We use Zscaler Cloud IPS for threat protection, full SSL inspection, and data center scalability. It integrates with multiple products, including cloud firewalls, cloud sandboxing, Cloud Security Broker (CSB), and Data Loss Prevention (DLP). It helps us allow or block specific TCP or UDP ports, ensuring that only authorized traffic is permitted.
Chief Platform Officer at a comms service provider with 51-200 employees
Real User
2021-08-19T18:26:54Z
Aug 19, 2021
We primarily use the solution for offering local secure internet access, such as those involving IPsec or GRE tunnels from site to the Zscaler. The security operation people running the policies and activating the different features provide insight into what is going on within the Zscaler solution.
Find out what your peers are saying about Zscaler, Darktrace, Palo Alto Networks and others in Intrusion Detection and Prevention Software (IDPS). Updated: March 2024.
What Is an Intrusion Detection System? Intrusion detection systems (IDSes) analyze network traffic for signatures of known attackers. The systems can be hardware devices or software solutions. An IDS can mitigate existing malware, such as backdoors, rootkits, and trojans.The goal of an intrusion detection system is to detect an attack as it occurs. The system starts by analyzing inbound and outbound network traffic for signs of known attackers.
Some activities an IDS performs...
We use Zscaler Cloud IPS for threat protection, full SSL inspection, and data center scalability. It integrates with multiple products, including cloud firewalls, cloud sandboxing, Cloud Security Broker (CSB), and Data Loss Prevention (DLP). It helps us allow or block specific TCP or UDP ports, ensuring that only authorized traffic is permitted.
We use Zscaler Cloud IPS for internet access, extended log store, cloud application control, and advanced threat protection.
I've used Zscaler mostly for URL filtering, SSL Decryption, etc.
We are running multiple production environments there, so that's pretty much it.
We primarily use the solution for offering local secure internet access, such as those involving IPsec or GRE tunnels from site to the Zscaler. The security operation people running the policies and activating the different features provide insight into what is going on within the Zscaler solution.