Zscaler Internet Access Valuable Features

Ashish Kumbhar - PeerSpot reviewer
Senior Product Manager - Cyber Security for Middle East, Central Asia and Africa Region at Tata Communications Ltd

The cloud proxy and integration are some of the key features. Since there is cloud waste, we can quickly provision it and start working on the configuration. On top of that, they have added a few more features. They have integrated CASB, and file sandboxing is part of it.

We have used this solution for three years. We have seen a lot of traction in the market and a lot of users adopting this solution. We're able to control or manage all the remote locations from one place. When a user is traveling from one location and is connected to the internet, it connects to the bigger cloud and relevant policies will be applied to the user or the device. We have expanded the base from very few users to a large number.

View full review »
TejasJain - PeerSpot reviewer
Sr. Cloud Security Architect at a computer software company with 10,001+ employees

The ease of deployment is the most valuable feature. All it takes is building a few QRE or ITC tunnels and installing agents. It's a piece of cake. 

And the policies are very intuitive and easy to configure, with very little possibility of messing things up. I also like the great analytics and good visibility into the traffic that goes out of my organization. 

Shadow ID Discovery is also great for finding out what SaaS applications people in my organization are trying to access.

View full review »
MA
Service Manager at a construction company with 10,001+ employees

There are a bunch of different capabilities that are valuable within the platform. We use quite a lot of them, but not everything. The ones that are most important to us are the URL Filtering and the application control. 

For our needs, the cloud-native proxy architecture is a very good solution. We are moving away from on-prem appliances and moving more toward cloud-based solutions. Zscaler is a good fit for our strategy. This architecture helps with cyber threats because we inspect most of the traffic and we can see that a lot of threats are stopped directly in the secure web gateway. But there are parts of it that we don't use yet, like the DLP functions. Instead, we are using the Zscaler Cloud Sandbox feature for content that is downloaded as files. We detonate the document in a sandbox and see if it's malicious or not.

It's a very easy-to-learn and easy-to-use platform, even for me as a more non-technical person. I'm still able to do a lot of work in this platform.

View full review »
Buyer's Guide
Zscaler Internet Access
March 2024
Learn what your peers think about Zscaler Internet Access. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
765,234 professionals have used our research since 2012.
Ben AmaraSeif Alah - PeerSpot reviewer
Cloud Architect Azure at Thales

The most valuable feature is the ability to drop packets.

View full review »
BN
Senior Software Engineer with 501-1,000 employees

The way they do it is very easy to use at the moment. If you power on the laptop, they will survey. It's very easy for the user. The user doesn't really need to do anything except make sure that the access is there. That's all.

The initial setup is very straightforward.  

It is easy to scale. 

The solution is stable. 

View full review »
AA
IT Project Manager at LifeCell international Pvt.Ltd

It can be easily accessed by the cloud. Users can easily work from home while maintaining company security.

The servers are hosted in the cloud, and it maintains security for Azure. It's like having double security - one for the cloud and one for the user.

It is simple to use. We can create multiple tunnels with ease. It's simpler to use than a VPN.

The solution is stable.

View full review »
RC
Senior Technical Writer at Cielo North America

The permission settings in the solutions are the most valuable feature in the solution since it allows me to assign roles and permissions.

View full review »
Akshay-Singh - PeerSpot reviewer
Associate Presales Lead at a tech services company with 201-500 employees

The product has different modules like SWG, CASB, DLP, and Threat Protection. The most valuable feature of the solution is SWG traffic. The product is very good in web traffic.

View full review »
Carlos Snel - PeerSpot reviewer
Director at Aquila ICT Solutions

I like the granularity of the control of all the traffic, including SSL inspection. I also like the fact that the user interface is intuitive.

The latencies with Zscaler are minimal compared to those of any other competitor. Other competitors do not really have the global scale that Zscaler has and cannot promise low latencies.

View full review »
SM
Architecture Senior Manager at a insurance company with 10,001+ employees

The data loss prevention feature is the most valuable. It stops our users from inadvertently leaking our customers' data to the Internet or anywhere else it shouldn't go.

