We performed a comparison between Menlo Security Remote Browser Isolation and Zscaler Internet Access based on real PeerSpot user reviews.
Find out what your peers are saying about Cisco, Zscaler, Forcepoint and others in Internet Security."Menlo Security RBI's best feature is its threat isolation engine."
"The solution’s customer service is good."
"We use ZIA for outbound internet connectivity. The internet traffic of on-prem users will be directed to the ZIA cloud for security checks and web filtering."
"We enjoy all of the proxy capabilities and the capability to integrate into the SIEM/SOC solution."
"It is easy to set up the solution."
"The solution has reduced cyberattacks."
"Zscaler Internet Access protects using data loss prevention. If you have a CASB exposing your cloud out into the network, then Zscaler Internet Access will go ahead and control that unknown cloud application in the CASB, protecting it. There is also data detection with exact data match. This improves the data coming into your cloud so you are protecting it."
"The most valuable feature is the ability to drop packets."
"The initial setup was straightforward. The biggest thing for us was to build our own policies. The deployment itself was only a few hours."
"Menlo Security RBI could be more cloud-friendly, and its mobility could be improved."
"If they can also integrate with the multi-factor authentication to prompt users to do another, second-factor authentication, that would be ideal."
"I would like to see more training and video documentation."
"One thing that they could improve is the ability to import rules from other platforms."
"They block Zscaler IPs when the traffic origin is from Zscaler IPs. They've been blocked by certain government organizations so the end users are not able to visit those websites unless we ask them to unblock those IP. This is a bit problematic."
"Zscaler Internet Access needs to integrate more ISPs. It is good to have more than three ISPs."
"An improvement would be if they could provide an out-of-the-box experience, like 20 to 30 features all ready to go. In comparison, LogRhythm offers out-of-the-box features. With Zscaler Internet Access, there is firewall IPS, multiple security services, filtering, DLP, and CASB browser isolation. These are things that all users are going to be using. However, when an administrator or architect would start building this, I would definitely need to engage professional services to help clients do it."
"The interface for administration could be better. They should upgrade the management portal."
"The reporting functionality could be a bit easier to use. There is a reporting function, but it's quite hard to do any good reporting, from a user-management perspective. For example, if a department manager wants to know how his department is using the web, there is a way to get the data, but it's quite cumbersome to get it and show it well. And that's true for comparing between departments."
More Menlo Security Remote Browser Isolation Pricing and Cost Advice →
Menlo Security Remote Browser Isolation is ranked 7th in Internet Security with 1 review while Zscaler Internet Access is ranked 2nd in Internet Security with 46 reviews. Menlo Security Remote Browser Isolation is rated 8.0, while Zscaler Internet Access is rated 8.2. The top reviewer of Menlo Security Remote Browser Isolation writes "Stable and scalable solution with a great threat isolation engine". On the other hand, the top reviewer of Zscaler Internet Access writes "Provides integrated CASB and file sandboxing but could be less expensive ". Menlo Security Remote Browser Isolation is most compared with Cisco Umbrella, Cloudflare Access, Skyhigh Security, Perimeter 81 and Akamai Enterprise Application Access, whereas Zscaler Internet Access is most compared with Cisco Umbrella, Microsoft Defender for Cloud Apps, Netskope , Prisma Access by Palo Alto Networks and Illumio.
See our list of best Internet Security vendors.
We monitor all Internet Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.