Zscaler Zero Trust Exchange Platform Primary Use Case
We are not resellers. We are utilizing it. We come from consulting firms, providing it to customers along with services, operational support, implementation support, and more. It involves various users in our organization.
View full review »DB
DeepakBhaskaran
AGM IT Security at Prestige Estates Projects Ltd
We primarily use Zscaler SASE as a web filter to have secure internet connectivity for all our endpoints, users, and branch offices. The agent installed on all endpoints controls individual internet access, ensuring that only approved sites and applications are available for end users. It also blocks access to any website identified as a threat or security-compromised. Additionally, it is used to enable zero trust network configuration, allowing users from their homes to connect to Zscaler Zero Trust network using Zscaler private access component.
View full review »There's a different mechanism and modules. For example, ZIA is primarily for internet access from the user's side. We can forward the traffic using the ZIA client connector agent installed on user machines like laptops and desktops.
Users can log in using their credentials and even use single sign-on. Once logged in, their traffic is forwarded to the Zscaler cloud.
Based on the user profile, we can define policies on what type of content they can access, like streaming or specific file types. It provides data protection as well.
Alternatively, there's another configuration. If we can't install an agent, we can forward traffic using a PAC file URL to Zscaler servers.
View full review »Buyer's Guide
Zscaler Zero Trust Exchange Platform
June 2025

Learn what your peers think about Zscaler Zero Trust Exchange Platform. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
861,390 professionals have used our research since 2012.
The primary use cases for the Zscaler include secure channel access for applications, private file service access, and remote connectivity to the active directory. These are the top three essential functionalities provided by Zscaler.
View full review »This is the primary Private Access solution, the VPN solution.
View full review »I use Zscaler Cloud DLP to protect sensitive data. It works by checking the content I'm trying to send or use on websites. If it sees any personal data or if someone tries to copy-paste it, it stops them. It can even notice when I use certain commands like "put," making sure my data stays safe. It watches what I'm doing online to keep my data secure.
Zscaler Cloud DLP integrates with Microsoft Defender to improve its abilities. This integration allows Zscaler to access data from Microsoft Defender, helping it track timestamps and offer strong protection for DLP events. This partnership between Zscaler and Microsoft Defender is a valuable addition that boosts DLP measures and enhances data protection.
I use Zscaler Cloud DLP since my company's clients use Zscaler Cloud Proxy in their environments. I deal with Zscaler Cloud DLP since it meets the requirements of my company's clients and helps to manage data breaches. In general, my company takes care of the configuration part of Zscaler Cloud DLP and provides it to our company's clients as a service.
View full review »SN
Sathish Nadarajah
Digital BA, Project Manager at FWD Hong Kong & Macau
We use Zscaler CASB for DLP and shadow IT.
View full review »We can use Zscaler Private Access as a recipient for external communication. Zscaler Private Access can help users sitting in our organization domain and trying to access their own internal company sources. The traffic is forwarded to us through the Zscaler Private Access node, which we can have in our own infrastructure, or it can be hosted on the Zscaler private cloud.
We are using Zscaler Private Access to build our own Zscaler private node. Although this node is maintained and managed by Zscaler, it resides in our own data center or domain. So the traffic forwarded from the user system towards any internal resource will go through this private node.
LV
Likhith Varma
Security Analyst at Secure-24
We use the solution to build zero-trust networks. We use it to block everything except the trusted URLs. We get a bunch of URLs from the customers, whitelist them in the solution, and everything else is blocked automatically.
An URL must be whitelisted for users to access it. When a customer tells us they need a particular URL, we analyze it and send it for approval. Once it is approved, we whitelist the URL for the user. The solution is useful for zero-trust and DLP.
I use Zscaler CASB to get the visibility of the cloud application since everything is moving to the cloud these days. We use the solution to get complete visibility of what is happening on my drive and official applications. The solution also helps to restrict information shared with my other partners.
View full review »In Qatar industries, the legacy systems like the Bluecoat Proxy is still being used, these solutions work at a limited capacity. For instance, one of our organization's customers is in the Oil & Gas transportation business with tankers, if a company like them wants to deploy a proxy solution, physical proxy deploy is very complicated for such companies, therefore our organization proposes a cloud proxy solution to them like Zscaler DLP.
There are several cloud proxy solutions in the market, but Zscaler DLP provides the lowest latency rates due to the presence of global enforcement nodes in the solution. Whenever a potential customer approaches our company, which has a large workforce, has offices distributed across a wide geography and is in need of a cloud-based solution, we suggest Zscaler DLP for comprehensive global control.
It ensures a secure online environment for our users, irrespective of their location. By routing all internet traffic through the Zscaler Cloud, users can browse safely, shielded from malicious content. Whether connected from the office or home network, Zscaler enforces our defined policies consistently.
View full review »
We use the solution to restrict uploading over public sites. We control the users’ actions through DLP. Only users who have access can upload files. We manage multiple policies.