The cloud-native proxy architecture certainly seems fast enough. The performance is good. The multi-country nature of it allows us to keep the proxy closer to the user so a user's data doesn't transit as far as it would otherwise. It helps to keep latency down and the speed up. It also helps a little bit with cyber threats, but that is not necessarily its primary purpose for us.

Zscaler is constantly improving the network. They are adding new data centers and regions all the time. They listen to feedback, and based on where we tell them to go and put data centers, they add new data centers. For example, they created a couple of data centers in the Middle East, which has been very helpful for us.

View full review »
Arun Sngh - PeerSpot reviewer
Function Head Technology IT at Tech Mahindra Limited

The users are at different locations, and Zscaler helps us to put the organization's central security controls on these roaming users.

View full review »
FW
Sr. Manager IT at a non-profit with 51-200 employees

When you try to access suspicious websites, they will give you a warning. This helps us with user access without our office network.

Its cyberthreat protection is important for our needs. We use it for Internet access control, e.g., accessing web pages. We also use it when a user downloads or uploads files from the Internet.

When a user goes to the Internet to browse or download something, it is secured by this tool. This is important to us because it is another layer of protection.

View full review »
ArunGauttam - PeerSpot reviewer
Associate Manager at Arisglobal Software Pvt Ltd

The solution's most valuable feature is the well-structured functioning of services. It allows us to monitor things in the best possible way. It has all the features separated well from each other. For instance, they have a separate portal in case one wants to control anything on the internet. The other valuable feature is its ability to audit the reports well.

View full review »
DW
Cloud and Security Transformation Specialist at Comtact

This solution has a lot of valuable features. The most valuable features of the solution are URL filtering, CASB, data leak prevention, DLP, and also ZDX a digital experience monitoring option.

View full review »
Bhaskar Rao - PeerSpot reviewer
Sr. Network Engineer at Yamaha

Zscaler Internet Access's roaming user feature is most valuable and is much better compared to other secure web gateways. 

View full review »
ON
Security Architect at a comms service provider with 201-500 employees
  • The integration of the gateway that inspects all ports and protocols. So, there is threat prevention. 
  • The cloud sandbox
  • VNS security
  • Access control that will protect URL filtering and the cloud firewall. 
  • Data protection that will protect your gateway, like your CASB or your cloud DLP. The capabilities of this will point your traffic to Zscaler Cloud.

The proxy architecture is the way to go. Zscaler uses it to protect their applications on the cloud. So, if you are using Box, Office 365, or even have an end user using LinkedIn or YouTube, then it will give you updated threat updates. It will also inspect all your traffic so you don't get compromised.

Advanced Threat Protection on Zscaler Internet Access has a few functionalities. It has ways to find threats. So, if they are actually hiding, you could do an inspection of your SSL traffic. You also have DNS security in Zscaler Internet Access that will help you route suspicious command-and-control attacks as well as detect threats when it does a full inspection. 

Zscaler Internet Access protects using data loss prevention. If you have a CASB exposing your cloud out into the network, then Zscaler Internet Access will go ahead and control that unknown cloud application in the CASB, protecting it. There is also data detection with exact data match. This improves the data coming into your cloud so you are protecting it. 

It offers a Cloud Browser Isolation feature, which exfiltrates browser activities from the end user's device. This feature can eliminate our exposures on that.

I like its features because they help me eliminate firewalls. I don't need to have firewalls, SIEMs, or an IPS/IDS. So, if all my end users are remote and using Office 365, I am already protecting them because they are in the cloud. I just have to attach the security application, which makes sure that any user who is mobile or remote is protected, without spending money on other solutions.

View full review »
Mauzzam Shaikh - PeerSpot reviewer
Senior Technical Consultant at Meta Infotech Pvt Ltd

The product is simple yet has a lot of features.

It offers a straightforward setup process. Setting up the solution is simple.

The solution is stable and reliable.

Users can scale the product.

