IT Central Station is now PeerSpot: Here's why

Zscaler Internet Access Valuable Features

MA
Service Manager at a construction company with 10,001+ employees

There are a bunch of different capabilities that are valuable within the platform. We use quite a lot of them, but not everything. The ones that are most important to us are the URL Filtering and the application control. 

For our needs, the cloud-native proxy architecture is a very good solution. We are moving away from on-prem appliances and moving more toward cloud-based solutions. Zscaler is a good fit for our strategy. This architecture helps with cyber threats because we inspect most of the traffic and we can see that a lot of threats are stopped directly in the secure web gateway. But there are parts of it that we don't use yet, like the DLP functions. Instead, we are using the Zscaler Cloud Sandbox feature for content that is downloaded as files. We detonate the document in a sandbox and see if it's malicious or not.

It's a very easy-to-learn and easy-to-use platform, even for me as a more non-technical person. I'm still able to do a lot of work in this platform.

View full review »
ON
Security Architect at a comms service provider with 201-500 employees
  • The integration of the gateway that inspects all ports and protocols. So, there is threat prevention. 
  • The cloud sandbox
  • VNS security
  • Access control that will protect URL filtering and the cloud firewall. 
  • Data protection that will protect your gateway, like your CASB or your cloud DLP. The capabilities of this will point your traffic to Zscaler Cloud.

The proxy architecture is the way to go. Zscaler uses it to protect their applications on the cloud. So, if you are using Box, Office 365, or even have an end user using LinkedIn or YouTube, then it will give you updated threat updates. It will also inspect all your traffic so you don't get compromised.

Advanced Threat Protection on Zscaler Internet Access has a few functionalities. It has ways to find threats. So, if they are actually hiding, you could do an inspection of your SSL traffic. You also have DNS security in Zscaler Internet Access that will help you route suspicious command-and-control attacks as well as detect threats when it does a full inspection. 

Zscaler Internet Access protects using data loss prevention. If you have a CASB exposing your cloud out into the network, then Zscaler Internet Access will go ahead and control that unknown cloud application in the CASB, protecting it. There is also data detection with exact data match. This improves the data coming into your cloud so you are protecting it. 

It offers a Cloud Browser Isolation feature, which exfiltrates browser activities from the end user's device. This feature can eliminate our exposures on that.

I like its features because they help me eliminate firewalls. I don't need to have firewalls, SIEMs, or an IPS/IDS. So, if all my end users are remote and using Office 365, I am already protecting them because they are in the cloud. I just have to attach the security application, which makes sure that any user who is mobile or remote is protected, without spending money on other solutions.

View full review »
SM
Architecture Senior Manager at a insurance company with 10,001+ employees

The data loss prevention feature is the most valuable. It stops our users from inadvertently leaking our customers' data to the Internet or anywhere else it shouldn't go.

The cloud-native proxy architecture certainly seems fast enough. The performance is good. The multi-country nature of it allows us to keep the proxy closer to the user so a user's data doesn't transit as far as it would otherwise. It helps to keep latency down and the speed up. It also helps a little bit with cyber threats, but that is not necessarily its primary purpose for us.

Zscaler is constantly improving the network. They are adding new data centers and regions all the time. They listen to feedback, and based on where we tell them to go and put data centers, they add new data centers. For example, they created a couple of data centers in the Middle East, which has been very helpful for us.

View full review »
Buyer's Guide
Zscaler Internet Access
June 2022
Learn what your peers think about Zscaler Internet Access. Get advice and tips from experienced pros sharing their opinions. Updated: June 2022.
607,127 professionals have used our research since 2012.
Gregor Burow - PeerSpot reviewer
Channel Alliances Leader Germany at ALE

Zscaler is a very stable solution.

The security is excellent.

View full review »
Elvin Castellanos - PeerSpot reviewer
Server Administration / Security Officer at a manufacturing company with 501-1,000 employees

Some of the most valuable features are that, as a remote solution it is 

  • lightweight
  • very easy to set up and configure
  • the protection is in the cloud. 

We are agnostic when it comes to what they are doing. We don't have to buy equipment to use it. And when our engineers set it up on our side, we just configured a few settings and we were in.

View full review »
ForrestWu - PeerSpot reviewer
Sr. Manager IT at a non-profit with 51-200 employees

When you try to access suspicious websites, they will give you a warning. This helps us with user access without our office network.

Its cyberthreat protection is important for our needs. We use it for Internet access control, e.g., accessing web pages. We also use it when a user downloads or uploads files from the Internet.

When a user goes to the Internet to browse or download something, it is secured by this tool. This is important to us because it is another layer of protection.

View full review »
MilindSampat - PeerSpot reviewer
Technical Lead at Wipro Limited

Overall, it's a good solution. 

We had very few issues during implementation.

Technical support is quite helpful and responsive once you get a hold of them. 

It has private access and has a lot of features inbuilt including DLP, CASB, et cetera. 

The solution is scalable and stable. 

View full review »
MM
Solution Architect at Tata Consultancy

Zscaler covers all the features needed to replace a VPN or proxy solution. They are good. They've been on the market for 15 years now, so they are mature enough.

View full review »
AP
Cyber Security Consultant at flydubai

The most valuable features of Zscaler Internet Access are it's on the cloud, high network performance, and the interception of users is very easy.

View full review »
RK
Consultant at Tata Consultancy

The most valuable features I found in Zscaler Internet Access are the restriction of users for a particular URL, the security feature related to stopping DDoS, and the VPN.

View full review »
HM
Network Engineer at a financial services firm with 5,001-10,000 employees

The internet security that it provides is valuable.

The VPN is valuable, as the whole technology is very different from a traditional VPN.

View full review »
Anson Mani - PeerSpot reviewer
Cyber Security Consultant at Envestnet, Inc

The most valuable feature of Zscaler Internet Access is that it is a consolidated solution, it comes with many features, such as DLP.

View full review »
Buyer's Guide
Zscaler Internet Access
June 2022
Learn what your peers think about Zscaler Internet Access. Get advice and tips from experienced pros sharing their opinions. Updated: June 2022.
607,127 professionals have used our research since 2012.