Zscaler Private Access (ZPA) is a Zero Trust Network Access solution. When replacing traditional remote access VPN technology, which is not aligned with NIST 800-207 Zero Trust principles, Zscaler Private Access (ZPA) is the solution. It serves enterprises that prefer not to manage the underlay by installing a client connector agent on end-user machines. It provides access to private applications and SaaS applications remotely when users are traveling while building secure connectivity and ensuring least privilege access to these applications rather than everything within the perimeter.
Senior IT Specialist Network and Security at a marketing services firm with 201-500 employees
Real User
Top 5
Jun 18, 2025
We are using secure remote access for internal applications, and that's why we are using Zscaler Private Access (ZPA) now. I work with Zscaler Private Access (ZPA). I use it just for the VPN functionality.
The main use cases for Zscaler Private Access (ZPA) include allowing network access. We use it mostly for private laptops and Macs, and we are also using it for communication between EC2s. I can provide examples of how it has been effective in the organization. We use Zscaler Private Access (ZPA) to control the communication, mostly for the bands and working groups within the organization itself, so we can have complete control of who can access which resources on Amazon.
I worked with these organizations for implementing Secure Service Edge and SASE solutions, including Cloud Access Security Brokers, such as Netskope and Zscaler. Zscaler and Netskope are the main solutions I work with for various use cases. Based on my experience, I have worked at the enterprise level only, for large companies such as banks and financial institutions that are transitioning from traditional solutions to new secure service edge solutions.
I am helping a customer to evaluate Palo Alto IoT Security ( /categories/iot-security ) and Cloudflare ( /products/cloudflare-reviews ) solutions. Additionally, I am a partner with Zscaler and work with Zscaler Private Access (ZPA) ( /products/zscaler-private-access-zpa-reviews ) for secure access to private networks and VPN replacement.
Technical management of Network Security - Network Hub at a comms service provider with 5,001-10,000 employees
Real User
Top 20
Mar 19, 2025
The main use case is to access the local network or the customer network, the servers, and applications. This is the primary use case for Zscaler Private Access (ZPA) as we use it. Additionally, we use it to access cloud resources such as Microsoft Azure, as it's the easiest and most secure way to access these servers.
Learn what your peers think about Zscaler Private Access (ZPA). Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
Consultant at a consultancy with 10,001+ employees
Real User
Top 10
Feb 5, 2025
We do not manage the vendor machines. We provide them with a passwordless solution. Multiple tenants are enabled on the vendor's machines from their organizations. Accordingly, they connect to both Zscaler and their own environment. We provide limited access to servers and use privileged remote access or browser access when needed.
Zscaler Private Access enhances security by enabling access to specific applications without exposing entire networks. It is designed for scalability and flexibility, making it particularly suitable for cloud transitions and remote work environments.Zscaler Private Access offers a comprehensive solution for modern security needs by ensuring secure remote application access. This is achieved through its advanced features such as micro-segmentation and AI capabilities. Organizations can...
Zscaler Private Access (ZPA) is a Zero Trust Network Access solution. When replacing traditional remote access VPN technology, which is not aligned with NIST 800-207 Zero Trust principles, Zscaler Private Access (ZPA) is the solution. It serves enterprises that prefer not to manage the underlay by installing a client connector agent on end-user machines. It provides access to private applications and SaaS applications remotely when users are traveling while building secure connectivity and ensuring least privilege access to these applications rather than everything within the perimeter.
We are using secure remote access for internal applications, and that's why we are using Zscaler Private Access (ZPA) now. I work with Zscaler Private Access (ZPA). I use it just for the VPN functionality.
The main use cases for Zscaler Private Access (ZPA) include allowing network access. We use it mostly for private laptops and Macs, and we are also using it for communication between EC2s. I can provide examples of how it has been effective in the organization. We use Zscaler Private Access (ZPA) to control the communication, mostly for the bands and working groups within the organization itself, so we can have complete control of who can access which resources on Amazon.
I worked with these organizations for implementing Secure Service Edge and SASE solutions, including Cloud Access Security Brokers, such as Netskope and Zscaler. Zscaler and Netskope are the main solutions I work with for various use cases. Based on my experience, I have worked at the enterprise level only, for large companies such as banks and financial institutions that are transitioning from traditional solutions to new secure service edge solutions.
I am helping a customer to evaluate Palo Alto IoT Security ( /categories/iot-security ) and Cloudflare ( /products/cloudflare-reviews ) solutions. Additionally, I am a partner with Zscaler and work with Zscaler Private Access (ZPA) ( /products/zscaler-private-access-zpa-reviews ) for secure access to private networks and VPN replacement.
The main use case is to access the local network or the customer network, the servers, and applications. This is the primary use case for Zscaler Private Access (ZPA) as we use it. Additionally, we use it to access cloud resources such as Microsoft Azure, as it's the easiest and most secure way to access these servers.
We do not manage the vendor machines. We provide them with a passwordless solution. Multiple tenants are enabled on the vendor's machines from their organizations. Accordingly, they connect to both Zscaler and their own environment. We provide limited access to servers and use privileged remote access or browser access when needed.
Most of the users are using this because of the migrations from the traditional VPN to this next generation of GP services.