Compare Check Point URL Filtering and Zscaler Internet Access

Save your comparisonKeep these tools in one place and come back anytime.
Save to board
At a Glance
Check Point URL Filtering
Check Point URL Filtering
Star Rating
(58)4.5 out of 5
Market Segments
Mid-Market (62.5% of reviews)
Information
Pros & Cons
Not enough data
Entry-Level Pricing
No pricing available
Learn more about Check Point URL Filtering
Zscaler Internet Access
Zscaler Internet Access
Star Rating
(191)4.4 out of 5
Market Segments
Enterprise (50.9% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Zscaler Internet Access
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that Zscaler Internet Access excels in providing a seamless, cloud-delivered security experience, which is particularly appreciated for its URL Filtering Policies. Users highlight the ability to block or allow connections based on specific URLs, domains, or IPs, enhancing control over web access and reducing risks associated with blocked URLs.
  • Users say Check Point URL Filtering offers robust protection without hindering productivity. Reviewers commend its capability to quickly and accurately block access to malicious or inappropriate sites while allowing for exceptions, which helps maintain a balance between security and user flexibility.
  • According to verified reviews, Zscaler Internet Access is praised for its consistent performance and easy scalability. Users appreciate that everything is managed in the cloud, which not only simplifies infrastructure but also enhances data protection by preventing accidental leaks.
  • Reviewers mention that Check Point URL Filtering provides precise control over website access, allowing organizations to block harmful pages while ensuring that productivity is not affected. This feature is particularly valued in environments where employee focus on work-related browsing is crucial.
  • G2 reviewers highlight that while Zscaler Internet Access has a slightly lower rating in terms of ease of use and setup compared to Check Point, it still offers a user-friendly experience. Users appreciate the intuitive onboarding process, which helps in quickly implementing security policies across the organization.
  • Users report that Check Point URL Filtering is frequently updated with new categories and threats, providing confidence in its ability to adapt to the evolving security landscape. This proactive approach to threat management is a significant advantage for users looking for reliable and up-to-date protection.
Pricing
Entry-Level Pricing
Check Point URL Filtering
No pricing available
Zscaler Internet Access
No pricing available
Free Trial
Check Point URL Filtering
No trial information available
Zscaler Internet Access
No trial information available
Ratings
Meets Requirements
9.3
47
8.8
136
Ease of Use
9.3
49
8.7
140
Ease of Setup
9.1
45
8.5
93
Ease of Admin
9.3
34
8.9
50
Quality of Support
9.2
47
8.7
128
Has the product been a good partner in doing business?
9.0
34
8.9
47
Product Direction (% positive)
9.8
47
9.4
135
Features by Category
Not enough data
8.8
26
Sandbox
Not enough data
8.9
21
Evaluation
Not enough data
9.0
20
Not enough data
9.0
20
Not enough data
9.1
20
Not enough data
8.6
20
Data Loss Prevention (DLP)Hide 10 FeaturesShow 10 Features
Not enough data
9.1
35
Administration
Not enough data
9.1
27
Not enough data
9.0
28
Not enough data
9.0
27
Governance
Not enough data
9.3
28
Not enough data
9.2
26
Not enough data
9.2
28
Security
Not enough data
9.3
27
Not enough data
9.0
27
Not enough data
9.2
29
Not enough data
9.0
28
Not enough data
9.1
51
Administration
Not enough data
8.7
43
Not enough data
9.2
42
Not enough data
9.1
43
Not enough data
9.1
42
Agentic AI - Firewall Software
Not enough data
9.7
5
Not enough data
9.7
5
Functionality
Not enough data
9.2
40
Not enough data
9.0
40
Not enough data
9.2
42
Not enough data
9.1
41
Monitoring
Not enough data
9.0
43
Not enough data
9.1
42
Not enough data
9.3
43
Not enough data
9.2
42
Generative AI
Not enough data
8.1
16
Artificial Intelligence - Firewall
Not enough data
9.7
5
Software-Defined Perimeter (SDP)Hide 11 FeaturesShow 11 Features
Not enough data
8.5
10
Administration
Not enough data
8.3
8
Not enough data
8.3
8
Not enough data
8.3
9
Protection
Not enough data
8.9
9
Not enough data
9.3
9
Not enough data
