We use Zscaler Cloud IPS for threat protection, full SSL inspection, and data center scalability. It integrates with multiple products, including cloud firewalls, cloud sandboxing, Cloud Security Broker (CSB), and Data Loss Prevention (DLP). It helps us allow or block specific TCP or UDP ports, ensuring that only authorized traffic is permitted.
Chief Platform Officer at a comms service provider with 51-200 employees
Real User
2021-08-19T18:26:54Z
Aug 19, 2021
We primarily use the solution for offering local secure internet access, such as those involving IPsec or GRE tunnels from site to the Zscaler. The security operation people running the policies and activating the different features provide insight into what is going on within the Zscaler solution.
Find out what your peers are saying about Zscaler, Darktrace, Palo Alto Networks and others in Intrusion Detection and Prevention Software (IDPS). Updated: November 2024.
Intrusion Detection and Prevention Software (IDPS) helps organizations identify potential security threats and respond to them effectively to protect sensitive data and maintain network integrity.
IDPS provides real-time monitoring and analysis of network traffic to detect malicious activities. By leveraging advanced algorithms and machine learning, IDPS solutions can identify unusual patterns and potential threats that traditional firewalls might miss. This proactive approach helps in...
We use Zscaler Cloud IPS for threat protection, full SSL inspection, and data center scalability. It integrates with multiple products, including cloud firewalls, cloud sandboxing, Cloud Security Broker (CSB), and Data Loss Prevention (DLP). It helps us allow or block specific TCP or UDP ports, ensuring that only authorized traffic is permitted.
We use Zscaler Cloud IPS for internet access, extended log store, cloud application control, and advanced threat protection.
I've used Zscaler mostly for URL filtering, SSL Decryption, etc.
We are running multiple production environments there, so that's pretty much it.
We primarily use the solution for offering local secure internet access, such as those involving IPsec or GRE tunnels from site to the Zscaler. The security operation people running the policies and activating the different features provide insight into what is going on within the Zscaler solution.