IT Central Station is now PeerSpot: Here's why

Safe-T Secure Application Access vs Zscaler Internet Access comparison

Cancel
You must select at least 2 products to compare!
Featured Review
Buyer's Guide
Enterprise Infrastructure VPN
July 2022
Find out what your peers are saying about Fortinet, Palo Alto Networks, Check Point and others in Enterprise Infrastructure VPN. Updated: July 2022.
621,327 professionals have used our research since 2012.
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pricing and Cost Advice
Information Not Available
  • "The pricing is fair based on its competitive market."
  • "The price is competitive. It's not cheap and it's not expensive."
  • "The pricing for Zscaler Internet Access could be made cheaper."
  • "The price of Zscaler Internet Access should improve, it is expensive."
  • "We have found the solution to be expensive."
  • "Licenses are available on a per-host basis. Some features like sandboxing require an additional fee, but most standard features are included in the license."
  • "We pay around 6,500 INR per user per year, which is very expensive. I would rate Zscaler's pricing one out of five."
  • "Because it's a cloud solution, we pay on a yearly basis. It is affordable and includes tech support and all features."
  • More Zscaler Internet Access Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Enterprise Infrastructure VPN solutions are best for your needs.
    621,327 professionals have used our research since 2012.
    Questions from the Community
    Ask a question

    Earn 20 points

    Top Answer: Cisco Umbrella and Zscaler Internet Access are two broad-spectrum Internet security solutions that I have tried. Zscaler Internet Access is a good option for carrying out multiple security… more »
    Top Answer:We researched Netskope but ultimately chose Zscaler. Netskope is a cloud access security broker that helps identify and manage cloud applications, protecting your sensitive data from exfiltration.… more »
    Top Answer:The users are at different locations, and Zscaler helps us to put the organization's central security controls on these roaming users.
    Ranking
    Views
    632
    Comparisons
    468
    Reviews
    0
    Average Words per Review
    0
    Rating
    N/A
    Views
    36,582
    Comparisons
    29,069
    Reviews
    16
    Average Words per Review
    668
    Rating
    8.6
    Comparisons
    Also Known As
    Safe-T SDA, Safe-T, Safe-T Software-Defined Access
    ZIA
    Learn More
    Overview



    Safe-T is a provider of Zero Trust Access solutions which mitigate attacks on enterprises’ business-critical services and sensitive data, while ensuring uninterrupted business continuity. 

    Safe-T’s cloud and on-premises solutions ensure that an organization’s access use cases, whether into the organization or from the organization out to the internet, are secured according to the “validate first, access later” philosophy of Zero Trust. 

    This means that no one is trusted by default from inside or outside the network, and verification is required from everyone trying to gain access to resources on the network or in the cloud. 

    Safe-T’s wide range of access solutions reduce organizations’ attack surface and improve their ability to defend against modern cyberthreats. As an additional layer of security, our integrated business-grade global proxy solution cloud service enables smooth and efficient traffic flow, interruption-free service, unlimited concurrent connections, instant scaling and simple integration with our services. 

    With Safe-T’s patented reverse-access technology and proprietary routing technology, organizations of all size and type can secure their data, services and networks against internal and external threats. 

    At Safe-T, we empower enterprises to safely migrate to the cloud and enable digital transformation.

    Zscaler Internet Access is a cloud-native security service edge (SSE) platform. Its main purpose is to provide AI-powered protection for all users, all applications, and all locations. The solution replaces other legacy network security solutions to stop advanced attacks and prevent data loss by using a comprehensive zero trust approach.

    Zscaler Internet Access Features

    Zscaler Internet Access has many valuable key features. Some of the most useful ones include:

    • Proxy (native SSL)
    • IPS and advanced protection
    • Cloud sandbox
    • DNS security
    • Cloud firewall
    • URL filtering
    • Bandwidth control
    • DNS filtering
    • Cloud DLP w/EDM and IDM
    • Cloud access security broker (CASB)
    • Cloud security posture management (CSPM)
    • CloudBrowser isolation
    • Cloud secure web gateway (SWG)
    • Zero trust network access (ZTNA)
    • Digital experience monitoring

    Zscaler Internet Access Benefits

    There are several benefits to implementing Zscaler Internet Access. Some of the biggest advantages the solution offers include:

