Zscaler Private Access is used for private data. You need to deploy Zscaler Private Access to put security and internal network after you build your application. The solution is used when you build an application and want to provide services to the public.
The primary use cases for the Zscaler include secure channel access for applications, private file service access, and remote connectivity to the active directory. These are the top three essential functionalities provided by Zscaler.
We use Zscaler Private Access to authenticate our applications, which provides a more secure way to access the Internet from our work environment. We have multiple policies for different types of users. When new users join the company, they authenticate the VPA application to access the Internet. We use SSL bypass policies, tenant restrictions policies, and Microsoft tenant cloud application policies. We also use File Type Control Policy for all categories of files, and our traffic goes to the WAPAC file and the application. We are using services as per the requirements of our clients.
We are using it for monitoring the global areas, which Zscaler considers for people who are roaming around the system to have a secure connection to internal applications.
SME-support management of architecture at Cognizant
Real User
Top 10
2023-06-06T15:25:17Z
Jun 6, 2023
We can use Zscaler Private Access as a recipient for external communication. Zscaler Private Access can help users sitting in our organization domain and trying to access their own internal company sources. The traffic is forwarded to us through the Zscaler Private Access node, which we can have in our own infrastructure, or it can be hosted on the Zscaler private cloud. We are using Zscaler Private Access to build our own Zscaler private node. Although this node is maintained and managed by Zscaler, it resides in our own data center or domain. So the traffic forwarded from the user system towards any internal resource will go through this private node.
Learn what your peers think about Zscaler Zero Trust Exchange Platform. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
I work for a service provider for a defense customer. We are using Zscaler Private Access to connect to the Internet. This is how we keep our customers protected with the latest inspection of the URLs.
Information Technology System Engineer at DRÄXLMAIER Group
Real User
Top 5
2023-01-03T10:49:08Z
Jan 3, 2023
We use this solution for traffic and establishing the connection. It's deployed on-premises. There are 60,000 people who use Zscaler in my organization.
Zscaler offers a point-to-site or point-to-point connectivity to a dedicated service in a secure way. The DNS encryption is based on the identity of users or the identity of a group of users. It's a cloud solution. We use Zscaler App Connector to manage the solution. As a company, we need to manage connectors. Some are attached to the virtual machine. Typically, we have 200 fixed users. We can increase the number of users by 10% each year.
We've so far recommended the solution in one or two engagements. We work with customers who have various businesses like banking, finance, travel, et cetera, where we do a solution for them, a security solution for them. We are an IT service consultant company. We generally use that product for the proxy setup, for URL dealing and blacklist blocking, and all that stuff. When the customer has a requirement where their workforce is very mobile or if they're on-premise and moving the workforce, we do recommend the Zscaler product. There are also other cases. We extend other modules like CASB or another setup, where we say they can access the public cloud or send some data against the policy.
With Private Access, from TCS, we used to support multiple customers. Some of our customers will be utilizing Private Access and we'll be supporting them. Mainly due to the COVID pandemic situation, many people now work from home. When working from home they needed better connectivity for a VPN solution. That is the main criteria and customers are looking for a stable solution, a cloud-based solution, which can be integrated quickly and can be managed centrally. That is the driving point. The pandemic situation was the driver, as clients needed to add capacity also. Earlier, they would give this remote access solution only to a few people. Now nearly 90% of people work from home. The capacity has to be increased. For that, clients were looking for a multi-net solution and they started deploying Private Access.
Global Knowledge Based Engineering Manager at Tenneco Inc.
Real User
2019-06-24T12:13:00Z
Jun 24, 2019
When I am outside of the company, I use Zscaler Private Access. I use Zscaler Private Access in the home, hotel, or wherever for remote working. It is a VPN.
Zscaler Zero Trust Exchange Platform acts as a VPN alternative for secure remote access, cloud protection, and zero-trust strategies. It enables secure data transmission, supports remote work, and enhances compliance through a cloud-based architecture, offering improved performance and simplified management.Designed for organizations seeking secure application access and robust data protection, Zscaler Zero Trust Exchange Platform delivers a comprehensive solution through seamless VPN...
Zscaler Private Access is used for private data. You need to deploy Zscaler Private Access to put security and internal network after you build your application. The solution is used when you build an application and want to provide services to the public.
We use the product to provide secure access to our customer's environment consisting of on-premise and on-cloud applications.
The primary use cases for the Zscaler include secure channel access for applications, private file service access, and remote connectivity to the active directory. These are the top three essential functionalities provided by Zscaler.
We use Zscaler Private Access to authenticate our applications, which provides a more secure way to access the Internet from our work environment. We have multiple policies for different types of users. When new users join the company, they authenticate the VPA application to access the Internet. We use SSL bypass policies, tenant restrictions policies, and Microsoft tenant cloud application policies. We also use File Type Control Policy for all categories of files, and our traffic goes to the WAPAC file and the application. We are using services as per the requirements of our clients.
We are using it for monitoring the global areas, which Zscaler considers for people who are roaming around the system to have a secure connection to internal applications.
We can use Zscaler Private Access as a recipient for external communication. Zscaler Private Access can help users sitting in our organization domain and trying to access their own internal company sources. The traffic is forwarded to us through the Zscaler Private Access node, which we can have in our own infrastructure, or it can be hosted on the Zscaler private cloud. We are using Zscaler Private Access to build our own Zscaler private node. Although this node is maintained and managed by Zscaler, it resides in our own data center or domain. So the traffic forwarded from the user system towards any internal resource will go through this private node.
I work for a service provider for a defense customer. We are using Zscaler Private Access to connect to the Internet. This is how we keep our customers protected with the latest inspection of the URLs.
We use this solution for traffic and establishing the connection. It's deployed on-premises. There are 60,000 people who use Zscaler in my organization.
Zscaler offers a point-to-site or point-to-point connectivity to a dedicated service in a secure way. The DNS encryption is based on the identity of users or the identity of a group of users. It's a cloud solution. We use Zscaler App Connector to manage the solution. As a company, we need to manage connectors. Some are attached to the virtual machine. Typically, we have 200 fixed users. We can increase the number of users by 10% each year.
We've so far recommended the solution in one or two engagements. We work with customers who have various businesses like banking, finance, travel, et cetera, where we do a solution for them, a security solution for them. We are an IT service consultant company. We generally use that product for the proxy setup, for URL dealing and blacklist blocking, and all that stuff. When the customer has a requirement where their workforce is very mobile or if they're on-premise and moving the workforce, we do recommend the Zscaler product. There are also other cases. We extend other modules like CASB or another setup, where we say they can access the public cloud or send some data against the policy.
We use Zscaler Private Access to provide access to on-premise applications.
With Private Access, from TCS, we used to support multiple customers. Some of our customers will be utilizing Private Access and we'll be supporting them. Mainly due to the COVID pandemic situation, many people now work from home. When working from home they needed better connectivity for a VPN solution. That is the main criteria and customers are looking for a stable solution, a cloud-based solution, which can be integrated quickly and can be managed centrally. That is the driving point. The pandemic situation was the driver, as clients needed to add capacity also. Earlier, they would give this remote access solution only to a few people. Now nearly 90% of people work from home. The capacity has to be increased. For that, clients were looking for a multi-net solution and they started deploying Private Access.
Our primary use case of this product is as a VPN solution. I'm the head of IT infrastructure and we're a customer of Zscaler.
When I am outside of the company, I use Zscaler Private Access. I use Zscaler Private Access in the home, hotel, or wherever for remote working. It is a VPN.