We use this solution for traffic and establishing the connection.
It's deployed on-premises.
There are 60,000 people who use Zscaler in my organization.
We use this solution for traffic and establishing the connection.
It's deployed on-premises.
There are 60,000 people who use Zscaler in my organization.
The best feature is the ability to establish the connection between your public network and automatically connect to the intranet connection.
The stability could be improved.
I have worked with Zscaler Private Access for six months.
I would rate the stability as eight out of ten.
I would rate Zscaler as eight out of ten.
I primarily use it for conducting security incident investigations and generating security reports. It serves as a valuable tool in analyzing and responding to security events, and its capabilities are instrumental in producing comprehensive reports on the security status of the network.
It proved to be invaluable in addressing our challenge of not having a rigid perimeter. With employees working from various locations, the need to move away from VPN reliance became apparent. Following thorough assessments, we opted to continue using it as our cloud Web Access solution.
It stands out for its seamless integration with various security solutions, such as EDR, SOAR, etc. The implementation process is straightforward, requiring minimal ongoing maintenance. The desktop agent enhances endpoint protection against zero-day vulnerabilities, providing a safeguard until patches are released. Its adaptability extends beyond a single solution, allowing integration with different models and solutions. The alert detection system and additional security features add an extra layer of appeal. The flexibility to start with one aspect and expand within a single vendor is advantageous. The agent's versatility is notable, used for digital experience monitoring to collect valuable endpoint metrics for troubleshooting. The security browser function distinguishes between known safe sites and potentially suspicious ones, ensuring a secure browsing experience. Unfamiliar websites are run in the Zscaler Cloud, isolating them from the endpoint and preventing potential phishing or malicious scripts from reaching the user's device.
Occasionally, there are certain delays in report generation. Clicking on a link, I found myself waiting for an unpredictable duration—sometimes as long as thirty seconds to a minute—until the report was ready.
I have been working with it for over a year.
There have been instances where certain software or applications on the user side didn't work smoothly. This posed an additional onboarding challenge, requiring collaboration with technical support to analyze logs, generate reports, and identify necessary exclusions or policies to rectify the issue. Once addressed, the applications resumed normal functioning.
It's highly scalable, and I frequently receive notifications about new data center expansions. With around five thousand endpoints, I am not aware of any problems that have been discussed as requiring a change of solution.
I gained access to the web console, and within an hour, I comprehended its capabilities, which I found appealing. Beyond predefined reports, the platform enables users to retrieve any imaginable information. Creating a visual search request is a straightforward process, delivering the required data through a user-friendly interface.
The implementation has effectively addressed numerous challenges related to ensuring a secure internet connection for users.
When we conducted assessments, Cisco and Microsoft were also considered. However, at that time, Cisco was in the initial stages of developing their solution, and Microsoft had just released their web security gateway.
When making a decision, choosing a market leader is often advisable. While the initial cost may be slightly higher, the long-term savings in both time and money, as well as the reduction in operational costs, often outweigh the investment. Opting for a leading product can also mitigate potential issues and challenges that might arise with newer or less-established alternatives. Overall, I would rate it eight out of ten.
It serves as a globally distributed solution, differing significantly from MPLS. Unlike traditional firewalls, it seamlessly accommodates cloud services and enables remote work from any location. The product's global distribution across the cloud facilitates internal access with the necessary licenses. Whether connecting from a branch office, on-premises solution, private data system, public data center, or the cloud, the platform ensures consistent and robust security protection throughout the entire infrastructure.
The most valuable feature is its seamless integration capabilities, streamlining the process by eliminating the need for extensive installations. Users can connect to the SaaS solution by simply installing the necessary apps. This includes the flexibility to connect with any firewall or router capable of setting up IPSec, providing users the freedom to choose their preferred hardware. This versatility extends beyond Zscaler-specific applications or devices, making it compatible with a range of SD-WAN solutions, such as Cisco Meraki, Palo Alto, and Juniper.
A suggestion for improvement is the development of their own proprietary SD-WAN device. Currently, the experience can vary when integrating cloud protection with different vendors, such as Palo Alto, Meraki, or Juniper. Having a Zscaler-specific device could streamline this process and provide a more consistent user experience across diverse branches. Additionally, expanding their offerings to include solutions like SIEM, similar to competitors, could enhance their portfolio and cater to clients interested in a broader range of services.
I have been working with it for two years.
It is highly reliable and ensures that users receive optimal performance regardless of their physical location, creating a more seamless and user-friendly experience.
The initial setup was straightforward.
The perception of cloud services being expensive is often a result of the initial migration costs, especially when transitioning from traditional and limited MPLS environments. In the long run, cloud services are not inherently costly. If you're starting fresh and adopting a cloud-first approach from the beginning, the perceived expense is considerably less significant.
