Try our new research platform with insights from 80,000+ expert users
Cloud Security Connector for Zscaler Logo

Cloud Security Connector for Zscaler Reviews

4.5 out of 5

What is Cloud Security Connector for Zscaler?

Cloud Security Connector for Zscaler mindshare

As of August 2025, the mindshare of Cloud Security Connector for Zscaler in the AWS Marketplace category stands at 0.7%, down from 3.2% compared to the previous year, according to calculations based on PeerSpot user engagement data.
AWS Marketplace
 
 
Key learnings from peers

Valuable Features

Room for Improvement

Top industries

By visitors reading reviews
Insurance Company
22%
Computer Software Company
12%
Manufacturing Company
11%
Financial Services Firm
8%
Educational Organization
5%
Retailer
5%
University
3%
Construction Company
3%
Engineering Company
3%
Legal Firm
3%
Logistics Company
3%
Outsourcing Company
3%
Real Estate/Law Firm
3%
Government
1%
Marketing Services Firm
1%
Media Company
1%
Non Profit
1%
Aerospace/Defense Firm
1%
Performing Arts
1%
Printing Company
1%
Comms Service Provider
1%
Recreational Facilities/Services Company
1%
Hospitality Company
1%
Healthcare Company
1%
Renewables & Environment Company
1%
Energy/Utilities Company
1%
 

Cloud Security Connector for Zscaler reviews

Sort by:
Deepak  Nagar - PeerSpot user
Manager, Strategic Alliances at Softcell Technologies Limited
Verified user of Cloud Security Connector for Zscaler
Jan 19, 2024
A fast and scalable solution that is secure and can be modified according to the customers’ requirements

Pros

"The solution is secure."

Cons

"The connectivity could be faster."
TS
Technical Associate at IntimeSolutions
Verified user of Cloud Security Connector for Zscaler
Aug 13, 2024
Prevents the end-user system from being compromised and good integration capabilities

Pros

" It is very useful ............visibility on the end-user,"

Cons

"If there are any issues at the network level, such as users working from home, then it is very hard to catch up with them and resolve issues on the end-user machine. "