116 Zscaler Internet Access Reviews
Overall Review Sentiment for Zscaler Internet Access
Log in to view review sentiment.

Unintrusive and reliable platform, with robust settings for quick updating turnaround Review collected by and hosted on G2.com.
Took some time to get running and define what we needed initially Review collected by and hosted on G2.com.
This best internet security option for roaming client and organization users. Review collected by and hosted on G2.com.
Nothing dislike on Zscaler Internet Access. Review collected by and hosted on G2.com.
Detects, prevents, and mitigates cyber threats, safeguarding systems, data, and user privacy from malicious attacks Review collected by and hosted on G2.com.
Can potentially generate false alarms while using in everyday work Review collected by and hosted on G2.com.
Best part about it was the protection from outside threats real-time when its running fine. On my machine - Lenovo T14, I was able to download and setup quickly but setting up rules was not very easy. Review collected by and hosted on G2.com.
My organization has upgraded from Pulse Secure to Zscaler and now Citrix. The setting up of rules is not very easy. Documentation of Zscaler is a little tough to go through to accomplish few tasks. It creates trouble in loading few websites, even in internal LAN. A lot of issues have been reported which is why it has been a hassle. Review collected by and hosted on G2.com.

Best part about Zscaler is that its easy to use. Once logged in, you have an option to keep yourself logged on and protect all information from attacks. It also supports SSO. Im also not allowed to use the web unless I log onto Zscaler which gives added protection. Review collected by and hosted on G2.com.
So far, theres nothing that I dislike about this product. It supports everything from my organization and team perspective. Review collected by and hosted on G2.com.

I have worked on ZIA, ZPA products in zsclaer, they work seamlessly, also provides complet security. Review collected by and hosted on G2.com.
Nothing much to dislike the product in my 4 years of zscaler Review collected by and hosted on G2.com.
The ability to provide customers peace of mind with securing their endpoints, wherever they are.
It provides enterprise-level security, monitoring, and visibility of threats. Review collected by and hosted on G2.com.
It can be tough at first to get familiar with the interface, and deciding on which versions to enable for your environment to deploy.
The SSL certificate has to be first trusted from mac installations. Some admins or end users forget this step. Would prefer if it was automatic. Review collected by and hosted on G2.com.
Controls to block the URLs.
Controls to limit access of the URLs to certain users only. Review collected by and hosted on G2.com.
it doesn't provide DLP support, which is a huge drawback here Review collected by and hosted on G2.com.
We like the way the software is designed and it is very easy to understand.
The level of security is very high. Review collected by and hosted on G2.com.
It sometimes disturbs our performance by increasing the utilization of the CPU and Memory.
The price is also quite high. Review collected by and hosted on G2.com.

This client is supposed to be user transparent.. and it is, as long as you have a standard configuration PC. If you have custom setups or need access to a broad variety of networks (such as road warriors), be prepared to have some bumps. It does allow passthroughs on trusted networks to essential functionality (such as Office 365 outlook or gmail) which has reduced traffic on our unsecured network by employees who need these functions. (Email?? who would have thought we needed email??) Review collected by and hosted on G2.com.
If you have custom setups or need access to a broad variety of networks (such as road warriors), be prepared to have some bumps. You may have conflicts with network adaptors or VPN clients that need to run on top of Zscaler... so that the multiple layers of security create situations where users can't be optimally productive. Review collected by and hosted on G2.com.