Try our new research platform with insights from 80,000+ expert users

Seeker Interactive vs Zscaler Internet Access comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 15, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Seeker Interactive
Ranking in Internet Security
18th
Average Rating
7.0
Reviews Sentiment
7.3
Number of Reviews
1
Ranking in other categories
Mobile Threat Defense (16th), API Security (24th)
Zscaler Internet Access
Ranking in Internet Security
2nd
Average Rating
8.4
Reviews Sentiment
6.7
Number of Reviews
57
Ranking in other categories
Secure Web Gateways (SWG) (3rd)
 

Mindshare comparison

As of September 2025, in the Internet Security category, the mindshare of Seeker Interactive is 0.1%. The mindshare of Zscaler Internet Access is 32.4%, down from 36.5% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Internet Security Market Share Distribution
ProductMarket Share (%)
Zscaler Internet Access32.4%
Seeker0.1%
Other67.5%
Internet Security
 

Featured Reviews

San K - PeerSpot reviewer
More effective than dynamic scanners, but is missing useful learning capabilities
One area that Seeker can improve is to make it more customizable. All security scanning tools have a defined set of rules that are based on certain criteria which they will use to detect issues. However, the criteria that you set initially is not something that all applications are going to need. The purposes for which applications are designed may differ in practice in the industry, and because of this, there will always be tools that sometimes report false positives. Thus, there should be some means with which I can customize the way that Seeker learns about our applications, possibly by using some kind of AI / ML capability within the tool that will automatically reduce the number of false positives that we get as we use the tool over time. Obviously, when we first start using the scanning tool there will be false positives, but as it keeps going and as I keep using the tool, there should be a period of time where either the application can learn how to ignore false positives, or I can customize it do so. Adding this type of functionality would definitely prevent future issues when it comes to reporting false positives, and this is a key area that we have already asked the vendor to improve on, in general. On a different note, there is one feature that isn't completely available right now where you can integrate Seeker with an open-source vulnerability scanner or composition analysis tool such as Black Duck. I would very much like this capability to be available to us out-of-the-box, so that we can easily integrate with tools like Black Duck in such a way that any open source components that are used in the front-end are easily identified. I think this would be a huge plus for Seeker. Another feature within Seeker which could benefit from improvement is active verification, which lets you actively verify a vulnerability. This feature currently doesn't work in certain applications, particularly in scenarios where you have requested tokens. When we bought the tool, we didn't realize this and we were not told about it by the vendor, so initially it was a big challenge for us to overcome it and properly begin our deployment.
Mohan Janarthanan - PeerSpot reviewer
User access management and threat prevention are enhanced with user-friendly controls
The best features Zscaler Internet Access offers include application control, tenant segregation, and PoP center regions which have low availability zones. The internet access is very successful and bandwidth speed is excellent. It also has application-based control, URL-based control, and SSL inspection capabilities, which are very useful. Additionally, the in-depth CASB segregation is very beneficial to us. One unique feature I found helpful is the tenant level restrictions, which we use to only access our organization's tenant level mail IDs, drives, and specific tenant level access while restricting public access. Zscaler Internet Access has positively impacted our organization as we have noticed substantial outputs and income. It has improved our security environment control and endpoint protection. It prevents numerous web attacks through its AI/ML incorporated capability which identifies malware, threats, and viruses. It has a toggle button to enable features entirely at the tenant level for all users onboarded into Zscaler Internet Access, resulting in much better outcomes.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"A significant advantage of Seeker is that it is an interactive scanner, and we have found it to be much more effective in reducing the amount of false positives than dynamic scanners such as AppScan, Micro Focus Fortify, etc. Furthermore, with Seeker, we are finding more and more valid (i.e. "true") positives over time compared with the dynamic scanners."
"The most valuable feature is the ability to drop packets."
"Tech support is good."
"Stability-wise, I rate the solution a nine and a half out of ten...The setup phase was easy."
"In terms of management and visibility, there is a single panel where you can configure the policies for your entire organisation worldwide."
"I would recommend Zscaler Internet Access due to its ease of use and deployment, with a user-friendly interface."
"The security is excellent."
"The most valuable features of Zscaler Internet Access are it's on the cloud, high network performance, and the interception of users is very easy."
"Zscaler Internet Access has positively impacted our organization as we have noticed substantial outputs and income, improved our security environment control and endpoint protection, and it prevents numerous web attacks through its AI/ML incorporated capability which identifies malware, threats, and viruses."
 

