Overview
Product Information on Zscaler Zero Trust SASE
What is Zscaler Zero Trust SASE?
Zscaler Zero Trust SASE Pricing
Overall experience with Zscaler Zero Trust SASE
“Zero Trust Reduces Attack Surface Yet Presents Difficulties for Initial Policy Governance”
About Company
Company Description
Zscaler is a globally recognized company that specializes in securing network and application transformations for mobile and cloud based platforms of major organizations. The primary services it offers are Zscaler Internet Access and Zscaler Private Access. These services are developed to create rapid, robust links between users and applications, independent of the device, location, or network. Fully delivered through cloud, Zscaler services aim to provide simplicity, enhanced cybersecurity, and better user experience which can be a challenge for traditional appliances or hybrid solutions. Functioning in over 185 countries, Zscaler operates a vast cloud security platform to protect numerous enterprises and governmental agencies from cyber threats and potential data loss.
Company Details
Do You Manage Peer Insights at Zscaler?
Access Vendor Portal to update and manage your profile.
Key Insights
A Snapshot of What Matters - Based on Validated User Reviews
User Sentiment About Zscaler Zero Trust SASE
Reviewer Insights for: Zscaler Zero Trust SASE
Performance of Zscaler Zero Trust SASE Across Market Features
Zscaler Zero Trust SASE Likes & Dislikes
Zscaler's Zero Trust model ensures that users are never placed directly on the corporate network. Instead, access is granted only to specific applications based on identity, device posture, and policy, dramatically reducing attack surface, lateral movement risk, and exposure of internal resources.
Ease of deployment, excellent onboarding and after sale support.
The Zero Trust Security model gives assurance that no device or user is automatically trusted. since each access request is validated. Secure remote access without VPN. This solution is perfect for hybrid and remote work setups because, in contrast to traditional VPNs. Real-time threat protection. This solution continuously scans all traffic going over the internet for ransomware, malware and phishing scams.
what I dislike about Zscaler is the initial complexity in policy design and troubleshooting, without strong Zero Trust understanding and governance, diagnosing access issues can be challenging and time-consuming.
There are fewer Data Centers (DCs) across the world compared to other competitors, which can sometimes lead to connectivity issues. Expanding the network of DCs would give users more options and could help reduce the connectivity problems that occasionally occur.
facing difficulty in initial configuration. Occasional performance issues limited visibility during troubleshooting
Top Zscaler Zero Trust SASE Alternatives
Peer Discussions
Zscaler Zero Trust SASE Reviews and Ratings
- It Security & Risk Management Associate50M-1B USDTransportationReview Source
Zero Trust Reduces Attack Surface Yet Presents Difficulties for Initial Policy Governance
Zscaler Zero Trust SASE provides a scalable, cloud-native security platform that effectively replaces traditional perimeter controls with identity-driven access, delivering strong security and excellent support for modern work environments. - IT SECURITY & RISK MANAGEMENT ASSOCIATE50M-1B USDTelecommunicationReview Source
High User Dependence and Seamless Onboarding Balanced By Data Center Limitations
Zscaler caught our attention during the Covid days and has turned out to be an excellent partner ever since. We initially implemented it as a web proxy and later adopted their Zero Trust module as well and it has been working smoothly for us and currently over 95 percent of users depend on it. - DEPUTY MANAGER1B-10B USDBankingReview Source
Modern Zero Trust protection with a steep learning curve
I've had a good experience with Solution by restricting access to company resources to trusted users and devices. This helps secure our network. It doesn’t require a conventional VPN to function from any location, including outside of the office. We can rest easy knowing that it continuously monitors and safeguards our internet traffic. All things considered, it's a contemporary, safe, and simple method of controlling access and safeguarding our data. - ENGINEERING MANAGER50M-1B USDBankingReview Source
Cloud-Based Security Stack Simplifies Compliance and Access Permissions Enforcement
It's a great new security technology stack which is allowing us to become compliant with many security policies. - Information Security Manager50M-1B USDConstructionReview Source
Initial Setup Challenges Overcome by Reliable Performance and Scalability Metrics
Overall experience has been strong, the rollout was challenging, but now that it is integrated it runs flawlessly. Performance has also been reliable!



