• HOME
  • CATEGORIES

    • CATEGORIES

    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

    • No categories available

      Browse All Categories

      Select a category to view markets

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
zscaler
4.6
1339 Reviews (All time)
Review weighting


Browse Zscaler Reviews

Zscaler is present in 9 markets with 12 products. Zscaler has 1339 reviews with an overall average rating of 4.6.

AI Security Testing

AI security testing (AI‑ST) uncovers vulnerabilities and exposures in AI‑enabled systems and applications by applying specialized assessments tailored to the unique risks of machine learning and generative AI. It includes offensive techniques such as automated generation and execution of adversarial prompts, as well as AI component scanning across model repositories, libraries, frameworks, and notebooks. AI‑ST also evaluates model behavior under manipulation, edge cases, and failure modes to identify issues like data leakage, bias, or unsafe outputs. By proactively detecting weaknesses before deployment, AI‑ST helps organizations strengthen resilience, reduce security incidents, and maintain trust in AI‑driven products. Typical users include security teams, AI/ML engineers, red‑teamers, DevSecOps practitioners, and risk or compliance groups responsible for safeguarding AI applications.

Zscaler has 1 product in AI Security Testing market
  • Zscaler AI Red Teaming
    4.4
    14 Reviews

CPS Protection Platforms

Gartner defines cyber-physical systems (CPS) protection platforms as products that discover, categorize, map and protect CPS in production or mission-critical environments outside of enterprise IT. They do so by analyzing or interacting with industrial/industry-specific protocols and operational network traffic. They understand physical process asset behavior and do not interfere with CPS operations. They can be delivered from the cloud, on-premises or in a hybrid form. Gartner defines CPS as engineered systems that orchestrate sensing, computation, control, networking and analytics to interact with the physical world (including humans). When secure, they enable safe, real-time, reliable, resilient and adaptable performance.

Zscaler has 1 product in CPS Protection Platforms market
  • Zscaler Deception
    4.3
    38 Reviews

Cloud Security Posture Management Tools

Cloud security posture management tools help in the identification and remediation of risks across cloud infrastructures, including Infrastructure as a Service (IaaS), Software as a Service (SaaS), and Platform as a Service (PaaS). These tools continuously assess the security posture across multi-cloud environments by maintaining a current inventory of the cloud assets for proactive analysis and risk assessment to detect any misconfigurations. Once these misconfigurations are identified, security controls are developed and implemented. CSPM solutions also integrate with DevOps tools, streamlining the incident response process and ensuring continuous compliance with regulatory requirements and security frameworks by providing visibility of the cloud environment’s security posture.

Zscaler has 1 product in Cloud Security Posture Management Tools market
  • Zscaler Posture Control
    4.4
    13 Reviews

Data Loss Prevention

Gartner defines data loss prevention (DLP) as a technical control designed to prevent data loss in order to comply with personal data regulations, prevent unintended disclosure, minimize insider risk and ensure that sensitive data is not overly accessible. DLP controls are typically applied to reduce the data risk for two states of unstructured data: data at rest and data in motion. Depending on the state of the data, DLP applies detective, preventive or corrective controls, including alerting, quarantining, blocking, redaction or access restriction.

Zscaler has 1 product in Data Loss Prevention market
  • Zscaler Unified Data Protection Platform
    4.4
    28 Reviews

Digital Experience Monitoring

Gartner defines digital experience monitoring (DEM) as the measurement of the availability, performance and quality of the user experience of applications. This can include internal users (employees), external users (customers and partners) or a digital agent connecting to an API. In addition to performance, DEM enables observability of user behavior and journeys based on their interaction with applications. DEM tools allow I&O leaders to understand the availability, performance and reliability of business applications, networks and infrastructure by focusing on understanding the user experience. This is in contrast to other performance monitoring approaches, such as observability platforms, that understand the inner workings of applications.

Zscaler has 1 product in Digital Experience Monitoring market
  • Zscaler Platform
    4.5
    72 Reviews

Exposure Assessment Platforms

Exposure assessment platforms (EAPs) continuously identify and prioritize exposures, such as vulnerabilities and misconfigurations, across a broad range of asset classes. They natively deliver or integrate with discovery capabilities, such as assessment tools, that enumerate exposures, like vulnerabilities and configuration issues, to increase visibility. EAPs use techniques like threat intelligence (TI) to analyze an organization’s attack surfaces and weaknesses, and prioritize treatment efforts for high-risk exposures by incorporating threat landscape, business and existing security control context. Through prioritized visualizations and treatment recommendations, EAPs help provide direction for mobilization, identifying the various teams involved in mitigation and remediation. EAPs are primarily delivered as self-hosted software or as a cloud service, and may use agents for exposure information collection.

Zscaler has 1 product in Exposure Assessment Platforms market
  • Zscaler Unified Vulnerability Management
    5.0
    4 Reviews

Network Security Microsegmentation

Gartner defines network security microsegmentation — also referred to as zero-trust network segmentation — as an effort that can create more granular and dynamic access policies than traditional network segmentation (often north-south traffic segmentation). It allows the insertion of a security policy between any two workloads in the same broadcast domain — with microsegmentation technologies narrowing fine-grained network zones down to individual assets and applications. Microsegmentation tools support the implementation of finer-grained zoning across public, private and hybrid cloud infrastructures. Cybersecurity leaders must understand the key features, use cases, and role of microsegmentation in their environment, as well as determine which model is the best fit for their needs.

Zscaler has 3 products in Network Security Microsegmentation market
  • Zscaler Workload Communications
    5.0
    2 Reviews
  • Zscaler Zero Trust SASE
    4.5
    17 Reviews
  • 1 more product

SASE Platforms

Secure access service edge (SASE) platforms deliver converged network and security-as-a-service capabilities, such as software-defined WAN (SD-WAN) and secure access to the web, cloud services and private applications regardless of the user’s location, the device used or where that application is hosted. These offerings primarily use a cloud-centric architecture delivered as a platform by one vendor. SASE securely connects users and devices with applications, services and other users. It supports branch office and remote worker connectivity and on-premises general internet security, private application access and public cloud service provider access use cases.

Zscaler has 1 product in SASE Platforms market
  • Zscaler Zero Trust SASE
    5.0
    12 Reviews

Security Service Edge

cca-logo

Gartner defines security service edge (SSE) as an offering that secures access to the web, cloud services and private applications regardless of the location of the user, the device they are using or where that application is hosted. SSE protects users from malicious and inappropriate content on the web and provides enhanced security and visibility for the SaaS and private applications accessed by end users. Security service edge provides a primarily cloud-delivered solution to control access from end users and devices to applications, as well as websites and the internet. It provides a range of security capabilities, including adaptive access based on identity and context, malware protection, data security and threat prevention, as well as the associated analytics and visibility. It enables more direct connectivity for hybrid users by reducing latency and providing the potential for improved user experience. Capabilities that are integrated across multiple traffic types and destinations allow a more seamless experience for both users and administrators while maintaining a consistent security stance.

Zscaler has 2 products in Security Service Edge market
  • Zscaler Zero Trust Exchange
    4.7
    1112 Reviews
  • Zscaler for Users
    4.6
    23 Reviews
Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.
This site is protected by hCaptcha and its Privacy Policy and Terms of Service apply.
  • Community Guidelines
  • Listing Guidelines
  • Browse Vendors
  • Rules of Engagement
  • FAQ
  • Privacy
  • Terms of Service
©
 
©