We performed a comparison between Cisco Umbrella and Zscaler Zero Trust Exchange based on real PeerSpot user reviews.
Find out what your peers are saying about Palo Alto Networks, Cisco, Zscaler and others in Secure Access Service Edge (SASE)."The most valuable features are the antivirus as a whole, the anti-malware, and all of the protection features that scan our enterprise devices."
"The solution is stable."
"On the outside, the main differentiation is because Lookout ingest. They have ingested basically all of the apps for the last ten years and all the versions of all the apps, and we have that in a corporate database that allows us to do very large-scale machine learning and analysis on that data set. That's not something that any of the competitors really have the capability to do because they don't have access to the data set. A lot of the apps you can no longer get them because that version of the app is five or six years old, and it just doesn't exist anywhere anymore, except within our infrastructure. So, the ability to have that very rich dataset and learn from that dataset is a real differentiator."
"The protection offered by the product is the most valuable feature. It detects vulnerabilities or traps on our users' phones and then prompts them to clean up their devices. Tools we used previously would only discover, which required us to gather information on the backend, so Lookout is a welcome upgrade."
"I like that it integrates with the infrastructure. I also like the kind of data and intelligence that's built-in. It helps create innovative reports for security."
"We use Cisco Umbrella for DNS filtering and as a secure gateway."
"It blocks malicious DNS queries daily which is very beneficial."
"The most valuable feature is that it secures our network against blacklisted or malicious websites."
"The initial setup is very easy and takes only a few minutes."
"It provides centralized, device-agnostic management of the Internet experience."
"When we have laptops that leave the building, they could connect to public WiFi before they establish a VPN connection back into the company. For that duration or that period of time when they're not docked in the network or on a VPN, they effectively don't have that full layer of security that I provide inside the building. This tool stands in during that period of time, and we extend the security settings through their basic firewall or their cloud-based firewall at that time. So, we do content filtering and control access, but they also are looking at new domains, IP addresses, and bad requests. They're blocking them on my behalf when a laptop is not sitting behind our security appliances."
"I have found the malware protection feature valuable. It is helpful and deliverable and is able to protect my entire organization from getting compromised. It also prevents us from visiting any malicious sites which are not visible to the users."
"It is easy to use."
"It is a stable solution."
"The most valuable feature is its ability to establish connectivity for remote users and remote endpoints. It offers a high level of granularity compared to typical VPNs, which also encapsulate a lot of I/O."
"The scalability of the solution is great."
"The product's most valuable features are cloud-based services and secure internet access. We don't have to set up any physical appliances."
"The most valuable features of this solution are the CASB solutions, which is protecting their Office 365."
"The scalability is pretty good."
"The most valuable feature is the manageability of the micro tunnels."
"We just submitted an enhancement request reflecting the main area we want to see improvement in; the APIs. Currently, we're able to build dashboards, but it's somewhat backward because we use our MDM API to create them. Lookout should provide API to customers so we can query our data and use it in our cloud, and this is the only outstanding area for improvement with the product right now."
"Lookout was moving into the SSE space. And so their work on SecureWeb Gateway and SD-WAN is still sort of evolving."
"The stability depends on the service from where you access it. Because sometimes, the place you are in, you have Gateway. You don't have Gateway. The gateway is overutilized. At the end, you need to go through their gateways. And this is the key point here. You have a tracking point. If it's not well orchestrated, and it scales up as you add more to the existing team, you will suffer"
"From the analysis that we've done, they do seem to be maybe a step behind in trying to enter the market with a new solution. But when they do pick up, they do come out with some good products."
"Their support should be improved. It is necessary that the support is efficient. It is not really easy to get a resolution for an issue from Cisco support. They should be faster and more efficient."
"I feel that the application needs other characteristics that are available with other applications in the market."
"There are cheaper solutions in the market"
"Network connectivity was a bit of a challenge at the beginning, but we were able to get the right help from Cisco."
"They need to improve analytics so they report on more of the specifics of user activity."
"We would like to see the enhancements made to the EDR, as we see features that are running endpoint management."
"It would be useful if they had a malware protection engine running inside their own VM."
"It could be more secure. It would be better if they provided a transferring proxy as an add-on and more integration."
"There are latency issues with the solution. They are small, however, they are there when you compare it to other vendors."
"What could be improved in Zscaler Private Access is its notification. For example, if there's a speed issue, there should be a pop-up that alerts the user about it. If there is a network quality issue, for example, it isn't good enough to connect to, or the network quality is bad, there should be a notification from the solution. Zscaler Private Access also needs improvement in terms of its interface and security."
"While Zscaler supports client-initiated connections, it does not support server-initiated connections. This is a feature that Zscaler may consider adding in the future."
"We would like to extend the SASE applications for Zscaler."
"We faced certain migration and implementation challenges in executing the tasks, so I would suggest improvement related to the stability of the solution."
"There is improvement in enhancing proper manageability, policies, and logs. So, log management could be improved."
"Zscaler Private Access could improve by improving external access. If external parties want to access locally to my company's services, we need to onboard them into our domain, otherwise, it doesn't work. Additionally, if their company also has Zscaler Private Access, then it doesn't work. They need to log in with our domain ID, not their company ID."
"The menu for the ZIA portal could be organized a little bit differently. The most-used modules should be at the top of the menus, not somewhere near the bottom, some of them are not organized well in my opinion."
Cisco Umbrella is ranked 2nd in Secure Access Service Edge (SASE) with 108 reviews while Zscaler Zero Trust Exchange is ranked 3rd in Secure Access Service Edge (SASE) with 34 reviews. Cisco Umbrella is rated 8.8, while Zscaler Zero Trust Exchange is rated 8.4. The top reviewer of Cisco Umbrella writes "Protects endpoints wherever they are, always pushing people to the right locations to avoid malicious intent". On the other hand, the top reviewer of Zscaler Zero Trust Exchange writes "Allows for strict access control, granting access to specific applications at a URL level rather than at the physical IP level". Cisco Umbrella is most compared with Zscaler Internet Access, Microsoft Defender for Cloud Apps, Prisma Access by Palo Alto Networks, Palo Alto Networks DNS Security and Infoblox BloxOne Threat Defense, whereas Zscaler Zero Trust Exchange is most compared with Prisma Access by Palo Alto Networks, Cato SASE Cloud Platform, Axis Security, Cisco AnyConnect Secure Mobility Client and Cisco Duo.
See our list of best Secure Access Service Edge (SASE) vendors.
We monitor all Secure Access Service Edge (SASE) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.