TrustRadius: an HG Insights company

Zscaler Internet Access

Score8.8 out of 10

80 Reviews and Ratings

What is Zscaler Internet Access?

Zscaler Internet Access™ (ZIA) is a secure web gateway (SWG), delivering cloud native cyberthreat protection and zero trust access to the internet and SaaS apps.

Media

an overview of Zscaler Internet Access (ZIA), a cloud native security service edge (SSE) solution that builds on a decade of secure web gateway leadership. Offered as a scalable SaaS platform through Zscaler's security cloud, it replaces legacy network security solutions, preventing advanced attacks and data loss with a comprehensive zero trust approach. ZIA is integrated into the Zscaler Zero Trust Exchange™ to provide superior defense-in-depth, secure connectivity, end user experience, and administrative visibility and control.

Top Performing Features

  • Endpoint Detection and Response (EDR)

    Continuous monitoring and response to advanced internet threats by endpoint agents.

    Category average: 9.4

  • Segmentation Leveraging

    The ability to reduce the impact of an external attack by restricting the access of specified accounts, applications, or services during an attack.

    Category average: 8.5

  • Network Topology Mapping

    The ability to map a network, in detail, to show performance metrics, device and software connections, and resource utilization.

    Category average: 8.4

Areas for Improvement

  • Network Data Encryption

    Encrypting data so that only the network users with the proper privileges may see and access the data.

    Category average: 9.6

  • Automated Threat Identification

    Leveraging multiple sources of information (such as threat intelligence databases) to automatically identify threats.

    Category average: 9.2

  • Multi-Factor Authentication

    Using multiple, independent components to gain access

    Category average: 8.2

Zscaler Internet Access Review

Use Cases and Deployment Scope

We use it for URL filtering, creating policies around risky web sites and policies around media entertainment sites so that we can limit the sites that users can visit and/or limit the actions that users can take on specific sites such as YouTube with an upload action limitation. We also use it to view and analyze user behavior to direct future policy decisions.

Pros

  • URL filtering
  • Internet access policies
  • User action limitations

Cons

  • User Interface could be a little better
  • The activate button when making changes could be better, activate seems somewhat like a misnomer especially to newer admins/engineers to the product, a more accurate word would be publish.
  • Blocked action message for the user could be more user friendly

Return on Investment

  • Has allowed us to remove other products that were suboptimal
  • Saved us money overall by stacking it with other Zscaler products
  • Created a more secure work environment for our users through intelligent internet policies that are not needlessly restrictive while still maintaining security best practices

Usability

Alternatives Considered

Citrix Endpoint Management, Citrix Gateway and AWS Firewall Manager

Other Software Used

Zscaler Private Access, Zscaler Digital Experience, Zscaler Data Protection

ZIA.

Use Cases and Deployment Scope

Replaced web filtering on the firewall and openDNS with this solution. It gave us the ability to see what users are doing both in the office and remotely.

Pros

  • No need to be in the office.
  • 1 agent.
  • SSL inspection.

Cons

  • Not a lightweight app when combined with ZPA.
  • An agent can pick a foreign data center when close to the border.

Return on Investment

  • Installation was not smooth.

Usability

ZIA in the energy sector.

Use Cases and Deployment Scope

Deployed across 1500 users to provide user internet activity visibility and impose controls as needed to enforce published policies.

Pros

  • Aggregation of deployed base internet usage.
  • The ability to create and apply URL & cloud policies to those users.
  • Reportable metrics on internet access as a whole.

Cons

  • Sectional exports & reports. For example, provide the CIO with Zero Trust "holes" because of "sacred cow" users. It'd be nice to generate reporting or even CSV exports for that data for easier communication.
  • Tenant resolution - regardless of my physical or logical location, the ZIA tenant landing always takes longer to resolve than one would think.

Return on Investment

  • We just turned off the general VPN this week, post Zscaler rollout of ZPA & ZIA, but it's still the "new" kid on the block, so "everything" is a Zscaler issue.
  • The ZIA implementation revealed to us exactly how inadequate our internal policies regarding internet access are. Instead of leveraging the tool to reduce risk factors, we find ourselves adjusting ZIA policies to accommodate user complaints rather than adhering to company policy enforcement.

Usability

Alternatives Considered

Netskope CASB

Other Software Used

Smokescreen IllusionBlack, from Zscaler, Zscaler Digital Experience, Zscaler Private Access

[...] overview

Use Cases and Deployment Scope

we are using Zscaler Internet Access to help secure our users internet data exposure and enforce compliance to company policy. WE have had issues with staff accessing un secure sites under the pretence of trying to do work however this was not the case.

Pros

  • easier deployment
  • the reporting is great
  • the ease of use for back end users helps manege things better

Cons

  • the training material is not great
  • having a high level overview of all platforms under one screen would help

Return on Investment

  • compliance protection
  • current negative due to complexity in deployment alongside Palo

Usability

Alternatives Considered

Palo Alto Networks Advanced Threat Prevention

Other Software Used

Palo Alto Networks Advanced Threat Prevention, Okta, Cisco 1000 Series Aggregation Services Routers (ASR 1000)

Zscaler Risk Advisory Consultant Review

Use Cases and Deployment Scope

It has removed the burden of the internal infrastructure and improved latency. We have noticed that the user satisfaction and user experience has improved as well. What we have enjoyed most has been that we can remove the dependency of some segmentation efforts and reduce the endpoint burden of configuration sets.

Pros

  • Efficiency
  • Reliability
  • Simplifying.
  • Security

Cons

  • Localizing the network
  • More protocol support
  • Less impact to OT devices like PLCs

Return on Investment

  • Reduces our threat landscape
  • Reduces the footprint of technology devices
  • future proofs the segmentation and network hardware

Usability

Other Software Used

Microsoft 365