10
Secure Web Gateways
10
Network Flow Control
10
Network Traffic Analysis
8
Segmentation Leveraging
10
Admin Access Control
10
Network Data Encryption
10
Network Analytics
6
Threat Recognition
10
Vulnerability Classification
10
Automated Alerts and Reporting
7
Threat Analysis
7
Threat Intelligence Reporting
7
Automated Threat Identification
10

Comments

More Reviews of Zscaler Internet Access