    • Fast access with zero infrastructure: Zscaler Internet Access creates a fast, seamless user experience because of its direct-to-cloud architecture. With no infrastructure, Zscaler Internet Access helps you eliminate backhauling, which improves performance and simplifies network administration.
    • Threat intelligence: By using threat intelligence, Zscaler Internet Access can stop ransomware, zero-day malware, and advanced attacks via Inline inspection of all internet traffic, including SSL decryption, and a suite of AI-powered cloud security services. 
    • Consistent security: With Zscaler Internet Access, your security policy goes everywhere your users go. When you move security to the cloud, all users, applications, devices, and locations remain protected and secure based on identity and context.
    • Hybrid workforce: Zscaler Internet Access enables secure access to all external and internal apps from anywhere, so remote work is not an issue. You can also enforce business policies that follow the user, making security identical regardless of location.

    Reviews from Real Users

    Below are some reviews and helpful feedback written by Zscaler Internet Access users.

    A Service Manager at a construction company says, "There are a bunch of different capabilities that are valuable within the platform. We use quite a lot of them, but not everything. The ones that are most important to us are the URL Filtering and the application control. For our needs, the cloud-native proxy architecture is a very good solution. This architecture helps with cyber threats because we inspect most of the traffic and we can see that a lot of threats are stopped directly in the secure web gateway."

    Owen N., Security Architect at Claro Enterprise Solutions, explains that the solution’s most valuable features include “The integration of the gateway that inspects all ports and protocols. So, there is threat prevention; The cloud sandbox; VNS security; Access control that will protect URL filtering and the cloud firewall; Data protection that will protect your gateway, like your CASB or your cloud DLP; The capabilities of this will point your traffic to Zscaler Cloud.”

    An Architecture Senior Manager at an insurance company mentions, "The data loss prevention feature is the most valuable. It stops our users from inadvertently leaking our customers' data to the Internet or anywhere else it shouldn't go." He also adds, “The solution provides quick access to cloud services, securing our data and allowing us to inspect all our traffic.”

    Offer
    Learn more about Safe-T Secure Application Access
    Learn more about Zscaler Internet Access
    Sample Customers
    Government of Israel, eviCore Healthcore, Glen Imaging, Sarin, LBG, Rollomatic, Boegli-Gravures SA, Banque Heritage, Groupe Minoteries, Temenos, ZEK, RLM Finsbury, Harel Insurance, Meitav Dash
    Ulster-Greene ARC, BanRegio, HDFC, Ralcorp Holdings Inc., British American Tobacco, Med America Billing Services Inc., Lanco Group, Aquafil, Telefonica, Swisscom, Brigade Group
    Top Industries
    VISITORS READING REVIEWS
    Comms Service Provider24%
    Computer Software Company23%
    Government11%
    Financial Services Firm5%
    REVIEWERS
    Comms Service Provider24%
    Pharma/Biotech Company12%
    Financial Services Firm12%
    Computer Software Company12%
    VISITORS READING REVIEWS
    Computer Software Company25%
    Comms Service Provider21%
    Financial Services Firm7%
    Government6%
    Company Size
    VISITORS READING REVIEWS
    Small Business25%
    Midsize Enterprise22%
    Large Enterprise53%
    REVIEWERS
    Small Business29%
    Midsize Enterprise6%
    Large Enterprise65%
    VISITORS READING REVIEWS
    Small Business19%
    Midsize Enterprise15%
    Large Enterprise66%
    Buyer's Guide
    Enterprise Infrastructure VPN
    July 2022
    Find out what your peers are saying about Fortinet, Palo Alto Networks, Check Point and others in Enterprise Infrastructure VPN. Updated: July 2022.
    621,327 professionals have used our research since 2012.

    Safe-T Secure Application Access is ranked 28th in Enterprise Infrastructure VPN while Zscaler Internet Access is ranked 2nd in Secure Web Gateways (SWG) with 17 reviews. Safe-T Secure Application Access is rated 0.0, while Zscaler Internet Access is rated 8.6. On the other hand, the top reviewer of Zscaler Internet Access writes " AI decision-making on quarantined documents reduces manual work". Safe-T Secure Application Access is most compared with MOVEit and Axway AMPLIFY Managed File Transfer, whereas Zscaler Internet Access is most compared with Cisco Umbrella, Netskope CASB, Microsoft Defender for Cloud Apps, Palo Alto Networks WildFire and Forcepoint Secure Web Gateway.

    We monitor all Enterprise Infrastructure VPN reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.