Technical management of Network Security - Network Hub at a comms service provider with 5,001-10,000 employees
Real User
Top 20
2025-03-19T15:58:00Z
Mar 19, 2025
The rollout process could be much easier, and the configuration of identity providers like Azure is more complicated than with other zero trust network providers. This can be a pain point. Additionally, the software rollout process needs improvement as it requires knowledge of Linux command lines.
Cloud Access Security Brokers offer security solutions for cloud environments by providing visibility and control over data and applications. They address security threats, compliance requirements, and data management concerns, making them a critical component in the cloud security landscape.CASBs play a key role in enhancing security for cloud service adoption. They bridge the gap between enterprise IT infrastructure and cloud services, granting actionable insights and enforcing security...
The rollout process could be much easier, and the configuration of identity providers like Azure is more complicated than with other zero trust network providers. This can be a pain point. Additionally, the software rollout process needs improvement as it requires knowledge of Linux command lines.
One area for improvement is setting posture profiles for vendor machines. It's not yet enabled by Zscaler, however, it is in the pipeline.
There are some bugs in the solution, which they are clearly working on, and they are still not resolving them. So it's taking some time.