We performed a comparison between Jamf Connect and Zscaler Zero Trust Exchange based on real PeerSpot user reviews.
Find out what your peers are saying about Zscaler, Palo Alto Networks, Cisco and others in ZTNA as a Service."The most valuable feature is ease of access. It's convenient to do things like resetting passwords. Previously, users were bound to their domain. We had to bind the user to the domain and log them in through the AD. Now, using Jamf Connect, we don't face any of these challenges. Resetting passwords is hassle-free so we can regularly rotate passwords according to best practices."
"I would rate the product's scalability an eight out of ten."
"The most valuable feature is the synchronization of passwords with a local password, which works well."
"The solution is scalable."
"The tool supports different types of authentication. It also integrates seamlessly if you are using other Jamf products."
"It's connection with Azure is the most valuable. It is easy to deploy and connect."
"It's a good and stable tool, so you should use it if you have a need."
"Jamf Connect allows for easy and seamless joining of Mac devices to Azure AD, eliminating the need for third-party involvement or support engineer assistance."
"The most valuable feature is its ability to establish connectivity for remote users and remote endpoints. It offers a high level of granularity compared to typical VPNs, which also encapsulate a lot of I/O."
"The most valuable features of Zscaler Private Access are its ability to integrate with multiple IDPs and application segmentation."
"The best feature is the ability to establish the connection between your public network and automatically connect to the intranet connection."
"The most valuable feature of Zscaler Private Access is we do not have to connect to a VPN, it is seamless. It is more convenient for us because we use one agent to cover the internet and VPN access."
"Sandboxing, DLP, and SSL inspection engine are the most valuable features of Zscaler SASE."
"I like the web filtering capabilities."
"With SASE, we have a single platform that covers multiple task services with which we need to control access. All the features are equally valuable."
"We don't need to connect anymore. It is automatically connected when you log on in Windows."
"When a Mac is joined to Azure, the generic Pro console in the MDM should accurately display the Mac as joined to Azure in the inventory section. Currently, it shows "no domain account found," which can be misleading."
"We've had some issues when users restart their devices because the device asks for credentials afterward. Jamf Connect asks for a username, password, and MFA."
"Jamf Connect is beginning to implement Multi-Factor Authentication for offline authentication, but the setup documentation is insufficient."
"We have faced issues with the product's configuration. If we use the tool with other business manager solutions, then there is the issue of naming conventions. The tool needs to be careful with newer updates so that it doesn't break any of the existing configurations."
"The solution needs to improve its licensing."
"The configuration could be faster."
"The logs are an area with a shortcoming."
"The solution's UI could be more user-friendly for the setup process."
"There are latency issues with the solution. They are small, however, they are there when you compare it to other vendors."
"The interface needs a bit of work."
"We often face performance and latency issues with Zscaler SASE."
"More on-prem infrastructure is required when Zscaler Private Access is to be implemented as a single point of entry."
"We'd like to have two-factor authentication that is quite simple."
"It would be better if the Zscaler Private Access team made it easier for people to find subscriptions on the portal, mainly information on what my customers subscribed to or the type of licenses purchased."
"It has massive room for improvement. The Zscaler product itself is okay, but it doesn't give enough granularity for us as an organization to stipulate rules or processes, especially for data-driven services. For instance, we can stick on SSL inspection, but it's just a click box. It doesn't allow us to go any further into the detail of the SSL inspection. We also can't pull it out without having an additional logging server. It just doesn't give us enough granularity. They should give us more control over the interfaces because it is all backend. They weren't very open to discussing their backend architecture with us in terms of their own data centers. They can maybe a little bit more open about what components are there and how the backend infrastructure works alongside Zscaler. Its licensing can be better. Some of the additional licensing costs are quite high, and they should have certain features ready and available as a baseline rather than having to purchase additional licenses for it. Their support should also be improved. I initially had a consultant from Zscaler for its deployment, but the support that I had throughout the deployment of the project wasn't the best."
"The area that requires improvement is their support. The current support is lacking."
Jamf Connect is ranked 8th in ZTNA as a Service with 10 reviews while Zscaler Zero Trust Exchange is ranked 1st in ZTNA as a Service with 34 reviews. Jamf Connect is rated 9.4, while Zscaler Zero Trust Exchange is rated 8.4. The top reviewer of Jamf Connect writes "Enhances user convenience by streamlining login processes". On the other hand, the top reviewer of Zscaler Zero Trust Exchange writes "Allows for strict access control, granting access to specific applications at a URL level rather than at the physical IP level". Jamf Connect is most compared with Prisma Access by Palo Alto Networks, VMware Workspace ONE, Netskope Private Access, Microsoft Intune and Zimperium, whereas Zscaler Zero Trust Exchange is most compared with Prisma Access by Palo Alto Networks, Cato SASE Cloud Platform, Axis Security, Cisco AnyConnect Secure Mobility Client and Appgate SDP.
See our list of best ZTNA as a Service vendors.
We monitor all ZTNA as a Service reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.