Zscaler Internet Access Primary Use Case
We are using the latest version of the solution. It's deployed on a private cloud through Zscaler.
We mostly use this solution in the distributed network where direct internet access has been growing. There are a lot of branches connected with their own internet access, so the solution secures the connectivity at remote locations. There's a very large network with many branches and users working across the globe.
There are about 5,000 people using this solution in my organization. Technical support uses this solution 24/7. We have an operations team and a monitoring and management team.
View full review »Primarily, it was to replace our existing on-premises box infrastructure. That's what it started with. And lately, we've been using it more for secure web gateway purposes.
View full review »MA
reviewer1247181
Service Manager at a construction company with 10,001+ employees
It's primarily for end-user access to the public internet. We use the proxy functionality and the URL Filtering.
We have a global policy for all our users. While there are a few categories of URLs that we are not allowed to do SSL inspection on, the primary function for us is to do SSL inspection so that we can make use of the built-in anti-malware and antivirus—the advanced-threat features—within the platform. We do SSL inspection of some 80 percent of all the traffic and we can evaluate if it's malicious or not.
It is a cloud solution where pretty much everything is handled by Zscaler.
View full review »Buyer's Guide
Zscaler Internet Access
March 2024
Learn what your peers think about Zscaler Internet Access. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
768,740 professionals have used our research since 2012.
We use Zscaler to secure endpoints using a proxy.
This solution is used by 500 people. We have plans to increase usage by 10-20%.
It's a cloud based solution.
View full review »BN
reviewer779877
Senior Software Engineer with 501-1,000 employees
Basically, they usually are the endpoint VPN connection to secure the end-user device. They also integrate with the SD One solution to form a secure endpoint assessment for the SD One, with security from the endpoints to the network.
It serves as protection for the endpoint, especially laptops, to secure any internet access. Even when you assess the wireless itself, they also make sure that the traffic from the laptop is encrypted.
View full review »AA
Arunachalam A
IT Project Manager at LifeCell international Pvt.Ltd
We can use the solution for users that are working from home. It allows us to manage control over security. We install an agent and can set the domains that are allowed on the network. It helps ensure security.
View full review »MR
reviewer2213736
Senior Network Consultant at a comms service provider with 10,001+ employees
We use ZIA for outbound internet connectivity. The internet traffic of on-prem users will be directed to the ZIA cloud for security checks and web filtering.
View full review »Our customer already had the product, which they got from another vendor. They were facing some issues with their existing policies. Our role was to optimize the policy. So we optimized Threat Protection, DLP, and CASB policies per the customer’s requirements. In their environment, G Suite was completely allowed for some users, but they wanted only to allow a specific corporate domain. As per the recommendation, CASB policy must have been in place, but it wasn’t. So we optimized the tool as per their requirement and delivered it.
View full review »SM
reviewer1753680
Architecture Senior Manager at a insurance company with 10,001+ employees
The product is an Internet proxy solution. We use it to manage our users' Internet access, making sure that they don't go to the wrong site. We also use it for data loss prevention.
It's a proxy solution, and we use it for reverse proxy, DNS security, and storage security.
View full review »FW
ForrestWu
Sr. Manager IT at a non-profit with 51-200 employees
We have Windows 10 laptops. We wanted help securing our laptops for remote work, but we don't have the server for this infrastructure. Whereas, with this solution, the cloud server is managed by Zscaler.
It is a pretty lean solution. We only need to manage the agent and some very small tools on the laptops.
View full review »We use the solution for web security services such as DLP, VPN, BPA, ZIA, and CASB.
View full review »
DW
Dale Walker-Hyde
Cloud and Security Transformation Specialist at Comtact
The solution is used to manage and protect end users' access to internet resources, websites, and web applications while checking for malicious or bad content in order to grant or block access to certain sites.
View full review »I mainly use Zscaler Internet Access for internet security and filtering.
View full review »ON
reviewer1500507
Security Architect at a comms service provider with 201-500 employees
You can have mobile employees who forward traffic into a Zscaler client, or you could use a PAC file. So, if users connect at the beach, a hotel, coffee shop or something outside their actual office, it will give them protection.
You can use it with a secured Internet using a web gateway to deliver to the cloud.
View full review »We use the solution for internet access, web-based policies, and application-based policies. It has a device posture profile, which is new.
DNS security is in progress now. I have done the test cases in my lab, however, now we are deploying it for 30,000 users. I'm working on that project as well. Apart from that, I have worked in ZIA's firewall and DLP.
View full review »AG
Andrew Geeves
Managed Network Services Networking Tasmania at Telstra
Our client is a government client with many different work groups.
View full review »MM
Milind Mane
Solution Architect at Tata Consultancy
One of the use cases is VPN replacement. Zscaler Private Access replaces the VPN solution.
AP
Amit Pandey
Cyber Security Consultant at flydubai
I used Zscaler Internet Access for our proxy web traffic.
View full review »Zscaler Internet Access provides customers with the internet. We can easily integrate policies.
View full review »RK
Rohit Khale
Consultant at Tata Consultancy
Zscaler Internet Access is used for internet access, security related to internet access, and in some cases, connecting to online applications.
