Zscaler Internet Access and Symantec Proxy are web security solutions. Zscaler has an advantage due to its remote capabilities and ease of implementing SSL inspection, while Symantec is noted for strong content filtering and URL database.
Features: Zscaler Internet Access offers advanced threat protection, SSL inspection, and cloud sandboxing. Its ability to secure remote users is notable. Symantec Proxy shines with its robust URL filtering database, effective content filtering, and a global intelligence network.
Room for Improvement: Zscaler needs better integration with applications and improved user reporting. It faces challenges in traffic allocation and multi-factor authentication integration. Symantec requires enhancements in reporting, dashboard integration, and policy management, as well as a more streamlined licensing renewal process.
Ease of Deployment and Customer Service: Zscaler is cloud-first, enabling quick deployment with strong global coverage, but its support could improve in response time and technical expertise. Symantec Proxy's on-premises setup needs more resources and time; however, its customer support is generally seen as helpful, though technical depth could be enhanced.
Pricing and ROI: Zscaler is generally more expensive, with a subscription model that can scale by user count. Despite high costs, users find ROI through reduced hardware and simplified IT management. Symantec Proxy also presents high costs, which have been a concern post-Broadcom acquisition, impacting the cost-to-feature ratio and perceived investment value.
iboss offers a comprehensive security platform designed for diverse use cases such as web filtering, data loss protection, corporate proxy services, and URL filtering.
iboss integrates advanced features to address dynamic security needs, leveraging its strength in SASE, ZTNA, AI initiatives, and cloud integration, while ensuring seamless operations for remote work. It excels in historical forensics, malware protection, and flexible cloud deployments. Users benefit from comprehensive traffic scanning, robust malware detection, and PaaS capabilities that reduce hardware management. An intuitive admin console ensures efficient management with content filtering and low false positives. SSL decryption enhances security, while DLP protects data in AI conversations. Deployment is rapid and scalable, allowing effortless integration with emerging technologies.
What features does iboss offer?
What benefits and ROI should users consider?
iboss finds significant application in sectors such as education, where web filtering for K-12 is crucial, and in corporate environments requiring robust proxy services and URL filtering for network security. Its adaptability is essential in scenarios demanding flexible, decentralized security frameworks, particularly for remote work setups.
Symantec Proxy is designed to provide web security, web access control, and secure web gateway functionalities for organizations. It helps protect against web-based threats, enforce web usage policies, and provide secure access to internet resources.
Symantec Proxy Benefits:
Symantec Proxy Features:
Reviews from Real Users
Below are some reviews and helpful feedback written by Symantec Proxy users.
PeerSpot user, Consultant at a financial services firm, says that Symantec Proxy "...enables us to manage bandwidth for users based on their privilege levels. For example, if a user wants to use a certain application or resource, we can provide access based on their privileges."
PeerSpot user, General Manager & founder at a engineering company, writes that Symantec Proxy has "A complex deployment, no proper user reporting, and a proxy component that works."
Muhammad Salahuddin, Unit Head - Network and Security Solutions at FPM Solutions, states that Symantec Proxy has "Good URL filtering but is expensive and doesn't have good technical support services."
Zscaler Internet Access is a cloud-native security service edge (SSE) platform. Its main purpose is to provide AI-powered protection for all users, all applications, and all locations. The solution replaces other legacy network security solutions to stop advanced attacks and prevent data loss by using a comprehensive zero trust approach.
Zscaler Internet Access Features
Zscaler Internet Access has many valuable key features. Some of the most useful ones include:
Zscaler Internet Access Benefits
There are several benefits to implementing Zscaler Internet Access. Some of the biggest advantages the solution offers include:
Reviews from Real Users
Below are some reviews and helpful feedback written by Zscaler Internet Access users.
A Service Manager at a construction company says, "There are a bunch of different capabilities that are valuable within the platform. We use quite a lot of them, but not everything. The ones that are most important to us are the URL Filtering and the application control. For our needs, the cloud-native proxy architecture is a very good solution. This architecture helps with cyber threats because we inspect most of the traffic and we can see that a lot of threats are stopped directly in the secure web gateway."
Owen N., Security Architect at Claro Enterprise Solutions, explains that the solution’s most valuable features include “The integration of the gateway that inspects all ports and protocols. So, there is threat prevention; The cloud sandbox; VNS security; Access control that will protect URL filtering and the cloud firewall; Data protection that will protect your gateway, like your CASB or your cloud DLP; The capabilities of this will point your traffic to Zscaler Cloud.”
An Architecture Senior Manager at an insurance company mentions, "The data loss prevention feature is the most valuable. It stops our users from inadvertently leaking our customers' data to the Internet or anywhere else it shouldn't go." He also adds, “The solution provides quick access to cloud services, securing our data and allowing us to inspect all our traffic.”
We monitor all Secure Web Gateways (SWG) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.