No more typing reviews! Try our Samantha, our new voice AI agent.

Cloud Security Connector for Zscaler vs Perception Point Advanced Email Security comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cloud Security Connector fo...
Ranking in Internet Security
11th
Average Rating
8.6
Reviews Sentiment
8.2
Number of Reviews
4
Ranking in other categories
No ranking in other categories
Perception Point Advanced E...
Ranking in Internet Security
10th
Average Rating
9.0
Reviews Sentiment
7.1
Number of Reviews
26
Ranking in other categories
Email Security (16th)
 

Mindshare comparison

As of March 2026, in the Internet Security category, the mindshare of Cloud Security Connector for Zscaler is 0.6%. The mindshare of Perception Point Advanced Email Security is 1.3%, up from 0.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Internet Security Mindshare Distribution
ProductMindshare (%)
Perception Point Advanced Email Security1.3%
Cloud Security Connector for Zscaler0.6%
Other98.1%
Internet Security
 

Featured Reviews

Vibin Thomas - PeerSpot reviewer
Team Lead, Technical Content Security at Valuepoint Systems
Unified cloud policies have improved zero-trust controls and simplified workload monitoring
A challenge faced during the initial implementation involved routing and application dependency. After routing cloud workload traffic through Cloud Security Connector for Zscaler, a few applications started failing because they depended on specific external services that were getting blocked due to strict policies or SSL inspection. To resolve this, traffic was analyzed using Zscaler logs, the exact domains and services being impacted were identified, and a controlled policy exception was created while maintaining overall security. This helped strike the right balance between security and application availability, which is very important in production environments. A key learning from this was that while Cloud Security Connector for Zscaler provides strong security control, proper policy tuning and understanding application behavior is critical for smooth deployment. Cloud Security Connector for Zscaler has had a very positive impact, especially in terms of security and operational efficiency. Before implementation, cloud workloads had direct internet access through the NAT gateway, which limited visibility and control over outbound traffic. After adopting Cloud Security Connector for Zscaler, all traffic was routed through Zscaler, giving centralized visibility and full policy enforcement. One improvement observed was a significant increase in threat detection. The ability to identify and block suspicious outbound connections that were previously not visible improved the overall security posture. From an operational perspective, troubleshooting became much faster. Instead of checking multiple cloud logs, Zscaler logs could be directly used to analyze traffic behavior, which reduced incident resolution time. The dependency on traditional firewall appliances in cloud environments was reduced, which simplified the architecture and lowered operational overhead. Additionally, for compliance-driven clients in banking, it helped meet audit requirements by providing detailed logs and consistent policy enforcement across both users and workloads. Measurable improvements were observed after implementing Cloud Security Connector for Zscaler. In terms of visibility and threat detection, a 25 to 35 percent increase in identifying suspicious outbound connections was seen that were previously not visible when traffic was going through NAT. From an operational standpoint, troubleshooting time reduced by 45 to 55 percent because Zscaler logs could be directly analyzed instead of checking multiple cloud logs. Dependence on additional security appliances in the cloud was also reduced, which helped lower operational overhead and simplified the architecture. In terms of compliance, better audit readiness was achieved with centralized logging and consistent policy enforcement across workloads and users. While Cloud Security Connector for Zscaler is a strong solution, one area that could be improved, especially for teams that are new, is configuring route tables, ensuring proper traffic flow, and avoiding asymmetric routing, which can be challenging, particularly in large or multi-VPC environments. More automated deployment options or guided configurations, especially for AWS or Azure, would simplify the onboarding process. Another area for improvement is better visibility at the cloud-native level, such as tighter integration with cloud logs or more context-aware insight for workload behavior, which would make troubleshooting even faster. Once properly implemented, it works efficiently and provides strong security and visibility. In addition to deployment simplicity, improvements around policy tuning and documentation would add significant value. From a policy perspective, when Zscaler policy is extended to cloud workloads, it sometimes requires careful fine-tuning to avoid impacting application dependency. More predefined templates or workload-specific policy recommendations would help teams implement it faster with fewer disruptions. In terms of documentation, while the existing guides are helpful, more step-by-step real-world deployment examples, especially for multi-VPC or hybrid environments, would make onboarding smoother for teams. Tighter integration guidance with cloud-native tools such as AWS logging or monitoring services would further improve troubleshooting and visibility. From a support standpoint, faster access to best practice recommendations or reference architecture would help teams avoid common misconfigurations during the initial setup.
GK
Senior Information Security Analyst at Lumora Security
Advanced email security has reduced phishing risk and has improved multi-layered threat detection
I would like to improve reporting in Perception Point Advanced Email Security, along with adding options in the console where customers or users can create policies. That is what we are currently lacking; we need customized policies that we can create according to proofs of concept. If a customer is receiving cybersecurity advisory from any organization or their own company, it would be better if we could create an option to establish policies so that the AI and ML engine will work accordingly to those policies. Currently, they have the feature, but we need to request them in the backend, and they will be doing it for us from the backend. This process is difficult for us, as every time we want to make policy adjustments, we have to send them an email or get support. It is challenging sometimes for some customers when this type of advisory or policy change request occurs. I would like to see custom reports as an additional feature in the future to make it better. Some customers might require customized reporting based on their requirements and priorities. Seamless integration with other security solutions is also something I recommend. Third-party tools such as other XDR or SIEM tools or other MDR tools would benefit from seamless integration as well.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Cloud Security Connector for Zscaler has had a very positive impact, especially in terms of security and operational efficiency."
"It is very useful ............visibility on the end-user,"
"The solution is secure."
"Cloud Security Connector for Zscaler has positively impacted our organization by helping us in our cloud environment to connect our resources to Zscaler, ensuring that security policies are consistent with zero-trust access and increasing reliability by 28%."
"The solution’s effectiveness when it comes to detection is very good. It is stopping malicious emails and tagging emails noted as spam. So, we are able to disseminate those emails, get what we need, and block clearly malicious emails. It saves us a lot of valuable time. It keeps our users safe, e.g., the majority of emails that they would have gotten in the past don't even make it into their inbox."
"By the end of the year, I gave the company some reports, and we didn't have any issues or malicious activities from any point of view, especially from email."
"Scalability-wise, I rate the solution a ten out of ten."
"We haven't had a client, who uses their protection, have an email security breach, and their product just works and keeps bad emails away so we don't have to think too much."
"Since implementing Perception Point, we have had zero suspicious emails coming into our inbox, we have seen a 100 percent decrease in attempts, and there have been no false positives."
"Perception Point has helped to reduce our false positive rate by approximately 90% and, more generally, it has reduced the total number of alerts we get from more than 100 endpoint alerts per month to individual ones, representing a greater than 90% drop in alerts."
"The most valuable features of the solution are the ones that are related to finding impersonation attacks and detecting attempts to steal credentials. In scenarios where attackers get you to follow URLs to a malicious site that looks similar to a good site, and then ask for the user credentials to try to steal them, it is very useful."
"We can use it to perform detection and analysis of emails. For any malicious content found in emails, it gives in-depth analysis reports to end users. If you log into the console, you can see in-depth detection and how it happens."
 