9.0
8
Not enough data
8.8
8
Monitoring
Not enough data
8.7
9
Not enough data
8.8
8
Not enough data
8.8
8
Not enough data
8.5
8
9.0
28
8.9
47
Web Content and Traffic Filtering - Secure Web Gateways
9.0
27
9.1
38
8.9
28
8.7
36
9.8
28
8.8
36
9.4
27
9.0
37
8.6
27
8.4
33
Data Protection and Loss Prevention - Secure Web Gateways
8.8
27
9.3
36
9.0
27
9.1
34
9.6
27
9.3
34
8.8
27
9.0
33
Access Control and Authentication - Secure Web Gateways
8.9
27
9.1
34
8.6
27
9.2
35
8.9
27
9.3
36
Performance and Management - Secure Web Gateways
8.8
28
8.7
41
8.4
27
8.8
33
8.8
27
8.6
34
9.1
28
8.6
39
8.9
27
8.9
32
Not enough data
9.2
9
Identity and Access Management - Zero Trust Platforms
Not enough data
9.2
6
Not enough data
9.2
6
Not enough data
9.4
6
Not enough data
9.2
6
Security - Zero Trust Platforms
Not enough data
10.0
6
Not enough data
8.9
6
Not enough data
9.4
6
Not enough data
9.2
6
Not enough data
9.7
6
Data Security - Zero Trust Platforms
Not enough data
10.0
7
Not enough data
9.7
6
Application Visibility - Zero Trust Platforms
Not enough data
8.6
6
Not enough data
9.2
6
Not enough data
9.4
6
Not enough data
8.6
6
Not enough data
9.2
6
Reporting and Policies - Zero Trust Platforms
Not enough data
9.2
6
Not enough data
9.7
6
Not enough data
9.8
7
Not enough data
9.0
7
Not enough data
8.9
6
Agentic AI - Zero Trust Platforms
Not enough data
8.6
6
Not enough data
8.1
6
Not enough data
9.2
6
Not enough data
9.2
6
Secure Service Edge (SSE) SolutionsHide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Components - Secure Service Edge (SSE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Artificial Intelligence -Secure Service Edge (SSE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Secure Service Edge (SSE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Model Protection - AI Security Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Runtime Monitoring - AI Security Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Policy Enforcement and Compliance - AI Security Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Compliance
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
Check Point URL Filtering
Check Point URL Filtering
Zscaler Internet Access
Zscaler Internet Access
Check Point URL Filtering and Zscaler Internet Access are categorized as Secure Web Gateways
Unique Categories
Check Point URL Filtering
Check Point URL Filtering has no unique categories
Reviews
Reviewers' Company Size
Check Point URL Filtering
Check Point URL Filtering
Small-Business(50 or fewer emp.)
17.9%
Mid-Market(51-1000 emp.)
62.5%
Enterprise(> 1000 emp.)
19.6%
Zscaler Internet Access
Zscaler Internet Access
Small-Business(50 or fewer emp.)
17.6%
Mid-Market(51-1000 emp.)
31.5%
Enterprise(> 1000 emp.)
50.9%
Reviewers' Industry
Check Point URL Filtering
Check Point URL Filtering
Information Technology and Services
37.5%
Computer & Network Security
23.2%
Financial Services
8.9%
Defense & Space
8.9%
Information Services
3.6%
Other
17.9%
Zscaler Internet Access
Zscaler Internet Access
Information Technology and Services
22.6%
Computer Software
10.3%
Computer & Network Security
7.7%
Financial Services
6.5%
Hospital & Health Care
3.9%
Other
49.0%
Alternatives
Check Point URL Filtering
Check Point URL Filtering Alternatives
Cisco Umbrella
Cisco Umbrella
Add Cisco Umbrella
DNSFilter
DNSFilter
Add DNSFilter
Symantec Web Security Service
Symantec Web Security.cloud
Add Symantec Web Security Service
NordLayer
NordLayer
Add NordLayer
Zscaler Internet Access
Zscaler Internet Access Alternatives
Check Point SASE
Check Point SASE
Add Check Point SASE
Netskope One Platform
Netskope One Platform
Add Netskope One Platform
Absolute Secure Access
Absolute Secure Access
Add Absolute Secure Access
Check Point Next Generation Firewalls (NGFWs)
Check Point Next Generation...
Add Check Point Next Generation Firewalls (NGFWs)
Discussions
Check Point URL Filtering
Check Point URL Filtering Discussions
Monty the Mongoose crying
Check Point URL Filtering has no discussions with answers
Zscaler Internet Access
Zscaler Internet Access Discussions
What is Zscaler Internet Access used for?
1 Comment
Naveen K.
NK
Block the unwanted access of websites where organizations control it from anywhere via this tool.Read more
Monty the Mongoose crying
Zscaler Internet Access has no more discussions with answers