Safe-T Secure Application Access vs Zscaler Zero Trust Exchange comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Safe-T Secure Application Access and Zscaler Zero Trust Exchange based on real PeerSpot user reviews.

Find out what your peers are saying about Zscaler, Palo Alto Networks, Cisco and others in ZTNA as a Service.
To learn more, read our detailed ZTNA as a Service Report (Updated: March 2024).
767,847 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"It's easy to use over the web. A user who is not in the office can use it and securely insert files.""Safe-T is very good for users because it has plug-in for Outlook.""If you want a very flexible system that you can easily integrate, and develop interfaces for it or plug-ins to other application environments, it's probably the most flexible""the security level is very high. After we tested it and checked all the security aspects of the product, we found that it's highly secure."

More Safe-T Secure Application Access Pros →

"It does the job. What it is needed for. I can use it for VPN, I can use it for secure connections, I can use it as a firewall. So the solution does the job.""It is straightforward to set up.""The VPN is great for the stability on offer and for the cloud updates and insights you can get.""The most valuable feature of Zscaler Private Access is we do not have to connect to a VPN, it is seamless. It is more convenient for us because we use one agent to cover the internet and VPN access.""The ZPA is a unique feature which offers VPN along with all the additional security needed.""We don't need to connect anymore. It is automatically connected when you log on in Windows.""The most valuable feature of Zscaler Private Access is the categorization of the dynamic URLs which keeps the customer's environment protected. The threats and the malware are correctly categorized.""It is easy to use."

More Zscaler Zero Trust Exchange Pros →

Cons
"One important thing that we haven't found in this product is the ability to provide a read-only view for documents. Also, the ability for the customer to add annotations to these documents.""The Outlook agent is not working well for installing it in the entire office."

More Safe-T Secure Application Access Cons →

"The interface needs a bit of work.""We often face performance and latency issues with Zscaler SASE.""We faced certain migration and implementation challenges in executing the tasks, so I would suggest improvement related to the stability of the solution.""To enhance their offering, it is advisable for them to focus on strengthening the foundation of their architecture. Additionally, they should consider integrating a broader range of services that go beyond what managed service providers typically offer independently.""Zscaler Private Access's reporting is poor. We should have more insight into the reports regarding what is blocked and allowed.""We'd like to have two-factor authentication that is quite simple.""Users report application access or latency issues with Zscaler Private Access.""While Zscaler supports client-initiated connections, it does not support server-initiated connections. This is a feature that Zscaler may consider adding in the future."

More Zscaler Zero Trust Exchange Cons →

Pricing and Cost Advice
Information Not Available
  • "It has been relatively reasonable for what it does. Some of the additional license costs based on the advanced next-generation firewall functions are quite high, and they should have certain features ready and available as a baseline rather than having to purchase additional licenses for it. Overall, the cost seems reasonable."
  • "Pricing for Zscaler Private Access is moderate. It's acceptable, though I can't give you the exact price currently. It's not too expensive, and on a scale of one to five, I would rate it a four out of five in terms of pricing."
  • "The pricing is expensive and on the higher end. Honestly, in my opinion, it is not worth the price."
  • "The cost is expensive. It depends on the number of users."
  • "My company is a Zscaler Private Access partner, so the customers pay for the license fees."
  • "The price is competitive."
  • "In terms of market positioning, I would describe Zscaler Private Access as offering optimal pricing. Based on our experience, Cato Networks tends to be slightly more expensive."
  • "Zscaler Private Access is extremely expensive."
  • More Zscaler Zero Trust Exchange Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which ZTNA as a Service solutions are best for your needs.
    767,847 professionals have used our research since 2012.
    Questions from the Community
    Ask a question

