No more typing reviews! Try our Samantha, our new voice AI agent.

Cloud Security Connector for Zscaler vs Clumio comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jan 25, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cloud Security Connector fo...
Average Rating
8.4
Reviews Sentiment
8.2
Number of Reviews
5
Ranking in other categories
Internet Security (11th)
Clumio
Average Rating
9.6
Reviews Sentiment
5.4
Number of Reviews
4
Ranking in other categories
Backup and Recovery (28th), Cloud Backup (21st), SaaS Backup (9th), AI IT Support (8th)
 

Mindshare comparison

Cloud Security Connector for Zscaler and Clumio aren’t in the same category and serve different purposes. Cloud Security Connector for Zscaler is designed for Internet Security and holds a mindshare of 0.6%.
Clumio, on the other hand, focuses on Backup and Recovery, holds 1.0% mindshare, up 0.1% since last year.
Internet Security Mindshare Distribution
ProductMindshare (%)
Cloud Security Connector for Zscaler0.6%
Cisco Umbrella30.0%
Zscaler Internet Access28.8%
Other40.599999999999994%
Internet Security
Backup and Recovery Mindshare Distribution
ProductMindshare (%)
Clumio1.0%
Veeam Data Platform6.6%
Commvault Cloud3.9%
Other88.5%
Backup and Recovery
 

Featured Reviews

Vibin Thomas - PeerSpot reviewer
Team Lead, Technical Content Security at Valuepoint Systems
Unified cloud policies have improved zero-trust controls and simplified workload monitoring
A challenge faced during the initial implementation involved routing and application dependency. After routing cloud workload traffic through Cloud Security Connector for Zscaler, a few applications started failing because they depended on specific external services that were getting blocked due to strict policies or SSL inspection. To resolve this, traffic was analyzed using Zscaler logs, the exact domains and services being impacted were identified, and a controlled policy exception was created while maintaining overall security. This helped strike the right balance between security and application availability, which is very important in production environments. A key learning from this was that while Cloud Security Connector for Zscaler provides strong security control, proper policy tuning and understanding application behavior is critical for smooth deployment. Cloud Security Connector for Zscaler has had a very positive impact, especially in terms of security and operational efficiency. Before implementation, cloud workloads had direct internet access through the NAT gateway, which limited visibility and control over outbound traffic. After adopting Cloud Security Connector for Zscaler, all traffic was routed through Zscaler, giving centralized visibility and full policy enforcement. One improvement observed was a significant increase in threat detection. The ability to identify and block suspicious outbound connections that were previously not visible improved the overall security posture. From an operational perspective, troubleshooting became much faster. Instead of checking multiple cloud logs, Zscaler logs could be directly used to analyze traffic behavior, which reduced incident resolution time. The dependency on traditional firewall appliances in cloud environments was reduced, which simplified the architecture and lowered operational overhead. Additionally, for compliance-driven clients in banking, it helped meet audit requirements by providing detailed logs and consistent policy enforcement across both users and workloads. Measurable improvements were observed after implementing Cloud Security Connector for Zscaler. In terms of visibility and threat detection, a 25 to 35 percent increase in identifying suspicious outbound connections was seen that were previously not visible when traffic was going through NAT. From an operational standpoint, troubleshooting time reduced by 45 to 55 percent because Zscaler logs could be directly analyzed instead of checking multiple cloud logs. Dependence on additional security appliances in the cloud was also reduced, which helped lower operational overhead and simplified the architecture. In terms of compliance, better audit readiness was achieved with centralized logging and consistent policy enforcement across workloads and users. While Cloud Security Connector for Zscaler is a strong solution, one area that could be improved, especially for teams that are new, is configuring route tables, ensuring proper traffic flow, and avoiding asymmetric routing, which can be challenging, particularly in large or multi-VPC environments. More automated deployment options or guided configurations, especially for AWS or Azure, would simplify the onboarding process. Another area for improvement is better visibility at the cloud-native level, such as tighter integration with cloud logs or more context-aware insight for workload behavior, which would make troubleshooting even faster. Once properly implemented, it works efficiently and provides strong security and visibility. In addition to deployment simplicity, improvements around policy tuning and documentation would add significant value. From a policy perspective, when Zscaler policy is extended to cloud workloads, it sometimes requires careful fine-tuning to avoid impacting application dependency. More predefined templates or workload-specific policy recommendations would help teams implement it faster with fewer disruptions. In terms of documentation, while the existing guides are helpful, more step-by-step real-world deployment examples, especially for multi-VPC or hybrid environments, would make onboarding smoother for teams. Tighter integration guidance with cloud-native tools such as AWS logging or monitoring services would further improve troubleshooting and visibility. From a support standpoint, faster access to best practice recommendations or reference architecture would help teams avoid common misconfigurations during the initial setup.
reviewer2735244 - PeerSpot reviewer
IT Manager - Infrastructure & Security at a manufacturing company with 201-500 employees
Ensures efficient backup and recovery processes
The Protect and Restore features are very helpful. I can set up tags to include specific assets in our environment for backup. When I include those tags in my search, the assets are easily found and can be added for backup. I love the restore feature and how easily I can restore files, folders, or an entire image.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It is very useful ............visibility on the end-user,"
"Cloud Security Connector for Zscaler has positively impacted my organization significantly, as we have consistent, enforced policies on all cloud traffic, reduced risk of data leakage, easier audits, and from an operational standpoint we have saved time not having to manage individual workload agents, which is a win both in security and efficiency."
"The solution is secure."
"Cloud Security Connector for Zscaler has positively impacted our organization by helping us in our cloud environment to connect our resources to Zscaler, ensuring that security policies are consistent with zero-trust access and increasing reliability by 28%."
"Cloud Security Connector for Zscaler has had a very positive impact, especially in terms of security and operational efficiency."
"We now have the peace of mind knowing that our entire AWS infrastructure is fully backed up into an air-gapped environment."
"It has improved our disaster recovery footprint; previously, backups were only stored on premises, and having an offsite backup improves our reliability and security."
"Working with the Clumio/Commvault team has been a very good experience."
"Clumio has a straightforward setup"
"We now have the peace of mind knowing that our entire AWS infrastructure is fully backed up into an air-gapped environment."
 

