Try our new research platform with insights from 80,000+ expert users

Google Cloud Security Command Center vs Zscaler Zero Trust Exchange Platform comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Jul 27, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

SentinelOne Singularity Clo...
Sponsored
Ranking in Cloud Security Posture Management (CSPM)
3rd
Ranking in Cloud-Native Application Protection Platforms (CNAPP)
3rd
Average Rating
8.8
Reviews Sentiment
7.9
Number of Reviews
114
Ranking in other categories
Vulnerability Management (5th), Cloud and Data Center Security (2nd), Container Security (3rd), Cloud Workload Protection Platforms (CWPP) (4th), Compliance Management (1st)
Google Cloud Security Comma...
Ranking in Cloud Security Posture Management (CSPM)
24th
Ranking in Cloud-Native Application Protection Platforms (CNAPP)
18th
Average Rating
7.4
Reviews Sentiment
7.1
Number of Reviews
3
Ranking in other categories
No ranking in other categories
Zscaler Zero Trust Exchange...
Ranking in Cloud Security Posture Management (CSPM)
12th
Ranking in Cloud-Native Application Protection Platforms (CNAPP)
10th
Average Rating
8.4
Reviews Sentiment
6.9
Number of Reviews
64
Ranking in other categories
Data Loss Prevention (DLP) (2nd), Cloud Access Security Brokers (CASB) (5th), Application Control (4th), ZTNA as a Service (1st), Secure Access Service Edge (SASE) (1st), Remote Browser Isolation (RBI) (1st)
 

Mindshare comparison

As of August 2025, in the Cloud Security Posture Management (CSPM) category, the mindshare of SentinelOne Singularity Cloud Security is 3.2%, up from 1.2% compared to the previous year. The mindshare of Google Cloud Security Command Center is 2.1%, up from 0.6% compared to the previous year. The mindshare of Zscaler Zero Trust Exchange Platform is 1.0%, down from 1.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Cloud Security Posture Management (CSPM)
 

Featured Reviews

Andrew W - PeerSpot reviewer
Tells us about vulnerabilities as well as their impact and helps to focus on real issues
Looking at all the different pieces, it has got everything we need. Some of the pieces we do not even use. For example, we do not have Kubernetes Security. We are not running any K8 clusters, so it is good for us. Overall, we find the solution to be fantastic. There can be additional education components. This may not be truly fair to them because of what the product is going for, but it would be great to see additional education for compliance. It is not a criticism of the tool per se, but anything to help non-development resources understand some of the complexities of the cloud is always appreciated. Any additional educational resources are always helpful for security teams, especially those without a development background.
Nishant_Mishra - PeerSpot reviewer
Provides visibility, address cloud misconfiguration and prevent threats
In terms of identifying, the solution is pretty good. It takes care of all the layers. We have Cloud, Kubernetes cluster, instances running, and network. We have identities, permissions, and access. It provides pictures of everything in GCP. There's no such integration required. There are Google APIs that you need to enable. The compliance reporting feature helped us maintain a baseline of compliance within the information security policies. It's pretty stable and scalable. However, visibility can be improved along with automation. SCC to provide an option to fix those things, perhaps by clicking a button. For example, if a firewall rule allows an application to accept HTTP traffic, I should be able to address that specific issue directly within the interface. It's just a regular call to action button. There are no prerequisites for the solution. It's a requirement to have good security visibility into your Google Cloud Infrastructure. Cloud Security Command Center could be a good product to consider. There are other open-source solutions available. There are solutions from Aqua that are pretty decent. I would recommend that if somebody is opting for SCC, they should also explore open-source solutions. Open-source solutions can be very beneficial, especially if they are pursuing a multi-cloud strategy. You won't need additional security tools for platforms like AWS or others. Whenever a security issue pops up, a generative AI backend provides a summary of what happened. The information provided is quite detailed. Overall, I rate the solution an eight out of ten.
Sumit Bhanwala - PeerSpot reviewer
Cloud-based platform simplifies device and data center management
I find it to be good. The solution is cloud-based with the latest inspection engines, which I find to be amazing. We are less dependent on data centers and device management, which reduces our efforts significantly. It improves our device management, data center management, and updating devices. We need fewer engineers for this management, and it reduces time and efforts for data center management, device upgrades, and IT support.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The SentinelOne Singularity Cloud Security has substantially affected my risk posture, as it was the first tool that notified me of the public exposure of a repository by a developer, allowing me to resolve the issue within minutes."
"My favorite feature is Storyline."
"The ease of use of the platform is very nice."
"The UI is responsive and user-friendly."
"It saves us time based on savings on manual activities."
"SentinelOne Singularity Cloud Security is on top of protecting ephemeral workloads."
"The management console is highly intuitive to comprehend and operate."
"The most valuable aspect of Singularity Cloud Security is its unified dashboard."
"It simplifies compliance efforts."
"Most people use the threat detection dashboard."
"The compliance reporting feature helped us maintain a baseline of compliance within the information security policies."
"Zscaler Private Access is a platform that eliminates the complexity of VPN configuration."
"The solution is the best for storage."
"It has been helpful in maintaining our infrastructure. The granular level control it offers allows us to set application policies per application for each user."
"As a cloud-based service, it is very easily implemented."
"I like its ease of use. It has a single pane of glass for the ZIA and ZPA pieces. It is very manageable. It is also very easy to deploy for secure access, and it gives half-decent coverage for visibility in terms of what the users use and what data is being proxied through the access gateway."
"With SASE, we have a single platform that covers multiple task services with which we need to control access. All the features are equally valuable."
"The most valuable feature of Zscaler Private Access is we do not have to connect to a VPN, it is seamless. It is more convenient for us because we use one agent to cover the internet and VPN access."
"The most valuable features of Zscaler CASB are API integration and DLP."
 

