TrustRadius: an HG Insights company

Zscaler Private Access

Score7.9 out of 10

22 Reviews and Ratings

Features

Top Performing Features

  • Network Analytics

    Analyzes various data reports and logs (DNS, firewall, user data, security information etc.) to identify threats in a network.

    Category average: 8.7

  • Automated Alerts and Reporting

    Systems in place to automatically alert, report, or notify of issues that may need timely remediation.

    Category average: 8.8

  • Continuous Verification

    The ability to continuously validate users and services inside and outside a network before granting or keeping access to applications or data.

    Category average: 9.2

  • Secure Web Gateways

    Provides user protection from malicious web-based attacks while implementing company-approved use policies.

    Category average: 9.6

Threat Intelligence

Features for categories that leverage threat intelligence in network security

  • Network Analytics

    Analyzes various data reports and logs (DNS, firewall, user data, security information etc.) to identify threats in a network.

    Category average: 8.7

  • Automated Alerts and Reporting

    Systems in place to automatically alert, report, or notify of issues that may need timely remediation.

    Category average: 8.8

Zero Trust Security

Network and application access that abides by zero trust policies, where users are given access only to what they need and on an individual case basis.

  • Continuous Verification

    The ability to continuously validate users and services inside and outside a network before granting or keeping access to applications or data.

    Category average: 9.2

  • Secure Web Gateways

    Provides user protection from malicious web-based attacks while implementing company-approved use policies.

    Category average: 9.6

  • Network Flow Control

    Controls the flow of network traffic between assets using privilege restrictions to hide assets from unauthorized users.

    Category average: 9.6

  • Network Data Encryption

    Encrypting data so that only the network users with the proper privileges may see and access the data.

    Category average: 9.6

  • Network Topology Mapping

    The ability to map a network, in detail, to show performance metrics, device and software connections, and resource utilization.

    Category average: 8.4