It is not economically viable for individual users but is highly recommended for companies with a substantial user base, multiple branches, extensive cloud operations, and remote employees. The solution offers enhanced protection across network, on-premises, and cloud environments, making it valuable for enterprises adapting to the evolving landscape of cloud adoption and seeking comprehensive security and networking benefits. Overall, I would rate it nine out of ten.
We use the solution to restrict uploading over public sites. We control the users’ actions through DLP. Only users who have access can upload files. We manage multiple policies.
The policies are very easy to implement. It's very easy to understand. We have the option to assign time limits to the access we provide. For example, we can implement a policy for one year for a particular user. Once it expires, we can disable it.
We have some limitations while checking logs. The product must allow users to check logs for an entire year in the local console. Currently, we can check logs only for the previous three to four months.
Forcepoint provides multiple services separately, but Zscaler does not provide separate DLP. It will be good if Zscaler provides the DLP module separately.
I have been using the solution for the last two years.
I rate the tool’s stability a ten out of ten.
The tool is very scalable. I rate the scalability a ten out of ten. Approximately 5,200 people are using the solution in our organization.
We are also using Forcepoint.
The initial setup is very easy.
The product is a little more expensive than other tools.
We do not face any challenges with the product. If we have any problems, the vendor helps us. The product is everywhere. Everyone is using it. It's very, very flexible. It provides a single solution for multiple modules like DLP, proxy, and firewall. Overall, I rate the tool a ten out of ten.
We use Zscaler Private Access to authenticate our applications, which provides a more secure way to access the Internet from our work environment. We have multiple policies for different types of users. When new users join the company, they authenticate the VPA application to access the Internet. We use SSL bypass policies, tenant restrictions policies, and Microsoft tenant cloud application policies. We also use File Type Control Policy for all categories of files, and our traffic goes to the WAPAC file and the application. We are using services as per the requirements of our clients.
The most valuable features are the File Type Control and SSL bypass policies. We have multiple options, such as very flexible policies and modules in Zscaler. We will define them based on our requirements and the active Internet. We also have geolocation users. For example, a user from Singapore moves to Dubai. When the user tries to access the Internet, Zscaler automatically detects the geolocation and drives our traffic to the other channel. There is no issue here.
When using a Blue Coat, we have some problems. Sometimes, some of our users have some issues, but once we update the agent, the traffic goes to the current geolocation without any problems, and they can access it. Sometimes, we have some URL categories blocked in our environment, but HPE sometimes removes the block. We request that the vendor to remove the block from the correct URL category. They provide a suitable solution based on the findings.
There is some issue while accessing the portal. It takes too long. It will take longer if I am on the URL Cloud App category and switch to other tabs.
I have been using Zscaler Private Access for five years.
If something happens, they have integration and they send notifications. I rate the solution’s stability a ten out of ten.
If I need to switch the policy to another task, the solution takes time. I rate the solution’s scalability a nine out of ten.
Compared to other proxies, such as Glook and IronPort, Zscaler Private Access is very easy to handle.
The initial setup is easy. You need to configure the proxy tool for the network configuration. They can forward multiple services based on the client's requirements. If we need to use the VPA, we need to authenticate. It takes one day to implement the solution, but for smooth running, it takes around a month because of timely revision.
The solution is expensive.
The categorization issue is dependent on the end user. For example, if I am trying to access a categorized URL but need to access it for work, I should be able to request a change to the categorization. Forcepoint can change the categorization itself, or the client team can do it for me. This is enough to change the categorization to meet the requirements. Overall, I rate the solution a ten out of ten.
In Qatar industries, the legacy systems like the Bluecoat Proxy is still being used, these solutions work at a limited capacity. For instance, one of our organization's customers is in the Oil & Gas transportation business with tankers, if a company like them wants to deploy a proxy solution, physical proxy deploy is very complicated for such companies, therefore our organization proposes a cloud proxy solution to them like Zscaler DLP.
There are several cloud proxy solutions in the market, but Zscaler DLP provides the lowest latency rates due to the presence of global enforcement nodes in the solution. Whenever a potential customer approaches our company, which has a large workforce, has offices distributed across a wide geography and is in need of a cloud-based solution, we suggest Zscaler DLP for comprehensive global control.
The in-line DLP feature is one of the most vital features of the solution. Data security is a global concern, like in Europe there is the EDPR, while Qatar has its own data protection laws, so at our organization while data gets classified using different tools like Boldon James, security control in transit remains a concern so the in-line DLP policy is a valuable feature in Zscaler DLP that remains absent in most other products. Zscaler DLP takes care of the security when data is in motion.
The technical team in our company suggests there are some performance issues with the solution once the module addition begins. For instance, suppose I am using Zscaler Internet Access, and the connectivity speed is excellent, but the moment I start integrating some add-ons like DLP, then the solution considerably slows down in functionality.
But I believe the aforementioned instance or scenario is acceptable because an initial data check gets performed upon integration and it probably can be solved by the vendor through some alterations in the architecture. The set of features provided by Zscaler DLP is enough for the market in which our company operates.