Cons

"There is no break-glass account feature. They should implement this as soon as possible because we can't implement SSO without a break-glass feature."
"SentinelOne Singularity Cloud Security has limited legacy system support and may not fully support older operating systems or legacy environments."
"The area of improvement is the cost, which is high compared to other traditional endpoint protections."
"We wanted it to provide us with something like Claroty Hub in AWS for lateral movement. For example, if an EC2 instance or a virtual machine is compromised in a public subnet based on a particular vulnerability, such as Log4j, we want it to not be able to reach some of our databases. This kind of feature is not supported in SentinelOne Singularity Cloud Security."
"One potential drawback is the cost of SentinelOne Singularity Cloud Security, which may be prohibitive for smaller businesses or startups, particularly those in regions with lower average incomes, such as India."
"I export CSV. I cannot export graphs. Restricting it to the CSV format has its own disadvantages. These are all machine IP addresses and information. I cannot change it to the JSON format. The export functionality can be improved."
"The application module focuses on the different codes and libraries that can be run on the machines. It is very important for Singularity EDR to detect what type of codes and what type of libraries can run in the machine. If they can implement a white list or a black list of codes or libraries that can be used in the machine, it would be very helpful. They can focus more on the application module."
"I would like SentinelOne Singularity Cloud Security to add real-time detection of vulnerabilities and cloud misconfigurations."
"The AI capabilities have been heavily promoted, but I haven't seen a significant impact."
"Visibility can be improved along with automation."
"Zscaler Private Access's reporting is poor. We should have more insight into the reports regarding what is blocked and allowed."
"Occasionally, issues arise in the LogStack by a third party, particularly for government websites accessed by numerous users."
"You won't find anything that can help you with the configuration part and other areas related to the product if you search for proper or exact details of Zscaler Cloud DLP online in very easy language."
"The pre-defined dictionaries could be improved."
"I can't speak to any missing features."
"It has a limitation, if you are creating a rule or something for a web application or something, you could only add five users, not more than that. Five or four users are only included in a rule. If you want to create a rule for more than five or four users, you have to go through other methods, not particularly with the application. Working within the application with this method would be quite easy as compared to listing a URL or a normal IP address."
"The solution's granularity should be improved because it has limited granular options to control, visible, allow, block, delay, and receive."
"Having a Zscaler-specific device could streamline this process and provide a more consistent user experience across diverse branches."
 

Pricing and Cost Advice

"I am not involved in the pricing, but it is cost-effective."
"SentinelOne Singularity Cloud Security is on the costlier side."
"The pricing for PingSafe in India was more reasonable than other competitors."
"The pricing is fair. It is not inexpensive, and it is also not expensive. When managing a large organization, it is going to be costly, but it meets the business needs. In terms of what is out there on the market, it is fair and comparable to what I have seen, so I do not have any complaints about the cost"
"Pricing is based on modules, which was ideal for us."
"Singularity Cloud Workload Security's pricing is good."
"PingSafe is priced reasonably for our workload."
"PingSafe falls somewhere in the middle price range, neither particularly cheap nor expensive."
"Initially, it used to be relatively expensive, starting at around four or five hundred dollars."
"The pricing is quite high, especially when it comes to the gateway."
"The solution has increased prices this year."
"There is definitely an ROI."
"In terms of market positioning, I would describe Zscaler Private Access as offering optimal pricing. Based on our experience, Cato Networks tends to be slightly more expensive."
"Zscaler DLP solution is expensive, with a fixed pricing structure that is billed annually and monthly. There are no additional costs for licenses."
"The solution is expensive."
"It is an auto-renewal subscription service."
"As per industry leads, Zscaler CASB is an expensive solution."
report
Use our free recommendation engine to learn which Cloud Security Posture Management (CSPM) solutions are best for your needs.
865,384 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Financial Services Firm
14%
Manufacturing Company
9%
Government
6%
Computer Software Company
17%
Financial Services Firm
15%
Comms Service Provider
8%
Retailer
7%
Computer Software Company
14%
Financial Services Firm
13%
Manufacturing Company
10%
Insurance Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best featu...
What is your experience regarding pricing and costs for PingSafe?
I don't handle the price part, but it isn't more expensive than Palo Alto Prisma Cloud. It's not cheap, but it is wor...
What needs improvement with PingSafe?
There is scope for more application security posture management features. Additionally, the runtime protection needs ...
What do you like most about Google Cloud Security Command Center?
The compliance reporting feature helped us maintain a baseline of compliance within the information security policies.
What is your primary use case for Google Cloud Security Command Center?
The primary use case is to monitor the Google Cloud infrastructure across all projects for security-related alerts. T...
What is the better solution - Prisma Access or Zscaler Private Access?
We looked into Prisma Access before choosing Zscaler Private Access (ZPA). Palo Alto’s Prisma Access is a secure ac...
What do you like most about Zscaler SASE?
The most valuable features of Zscaler Private Access are reliability, scalability, and availability.
What is your experience regarding pricing and costs for Zscaler SASE?
Zscaler SASE is quite expensive compared to other solutions. The price is not fixed and it does not include all of th...
 

Also Known As

PingSafe
No data available
Zscaler SASE, Zscaler DLP, Zscaler CASB, Zscaler CSPM, Zscaler Browser Isolation, Zscaler Posture Control
 

Overview

 

Sample Customers

Information Not Available
Information Not Available
Siemens, AutoNation, GE, NOV
Find out what your peers are saying about Google Cloud Security Command Center vs. Zscaler Zero Trust Exchange Platform and other solutions. Updated: July 2025.
865,384 professionals have used our research since 2012.