    Earn 20 points

    Top Answer: We looked into Prisma Access before choosing Zscaler Private Access (ZPA). Palo Alto’s Prisma Access is a secure access service edge (SASE) designed to deliver network security in a… more »
    Top Answer:The most valuable features of Zscaler Private Access are reliability, scalability, and availability.
    Top Answer:Zscaler SASE is quite expensive compared to other solutions. The price is not fixed and it does not include all of the features, so my advice for organizations would be to evaluate their specific… more »
    Ranking
    Views
    68
    Comparisons
    52
    Reviews
    0
    Average Words per Review
    0
    Rating
    N/A
    1st
    out of 34 in ZTNA as a Service
    Views
    10,795
    Comparisons
    8,553
    Reviews
    24
    Average Words per Review
    403
    Rating
    8.5
    Comparisons
    Also Known As
    Safe-T SDA, Safe-T, Safe-T Software-Defined Access
    Zscaler SASE
    Learn More
    Overview



    Safe-T is a provider of Zero Trust Access solutions which mitigate attacks on enterprises’ business-critical services and sensitive data, while ensuring uninterrupted business continuity. 

    Safe-T’s cloud and on-premises solutions ensure that an organization’s access use cases, whether into the organization or from the organization out to the internet, are secured according to the “validate first, access later” philosophy of Zero Trust. 

    This means that no one is trusted by default from inside or outside the network, and verification is required from everyone trying to gain access to resources on the network or in the cloud. 

    Safe-T’s wide range of access solutions reduce organizations’ attack surface and improve their ability to defend against modern cyberthreats. As an additional layer of security, our integrated business-grade global proxy solution cloud service enables smooth and efficient traffic flow, interruption-free service, unlimited concurrent connections, instant scaling and simple integration with our services. 

    With Safe-T’s patented reverse-access technology and proprietary routing technology, organizations of all size and type can secure their data, services and networks against internal and external threats. 

    At Safe-T, we empower enterprises to safely migrate to the cloud and enable digital transformation.

    The Zscaler Zero Trust Exchange enables fast, secure connections and allows your employees to work from anywhere using the internet as the corporate network. Based on the zero trust principle of least-privileged access, it provides comprehensive security using context-based identity and policy enforcement.

    The Zero Trust Exchange operates across 150 data centers worldwide, ensuring that the service is close to your users, co-located with the cloud providers and applications they are accessing, such as Microsoft 365 and AWS. It guarantees the shortest path between your users and their destinations, providing comprehensive security and an amazing user experience.

    Sample Customers
    Government of Israel, eviCore Healthcore, Glen Imaging, Sarin, LBG, Rollomatic, Boegli-Gravures SA, Banque Heritage, Groupe Minoteries, Temenos, ZEK, RLM Finsbury, Harel Insurance, Meitav Dash
    Siemens, AutoNation, GE, NOV
    Top Industries
    No Data Available
    REVIEWERS
    Manufacturing Company29%
    Computer Software Company29%
    Financial Services Firm12%
    Pharma/Biotech Company6%
    VISITORS READING REVIEWS
    Computer Software Company18%
    Financial Services Firm11%
    Manufacturing Company10%
    Government7%
    Company Size
    No Data Available
    REVIEWERS
    Small Business29%
    Midsize Enterprise14%
    Large Enterprise57%
    VISITORS READING REVIEWS
    Small Business20%
    Midsize Enterprise14%
    Large Enterprise66%
    Buyer's Guide
    ZTNA as a Service
    March 2024
    Find out what your peers are saying about Zscaler, Palo Alto Networks, Cisco and others in ZTNA as a Service. Updated: March 2024.
    767,847 professionals have used our research since 2012.

    Safe-T Secure Application Access is ranked 44th in Enterprise Infrastructure VPN while Zscaler Zero Trust Exchange is ranked 1st in ZTNA as a Service with 34 reviews. Safe-T Secure Application Access is rated 7.8, while Zscaler Zero Trust Exchange is rated 8.4. The top reviewer of Safe-T Secure Application Access writes "The architecture is open to integration and development, making the product very flexible". On the other hand, the top reviewer of Zscaler Zero Trust Exchange writes "Allows for strict access control, granting access to specific applications at a URL level rather than at the physical IP level". Safe-T Secure Application Access is most compared with , whereas Zscaler Zero Trust Exchange is most compared with Prisma Access by Palo Alto Networks, Cato SASE Cloud Platform, Axis Security, Cisco AnyConnect Secure Mobility Client and Cloudflare Access.

    See our list of best ZTNA as a Service vendors.

    We monitor all ZTNA as a Service reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.