Zscaler Private Access Features
What are the features of Zscaler Private Access?
Authentication Options
- Authentication User experience
- Multi-Factor Authentication
- Supports Required Authentication Methods/Protocols
Administration
- Password Policy Enforcement
Network Management
- Network Segmentation
- Network Mapping
- Security Analytics
- API/Integrations
Security
- Security Automation
- Application Security
- Workload Protection
- Data Protection
Identity Management
- Adaptive Access Control
- Identity Scoring
- User Monitoring
Top Rated Zscaler Private Access Alternatives
Zscaler Private Access Categories on G2
Filter for Features
Authentication Options
Authentication User experience | Based on 18 Zscaler Private Access reviews. Process of providing credentials and logging into multiple systems is easy and intuitive for users | 91% (Based on 18 reviews) | |
Supports Required Authentication systems | As reported in 17 Zscaler Private Access reviews. Supports required 3rd party Authentication Technologies. Example systems: bioMetric, passwords, key cards, token based systems, etc. | 90% (Based on 17 reviews) | |
Multi-Factor Authentication | Provides support for Multi-Factor authentication, so users are required to provide multiple factors to authenticate. For example, something they know, Something they have or something they are. This feature was mentioned in 17 Zscaler Private Access reviews. | 90% (Based on 17 reviews) | |
Supports Required Authentication Methods/Protocols | Support SSO via Web agents, proxy agents, agent-less, SAML or oAuth and WS-Federation authentication and authorization Web services depending upon the application and business use case This feature was mentioned in 17 Zscaler Private Access reviews. | 92% (Based on 17 reviews) | |
Federation/SAML support (idp) | As reported in 14 Zscaler Private Access reviews. Can serve as the identity provider to external service providers so that when the user logs into a service, instead of providing credentials to the service provider, the service provider trusts the identity provider to validate the credentials. | 83% (Based on 14 reviews) | |
Federation/SAML support (sp) | Can serve as the Service provider from an external service so that when the user logs in externally they have seamless SSO to internal applications from a service provider. This feature was mentioned in 14 Zscaler Private Access reviews. | 86% (Based on 14 reviews) |
Access Control Types
Endpoint access | As reported in 16 Zscaler Private Access reviews. Provides ability to control access to PC's, Mobile devices, and other endpoint devices. | 96% (Based on 16 reviews) | |
Local Access | Controls access to legacy applications, web based applications, network resources and servers while employees are on the companies local area network. 15 reviewers of Zscaler Private Access have provided feedback on this feature. | 90% (Based on 15 reviews) | |
Remote Access | Controls access to legacy applications, web based applications, networks resources while employees are outside the local area network. This feature was mentioned in 16 Zscaler Private Access reviews. | 83% (Based on 16 reviews) | |
Partner Access | Based on 14 Zscaler Private Access reviews. Controls access to users that are not company employees that are either within the companies local area network or outside the network | 80% (Based on 14 reviews) | |
Supports BYOD users | Enables users to use their own device to access company applications. 14 reviewers of Zscaler Private Access have provided feedback on this feature. | 76% (Based on 14 reviews) |
Administration
Ease of installation on server | Based on 16 Zscaler Private Access reviews. Installation process is easy and flexible. | 84% (Based on 16 reviews) | |
Password Policy Enforcement | Options for resetting and enforcing password policies 17 reviewers of Zscaler Private Access have provided feedback on this feature. | 91% (Based on 17 reviews) | |
Administration Console | As reported in 16 Zscaler Private Access reviews. Provides Administration tools/console that are easy to use and learn for routine maintenance tasks | 94% (Based on 16 reviews) | |
Ease of connecting applications | As reported in 16 Zscaler Private Access reviews. Easily provisions new systems, platforms or applications using configuration and not customization. | 90% (Based on 16 reviews) | |
Self Service Password Administration | Users can set, change passwords without interaction from IT staff This feature was mentioned in 16 Zscaler Private Access reviews. | 85% (Based on 16 reviews) |
Platform
Multiple Operating system support | Supports Endpoint access control to multiple operating systems 15 reviewers of Zscaler Private Access have provided feedback on this feature. | 87% (Based on 15 reviews) | |
Multi-Domain Support | Allows user authentication to be honored by all the hosts in two or more domains This feature was mentioned in 15 Zscaler Private Access reviews. | 84% (Based on 15 reviews) | |
Cross Browser support | Support access to browser based applications across required browser types This feature was mentioned in 15 Zscaler Private Access reviews. | 83% (Based on 15 reviews) | |
Fail over protection | As reported in 14 Zscaler Private Access reviews. Provides required failover mechanisms to ensure if one server, network, etc fails users are still able able to authenticate | 87% (Based on 14 reviews) | |
Reporting | Contains pre-built and custom reporting tools to required to manage business 15 reviewers of Zscaler Private Access have provided feedback on this feature. | 91% (Based on 15 reviews) | |
Auditing | Provides mechanism for auditing authentication for trouble shooting purposes. This feature was mentioned in 15 Zscaler Private Access reviews. | 86% (Based on 15 reviews) | |
Third Party Web Services support | Can call and pass credentials to third party web services. 12 reviewers of Zscaler Private Access have provided feedback on this feature. | 86% (Based on 12 reviews) |
Network Management
Network Segmentation | Based on 23 Zscaler Private Access reviews. Allows administrative control over network components, mapping, and segmentation. | 89% (Based on 23 reviews) | |
Network Mapping | Allows visual display of networks segmented components and their connected resources. 25 reviewers of Zscaler Private Access have provided feedback on this feature. | 88% (Based on 25 reviews) | |
Security Analytics | Utilizes behavioral analysis to improve security procedures and documentation. This feature was mentioned in 24 Zscaler Private Access reviews. | 92% (Based on 24 reviews) | |
API/Integrations | Based on 23 Zscaler Private Access reviews. Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications. | 86% (Based on 23 reviews) |
Security
Security Automation | Allows administrative control over automated security tasks. 24 reviewers of Zscaler Private Access have provided feedback on this feature. | 91% (Based on 24 reviews) | |
Application Security | Based on 26 Zscaler Private Access reviews. Protects application access and data. Prompts additional authentication for suspicious users. | 92% (Based on 26 reviews) | |
Workload Protection | As reported in 24 Zscaler Private Access reviews. Protects computing resources across a network. Prompts additional authentication for suspicious users. | 83% (Based on 24 reviews) | |
Data Protection | Based on 25 Zscaler Private Access reviews. Protects informatin stored on premises and in the cloud. Prompts additional authentication for suspicious users. | 92% (Based on 25 reviews) |
Identity Management
Adaptive Access Control | Provides a risk-based approcach to determining trust within the network. 23 reviewers of Zscaler Private Access have provided feedback on this feature. | 90% (Based on 23 reviews) | |
Identity Scoring | As reported in 22 Zscaler Private Access reviews. Calculates risk based on user behavior, permissions, and requests. | 91% (Based on 22 reviews) | |
User Monitoring | As reported in 25 Zscaler Private Access reviews. Monitors users attempting unauthorized access to databases, applicaitons, and othe network components. | 91% (Based on 25 reviews) |