Overview
Product Information on Zscaler Zero Trust SASE
What is Zscaler Zero Trust SASE?
Zscaler Zero Trust SASE Pricing
Overall experience with Zscaler Zero Trust SASE
“High User Dependence and Seamless Onboarding Balanced By Data Center Limitations”
About Company
Company Description
Zscaler is a globally recognized company that specializes in securing network and application transformations for mobile and cloud based platforms of major organizations. The primary services it offers are Zscaler Internet Access and Zscaler Private Access. These services are developed to create rapid, robust links between users and applications, independent of the device, location, or network. Fully delivered through cloud, Zscaler services aim to provide simplicity, enhanced cybersecurity, and better user experience which can be a challenge for traditional appliances or hybrid solutions. Functioning in over 185 countries, Zscaler operates a vast cloud security platform to protect numerous enterprises and governmental agencies from cyber threats and potential data loss.
Company Details
Do You Manage Peer Insights at Zscaler?
Access Vendor Portal to update and manage your profile.
Key Insights
A Snapshot of What Matters - Based on Validated User Reviews
User Sentiment About Zscaler Zero Trust SASE
Reviewer Insights for: Zscaler Zero Trust SASE
Performance of Zscaler Zero Trust SASE Across Market Features
Zscaler Zero Trust SASE Likes & Dislikes
Ease of deployment, excellent onboarding and after sale support.
The Zero Trust Security model gives assurance that no device or user is automatically trusted. since each access request is validated. Secure remote access without VPN. This solution is perfect for hybrid and remote work setups because, in contrast to traditional VPNs. Real-time threat protection. This solution continuously scans all traffic going over the internet for ransomware, malware and phishing scams.
I like the fact that its cloud based, and we do not need in premise infrastrucuture to be able to use url inspection, internal application isolation, microsegmentation in the level of the application. The idea of getting permission only if needed, by a specific group, its also very useful. Cause it enforces security by default, thus harder to avoid it.
There are fewer Data Centers (DCs) across the world compared to other competitors, which can sometimes lead to connectivity issues. Expanding the network of DCs would give users more options and could help reduce the connectivity problems that occasionally occur.
facing difficulty in initial configuration. Occasional performance issues limited visibility during troubleshooting
The price increased quickly thus making it hard for us to handle the prices. Also, there are not many attributes in the Zscaler client connector that can be used to make posture analysis on the endpoints.
Top Zscaler Zero Trust SASE Alternatives
Peer Discussions
Zscaler Zero Trust SASE Reviews and Ratings
- IT SECURITY & RISK MANAGEMENT ASSOCIATE50M-1B USDTelecommunicationReview Source
High User Dependence and Seamless Onboarding Balanced By Data Center Limitations
Zscaler caught our attention during the Covid days and has turned out to be an excellent partner ever since. We initially implemented it as a web proxy and later adopted their Zero Trust module as well and it has been working smoothly for us and currently over 95 percent of users depend on it. - DEPUTY MANAGER1B-10B USDBankingReview Source
Modern Zero Trust protection with a steep learning curve
I've had a good experience with Solution by restricting access to company resources to trusted users and devices. This helps secure our network. It doesn’t require a conventional VPN to function from any location, including outside of the office. We can rest easy knowing that it continuously monitors and safeguards our internet traffic. All things considered, it's a contemporary, safe, and simple method of controlling access and safeguarding our data. - ENGINEERING MANAGER50M-1B USDBankingReview Source
Cloud-Based Security Stack Simplifies Compliance and Access Permissions Enforcement
It's a great new security technology stack which is allowing us to become compliant with many security policies. - Information Security Manager50M-1B USDConstructionReview Source
Initial Setup Challenges Overcome by Reliable Performance and Scalability Metrics
Overall experience has been strong, the rollout was challenging, but now that it is integrated it runs flawlessly. Performance has also been reliable! - IT Security & Risk Management Associate50M-1B USDIT ServicesReview Source
Strong Zero Trust Solution That Simplifies Secure Cloud Access
Has significantly improved our security posture and simplified network access across the organization. The deployment was smooth and the product has consistently delivered reliable performance.



