Dragos CernatGlobal Information Security Architect at a engineering company
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"The most valuable feature is MVX, which tests all of the files that have been received in an email."
"The server appliance is good."
"The most valuable feature is the network security module."
"It is stable and quite protective. It has a lot of features to scan a lot of malicious things and vulnerabilities."
"It protects from signature-based attacks and signature-less attacks. The sandboxing technology, invented by FireEye, is very valuable. Our customers go for FireEye because of the sandboxing feature. When there is a threat or any malicious activity with a signature, it can be blocked by IPS. However, attacks that do not have any signatures and are very new can only be blocked by using the sandboxing feature, which is available only in FireEye. So, FireEye has both engines. It has an IPS engine and a sandbox engine, which is the best part. You can get complete network protection by using FireEye."
"I also like its logging method. Its logging is very powerful and useful for forensic purposes. You can see the traffic or a specific activity or how something entered your network and where it went."
"The initial setup was straightforward. The biggest thing for us was to build our own policies. The deployment itself was only a few hours."
"The best thing about Zscaler Internet Access is the website filtering. In the UAE it's quite an important feature because most of the malware comes through the SQL injection and through downloads from websites. Zscaler helps protect against that."
"The solution offers a distributed organization to master and to control all of the endpoints."
"The most valuable feature is bandwidth control."
"Zscaler Web Security protects our users in remote locations from internet threats - even if they are not connected to our network."
"The scanning feature is impressive, because they do not introduce a big latency to the traffic."
"The security is excellent."
"The VPN is valuable, as the whole technology is very different from a traditional VPN."
"It would be very helpful if there were better integration with other solutions from other vendors, such as Fortinet and Palo Alto."
"Technical packaging could be improved."
"It is very expensive, the price could be better."
"I heard that FireEye recently was hacked, and a lot of things were revealed. We would like FireEye to be more secure as an organization. FireEye has to be more protective because it is one of the most critical devices that we are using in our environment. They have a concept called SSL decryption, but that is only the packet address. We would like FireEye to also do a lot of decryption inside the packet. Currently, FireEye only does encryption and decryption of the header, but we would like them to do encryption and decryption of the entire packet."
"Its documentation can be improved. The main problem that I see with FireEye is the documentation. We are an official distributor and partner of FireEye, and we have access to complete documentation about how to configure or implement this technology, but for customers, very limited documentation is available openly. This is the area in which FireEye should evolve. All documents should be easily available for everyone."
"They can maybe consider supporting some compliance standards. When we are configuring rules and policies, it can guide whether they are compliant with a particular compliance authority. In addition, if I have configured some rules that have not been used, it should give a report saying that these rules have not been used in the last three months or six months so that I disable or delete those rules."
"In every cloud service in the world, you have multiple upstream internet providers to create diversity so that if one of your providers fails, your network just continues. In South Africa, there is only one upstream provider, and that's not right. That that's a problem."
"In terms of usage, here in the GCC, it's still growing a growing market, so the combination of DLP, data leak prevention, to a certain extent is fine. But what it requires is user-based access or role-based access. The solution needs to grow into that, which definitely takes time. There's not an easy way to integrate it, when you have a cloud-based solution."
"Zscaler should provide adjacent services, which would be complementary to their current offering that could to be more pragmatic for a customer. For example, if you take Akamai, you get multiple sets of services, all depending on the customer and the strategy and the complexity and the problems. In some areas, they are more varied in terms of coverage."
"It also needs better integration with other applications as well. There are some restrictions."
"Another thing that I would like to see is if Zscaler could have a separate product for direct access. I looked at a private access solution, but I understand there's a separate product that isn't integrated with this."
"I would like to see the ability to choose a pool of IPs for my company, set up rules based on them, and know that those IPs are not used by other companies."
"I don't know whether it's Zscaler or not, however, sometimes I can't access my time management. I need to wait and try again a few hours later. Typically, if I let some time pass, I can access it again."
"There are a few features that are not compatible with the Azure cloud."
"The user fee is not as high but the maintenance fee is expensive."
"It's an expensive solution."
"Its price is a bit high. A small customer cannot buy it. Its licensing is on a yearly basis."
"Roughly, we might spend $70,000 a month on the solution. We don't pay for anything beyond the standard licensing fee."
"Our monthly fee is around R3000."
FireEye Network Security is an advanced threat protection and breach detection platform that provides industry leading threat visibility and protection against the world’s most sophisticated and damaging attacks. By leveraging FireEye’s unique technologies and threat intelligence, FireEye Network Security detects what other security solutions miss, providing holistic security from the perimeter to the network core.
Zscaler Web Security provides unmatched security, visibility and control, going beyond the basics of web content filtering. Delivered in the cloud, Zscaler includes award-winning web security integrated with our robust network security platform that features advanced threat protection, real-time analytics and forensics. You'll get protection across every user, location and device, including laptops, smartphones, tablets and Internet of Things devices.
For more details:
FireEye Network Security is ranked 8th in Advanced Threat Protection (ATP) with 5 reviews while Zscaler Internet Access is ranked 2nd in Secure Web Gateways (SWG) with 8 reviews. FireEye Network Security is rated 8.6, while Zscaler Internet Access is rated 7.8. The top reviewer of FireEye Network Security writes "A reliable and complete network protection solution that protects from signature-based and signature-less attacks and has powerful logging". On the other hand, the top reviewer of Zscaler Internet Access writes "Centralized firewall that protects the whole topography". FireEye Network Security is most compared with Palo Alto Networks WildFire, Cisco Stealthwatch, Check Point SandBlast Network, Fortinet FortiGate and Symantec Advanced Threat Protection, whereas Zscaler Internet Access is most compared with Cisco Umbrella, Netskope CASB, Prisma SaaS by Palo Alto Networks, Palo Alto Networks WildFire and Cisco Firepower NGFW Firewall.
See our list of .
We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.