Zscaler Internet Access™ (ZIA) is a secure web gateway (SWG), delivering cloud native cyberthreat protection and zero trust access to the internet and SaaS apps.
Screenshot of an overview of Zscaler Internet Access (ZIA), a cloud native security service edge (SSE) solution that builds on a decade of secure web gateway leadership. Offered as a scalable SaaS platform through Zscaler's security cloud, it replaces legacy network security solutions, preventing advanced attacks and data loss with a comprehensive zero trust approach. ZIA is integrated into the Zscaler Zero Trust Exchange™ to provide superior defense-in-depth, secure connectivity, end user experience, and administrative visibility and control.
Key Features
Learn about the best (and worst!) features Zscaler Internet Access has to offer, as determined by TrustRadius' reviewers.
Based on 79 ratings of Zscaler Internet Access's features
Top Performing Features
10+6%
Endpoint Detection and Response (EDR)
Continuous monitoring and response to advanced internet threats by endpoint agents.
Category average: 9.4
10+18%
Segmentation Leveraging
The ability to reduce the impact of an external attack by restricting the access of specified accounts, applications, or services during an attack.
Category average: 8.5
10+19%
Network Topology Mapping
The ability to map a network, in detail, to show performance metrics, device and software connections, and resource utilization.
Category average: 8.4
Areas for Improvement
9.4-2%
Network Data Encryption
Encrypting data so that only the network users with the proper privileges may see and access the data.
Category average: 9.6
9.10%
Automated Threat Identification
Leveraging multiple sources of information (such as threat intelligence databases) to automatically identify threats.
Category average: 9.1
5-39%
Multi-Factor Authentication
Using multiple, independent components to gain access
Category average: 8.2
Reviews
What users are saying about Zscaler Internet Access.
A de minimis incentive was given to thank the reviewer for their time. The incentive was not used to bias or drive a particular response, nor was the incentive contingent on a positive endorsement. More Info
Senior Systems Engineer in Information Technology at NVR INC (1001-5000 employees employees)
Use Cases and Deployment Scope
We use it for URL filtering, creating policies around risky web sites and policies around media entertainment sites so that we can limit the sites that users can visit and/or limit the actions that users can take on specific sites such as YouTube with an upload action limitation. We also use it to view and analyze user behavior to direct future policy decisions.
Pros
URL filtering
Internet access policies
User action limitations
Cons
User Interface could be a little better
The activate button when making changes could be better, activate seems somewhat like a misnomer especially to newer admins/engineers to the product, a more accurate word would be publish.
Blocked action message for the user could be more user friendly
Return on Investment
Has allowed us to remove other products that were suboptimal
Saved us money overall by stacking it with other Zscaler products
Created a more secure work environment for our users through intelligent internet policies that are not needlessly restrictive while still maintaining security best practices
Usability
Alternatives Considered
Citrix Endpoint Management, Citrix Gateway and AWS Firewall Manager
Other Software Used
Zscaler Private Access, Zscaler Digital Experience, Zscaler Data Protection
A de minimis incentive was given to thank the reviewer for their time. The incentive was not used to bias or drive a particular response, nor was the incentive contingent on a positive endorsement. More Info
VP Infrastructure in Information Technology at KA (51-200 employees employees)
Use Cases and Deployment Scope
Replaced web filtering on the firewall and openDNS with this solution. It gave us the ability to see what users are doing both in the office and remotely.
Pros
No need to be in the office.
1 agent.
SSL inspection.
Cons
Not a lightweight app when combined with ZPA.
An agent can pick a foreign data center when close to the border.
A de minimis incentive was given to thank the reviewer for their time. The incentive was not used to bias or drive a particular response, nor was the incentive contingent on a positive endorsement. More Info
Sr Systems Engineer in Information Technology at Global Partners LP (201-500 employees employees)
Use Cases and Deployment Scope
Deployed across 1500 users to provide user internet activity visibility and impose controls as needed to enforce published policies.
Pros
Aggregation of deployed base internet usage.
The ability to create and apply URL & cloud policies to those users.
Reportable metrics on internet access as a whole.
Cons
Sectional exports & reports. For example, provide the CIO with Zero Trust "holes" because of "sacred cow" users. It'd be nice to generate reporting or even CSV exports for that data for easier communication.
Tenant resolution - regardless of my physical or logical location, the ZIA tenant landing always takes longer to resolve than one would think.
Return on Investment
We just turned off the general VPN this week, post Zscaler rollout of ZPA & ZIA, but it's still the "new" kid on the block, so "everything" is a Zscaler issue.
The ZIA implementation revealed to us exactly how inadequate our internal policies regarding internet access are. Instead of leveraging the tool to reduce risk factors, we find ourselves adjusting ZIA policies to accommodate user complaints rather than adhering to company policy enforcement.
Usability
Alternatives Considered
Netskope CASB
Other Software Used
Smokescreen IllusionBlack, from Zscaler, Zscaler Digital Experience, Zscaler Private Access
A de minimis incentive was given to thank the reviewer for their time. The incentive was not used to bias or drive a particular response, nor was the incentive contingent on a positive endorsement. More Info
network engineer in Information Technology at csc global (5001-10,000 employees employees)
Use Cases and Deployment Scope
we are using Zscaler Internet Access to help secure our users internet data exposure and enforce compliance to company policy. WE have had issues with staff accessing un secure sites under the pretence of trying to do work however this was not the case.
Pros
easier deployment
the reporting is great
the ease of use for back end users helps manege things better
Cons
the training material is not great
having a high level overview of all platforms under one screen would help
Return on Investment
compliance protection
current negative due to complexity in deployment alongside Palo
A de minimis incentive was given to thank the reviewer for their time. The incentive was not used to bias or drive a particular response, nor was the incentive contingent on a positive endorsement. More Info
Cyber Risk Advisor in Information Technology at Marathon Petroleum (10,001+ employees employees)
Use Cases and Deployment Scope
It has removed the burden of the internal infrastructure and improved latency. We have noticed that the user satisfaction and user experience has improved as well. What we have enjoyed most has been that we can remove the dependency of some segmentation efforts and reduce the endpoint burden of configuration sets.
Pros
Efficiency
Reliability
Simplifying.
Security
Cons
Localizing the network
More protocol support
Less impact to OT devices like PLCs
Return on Investment
Reduces our threat landscape
Reduces the footprint of technology devices
future proofs the segmentation and network hardware
Usability
Other Software Used
Microsoft 365
Related Products
Products similar to Zscaler Internet Access that may also meet your needs.