Organizations should plan the deployment carefully, especially around routing and network design. Understanding the traffic flow and dependencies upfront helps avoid issues later. It is important to start with a phased rollout and proper policy tuning rather than enabling stricter policies immediately. This ensures minimal impact on applications while maintaining security. This review has been given an overall rating of 8.
One more thing I want to mention is the built-in tools for testing and troubleshooting, which include traffic logs, TCP dump, speed test, and MTR. Everything else is good. The user interface is very attractive and does not require any change. If you are looking into using Cloud Security Connector for Zscaler, I recommend it highly if you are committed to Zscaler and want a very simple automated GRE and IP routing from Azure, AWS, or GCP, without having to manage tunnels or custom NVA designs yourself. Cloud Security Connector for Zscaler is a good solution that can help your Zscaler work better and secure your environment more effectively. It can also integrate with multiple cloud platforms like Azure, AWS, and GCP, making it a must-have solution for organizations based on my observation. I provide this review with an overall rating of 4 out of 5.
I would rate it a nine out of ten. It is recommended for hybrid users, where the work-from-anywhere concept is followed. It is very useful for them to get complete visibility on the end-user and to secure their environment by bridging from outside.
Manager, Strategic Alliances at Softcell Technologies Limited
Real User
Jan 18, 2024
Once the sales activity and upgrades were complete, we requested some licenses and started utilizing them. I will recommend the solution to others. Organizations must remove the bottlenecks and latency issues before converting from the legacy VPN connectivity to Zscaler. Otherwise, we will face some connectivity issues. Overall, I rate the tool a nine out of ten.
Learn what your peers think about Cloud Security Connector for Zscaler. Get advice and tips from experienced pros sharing their opinions. Updated: May 2026.
Cloud Security Connector for Zscaler is designed to enhance security by blocking malicious content and providing agentless integration with cloud workloads. It simplifies policy management and improves scalability, making it a critical tool for securing cloud environments. Cloud Security Connector for Zscaler automates node detection, route selection, and offers centralized visibility, allowing businesses to focus on scaling without traditional firewall constraints. Its high availability...
Organizations should plan the deployment carefully, especially around routing and network design. Understanding the traffic flow and dependencies upfront helps avoid issues later. It is important to start with a phased rollout and proper policy tuning rather than enabling stricter policies immediately. This ensures minimal impact on applications while maintaining security. This review has been given an overall rating of 8.
One more thing I want to mention is the built-in tools for testing and troubleshooting, which include traffic logs, TCP dump, speed test, and MTR. Everything else is good. The user interface is very attractive and does not require any change. If you are looking into using Cloud Security Connector for Zscaler, I recommend it highly if you are committed to Zscaler and want a very simple automated GRE and IP routing from Azure, AWS, or GCP, without having to manage tunnels or custom NVA designs yourself. Cloud Security Connector for Zscaler is a good solution that can help your Zscaler work better and secure your environment more effectively. It can also integrate with multiple cloud platforms like Azure, AWS, and GCP, making it a must-have solution for organizations based on my observation. I provide this review with an overall rating of 4 out of 5.
I would rate it a nine out of ten. It is recommended for hybrid users, where the work-from-anywhere concept is followed. It is very useful for them to get complete visibility on the end-user and to secure their environment by bridging from outside.
Once the sales activity and upgrades were complete, we requested some licenses and started utilizing them. I will recommend the solution to others. Organizations must remove the bottlenecks and latency issues before converting from the legacy VPN connectivity to Zscaler. Otherwise, we will face some connectivity issues. Overall, I rate the tool a nine out of ten.