Zscaler Internet Access Implementation Team

Ashish Kumbhar - PeerSpot reviewer
Senior Product Manager - Cyber Security for Middle East, Central Asia and Africa Region at Tata Communications Ltd

Deployment was done in-house.

View full review »
TejasJain - PeerSpot reviewer
Sr. Cloud Security Architect at a computer software company with 10,001+ employees

We deployed the solution ourselves. We have a team of in-house experts who can troubleshoot any issues that may arise. We have also used Zscaler's professional services team on occasion, for example, to help us with sizing and design, or when there are complex requirements from our clients. But for the most part, we're able to handle the ZIA deployment ourselves.

Most standard deployments take around two weeks. For example, I deployed Zscaler Internet Access (ZIA) for my previous organization, with 20,000 users in two weeks. However, I've also seen deployments for 50,000 to 60,000 users that took at least three to four months. 

The exact deployment time will vary depending on the size of the deployment, the complexity of the environment, and the specific requirements of the organization.

In a typical deployment process, the first step is to procure licenses. You can either do this yourself, or Zscaler can do it for you. Once the licenses are procured, Zscaler will create a tenant for your organization. This tenant will include the enforcement nodes that will be used to process traffic for your users.

Following this, the installation of Zscaler tunnels transpires, along with the deployment of the Zscaler Client Connector (ZCC) on user machines. Configuration of policies is then carried out, encompassing aspects such as policy definitions and potential additional inspection of HTTPS traffic. 

Moreover, ancillary facets are incorporated. These entail the establishment of compatible streaming services and TLS inspection. Integration with the corporate identity provider (IdP) is also a crucial step. 

Furthermore, if automation is a consideration, additional automation or orchestration components can be implemented to facilitate automatic policy enforcement. While integration with Extended Detection and Response (XDR) systems is conceivable, this is an aspect I have not personally done. This more or less encapsulates the overall process.

View full review »
AA
IT Project Manager at LifeCell international Pvt.Ltd

We have a third party that we get the solution. 

View full review »
Buyer's Guide
Zscaler Internet Access
March 2024
Learn what your peers think about Zscaler Internet Access. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
765,386 professionals have used our research since 2012.
Akshay-Singh - PeerSpot reviewer
Associate Presales Lead at a tech services company with 201-500 employees

The deployment is just a plug-and-play process. The policy is very simple.

View full review »
SM
Architecture Senior Manager at a insurance company with 10,001+ employees

We had Zscaler Professional Services helping us for quite a long time at the start of the project. They made sure that everything was set up correctly with no holes. They were very good and first-class.

View full review »
Arun Sngh - PeerSpot reviewer
Function Head Technology IT at Tech Mahindra Limited

Our team of two members along with Zscaler's team implemented the solution.

View full review »
DW
Cloud and Security Transformation Specialist at Comtact

The implementation was done in-house, using one of our engineers.

View full review »
Bhaskar Rao - PeerSpot reviewer
Sr. Network Engineer at Yamaha

We used an in-house team.

View full review »
ON
Security Architect at a comms service provider with 201-500 employees

We have a client who wants to start deploying the Cloud Browser Isolation feature. You can embrace this cloud platform using IPAC Files, which is just a clean way of deploying it.

I have personally worked for other vendors doing professional services as part of a professional services team. Every client decided to purchase professional services because deploying Zcaler Internet Access is too complex.

View full review »
AP
Cyber Security Consultant at flydubai

Wee had excellent support form vendor but it was done mutually along with inhouse design guide.

View full review »
EC
Server Administration / Security Officer at a manufacturing company with 501-1,000 employees

We had a local provider, SISAP, help us. They are a business based in Guatemala, with an office here in Honduras. They worked very well.

View full review »
RB
CISO at UST Global

We handled the deployment in-house. 

View full review »
RC
Security Architect at a tech services company with 501-1,000 employees

The deployment process involves building the Zscaler package, which can be vanilla or vanilla plus bundle, and then remotely pushing it to the client machine using Microsoft Intune or whatever it is. Meanwhile, we have to build the configuration and policy based on the client's requirements.

First, what we do is we build the ZScaler package. The package includes the features that will be going through the solution. Once the package is built, it is pushed into the endpoints or machines, such as computers, laptops, and desktops, through Microsoft Intune or SCCM, or any other patching solution that they have. Meanwhile, we configure Zscaler to the nearest hub that the reseller has. They have more than 150 nodes across the globe, so we configure the nearest hub for them. Once that configuration is done, we have established a connection, and the systems have gone online, then you can actually use the solution.

So, it's basically a two-step process. Rolling out the package, rolling out the agent, and configuring the reseller to the nearest hub. That's it. It's a smooth process.

View full review »
PZ
Chief Technical Officer at Accountabilit

We did the implementation ourselves. 

View full review »
it_user1150056 - PeerSpot reviewer
Managing Director at Onesecure

We are an integrator and a service provider for Zscaler in the region, so we handled the implementation ourselves.

View full review »
HM
Network Engineer at a financial services firm with 5,001-10,000 employees

We used Zscaler Professional Services for the deployment.

View full review »
PW
Security Architect at a financial services firm with 1,001-5,000 employees

We had involved a third party. It was a bit of a mix.

For the maintenance, there are about three people.

View full review »
KS
Consultant at a tech services company with 1-10 employees

We are consultants. We handle the implementation ourselves.

View full review »
SR
IT Manager at SiVEST

Our Internet Service Provider is a reseller, and they helped with the installation and setup. Their level of expertise was outstanding. Maintenance and deployment will be easy to manage and I believe one person will be able to handle it. It won't be a full-time job. 

View full review »
it_user1138029 - PeerSpot reviewer
Managing Partner with 1-10 employees

We consult on the implementation.

View full review »
it_user1059291 - PeerSpot reviewer
IT Projects & Innovation Manager at a pharma/biotech company with 1,001-5,000 employees

We used a consultant for the deployment. 

View full review »
Buyer's Guide
Zscaler Internet Access
March 2024
Learn what your peers think about Zscaler Internet Access. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
765,386 professionals have used our research since 2012.