View full review »We are currently using Zscaler Cloud DLP internally and it provides us with a robust and highly configurable Data Loss prevention engine, which meets our specific data handling needs.
We've so far recommended the solution in one or two engagements.
We work with customers who have various businesses like banking, finance, travel, et cetera, where we do a solution for them, a security solution for them. We are an IT service consultant company.
We generally use that product for the proxy setup, for URL dealing and blacklist blocking, and all that stuff. When the customer has a requirement where their workforce is very mobile or if they're on-premise and moving the workforce, we do recommend the Zscaler product.
There are also other cases. We extend other modules like CASB or another setup, where we say they can access the public cloud or send some data against the policy.
View full review »I primarily use it for conducting security incident investigations and generating security reports. It serves as a valuable tool in analyzing and responding to security events, and its capabilities are instrumental in producing comprehensive reports on the security status of the network.
NJ
Nikhil J.
Lead Information Technology Specialist at ZF Group
The main purpose was to use it as a zero-trust solution. Or also to have control over the inbound and outbound traffic coming and going through the end user's device.
View full review »We use Zscaler Private Access to authenticate our applications, which provides a more secure way to access the Internet from our work environment. We have multiple policies for different types of users. When new users join the company, they authenticate the VPA application to access the Internet. We use SSL bypass policies, tenant restrictions policies, and Microsoft tenant cloud application policies. We also use File Type Control Policy for all categories of files, and our traffic goes to the WAPAC file and the application. We are using services as per the requirements of our clients.
View full review »We use Zscaler Cloud DLP to maintain data load and for storage reports.
View full review »Most people use Zscaler SASE as a replacement for VPNs. You know, with a VPN, once you establish connectivity to the network, you have unrestricted access. But with Zscaler SASE, you have strict access control. You don't get any access unless you adhere to the policies set in Zscaler.
So, you can control who has access to specific applications at a URL level rather than granting access at the physical IP level. That's what most people appreciate about it. IPs provide access to everything on the machine, whereas Zscaler SASE provides access to specific services within the network.
View full review »We use the product for the process protocol for tunnels to manage network traffic.
View full review »We manage multiple customers using ZIA and ZPA to access internal resources and secure their own web applications. It acts like a VPN access connectivity, and ZIA is used as an internet gateway for users.
View full review »SD
SunilDhaka
Cybersecurity Consultant at a consultancy
The security issues one faces with legacy VPN solutions are addressed using a SaaS VPN platform. If an organization wants to implement a zero-trust network architecture, then a SaaS VPN platform is the way to go about it.
View full review »We have found that Zscaler SASE is a good product and we use it as a proxy.
View full review »SB
Senthilkumar Balasundaram
Technical Consultant at a tech vendor with 10,001+ employees
With Private Access, from TCS, we used to support multiple customers. Some of our customers will be utilizing Private Access and we'll be supporting them.
Mainly due to the COVID pandemic situation, many people now work from home. When working from home they needed better connectivity for a VPN solution. That is the main criteria and customers are looking for a stable solution, a cloud-based solution, which can be integrated quickly and can be managed centrally. That is the driving point. The pandemic situation was the driver, as clients needed to add capacity also. Earlier, they would give this remote access solution only to a few people. Now nearly 90% of people work from home. The capacity has to be increased. For that, clients were looking for a multi-net solution and they started deploying Private Access.
It serves as a globally distributed solution, differing significantly from MPLS. Unlike traditional firewalls, it seamlessly accommodates cloud services and enables remote work from any location. The product's global distribution across the cloud facilitates internal access with the necessary licenses. Whether connecting from a branch office, on-premises solution, private data system, public data center, or the cloud, the platform ensures consistent and robust security protection throughout the entire infrastructure.
Zscaler is a cloud proxy that scans and provides security for traffic to cloud-based applications and resources.
I work for a service provider for a defense customer. We are using Zscaler Private Access to connect to the Internet. This is how we keep our customers protected with the latest inspection of the URLs.
View full review »We use this solution for traffic and establishing the connection.
It's deployed on-premises.
There are 60,000 people who use Zscaler in my organization.
View full review »It’s a SaaS platform. It enables enterprise security and provides the advantage of SaaS applications while protecting our valuable digital assets from cyber threats.
View full review »We use the product to provide secure access to our customer's environment consisting of on-premise and on-cloud applications.
View full review »We use the product to control traffic and for user management purposes.
View full review »There are many use cases, but primarily we have been utilizing it for cloud and web security purposes.
View full review »OM
DR. Ovidio MAIURI
Chief Digital Officer at Challenger Stone
Zscaler Private Access empowers organizations to grant access to internal applications and services while maintaining the utmost security for their networks.
I've focused on basic Zscaler Private Access policies, primarily when users are working remotely.
I also use the solution for browser access, which means giving access to clientless machines.
Privileged remote access is another use case for Zscaler Private Access.
I also use the solution for its log streaming service and source IP anchoring.
View full review »The primary use case of SASE is for secure access, whether for public internet or private applications. Post-Covid, users are connecting from everywhere and need secure access with a good user experience. We deploy this solution to our customers.
