Lateral Movement Prevention - The main security benefit
October 16, 2025

Lateral Movement Prevention - The main security benefit

Anonymous | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Software Version

Professional Edition

Overall Satisfaction with Zscaler Private Access

Zscaler Private Access (ZPA) is used for securely accessing Internal Application. From both onprem and cloud. With ZPA its possible to access application without giving visibility to any other network or even same network. Helped in segmentation, users can access from anywhere with Security and Reliability. The Zscaler zero trust cloud exchange hiding internal application behind its cloud exchange which gives confidence for being protected.

Pros

  • Securing Access to Internal Applications
  • Segmentation for Applications
  • Strict enforcement policy implementations

Cons

  • Granularity and Complexity of Policy Enforcement
  • Application Segmentation and Listener Configuration - The way applications are defined and listened for is fundamental to ZPA, but can be a source of frustration, especially when dealing with legacy or non-HTTP protocols
  • The ZCC is the user's primary gateway, but its control over local system network behavior can sometimes clash with enterprise requirements.
  • Definitely rely on ZIA or ZPA
  • No security breaches scene so far
The functionality of ZPA use case is works very well. But the overall integration is bit complex. I hope implementation could be simpler in future.

Do you think Zscaler Private Access delivers good value for the price?

Not sure

Are you happy with Zscaler Private Access's feature set?

Yes

Did Zscaler Private Access live up to sales and marketing promises?

Yes

Did implementation of Zscaler Private Access go as expected?

Yes

Would you buy Zscaler Private Access again?

Yes

Zscaler Private Access- ZPA solution designed to securely connect authorized users to specific private applications, without ever placing the user on the network where the application resides ZIA- User can connect from anywhere without worrying about security concern. Whole traffic forwarded to Zscaler Exchange and then it goes on internet. All the security inspections are performed at ZE.

Zscaler Private Access Feature Ratings

Continuous Verification
10
Secure Web Gateways
10
Network Flow Control
10
Network Traffic Analysis
10
Segmentation Leveraging
10
Admin Access Control
10
Network Data Encryption
10
Network Topology Mapping
10
Network Analytics
10
Threat Recognition
10
Vulnerability Classification
10
Automated Alerts and Reporting
10
Threat Analysis
10
Threat Intelligence Reporting
10
Automated Threat Identification
10
Multi-Factor Authentication
10

Comments

More Reviews of Zscaler Private Access