View full review »
AG
Managed Network Services Networking Tasmania at Telstra

Overall, we're very happy with our product.

View full review »
MM
Solution Architect at Tata Consultancy

Zscaler covers all the features needed to replace a VPN or proxy solution. They are good. They've been on the market for 15 years now, so they are mature enough.

View full review »
AP
Cyber Security Consultant at flydubai

The most valuable features of Zscaler Internet Access are it's on the cloud, high network performance, and the interception of users is very easy.

View full review »
S Azeem - PeerSpot reviewer
Technology Manager at a computer software company with 201-500 employees

We can focus on a granular level of things. 

View full review »
RK
Consultant at Tata Consultancy

The most valuable features I found in Zscaler Internet Access are the restriction of users for a particular URL, the security feature related to stopping DDoS, and the VPN.

View full review »
EC
Server Administration / Security Officer at a manufacturing company with 501-1,000 employees

Some of the most valuable features are that, as a remote solution it is 

  • lightweight
  • very easy to set up and configure
  • the protection is in the cloud. 

We are agnostic when it comes to what they are doing. We don't have to buy equipment to use it. And when our engineers set it up on our side, we just configured a few settings and we were in.

View full review »
RB
CISO at UST Global

It is very transparent. 

It securely transfers internet connectivity seamlessly, without any problems or issues. It's very simple for the user. 

The product offers easy deployment. 

Security is very strong. There is seamless integration as well.  

There is no lag in service when accessing the internet. 

The initial setup was straightforward. 

It is scalable. 

The solution is stable. 

View full review »
MS
Global Head of Information and Cloud Security Architecture

The internet access is great. It offers good web filtering. It has DLP features. We can monitor our networks with ease. We can monitor the usage, bandwidth, chop, chalking, all these things we can monitor. On top of that, it is providing advanced threat protection ATP, which means any kind of malicious network or malicious payloads that are going through our network can be detected and it can be blocked. We can have a certain kind of block list. There are multiple levels of features.

We have fewer issues with Zscaler.

In terms of user experience, that is also excellent. 

In terms of reporting to senior management, it gives us a clear picture of what needs to be achieved about that solution.

It is easy to set up the solution. 

The solution is stable.

It is a scalable product. 

View full review »
RC
Security Architect at a tech services company with 501-1,000 employees

One feature that is valuable to me from an implementation point of view is that it's very easy to implement. We just had to route in some IPs, and it automatically hops into the nearest Zscaler nodes, which they call it. They have more than 150 nodes across the globe. Essentially, if I'm trying to access a server in India at this point in time, and the server I'm trying to access is somewhere in Singapore or Tokyo, it creates a lot of internet latency. But with Zscaler, it's not the case because they have a server in almost every major hotspot in the world. In India, if you're connecting, they will automatically route to their nearest server. Since they have servers in so many places in the world, we can easily configure them to the nearest server. 

The end-user who's using it doesn't feel the latency, and it's really minimal, less than three milliseconds, six milliseconds, whereas the competition has more than ten milliseconds and eleven milliseconds as latency.

View full review »
PZ
Chief Technical Officer at Accountabilit

Generally, the web proxy feature blocks malicious sites so that my end users don't inadvertently get compromised.

View full review »
Anson Mani - PeerSpot reviewer
Cyber Security Consultant at Envestnet, Inc

The most valuable feature of Zscaler Internet Access is that it is a consolidated solution, it comes with many features, such as DLP.

View full review »
LC
Managing Partner at a consultancy with 1-10 employees

We enjoy all of the proxy capabilities and the capability to integrate into the SIEM/SOC solution. We also like the capability to have local agents on PCs.

We are using that in managed services, so we are happy with the managed service as it is.

It's a very complete solution and well-organized. 

View full review »
NK
Sr. Consultant, Cyber Security at a tech services company with 501-1,000 employees

The URL filtering has been the most valuable feature. 

They're constantly improving because they have a very short development cycle where they add more features every one to three months. If we like a particular feature, we request it through a product enhancement and if it gets accepted, it gets implemented within that year. 