View full review »Zscaler offers a point-to-site or point-to-point connectivity to a dedicated service in a secure way. The DNS encryption is based on the identity of users or the identity of a group of users.
It's a cloud solution. We use Zscaler App Connector to manage the solution. As a company, we need to manage connectors. Some are attached to the virtual machine.
Typically, we have 200 fixed users. We can increase the number of users by 10% each year.
MR
Mohd Fauzan Rahim
Senior Network Engineer at a tech vendor with 11-50 employees
We use Zscaler Private Access to provide access to on-premise applications.
View full review »I use the solution primarily for security purposes. We are blocking other sites which are not SSL in our Indian organization.
We are refusing authorization for users to access unauthorized sites. We are blocking through Zscaler. It’s for web filtering.
View full review »HS
Harjinder Singh
Sr. Architect at a tech vendor with 10,001+ employees
Zscaler Private Access is mainly used for connecting to my company network through a VPN. It's used for remote work.
View full review »MA
Mohd Amir
Finance Manager at Landmark Cars Ltd
We are using Zscaler Zero Trust Exchange for its Zscaler Internet Access service. It provides web security, DLP, data protection, prevention, and lots more features.
View full review »Zscaler Private Access is used for private data. You need to deploy Zscaler Private Access to put security and internal network after you build your application. The solution is used when you build an application and want to provide services to the public.
View full review »As IT integrators, we are using the solution for application control, URL filtering, sandboxing, and antivirus. We have modules with data leak prevention and cloud browser isolation, device posture checking, related to the access because we are also using it for the ZTNA services, but it's not related to the Secure Web Gateway. We are also using it in ZIA with a firewall as a service.
View full review »Private Access is more for very high-powered users. It's dedicated access to certain applications. It's for more sensitive users. It's not for general users.
View full review »I use Zscaler Cloud DLP for its DLP features. It gives you all the basic features such as keywords, regular expressions, data identifiers, etc., but the only difference is that you can only apply the DLP policies to web traffic.
View full review »I mainly use SASE for proxy and content filtering.
View full review »The use case is employing data, PII, and even HIPAA. I do public sector work for hospitals, counties, and local governments.
I am using the latest version of Zscaler Cloud DLP. I'm a licensed installer—a subcontractor. I do a lot of installs for different companies and retailers, and one company that I do in Salesforce. There are probably 20 or 30 instances of it that I'm actively involved in at any given moment.
The solution is deployed on Zscaler's private cloud.
View full review »The tool is a proxy service that provides inspection of URL filtering for internet access. We have probably 20 or 30 different vendors that we work with in regards to carriers. These are all providers that we use that work in conjunction with that platform. It's an agent that's installed on all of our endpoints. We whitelist and blacklist and we allow certain websites, et cetera, using this product.
View full review »Unlike unconventional data that's being exposed, data loss prevention can become very difficult. Several of the old technologies, such as Symantec and McAfee, can cause a range of problems. On top of that, it derives from a lot of fines for customer loss. You can go through legal ramifications and damage to your company brand when data is exposed. Zscaler creates a significant bypass of security controls. It helps you with your compliance. Basically, it will then help you protect sensitive data.
Zscaler's Cloud DLP will also assist the users off-network, protecting them against data loss. The Cloud DLP will inspect all the traffic including SSL, which will give you protection and visibility. Zscaler Cloud DLP will also allow for compliance. It'll give you compliance for all major regulations that you have to go through.
We are resellers and we have multiple vendors for multiple technologies.
We work with Zscaler for their proxy server.
Zscaler proxy server has two uses. It is not just application control, it is for the company users to access company data from the outside, or for the company users from inside the company to access the internet.
It's a completely SaaS-based application.
View full review »Increase performance, stability and Secure Remote access for Remote Users.
View full review »Our primary use case of this product is as a VPN solution. I'm the head of IT infrastructure and we're a customer of Zscaler.
View full review »BS
BrunoSTOFFEL
Global Knowledge Based Engineering Manager at Tenneco Inc.
When I am outside of the company, I use Zscaler Private Access. I use Zscaler Private Access in the home, hotel, or wherever for remote working. It is a VPN.
View full review »We use the product for inbound and outbound DNS scanning.
View full review »Our role is as consultant, architectural, and pre-sales.
Rather than purchasing new VPNs and other architecture, our clients use Zscaler SASE to allow their workers to work from home due to COVID.
View full review »It pretty much covers, like, if you implement it, it's going to cover, like, 80 to 90% of real estate for the organization.
View full review »It serves various purposes. Overall, it's pretty good. Not bad at all.
View full review »We are using it for monitoring the global areas, which Zscaler considers for people who are roaming around the system to have a secure connection to internal applications.
View full review »Buyer's Guide
Zscaler Zero Trust Exchange Platform
June 2025

Learn what your peers think about Zscaler Zero Trust Exchange Platform. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
861,390 professionals have used our research since 2012.