I have been using Zscaler DLP for two and a half years.
I would rate the stability an eight out of ten. It's a highly stable solution. The product consistently functions all the time, but it slows down a couple of times when a large-scale data transfer is being processed that involves multiple policy checks.
Zscaler DLP almost never crashes, and when it does rarely, it's very specific to the customer environment. When some changes are made to the deployed product upon the customer's suggestion, initially, some instability arrives, which is then fixed through fine-tuning.
I would rate the scalability an eight out of ten. The Zscaler DLP is extremely scalable and we have experienced it hands-on in our organization. One of the customers of our company was beginning operations in the Philippines, and they were already using Zscaler DLP in other locations like Kuwait and Jordan; they asked us to increase the license numbers and deploy the same Zscaler DLP solution for their Philippines location as well, the entire process was smoothly completed by our team.
I believe the downscaling of the solution is as easy as upscaling. Around 80 to 90 customers of our organization are using Zscaler DLP. The customer portfolio of our company for Zscaler DLP comprises 20% government enterprises, 60% are medium-scale businesses, and the rest are small-scale businesses.
The customer support team has been responsive enough to our organization's queries in Qatar. In our company, we had to reach out for customer support on very few occasions. I would rate the tech support an eight out of ten.
Positive
I would rate the initial setup an eight out of ten. Our organization implements the setup operations and transitions of Zscaler DLP for each customer. Rarely the deployment team of our company has faced some challenges, but it has been due to the unique customer environments, server placements and connection requirements.
About 95% of the deployments have been carried out in our organization without any obstacles. Our organization always deploys Zscaler DLP on the cloud.
It's an affordable solution. I would rate the pricing a six out of ten. Once after deployment, you start bundling up additional components, the cost significantly increases. When compared to the cost of a competitor solution and the quality of Zscaler DLP, the price of the solution is justified.
Some customers who are familiar with other product environments of Palo Alto or Cisco might find Zscaler DLP a bit expensive when looking at it from an environment compatibility or opportunity perspective.
For companies that have operations across the globe, it's crucial for them to have the same set of data security controls and measures across all locations; Zscaler DLP helps in such implementations. For instance, if there are certain enforcement policies or data security norms implemented for the headquarters of an organization, Zscaler DLP allows a professional to just copy the implemented policies of one location to another, irrespective of the site members or users.
Overall, I would rate the solution an eight out of ten. I would advise others to perform due diligence before directly adopting the product, but just because the product is the market leader doesn't mean it will fit perfectly into every environment.
I always analyze the customer's requirements and existing environment before proposing the best solution. If integrating Zscaler DLP into a Palo Alto environment will create difficulties, then it's better to choose a solution from Palo Alto.
I use Zscaler CASB to get the visibility of the cloud application since everything is moving to the cloud these days. We use the solution to get complete visibility of what is happening on my drive and official applications. The solution also helps to restrict information shared with my other partners.
Zscaler CASB's latency and architecture are excellent.
Zscaler CASB needs to improve its applications or connectors. The solution's granularity should be improved because it has limited granular options to control, visible, allow, block, delay, and receive.
I have been using Zscaler CASB for one year.
Zscaler CASB is a stable solution.
Zscaler CASB is a scalable solution because it is a cloud-based solution. Around 30% of the industry people are using Zscaler CASB.
Zscaler CASB's technical support is good. The solution's support team is available, but they don't have much visibility of what is happening and take too much time to resolve it.
Positive
Zscaler CASB's initial setup is easy.
As per industry leads, Zscaler CASB is an expensive solution.
Zscaler CASB is deployed on-cloud in our organization.
I would recommend Zscaler CASB to other users. Zscaler CASB has a seamless deployment. The solution needs to improve on the navigation or user experience part.
Overall, I rate Zscaler CASB an eight out of ten.
I work for a service provider for a defense customer. We are using Zscaler Private Access to connect to the Internet. This is how we keep our customers protected with the latest inspection of the URLs.
The most valuable feature of Zscaler Private Access is the categorization of the dynamic URLs which keeps the customer's environment protected. The threats and the malware are correctly categorized.
Zscaler Private Access's reporting is poor. We should have more insight into the reports regarding what is blocked and allowed.
I have been using Zscaler Private Access for approximately four years.
I rate the scalability of Zscaler Private Access a ten out of ten.
I rate the support of Zscaler Private Access a five out of ten.
Neutral
There is a lightweight agent on six laptops and the agent reaches out to the SaaS-based cloud.
The process of deployment takes 15 to 30 days.
I rate the initial setup of Zscaler Private Access an eight out of ten.
I rate the ROI from Zscaler Private Access a seven out of ten.
The price is competitive.
I rate the price of Zscaler Private Access five out of ten.
If the reports were improved the customer would have more insight.
I rate Zscaler Private Access nine out of ten.