Zscaler Internet Access helped me with my deployment
June 05, 2025

Zscaler Internet Access helped me with my deployment

Anonymous | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User

Software Version

Business

Overall Satisfaction with Zscaler Internet Access

Be able to filter malicious web content and allow the incident response teams to create custom web categories containing phishing, malicious, and other custom URLs. Get a single pane of glass that allows the security and the incident response teams to look at activities on devices that are both on prem, off prem, and other remote workers.

Pros

  • SSL decryption
  • Single pane of visibility
  • Pricing

Cons

  • GUI Complexity
  • Training availability
  • Ease of use
  • Ability to block threats quickly
  • Single pane of glass visibility
  • UI could be better
The UI could be a bit complex and has a bit of a learning curve. Also, options tend to be divided into different sections of various portals which can be difficult to manage unless you understand where the various options sit and how they impact each other. That being said, the product is still quite usable and has a significant impact on our security posture.

Do you think Zscaler Internet Access delivers good value for the price?

Yes

Are you happy with Zscaler Internet Access's feature set?

No

Did Zscaler Internet Access live up to sales and marketing promises?

Yes

Did implementation of Zscaler Internet Access go as expected?

Yes

Would you buy Zscaler Internet Access again?

Yes

Zscaler Internet Access makes deploying web filtering across the fleet quite easy, even without having an internal PKI in place. It allows security teams to quickly block threats across the fleet without expensive firewalls or edge firewalls that would ordinarily be needed in a traditional on prem deployment. That said, some of the UI could use some room for consolidation and improvement.

Zscaler Internet Access Feature Ratings

Secure Web Gateways
8
Network Analytics
7
Threat Recognition
6
Threat Analysis
7
Threat Intelligence Reporting
8
Automated Threat Identification
6

Comments

More Reviews of Zscaler Internet Access