Zscaler Private Access
October 14, 2025

Zscaler Private Access

Anonymous | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Software Version

Business Edition

Overall Satisfaction with Zscaler Private Access

We use Zscaler Private Access for replacing 3 of our legacy VPN applications from the different mergers and aquisitions we have done. We needed a solution that could handle the growth for over 65,000+ employees that our other solutions could not handle.

Pros

  • easier way to keep employees connected while remote
  • better way to secure our data with browser isolation
  • easy way to route traffic back on site that's needed.

Cons

  • VOiP needs major improvements. that is where its lacking.
  • Also Public service edge Datacenters need to be built in the middle of the US to handle more business - Denver is the only location. I feel one is SLC, UT would be a good location.
  • negative issue is that we did not force people to use Zscaler Private Access more in the beginning then then 2 years in.
  • we are still having to use our other VPN to be able to use our VOiP solution Avaya.
even though Zscaler Private Access has been great I think it still needs some improvement.

Do you think Zscaler Private Access delivers good value for the price?

Yes

Are you happy with Zscaler Private Access's feature set?

Yes

Did Zscaler Private Access live up to sales and marketing promises?

I wasn't involved with the selection/purchase process

Did implementation of Zscaler Private Access go as expected?

No

Would you buy Zscaler Private Access again?

Yes

For our remote employees it is great to use as they do not have to authenticate every time they lock their computer or turn it off for the night. Its easy to just turn on and as its booting up getting logged into Zscaler Private Access.

Zscaler Private Access Feature Ratings

Continuous Verification
9
Secure Web Gateways
9
Network Flow Control
10
Network Traffic Analysis
9
Segmentation Leveraging
9
Admin Access Control
9
Network Data Encryption
9
Network Topology Mapping
9
Network Analytics
9
Threat Recognition
9
Vulnerability Classification
9
Automated Alerts and Reporting
9
Threat Analysis
9
Threat Intelligence Reporting
9
Automated Threat Identification
9
Multi-Factor Authentication
9
Endpoint Detection and Response (EDR)
9

Comments

More Reviews of Zscaler Private Access