TrustRadius: an HG Insights company

Zscaler Deception

Score7.6 out of 10

5 Reviews and Ratings

What is Zscaler Deception?

Zscaler Deption is a solution designed to detect sophisticated threats that bypass traditional defenses with the world's only zero trust platform with integrated deception capabilities.

Categories & Use Cases

Next level tool for risk and compliance management in an organization.

Use Cases and Deployment Scope

It effectively and efficiently detects threats in real-time by creating decoys deployed in the network alongside real assets. It also identifies privilege escalation. It has given our team the ability to think strategically about security. It is easy to create decoys that really blended in with our network. It also helps us in threat hunting.

Pros

  • Improve risk and compliance program.
  • Agent deployment is easy.
  • Improve decision making.

Cons

  • It should be more cost effective.
  • Regular reports.
  • Integration support.

Return on Investment

  • Increases customer trust in organisation security.
  • Help in compliance with government regulations.
  • Customer retention has been increased.

Alternatives Considered

BeyondTrust Network Security Scanner and powered by Retina (Legacy)

Other Software Used

MetricStream Platform, BusinessObjects GRC, Archer Integrated Risk Management Platform

Zscaler Review from Retail Perspective

Use Cases and Deployment Scope

At my company we use both ZIA(kind of like a proxy out to the public internet) and ZPA (enterprise VPN). ZPA is faster than the VPN we used to use. ZIA is good because it allows to set up policies to blacklist certain URLs. ZPA is cloud based and uses the zero-trust model so user data cannot be seen internally.

Pros

  • Zero Trust
  • Honeypots/nets etc.
  • Fast GUI

Cons

  • Cannot use internal DNS
  • Much tuning needed
  • Access typically limited to internal apps

Return on Investment

  • We haven't fully implemented Zscaler to the whole company yet due to the lack of DNS visibility.

Other Software Used

Elastic Security (Elastic SIEM + Elastic Agent) (formerly Endgame)

Zscalar Deception Technology Review

Use Cases and Deployment Scope

We are in the middle of a segregation program within our company and it requires zero trust with other domains and requires complete security protocols to be implemented. By using Zscalar Deception Technology we've been able to limit the cyber-attacks by blocking the proxy, making sure we get lesser number of false positives. The threat detection is wider.

Pros

  • Eliminates false positive alerts.
  • Wider Threat protection.
  • Easier to use and requires very less maintenance.

Return on Investment

  • Improved threat detection.
  • Lesser false positive alerts.

Other Software Used

Azure AD Security Governance, McAfee Endpoint Security