Cons

"The connectivity could be faster."
"While Cloud Security Connector for Zscaler is a strong solution, one area that could be improved, especially for teams that are new, is configuring route tables, ensuring proper traffic flow, and avoiding asymmetric routing, which can be challenging, particularly in large or multi-VPC environments."
"If there are any issues at the network level, such as users working from home, then it is very hard to catch up with them and resolve issues on the end-user machine."
"I did not rate it higher simply because there is room for even more seamless cloud-native integration and a few user experience refinements."
"They need to improve their SQL backup services"
report
Use our free recommendation engine to learn which Internet Security solutions are best for your needs.
885,667 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Construction Company
22%
Manufacturing Company
13%
Insurance Company
12%
Financial Services Firm
9%
Construction Company
9%
University
9%
Manufacturing Company
8%
Comms Service Provider
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
No data available
 

Questions from the Community

What is your experience regarding pricing and costs for Cloud Security Connector for Zscaler?
The experience with pricing, setup cost, and licensing for Cloud Security Connector for Zscaler is definitely competitive. They provide us a good cost, and since we obtained it through AWS Marketpl...
What needs improvement with Cloud Security Connector for Zscaler?
I feel that they are doing great with Cloud Security Connector for Zscaler. If I need to suggest an improvement, it would be to simplify the steep learning curve, as it can be complex for newcomers...
What is your primary use case for Cloud Security Connector for Zscaler?
In our current organization, we have been using Cloud Security Connector for Zscaler by Maiden Edge, Maidenhead Bridge for almost two and a half years. They are providing us specialized virtual app...
What is your experience regarding pricing and costs for Clumio?
The credit system can be confusing, but if you talk to your account manager, they can help alleviate those concerns.
What needs improvement with Clumio?
I would like to see a Dry Run feature for a full disaster recovery implemented.
What advice do you have for others considering Clumio?
I recommend starting with a trial and ensuring that the CloudFormation stack properly deploys in your environment. Set up email alerting to make sure you receive notifications about backup successe...
 

Overview

 

Sample Customers

Information Not Available
Cava Restaurants, Pacific Dental Services, Defiance Digital, Frogslayer, Motion Picture Associations, Point Loma, Club Assist, Immigrant Services Calgary (ISC), Lakeside Process Controls, Maple Reindeers
Find out what your peers are saying about Cisco, Zscaler, iboss and others in Internet Security. Updated: February 2026.
885,667 professionals have used our research since 2012.