No more typing reviews! Try our Samantha, our new voice AI agent.

Menlo Secure vs Zscaler Zero Trust Exchange Platform comparison

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Menlo Secure
Average Rating
9.2
Reviews Sentiment
6.7
Number of Reviews
5
Ranking in other categories
Secure Web Gateways (SWG) (27th), Firewalls (53rd), ZTNA (23rd), Cloud Security Remediation (8th)
Zscaler Zero Trust Exchange...
Average Rating
8.4
Reviews Sentiment
6.9
Number of Reviews
67
Ranking in other categories
Data Loss Prevention (DLP) (6th), Cloud Access Security Brokers (CASB) (9th), Application Control (6th), ZTNA as a Service (1st), Secure Access Service Edge (SASE) (4th), Remote Browser Isolation (RBI) (1st)
 

Mindshare comparison

While both are Network Security Systems solutions, they serve different purposes. Menlo Secure is designed for Cloud Security Remediation and holds a mindshare of 1.9%.
Zscaler Zero Trust Exchange Platform, on the other hand, focuses on Secure Access Service Edge (SASE), holds 9.5% mindshare, down 11.7% since last year.
Cloud Security Remediation Mindshare Distribution
ProductMindshare (%)
Menlo Secure1.9%
Wiz Code30.5%
Seemplicity17.8%
Other49.8%
Cloud Security Remediation
Secure Access Service Edge (SASE) Mindshare Distribution
ProductMindshare (%)
Zscaler Zero Trust Exchange Platform9.5%
Prisma Access by Palo Alto Networks11.8%
Cato SASE Cloud Platform9.8%
Other68.9%
Secure Access Service Edge (SASE)
 

Featured Reviews

reviewer2701794 - PeerSpot reviewer
Head Of Bluechip Enterprise at a manufacturing company with 51-200 employees
Provides strong protection and multiple use cases but struggles with market recognition
There aren't specific areas for improvement; however, they're not as well known as the big vendors such as Palo Alto. Menlo Secure is a smaller company with limited resources and funding, which makes it challenging to compete with larger companies such as Palo and Cisco. What can be improved is market awareness and adoption of the technology. When selling it in the channel, regardless of how good the technology might be, success depends more on market adoption and awareness.
Vibin Thomas - PeerSpot reviewer
Team Lead, Technical Content Security at Valuepoint Systems
Zero trust access has transformed remote connectivity and now simplifies secure app usage
Zscaler Zero Trust Exchange Platform, especially Zscaler Private Access, is very strong, though there are a few areas where improvements can be made. One challenge observed is around initial troubleshooting and visibility. While Zscaler Private Access provides logs, it can sometimes take time to pinpoint the exact cause of access issues, especially in complex environments with multiple policies and identity integration. Another area is the dependency on identity and connector health. Since Zscaler Private Access is heavily reliant on app connectors and identity providers, any issues with these components can impact user access, making proper monitoring critical. During the initial setup, policy configuration and application onboarding require careful planning, especially for larger environments with many applications. These challenges are manageable with proper design and monitoring. Overall, the platform delivers strong security and user experience. I would recommend a few improvements, especially around user interface, reporting, and troubleshooting experience. From a user interface perspective, while the platform is powerful, the policy configuration and navigation can feel complex, especially for new users. A more simplified and intuitive layout for policy mapping and application access would help reduce the learning curve. In terms of reporting, Zscaler Private Access provides logs, but having more built-in customizable dashboards and analytics would be very helpful. Better visibility into user access patterns, application performance, and real-time troubleshooting insights would improve operational efficiency. From a support and troubleshooting standpoint, it would be beneficial to have more granular centralized visibility, allowing for quick end-to-end tracing of a user request from authentication to application access without switching between multiple views. These improvements would make the platform even more efficient, especially for large-scale enterprise environments.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"We have definitely seen ROI, as we save a ton of money and time because the numerous hits that we were receiving from our security tools prior to implementing them had to all be chased down, dispositioned, and endpoints had to be reimaged."
"The fact that it is a cloud proxy solution is another feature we like. For example, if you acquire a new company, you can use it to protect that new company without the need to install anything physically on their networks."
"The solution is invisible to our end users, so it doesn't have any impact on their work or performance."
"For us, the primary goal is protection on the web, and that's extremely important. We're not using any of the other services at this time. The web part is key to the success of the organization. It gives us the ability to protect. It can isolate. It opens the session in an isolated format so that the code isn't running locally. It is running over in the Menlo environment, not in ours. It is not running on the local computer, whereas if you were to go to a normal website, it would run Java or something else on the local machine and potentially execute the malicious code locally. So, it does give us that level of protection."
"It has reduced security events to follow up on. While it is not 100%, there has been probably a 90% or more reduction. We were getting hit left, right, and center constantly from people browsing the Internet and hitting bad websites. It was not just bad websites that were stood up to be malicious, but good sites that were compromised."
"We are not aware of a single compromise from the web since implementing the solution."
"Either you have access to something or don't have access to it, and if you do, we can ensure, 100 percent of the time, that there is nothing malicious that is going to impact our system in any way."
"This security technology addresses risk and enables people to conduct business without that risk, which is where the ROI is realized."
"The platform offers advanced threat protection features and embedded AI/ML capabilities, making it more proactive in blocking threats."
"On DLP terms, Zscaler Cloud DLP ensures that data doesn't go outside of the organization. So on the network level, Zscaler does a pretty good job."
"The solution offers a simplified network infrastructure and security functions and it enables secure remote access for the users"
"What I find most valuable in Zscaler Private Access is that it's a VPN, and its connectivity as a VPN is its most valuable feature."
"The customer service and support are very good."
"This secure connection allows users to connect to the Zscaler VPN and access the resources on the office network, making it a highly valuable component of our system."
"The policies are very easy to implement."
"Zscaler SASE is probably the number one cloud-based proxy security solution."
 