Cons

"One area that Seeker can improve is to make it more customizable. All security scanning tools have a defined set of rules that are based on certain criteria which they will use to detect issues. However, the criteria that you set initially is not something that all applications are going to need."
"In every cloud service in the world, you have multiple upstream internet providers to create diversity so that if one of your providers fails, your network just continues. In South Africa, there is only one upstream provider, and that's not right. That that's a problem."
"Zscaler Internet Access could improve by adding a VPN feature."
"Zscaler needs to add client-to-client communication. It's always client-to-server communication. The cloud and branch connectors could be improved because we're still dependent on traditional firewalls. They should eliminate this. They should also provide WAN devices should to compete with the SD-WAN solutions also."
"Zscaler does not provide dedicated IPs to each customer. Hence, they share a pool of IPs provided by Zscaler. There is a chance of blacklisting these IPs. I also do not like the multi-management portal."
"Zscaler should provide adjacent services, which would be complementary to their current offering that could to be more pragmatic for a customer. For example, if you take Akamai, you get multiple sets of services, all depending on the customer and the strategy and the complexity and the problems. In some areas, they are more varied in terms of coverage."
"Technical support could be better."
"In terms of user experience, it could be better."
"The price of the solution could be improved."
 

Pricing and Cost Advice

"The licensing for Seeker is user-based and for 50 users I believe it costs about $70,000 per year."
"ZIA follows a subscription model pricing and charges you based on the number of users. I would say its price is good."
"We pay around 6,500 INR per user per year, which is very expensive. I would rate Zscaler's pricing one out of five."
"Our monthly fee is around R3000."
"There are multiple bundles: enterprise, business, and transformation. Transformation includes all the features, but recently I've seen a few more line items that are additional costs. Overall, it's expensive."
"The solution is a little bit expensive. On a scale of one to five, I would rate it as a three."
"The price of Zscaler Internet Access should improve, it is expensive."
"We have found the solution to be expensive."
"The pricing is an issue. It is expensive compared to other firewalls on the market."
report
Use our free recommendation engine to learn which Internet Security solutions are best for your needs.
867,821 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
21%
Government
16%
Computer Software Company
13%
Manufacturing Company
9%
Computer Software Company
15%
Manufacturing Company
11%
Financial Services Firm
10%
Government
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business15
Midsize Enterprise8
Large Enterprise39
 

Questions from the Community

Ask a question
Earn 20 points
Which is the better security solution - Cisco Umbrella or Zscaler?
Cisco Umbrella and Zscaler Internet Access are two broad-spectrum Internet security solutions that I have tried. Zscaler Internet Access is a good option for carrying out multiple security functi...
Which is better, Zscaler internet access or Netsckope CASB?
We researched Netskope but ultimately chose Zscaler. Netskope is a cloud access security broker that helps identify and manage cloud applications, protecting your sensitive data from exfiltration....
 

Also Known As

No data available
ZIA
 

Overview

 

Sample Customers

El Al Airlines and Société Française du Radiotelephone
Ulster-Greene ARC, BanRegio, HDFC, Ralcorp Holdings Inc., British American Tobacco, Med America Billing Services Inc., Lanco Group, Aquafil, Telefonica, Swisscom, Brigade Group
Find out what your peers are saying about Cisco, Zscaler, iboss and others in Internet Security. Updated: August 2025.
867,821 professionals have used our research since 2012.