Axis Security vs Zscaler CASB comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

Lookout
Sponsored
Ranking in Cloud Access Security Brokers (CASB)
12th
Average Rating
7.2
Number of Reviews
5
Ranking in other categories
Secure Web Gateways (SWG) (24th), Mobile Data Protection (7th), Threat Intelligence Platforms (18th), Endpoint Detection and Response (EDR) (43rd), Mobile Threat Defense (2nd), ZTNA as a Service (13th), ZTNA (10th), Secure Access Service Edge (SASE) (18th)
Axis Security
Ranking in Cloud Access Security Brokers (CASB)
8th
Average Rating
9.6
Number of Reviews
5
Ranking in other categories
Secure Web Gateways (SWG) (19th), ZTNA as a Service (12th), Secure Access Service Edge (SASE) (14th)
Zscaler CASB
Ranking in Cloud Access Security Brokers (CASB)
9th
Average Rating
7.6
Number of Reviews
6
Ranking in other categories
Application Control (6th)
 

Mindshare comparison

As of June 2024, in the Cloud Access Security Brokers (CASB) category, the mindshare of Lookout is 0.8%, down from 1.3% compared to the previous year. The mindshare of Axis Security is 2.1%, up from 1.1% compared to the previous year. The mindshare of Zscaler CASB is 1.6%, up from 1.5% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Cloud Access Security Brokers (CASB)
Unique Categories:
Secure Web Gateways (SWG)
0.4%
Mobile Data Protection
7.1%
ZTNA as a Service
5.1%
 

Featured Reviews

AP
May 23, 2023
User-focused design makes it easy to understand, and operations running in background provide peace of mind
In any of the discussions that we've had with their technical teams, they have been very knowledgeable and helpful in certain aspects. They have a lot of partnerships, from what we can tell, and that does start to make the waters a little bit murky. They have third parties that provide functionality and there is a concern that we're going to be bounced around between five different groups to get help for a problem. If you describe it incorrectly, all of a sudden you're with a group that can't help you and they have to forward you to another group. They have been very responsive and super helpful when it comes to any of the issues we've identified. Still, that concern about being bounced around between multiple partners detracts from the overall experience.
DW
Jul 12, 2023
Helps provide specific access, along with specific approvals, and simplifies access management
The interface is fine. I would like it to be somewhat hidden, similar to Cisco AnyConnect, their secure mobility client. However, it has some cool features for troubleshooting. I can debug things and easily log out. It probably shouldn't be available to everyone. I believe it should be restricted and running behind the scenes for most users. The user interface provides a satisfactory digital experience. I can access the tool and identify the specific user, enabling me to troubleshoot any issues. Moreover, I can utilize the tool to debug their connections and pinpoint the exact cause of the problem. Therefore, I have a positive opinion of the tool. However, some of the technical aspects may be more suitable for individuals with technical expertise. It would be beneficial if the debug interface were slightly more user-friendly, allowing users to examine it independently. Additionally, having documentation on how to send relevant information to the administrators would be helpful, as I am essentially responsible for managing these systems. Establishing trust for every access request, regardless of its origin, is highly beneficial in building trust. Some improvements I would like to see include more thorough debugging of all users, allowing us to identify their precise source, the computer they are using, and possibly additional mobile information. However, as an administrator, I have yet to determine how to utilize certain tools or the ongoing development of logging and monitoring features. One of the things I've noticed is that we need to be more proactive. I would like to find a way to work together and establish a connection between some of our technology interfaces in TechGeek and our SIM. The SIM is a tool that collects data and generates automated alerts. These alerts can be created using our endpoint detection tools or integrated directly into the access tool. Specifically, I aim to improve the automation capabilities of Axis Security. Axis Security has not assisted in freeing up my time to engage in other projects; however, incorporating automation could potentially aid in achieving that objective. I would appreciate more automated learning capabilities or increased integration with other security tools, allowing us to establish automation. One aspect that I would like to enhance pertains to several of the solutions we have employed, which might be unique to our organization. We have frequently had to engage Axis Engineering in the implementation of these solutions, as they are somewhat novel and tailored specifically to our needs. Consequently, I aspire to develop the capability to implement them independently. However, this could potentially be attributed to the complexity inherent in some of our current tools.
Arnab - PeerSpot reviewer
Jun 20, 2023
Provides granular level control allows setting application policies per application for each user but some cloud instances might not be managed properly
It serves various purposes. Overall, it's pretty good. Not bad at all It has been helpful in maintaining our infrastructure. The granular level control it offers allows us to set application policies per application for each user. The most valuable feature is policy creation and creating cloud…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The protection offered by the product is the most valuable feature. It detects vulnerabilities or traps on our users' phones and then prompts them to clean up their devices. Tools we used previously would only discover, which required us to gather information on the backend, so Lookout is a welcome upgrade."
"The solution is stable."
"On the outside, the main differentiation is because Lookout ingest. They have ingested basically all of the apps for the last ten years and all the versions of all the apps, and we have that in a corporate database that allows us to do very large-scale machine learning and analysis on that data set. That's not something that any of the competitors really have the capability to do because they don't have access to the data set. A lot of the apps you can no longer get them because that version of the app is five or six years old, and it just doesn't exist anywhere anymore, except within our infrastructure. So, the ability to have that very rich dataset and learn from that dataset is a real differentiator."
"The most valuable features are the antivirus as a whole, the anti-malware, and all of the protection features that scan our enterprise devices."
"The most valuable aspect is its ability to restrict unauthorized access, ensuring that only approved devices can connect to the network. T"
"The way the access connectors work is valuable."
"I would give it an A-plus for securing access to our applications, devices, and network. It does an extremely good job. Our security folks have analyzed it and tried to find loopholes, but they found none."
"The most valuable part so far has been Axis Security's ability to create identity connections to various servers, allowing users to access them. By doing so, we've managed to replace any old or existing VPN access with Axis Security. We are slowly but surely getting rid of our traditional VPN."
"The entire suite and the entire ZTNA process are very valuable."
"The tool's scalability is good."
"Zscaler CASB's latency and architecture are excellent."
"Overall, the solution does a pretty good job at web filtering."
"The most valuable features of Zscaler CASB are API integration and DLP."
"It has been helpful in maintaining our infrastructure. The granular level control it offers allows us to set application policies per application for each user."
"Has a good zero trust feature."
 

