We use Zscaler Cloud IPS for threat protection, full SSL inspection, and data center scalability. It integrates with multiple products, including cloud firewalls, cloud sandboxing, Cloud Security Broker (CSB), and Data Loss Prevention (DLP). It helps us allow or block specific TCP or UDP ports, ensuring that only authorized traffic is permitted.
Chief Platform Officer at a comms service provider with 51-200 employees
Real User
2021-08-19T18:26:54Z
Aug 19, 2021
We primarily use the solution for offering local secure internet access, such as those involving IPsec or GRE tunnels from site to the Zscaler. The security operation people running the policies and activating the different features provide insight into what is going on within the Zscaler solution.
Find out what your peers are saying about Zscaler, Darktrace, Palo Alto Networks and others in Intrusion Detection and Prevention Software (IDPS). Updated: February 2025.
Intrusion Detection and Prevention Software (IDPS) solutions are crucial for maintaining the security of network systems. They detect and block unauthorized access in real-time, providing a comprehensive layer of protection against cyber threats.Implementing IDPS in an organization's network infrastructure helps in identifying suspicious activities and unauthorized breaches. This software works by monitoring network traffic, analyzing data packets, and responding automatically to potential...
We use Zscaler Cloud IPS for threat protection, full SSL inspection, and data center scalability. It integrates with multiple products, including cloud firewalls, cloud sandboxing, Cloud Security Broker (CSB), and Data Loss Prevention (DLP). It helps us allow or block specific TCP or UDP ports, ensuring that only authorized traffic is permitted.
We use Zscaler Cloud IPS for internet access, extended log store, cloud application control, and advanced threat protection.
I've used Zscaler mostly for URL filtering, SSL Decryption, etc.
We are running multiple production environments there, so that's pretty much it.
We primarily use the solution for offering local secure internet access, such as those involving IPsec or GRE tunnels from site to the Zscaler. The security operation people running the policies and activating the different features provide insight into what is going on within the Zscaler solution.