View full review »
MS
Technical Lead at a tech vendor with 10,001+ employees

Overall, it's a good solution. 

We had very few issues during implementation.

Technical support is quite helpful and responsive once you get a hold of them. 

It has private access and has a lot of features inbuilt including DLP, CASB, et cetera. 

The solution is scalable and stable. 

View full review »
Mayank-Sharma - PeerSpot reviewer
Consultant at Tech Machindra Limited

Zscaler Internet Access's best feature is the granular policy controls.

View full review »
GB
Channel Alliances Leader Germany at ALE

Zscaler is a very stable solution.

The security is excellent.

View full review »
PT
CEO at a comms service provider with 11-50 employees

The most valuable feature is the Zscaler protection from external threats. It scrubs everything, email, worms and root problems from websites. It is protection, particularly for distributors users and road warriors. Its very good. They're rated highest in secure web-data wise.

View full review »
Arnab - PeerSpot reviewer
Data Analyst at a tech services company with 11-50 employees

SSL inspection is a valuable feature.

View full review »
HM
Network Engineer at a financial services firm with 5,001-10,000 employees

The internet security that it provides is valuable.

The VPN is valuable, as the whole technology is very different from a traditional VPN.

View full review »
PW
Security Architect at a financial services firm with 1,001-5,000 employees

The protection is most valuable.

View full review »
DC
Global Information Security Architect at a engineering company with 10,001+ employees

I cannot say that I found only one feature that is most valuable, but I can tell you that I find value in traffic scanning and samples. That I think is quite valuable for all their software. The scanning feature is impressive, because they do not introduce a big latency to the traffic. I really like how they manage this part.

View full review »
KS
Consultant at a tech services company with 1-10 employees

The best thing about Zscaler Internet Access is the website filtering. In the UAE it's quite an important feature because most of the malware comes through the SQL injection and through downloads from websites. Zscaler helps protect against that. It is very important for a telco provider, so that their customers, who rent or who buy those services from them, do not have an issue.

View full review »
SR
IT Manager at SiVEST

What I like most about Zscaler Web Security is that we can have our users protected from internet threats and viruses even when they're not connected to our network. I love the fact that it enables us to create whitelists and blacklists based on specific users. These features are extremely important to us and that is what we like most about this solution.

View full review »
it_user1138029 - PeerSpot reviewer
Managing Partner with 1-10 employees

The solution offers a distributed organization to master and to control all of the endpoints. Zscaler allows us to deploy their solution instead of building an in-house proprietary solution. Because it is well integrated and mature, it's faster, cheaper, and better for the company.

View full review »
RM
Technical Specialist with 5,001-10,000 employees

Zscaler is securing entire cooperate traffic using its different modules. This includes URL & aapplication filtering, malware & threat protection, bandwidth control, sand boxing and advanced fire-walling etc. Specifically, I like the URL filtering/user authentication. DLP and firewall features are also an added advantages. Also, there are various traffic forwarding mechanisms such GRE, pac file, VPN etc.

View full review »
AL
Chief Executive Officer at a tech services company with 1-10 employees

Zscaler provides a lot of features in terms of control (URL filtering, cloud app control, etc.), which can be found in other solutions as well, but in terms of security, it is quite unique. SSL inspection, Advanced Threat Security, and Cloud Sandbox are probably the most valuable. 

  • SSL inspection is easy to implement and the performance is great (it is the responsibility of Zscaler to provide it). 
  • Advanced Threat Security protects you from most threats that can bypass the classic anti-malware solution.
  • Cloud Sandbox completes the stack of security requirements stopping zero-day malware.
View full review »
it_user1059291 - PeerSpot reviewer
IT Projects & Innovation Manager at a pharma/biotech company with 1,001-5,000 employees

The most valuable feature is bandwidth control. It has good traffic visibility. 

View full review »
Buyer's Guide
Zscaler Internet Access
March 2024
Learn what your peers think about Zscaler Internet Access. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
765,234 professionals have used our research since 2012.