All about Zscaler Private Access
August 05, 2025

All about Zscaler Private Access

Loganathan Kandasamy | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User

Software Version

Professional Edition

Overall Satisfaction with Zscaler Private Access

We use Zscaler Private Access in our organization for Zero touch access to our enterprise application and the applications which we have hosted in the cloud.
Zscaler Private Access eliminate the legacy way of using VPN to access our Corpo applications.
This addresses the different methods to access our enterprise applications from office and from home thereby providing a unique experience to our employees irrespective of locations in the demanding hybrid environment now.

Pros

  • Zero touch access
  • Unique experience for accessing Enterprise applications irrespective of locations
  • Easier implementation of policies
  • Single pane of management

Cons

  • Better Diagnosis tool to have a consolidated view of logs in case of issues
  • Better support of IOS clients
  • More granular posture check.
  • Reduction on IT overhead by eliminating typical hardware VPN infra
  • More of Opex than the classic CAPEX models for these kind of work
  • Seamless Hybrid work enablement
Great and seamless end user experience ,Works well with SSO integration,Policy pushing is great , easier access for internet and enterprise applications in a secure manner
Ease of deployment , Scalable , Great user experience during POC , Cost effective with SAS model

Do you think Zscaler Private Access delivers good value for the price?

Yes

Are you happy with Zscaler Private Access's feature set?

Yes

Did Zscaler Private Access live up to sales and marketing promises?

Yes

Did implementation of Zscaler Private Access go as expected?

Yes

Would you buy Zscaler Private Access again?

Yes

Ease of use , quicker deployment , Easier manageability

Zscaler Private Access Feature Ratings

Continuous Verification
9
Secure Web Gateways
10
Network Traffic Analysis
9
Segmentation Leveraging
9
Admin Access Control
9
Network Data Encryption
9
Network Topology Mapping
9
Network Analytics
9
Threat Recognition
9
Vulnerability Classification
9
Automated Alerts and Reporting
6
Threat Analysis
6
Threat Intelligence Reporting
6
Automated Threat Identification
7
Multi-Factor Authentication
10
Endpoint Detection and Response (EDR)
10

Comments

More Reviews of Zscaler Private Access