Senior IT Specialist Network and Security at a marketing services firm with 201-500 employees
Real User
Top 5
2025-06-18T08:26:46Z
Jun 18, 2025
We are using secure remote access for internal applications, and that's why we are using Zscaler Private Access (ZPA) now. I work with Zscaler Private Access (ZPA). I use it just for the VPN functionality.
The main use cases for Zscaler Private Access (ZPA) include allowing network access. We use it mostly for private laptops and Macs, and we are also using it for communication between EC2s. I can provide examples of how it has been effective in the organization. We use Zscaler Private Access (ZPA) to control the communication, mostly for the bands and working groups within the organization itself, so we can have complete control of who can access which resources on Amazon.
Lead Engineer - Information Security at FIS Global
Real User
Top 5
2025-05-22T09:21:37Z
May 22, 2025
I worked with these organizations for implementing Secure Service Edge and SASE solutions, including Cloud Access Security Brokers, such as Netskope and Zscaler. Zscaler and Netskope are the main solutions I work with for various use cases. Based on my experience, I have worked at the enterprise level only, for large companies such as banks and financial institutions that are transitioning from traditional solutions to new secure service edge solutions.
I am helping a customer to evaluate Palo Alto IoT Security ( /categories/iot-security ) and Cloudflare ( /products/cloudflare-reviews ) solutions. Additionally, I am a partner with Zscaler and work with Zscaler Private Access (ZPA) ( /products/zscaler-private-access-zpa-reviews ) for secure access to private networks and VPN replacement.
Technical management of Network Security - Network Hub at a comms service provider with 5,001-10,000 employees
Real User
Top 20
2025-03-19T15:58:00Z
Mar 19, 2025
The main use case is to access the local network or the customer network, the servers, and applications. This is the primary use case for Zscaler Private Access (ZPA) as we use it. Additionally, we use it to access cloud resources such as Microsoft Azure, as it's the easiest and most secure way to access these servers.
We do not manage the vendor machines. We provide them with a passwordless solution. Multiple tenants are enabled on the vendor's machines from their organizations. Accordingly, they connect to both Zscaler and their own environment. We provide limited access to servers and use privileged remote access or browser access when needed.
Zscaler Private Access (ZPA) is a cloud-based solution focused on secure, seamless remote access. It operates without VPN, effectively addressing security challenges and enhancing productivity by connecting users directly to applications.ZPA is designed for secure access, eliminating the need for network access with its zero-trust model, which restricts users to applications they are authorized to access. By moving away from VPN dependencies, businesses can ensure improved security with less...
We are using secure remote access for internal applications, and that's why we are using Zscaler Private Access (ZPA) now. I work with Zscaler Private Access (ZPA). I use it just for the VPN functionality.
The main use cases for Zscaler Private Access (ZPA) include allowing network access. We use it mostly for private laptops and Macs, and we are also using it for communication between EC2s. I can provide examples of how it has been effective in the organization. We use Zscaler Private Access (ZPA) to control the communication, mostly for the bands and working groups within the organization itself, so we can have complete control of who can access which resources on Amazon.
I worked with these organizations for implementing Secure Service Edge and SASE solutions, including Cloud Access Security Brokers, such as Netskope and Zscaler. Zscaler and Netskope are the main solutions I work with for various use cases. Based on my experience, I have worked at the enterprise level only, for large companies such as banks and financial institutions that are transitioning from traditional solutions to new secure service edge solutions.
I am helping a customer to evaluate Palo Alto IoT Security ( /categories/iot-security ) and Cloudflare ( /products/cloudflare-reviews ) solutions. Additionally, I am a partner with Zscaler and work with Zscaler Private Access (ZPA) ( /products/zscaler-private-access-zpa-reviews ) for secure access to private networks and VPN replacement.
The main use case is to access the local network or the customer network, the servers, and applications. This is the primary use case for Zscaler Private Access (ZPA) as we use it. Additionally, we use it to access cloud resources such as Microsoft Azure, as it's the easiest and most secure way to access these servers.
We do not manage the vendor machines. We provide them with a passwordless solution. Multiple tenants are enabled on the vendor's machines from their organizations. Accordingly, they connect to both Zscaler and their own environment. We provide limited access to servers and use privileged remote access or browser access when needed.
Most of the users are using this because of the migrations from the traditional VPN to this next generation of GP services.