We use Zscaler Cloud IPS for threat protection, full SSL inspection, and data center scalability. It integrates with multiple products, including cloud firewalls, cloud sandboxing, Cloud Security Broker (CSB), and Data Loss Prevention (DLP). It helps us allow or block specific TCP or UDP ports, ensuring that only authorized traffic is permitted.
Chief Platform Officer at a comms service provider with 51-200 employees
Real User
Aug 19, 2021
We primarily use the solution for offering local secure internet access, such as those involving IPsec or GRE tunnels from site to the Zscaler. The security operation people running the policies and activating the different features provide insight into what is going on within the Zscaler solution.
Find out what your peers are saying about Zscaler, Darktrace, Palo Alto Networks and others in Intrusion Detection and Prevention Software (IDPS). Updated: February 2026.
Intrusion Detection and Prevention Software (IDPS) is crucial for identifying and thwarting unauthorized access attempts in real-time. It combines advanced technologies to offer robust network security and assists organizations in maintaining a secure environment.Numerous businesses rely on IDPS to detect unusual activity within their networks, providing an essential layer of defense in mitigating cyber threats. Feedback from users highlights its effectiveness, particularly the system's...
We use Zscaler Cloud IPS for threat protection, full SSL inspection, and data center scalability. It integrates with multiple products, including cloud firewalls, cloud sandboxing, Cloud Security Broker (CSB), and Data Loss Prevention (DLP). It helps us allow or block specific TCP or UDP ports, ensuring that only authorized traffic is permitted.
We use Zscaler Cloud IPS for internet access, extended log store, cloud application control, and advanced threat protection.
I've used Zscaler mostly for URL filtering, SSL Decryption, etc.
We are running multiple production environments there, so that's pretty much it.
We primarily use the solution for offering local secure internet access, such as those involving IPsec or GRE tunnels from site to the Zscaler. The security operation people running the policies and activating the different features provide insight into what is going on within the Zscaler solution.