Cons

"In the best of all worlds, we wouldn't have to make any exceptions. However, that is a big ask because a lot of that depends on how websites are constructed. For example, there are some very complex, application-oriented sites that we end up making exceptions for. It is really not that big an issue for us to make the exceptions. We feel like we are doing that without a huge impact on our security posture, but we do have to make some exceptions for complex sites, e.g., mostly SaaS-type sites and applications."
"Menlo Secure is a smaller company with limited resources and funding, which makes it challenging to compete with larger companies such as Palo and Cisco."
"We are now transitioning to another solution. The main reason for that is that managing all of the exceptions and troubleshooting all of the issues our users have had connecting to the internet has become too significant in terms of workload, compared to what we hope we will have with another solution."
"The user monitoring could still be improved."
"Currently, I don't have a good way to see which of my rules are being used in the access control lists. I have numerous entries, but are they all still needed? A report that would show me my list of who is allowed and whether we're actually using it would be useful because I can then go clean up my list. It would be easier to manage. We would eliminate the vulnerability of unused services."
"The user monitoring could still be improved."
"In the best of all worlds, we wouldn't have to make any exceptions. For example, there are some very complex, application-oriented sites that we end up making exceptions for."
"Currently, I don't have a good way to see which of my rules are being used in the access control lists."
"Zscaler Private Access needs to improve its collaboration with applications without compromising security."
"From a user interface perspective, while the platform is powerful, the policy configuration and navigation can feel complex, especially for new users."
"The pricing for Private Access seems to be on the expensive side, and I believe they should consider making it more competitive with other solutions."
"There could be more DLP-related features. Additionally, there needs to be flexibility for integrating ISP features."
"You won't find anything that can help you with the configuration part and other areas related to the product if you search for proper or exact details of Zscaler Cloud DLP online in very easy language."
"I can't speak to any missing features."
"On a scale from one to ten, I would rate Zscaler Private Access at only a three or four."
"Having a Zscaler-specific device could streamline this process and provide a more consistent user experience across diverse branches."
 

Pricing and Cost Advice

"The solution is expensive. It's more expensive than the solution I previously used. Compared with the other cloud-based solutions, it's very competitive."
"We save a ton of money and time. Previously, the numerous hits that we were receiving from our security tools, prior to implementing them, had to all be chased down, dispositioned, and endpoints had to be reimaged. It was just a ton of effort to do all that. That is where the savings from time and money come in."
"It is appropriately priced for what they're doing for us. Considering the protection provided, I feel their pricing is spot-on."
"The solution has increased prices this year."
"Zscaler Cloud DLP is moderately priced. We pay around 2 million rupees per year."
"The cost is expensive. It depends on the number of users."
"Zscaler DLP solution is expensive, with a fixed pricing structure that is billed annually and monthly. There are no additional costs for licenses."
"It is an auto-renewal subscription service."
"As per industry leads, Zscaler CASB is an expensive solution."
"My company is a Zscaler Private Access partner, so the customers pay for the license fees."
"Zscaler Private Access can be an expensive solution, depending on the license type you will purchase."
report
Use our free recommendation engine to learn which Cloud Security Remediation solutions are best for your needs.
885,789 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Manufacturing Company
14%
Retailer
10%
Computer Software Company
9%
Construction Company
9%
Financial Services Firm
12%
Manufacturing Company
9%
Computer Software Company
9%
Insurance Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business16
Midsize Enterprise12
Large Enterprise44
 

Questions from the Community

What needs improvement with Menlo Security Secure Web Gateway?
There aren't specific areas for improvement; however, they're not as well known as the big vendors such as Palo Alto. Menlo Secure is a smaller company with limited resources and funding, which mak...
What is your primary use case for Menlo Security Secure Web Gateway?
People are mainly using it for zero trust web access. Menlo Secure is built from the ground up to provide zero basic access, and by doing it that way, it has multiple use cases. For example, it man...
What advice do you have for others considering Menlo Security Secure Web Gateway?
Secure file sharing and data protection is not exactly what Menlo Secure is designed to do. While it can handle some of these functions, people typically choose another technology for those specifi...
What is the better solution - Prisma Access or Zscaler Private Access?
We looked into Prisma Access before choosing Zscaler Private Access (ZPA). Palo Alto’s Prisma Access is a secure access service edge (SASE) designed to deliver network security in a cloud-deliver...
What do you like most about Zscaler SASE?
The most valuable features of Zscaler Private Access are reliability, scalability, and availability.
What needs improvement with Zscaler SASE?
The solution needs to improve a lot of aspects.
 

Also Known As

Menlo Security Web Security, Menlo Web Security
Zscaler SASE, Zscaler DLP, Zscaler CASB, Zscaler CSPM, Zscaler Browser Isolation, Zscaler Posture Control
 

Overview

 

Sample Customers

Information Not Available
Siemens, AutoNation, GE, NOV