View full review »EC
Elvin Castellanos
Server Administration / Security Officer at a manufacturing company with 501-1,000 employees
Because some of our employees need to work remotely, due to the COVID-19 pandemic, we were looking for a solution that would keep them safe. We have a Cisco ASA firewall in our company, but when people work remotely they can't be protected by that solution. That's why we decided to go for a WAF.
View full review »RB
Rajesh Bhalerao
CISO at UST Global
We primarily use the solution for a secure web gateway and secure internet access.
We wanted something for an overall internet access solution, an in-office, and out-of-office solution. We chose Zscaler Internet Access.
View full review »MS
reviewer1941447
Global Head of Information and Cloud Security Architecture
We are using the solution for internet security. It's mostly web-based filtering.
We are into this modern world, meaning, we are working from home in hybrid scenario. Due to the pandemic, we have seen a lot of shifts towards a hybrid model of work. That provides lots of challenges in terms of security including, how to protect the users' machines and other devices. That is one of the core use cases. Wherever you are, you need to be protected. However, the traditional approaches such as a legacy-based proxy system won't work.
If we have some kind of critical systems, we need to figure out how we can provide the access to all these users, all these remote or roaming users, access to these critical areas, and we need to eliminate those legacy-based VPNs. Zscaler is doing it best. Zscaler offers the best service since you are protected wherever you are.
View full review »RC
reviewer2170611
Security Architect at a tech services company with 501-1,000 employees
The main use cases that our clients typically have and why we propose and implement the solution is for a proxy solution. It's designed to create a proxy site-to-site tunnel between the computer trying to access any resources on the Internet or within the offices. Most organizations have a significant number of remote workers - around 30 to 40 percent of their workforce is remote - and they log in from different locations globally, such as Japan, the US, Europe, and Asia. So they need one solution to cover these remote locations and provide a proxy solution.
In addition, we need to have minimum bandwidth latency, and Zscaler is the most suitable product we see. Whenever a customer comes to us with a large geographical spread in terms of their workforce, we propose and implement this solution across the cloud, as required.
View full review »PZ
Paul Zalewski
Chief Technical Officer at Accountabilit
We leverage it for web proxy and web security.
View full review »I use Zscaler Internet Access as an internet proxy for security.
View full review »LC
reviewer1971825
Managing Partner at a consultancy with 1-10 employees
We primarily use the product for proxy services. We are using that to manage services with a third party, so we are not directly exposed to Zscaler.
View full review »NK
reviewer1254573
Sr. Consultant, Cyber Security at a tech services company with 501-1,000 employees
We use this solution mainly to protect or provide internet security for our customers including URL filtering for SSL interception, tech protection and to provide phishing protection for our web links.
GB
Gregor Burow
Channel Alliances Leader Germany at ALE
The product is an endpoint solution for private and internet security. I use it myself in my home office. I'm in sales. I use it as an endpoint solution for my laptop, for my device, in order to get access to some internal service applications, such as pricing and time management tools.
View full review »PT
CEO832
CEO at a comms service provider with 11-50 employees
The primary use case is for organizations that have a lot of road warriors or very highly distributed small offices. It provides protection anywhere you are...whether you are in a hotel somewhere, or in Africa, it does not matter. You will get the Zscaler protection presence anywhere.
View full review »The use cases of the solution are vast. CASB is a part of the product.
View full review »HM
reviewer1316007
Network Engineer at a financial services firm with 5,001-10,000 employees
We use Zscaler for VPN connections and for internet security.
View full review »MS
reviewer1833561
Technical Lead at a tech vendor with 10,001+ employees
The solution is primarily used as a secure web gateway.
View full review »DC
Dragos Cernat
Global Information Security Architect at a engineering company with 10,001+ employees
We use it for security. We installed it on our work computers and also for other traffic from the office. We are using it for perimeter security and that is useful for us.
View full review »KS
Kamran Shaheen
Consultant at a tech services company with 1-10 employees
The primary use case is to secure internet traffic. Users want to make sure that the site doesn't have DDoS attacks or any malware. Zscaler is able to protect data for individual organizations and for the country as well.
View full review »SR
Suren Rupnarrain
IT Manager at SiVEST
We primarily use this web security solution to protect our users in remote locations or branches from internet threats. It is very important for our organization to protect our users, even if they are not connected to our network.
The primary use for the solution is to provide better more mature security for our client's networks.
View full review »AL
chiefexe795285
Chief Executive Officer at a tech services company with 1-10 employees
Zscaler provides web security on the cloud for any device at any place all the time. If you use local appliances, users are not protected when they are connecting from outside the corporate network (e.g., home office, hotspots, airports, etc.).
We use Zscaler from all our locations, and for our roaming users too. In order to integrate our users to Zscaler, we use Okta (ADFS) for authentication, cloud security connectors for traffic redirection from locations (tunnels to the Zscaler cloud), and the Zscaler app for roaming users.
View full review »Our primary use case of this solution is for the protection from malware and malicious attacks. We also use it for bandwidth control to compare business and individual use. We use it in conjunction with Palo Alto.
View full review »Buyer's Guide
Zscaler Internet Access
March 2024
Learn what your peers think about Zscaler Internet Access. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
768,740 professionals have used our research since 2012.