Cons

"While Cloud Security Connector for Zscaler is a strong solution, one area that could be improved, especially for teams that are new, is configuring route tables, ensuring proper traffic flow, and avoiding asymmetric routing, which can be challenging, particularly in large or multi-VPC environments."
"The connectivity could be faster."
"If there are any issues at the network level, such as users working from home, then it is very hard to catch up with them and resolve issues on the end-user machine."
"Email alerts should be available in real-time."
"They need more customer engagement. The product works very well. The IR works very well when we contact them. However, day-to-day, they should have more in communication with their customers explaining new products and features. There is possibly something that if I would know about it, then I would buy and use it. Maybe I need it. They need to improve their communications."
"We have had a few false positives, not that many, but a few... they have a feature where someone from the Incident Response team can look at an email and mark it as 'verified malicious.' You might think that if an engine detects it is malicious, and an IR team member has flagged it as malicious, it will definitely be malicious. But that's not always the case."
"They could provide additional data loss prevention features as we encounter different kinds of attacks in today's scenario."
"Maybe a couple of improvements on their portal would be good, but other than that, I think it is good."
"Perception Point Advanced Email Security should make available more use cases."
"The extensive reporting capabilities influence my decision-making process regarding email security as the reporting feature is intermediate. I believe there have been no changes in that part for the last couple of years, and there are no updates."
"In terms of architecture, the solution needs to be much more redundant; there was an outage a month ago in AWS, and that basically stopped the service for two or three hours."
 

Pricing and Cost Advice

Information not available
"The pricing compared to the value Perception Point brings is super-competitive. They're not the cheapest in the market, but the value and the quality of the product are superior to anything else in the market, so we don't mind paying more for it."
"We were able to get reasonable pricing that matches the ROI we want, so I think that it is the correct price point."
"The pricing was fair in comparison with the other solutions. We have received good value for what we paid."
"It has very reasonable pricing. Normally, the end user is paying. Perception Point is already in the Amazon marketplace, so we cannot sell it as a distribution partner. For example, we cannot take more than that margin of what they offer in the marketplace. Whatever the end user is paying, it is definitely worth it and it is not that high."
"The price of this solution was within our budget and I think that it will suit most SMBs."
"The price of the solution is high."
"They are not the most expensive vendor. There are much more expensive vendors. They are not cheap, but they are not the most expensive. They are somewhere in the middle."
"The pricing and licensing are very fair compared to competing companies in the same field."
report
Use our free recommendation engine to learn which Internet Security solutions are best for your needs.
885,311 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Manufacturing Company
15%
Insurance Company
14%
Construction Company
13%
Financial Services Firm
10%
Computer Software Company
11%
Manufacturing Company
8%
Comms Service Provider
6%
Retailer
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business13
Midsize Enterprise4
Large Enterprise6
 

Questions from the Community

What is your experience regarding pricing and costs for Cloud Security Connector for Zscaler?
The experience with pricing, setup cost, and licensing for Cloud Security Connector for Zscaler is definitely competitive. They provide us a good cost, and since we obtained it through AWS Marketpl...
What needs improvement with Cloud Security Connector for Zscaler?
I feel that they are doing great with Cloud Security Connector for Zscaler. If I need to suggest an improvement, it would be to simplify the steep learning curve, as it can be complex for newcomers...
What is your primary use case for Cloud Security Connector for Zscaler?
In our current organization, we have been using Cloud Security Connector for Zscaler by Maiden Edge, Maidenhead Bridge for almost two and a half years. They are providing us specialized virtual app...
What is your experience regarding pricing and costs for Perception Point Advanced Email Security?
In Brazil, the dollar price affects the cost. Perception Point Advanced Email Security is about 50 percent less expensive.
What needs improvement with Perception Point Advanced Email Security?
I would like to improve reporting in Perception Point Advanced Email Security, along with adding options in the console where customers or users can create policies. That is what we are currently l...
What is your primary use case for Perception Point Advanced Email Security?
My main use case for Perception Point Advanced Email Security is proactive defense against advanced threats, particularly phishing, zero-day attacks, and malware that a standard filter might miss. ...
 

Overview

Find out what your peers are saying about Cloud Security Connector for Zscaler vs. Perception Point Advanced Email Security and other solutions. Updated: March 2026.
885,311 professionals have used our research since 2012.