We performed a comparison between Bitsight Third-Party Risk Management and Zscaler Internet Access based on real PeerSpot user reviews.
Find out what your peers are saying about RSA, BitSight, AuditBoard and others in IT Vendor Risk Management."Its customer service team responds quickly."
"I prefer BitSight due to its patch management capabilities. The score is a valuable feature. I have contacted the customer support through e-mail and their response rate is fast. I rate the solution a nine out of ten."
"The product helps us identify the vulnerabilities of internet-facing applications."
"The solution is user-friendly."
"Offers open ports from an external point of view."
"The solution is stable."
"The most valuable features I found in Zscaler Internet Access are the restriction of users for a particular URL, the security feature related to stopping DDoS, and the VPN."
"The initial setup was straightforward. The biggest thing for us was to build our own policies. The deployment itself was only a few hours."
"The policies are very intuitive and easy to configure, with very little possibility of messing things up."
"Zscaler Internet Access has helped us reduce the time that we spend managing security policies by about four hours a week. We can use this time to focus on other things, especially the IT team."
"Zscaler Internet Access's roaming user feature is most valuable and is much better compared to other secure web gateways."
"The solution is stable and reliable."
"Zscaler Internet Access's best feature is the granular policy controls."
"There may be room for improvement in the methodology for identifying findings, as occasional errors occur on the technical side."
"At the moment, when the vulnerability score decreases, it remains the same for quite a while, even though issues are resolved in 24 hours."
"Its factor analysis feature could be better."
"The solution’s benchmarking should be improved."
"Data enrichment is the major issue."
"Zscaler Internet Access can improve by adding traffic filtering based on the DNS."
"They block Zscaler IPs when the traffic origin is from Zscaler IPs. They've been blocked by certain government organizations so the end users are not able to visit those websites unless we ask them to unblock those IP. This is a bit problematic."
"The price of the solution could be improved."
"The main issue with Zscaler Internet Access is proxy IP detection, which sometimes makes sites inaccessible."
"Sometimes it's not easy to use during large deployments of workstations."
"The solution is expensive. They recently revised the pricing and packaging. Some of our existing customers have been asking for alternate solutions for a lower price."
"I don't know whether it's Zscaler or not, however, sometimes I can't access my time management. I need to wait and try again a few hours later. Typically, if I let some time pass, I can access it again."
"It needs better integration with other applications. It takes a fair amount of regular activity to apply the by-passes because it is very strict in its restrictions and frequently you have to go in and open things up to allow the workforce to work."
More Bitsight Third-Party Risk Management Pricing and Cost Advice →
Bitsight Third-Party Risk Management is ranked 2nd in IT Vendor Risk Management with 5 reviews while Zscaler Internet Access is ranked 2nd in Secure Web Gateways (SWG) with 46 reviews. Bitsight Third-Party Risk Management is rated 8.6, while Zscaler Internet Access is rated 8.2. The top reviewer of Bitsight Third-Party Risk Management writes "User-friendly solution with robust patch management capabilities". On the other hand, the top reviewer of Zscaler Internet Access writes "Provides integrated CASB and file sandboxing but could be less expensive ". Bitsight Third-Party Risk Management is most compared with SecurityScorecard, RiskRecon, Microsoft Secure Score and UpGuard Vendor Risk, whereas Zscaler Internet Access is most compared with Cisco Umbrella, Microsoft Defender for Cloud Apps, Netskope , Prisma Access by Palo Alto Networks and FortiSASE .
We monitor all IT Vendor Risk Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.