Cons

"From the analysis that we've done, they do seem to be maybe a step behind in trying to enter the market with a new solution. But when they do pick up, they do come out with some good products."
"The stability depends on the service from where you access it. Because sometimes, the place you are in, you have Gateway. You don't have Gateway. The gateway is overutilized. At the end, you need to go through their gateways. And this is the key point here. You have a tracking point. If it's not well orchestrated, and it scales up as you add more to the existing team, you will suffer"
"Lookout was moving into the SSE space. And so their work on SecureWeb Gateway and SD-WAN is still sort of evolving."
"We just submitted an enhancement request reflecting the main area we want to see improvement in; the APIs. Currently, we're able to build dashboards, but it's somewhat backward because we use our MDM API to create them. Lookout should provide API to customers so we can query our data and use it in our cloud, and this is the only outstanding area for improvement with the product right now."
"I would like more statistics about what's going on in terms of usage. There is little-to-no usage reporting. That's one thing we've requested, and I think they're working on it."
"I would like more detailed logging in the Axis Security interface."
"They need to improve the networking and security tools a little in the troubleshooting and 'bad-actor' areas to help us analyze security threats a little better. They have some things built-in, but I would like to see more advanced tools."
"The support team should be more skilled in offering assistance."
"I would appreciate more automated learning capabilities or increased integration with other security tools, allowing us to establish automation."
"Zscaler CASB breaks down at times."
"It needs to offer SSO, single sign-on, and items of that nature."
"Zscaler CASB should include integrations with other SaaS applications."
"The solution's granularity should be improved because it has limited granular options to control, visible, allow, block, delay, and receive."
"The pre-defined dictionaries could be improved."
"User management can be improved."
 

Pricing and Cost Advice

"Lookout is definitely on the lower end when it comes to price point and that seems to be the only differentiator. The technology is in place in this space and it's really about who is coming in at the better price point now."
"The licensing costs are good. Prisma has much more options and support for security, but it has a higher cost. For example, Lookout costs 2/3rd of Prisma's licensing price."
"In terms of feature performance versus cost, they're a good value."
"The pricing is fair; it's comparable to our previous solution, and we carried out multiple POCs and POVs (proof of value). The product is worth the money we pay for it."
"The pricing is very competitive from what I've seen."
"The pricing is quite fair. It's better than what we gave up, which was Cisco AnyConnect."
"The solution has increased prices this year."
"As per industry leads, Zscaler CASB is an expensive solution."
"Zscaler CASB is an expensive solution."
report
Use our free recommendation engine to learn which Cloud Access Security Brokers (CASB) solutions are best for your needs.
787,779 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
19%
Manufacturing Company
10%
Financial Services Firm
10%
Government
6%
Computer Software Company
19%
Educational Organization
14%
Financial Services Firm
6%
Manufacturing Company
6%
Computer Software Company
15%
Financial Services Firm
10%
Insurance Company
8%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
No data available
 

Questions from the Community

What is your experience regarding pricing and costs for Lookout?
The licensing costs are good. Prisma has much more options and support for security, but it has a higher cost. For ex...
What needs improvement with Lookout?
The solution could improve identity integration as well. Zero trust, it's a good start as a zero-trust solution. More...
What do you like most about Axis Security?
The most valuable aspect is its ability to restrict unauthorized access, ensuring that only approved devices can conn...
What needs improvement with Axis Security?
The support team should be more skilled in offering assistance.
What is your primary use case for Zscaler Cloud Application Control?
I use Zscaler CASB to get the visibility of the cloud application since everything is moving to the cloud these days....
 

Also Known As

CipherCloud
No data available
No data available
 

Learn More

 

Overview

 

Sample Customers

Cardenas Markets, Armis, Alnylam Pharmaceuticals, Visionworks
Zenith Live, Azure, Carlsberg Group
Find out what your peers are saying about Axis Security vs. Zscaler CASB and other solutions. Updated: June 2024.
787,779 professionals have used our research since 2012.