Introducing G2.ai, the future of software buying.Try now

Compare Check Point URL Filtering and Zscaler Internet Access

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Check Point URL Filtering
Check Point URL Filtering
Star Rating
(56)4.5 out of 5
Market Segments
Mid-Market (61.1% of reviews)
Information
Entry-Level Pricing
No pricing available
Learn more about Check Point URL Filtering
Zscaler Internet Access
Zscaler Internet Access
Star Rating
(159)4.4 out of 5
Market Segments
Enterprise (53.9% of reviews)
Information
Entry-Level Pricing
No pricing available
Learn more about Zscaler Internet Access
AI Generated Summary
AI-generated. Powered by real user reviews.
  • Users report that Zscaler Internet Access excels in SSL/TLS Inspection with a score of 9.5, which reviewers mention provides robust security for encrypted traffic, while Check Point URL Filtering, although strong, scores slightly lower at 9.2 in this area.
  • Reviewers mention that Zscaler's URL Filtering feature stands out with a perfect score of 10.0, indicating exceptional performance in blocking malicious URLs, whereas Check Point's URL Filtering, while effective, scores 9.2, suggesting it may not be as comprehensive.
  • G2 users highlight Zscaler's ease of setup with a score of 8.9, making it user-friendly for organizations looking to implement quickly, compared to Check Point's higher score of 9.6, which indicates an even smoother setup experience.
  • Users on G2 report that Zscaler's policy management is rated at 8.7, which some reviewers feel could be improved, while Check Point shines with a score of 9.2, indicating a more intuitive and flexible policy management system.
  • Reviewers mention that Zscaler's global access feature scores lower at 7.5, which some users find limiting for remote work scenarios, while Check Point offers a better score of 9.0, suggesting it provides more reliable global access capabilities.
  • Users say that Zscaler's quality of support is rated at 8.8, which is generally positive, but Check Point's score of 8.6 indicates that both products have room for improvement in customer support, with users desiring more responsive service.
Pricing
Entry-Level Pricing
Check Point URL Filtering
No pricing available
Zscaler Internet Access
No pricing available
Free Trial
Check Point URL Filtering
No trial information available
Zscaler Internet Access
No trial information available
Ratings
Meets Requirements
9.3
45
8.8
123
Ease of Use
9.3
47
8.7
126
Ease of Setup
9.2
43
8.4
80
Ease of Admin
9.3
32
8.8
48
Quality of Support
9.1
45
8.7
115
Has the product been a good partner in doing business?
9.0
32
8.8
45
Product Direction (% positive)
9.7
45
9.3
122
Features by Category
Not enough data
8.8
25
Sandbox
Not enough data
8.8
20
Evaluation
Not enough data
9.0
20
Not enough data
9.0
20
Not enough data
9.1
20
Not enough data
8.6
20
Data Loss Prevention (DLP)Hide 10 FeaturesShow 10 Features
Not enough data
9.0
34
Administration
Not enough data
9.0
26
Not enough data
9.0
27
Not enough data
9.0
26
Governance
Not enough data
9.3
27
Not enough data
9.2
25
Not enough data
9.1
27
Security
Not enough data
9.3
26
Not enough data
8.9
26
Not enough data
9.2
27
Not enough data
9.1
27
Not enough data
9.0
51
Administration
Not enough data
8.8
42
Not enough data
9.2
41
Not enough data
9.1
42
Not enough data
9.1
41
Agentic AI - Firewall Software
Not enough data
Not enough data
Not enough data
Not enough data
Functionality
Not enough data
9.2
39
Not enough data
9.0
39
Not enough data
9.2
41
Not enough data
9.1
40
Monitoring
Not enough data
9.0
42
Not enough data
9.1
41
Not enough data
9.3
42
Not enough data
9.2
41
Generative AI
Not enough data
8.0
15
Artificial Intelligence - Firewall
Not enough data
9.7
5
Software-Defined Perimeter (SDP)Hide 11 FeaturesShow 11 Features
Not enough data
8.4
9
Administration
Not enough data
8.1
7
Not enough data
8.1
7
Not enough data
7.9
7
Protection
Not enough data
8.6
7
Not enough data
9.2
8
Not enough data
8.8
7
Not enough data
8.6
7
Monitoring
Not enough data
8.8
8
Not enough data
9.0
7
Not enough data
8.6
7
Not enough data
9.0
7
8.9
27
8.9
34
Web Content and Traffic Filtering - Secure Web Gateways
9.0
27
9.2
33
8.8
27
8.7
33
9.8
27
8.8
33
9.4
27
9.0
32
8.6
27
8.5
32
Data Protection and Loss Prevention - Secure Web Gateways
8.8
27
9.2
31
9.0
27
9.0
31
9.6
27
9.2
30
8.8
27
8.9
30
Access Control and Authentication - Secure Web Gateways
8.9
27
9.2
31
8.6
27
9.1
31
8.9
27
9.2
31
Performance and Management - Secure Web Gateways
8.7
27
8.9
31
8.4
27
8.8
30
8.8
27
8.7
32
9.1
27
8.8
32
8.9
27
8.9
32
Not enough data
9.2
6
Identity and Access Management - Zero Trust Platforms
Not enough data
9.2
6
Not enough data
9.2
6
Not enough data
9.4
6
Not enough data
9.2
6
Security - Zero Trust Platforms
Not enough data
10.0
6
Not enough data
8.9
6
Not enough data
9.4
6
Not enough data
9.2
6
Not enough data
9.7
6
Data Security - Zero Trust Platforms
Not enough data
10.0
6
Not enough data
9.7
6
Application Visibility - Zero Trust Platforms
Not enough data
8.6
6
Not enough data
9.2
6
Not enough data
9.4
6
Not enough data
8.6
6
Not enough data
9.2
6
Reporting and Policies - Zero Trust Platforms
Not enough data
9.2
6
Not enough data
9.7
6
Not enough data
9.7
6
Not enough data
8.9
6
Not enough data
8.9
6
Agentic AI - Zero Trust Platforms
Not enough data
8.6
6
Not enough data
8.1
6
Not enough data
9.2
6
Not enough data
9.2
6
Secure Service Edge (SSE) SolutionsHide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Components - Secure Service Edge (SSE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Artificial Intelligence -Secure Service Edge (SSE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Secure Service Edge (SSE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Compliance
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
Check Point URL Filtering
Check Point URL Filtering
Zscaler Internet Access
Zscaler Internet Access
Check Point URL Filtering and Zscaler Internet Access are categorized as Secure Web Gateways
Unique Categories
Check Point URL Filtering
Check Point URL Filtering has no unique categories
Reviews
Reviewers' Company Size
Check Point URL Filtering
Check Point URL Filtering
Small-Business(50 or fewer emp.)
18.5%
Mid-Market(51-1000 emp.)
61.1%
Enterprise(> 1000 emp.)
20.4%
Zscaler Internet Access
Zscaler Internet Access
Small-Business(50 or fewer emp.)
17.0%
Mid-Market(51-1000 emp.)
29.1%
Enterprise(> 1000 emp.)
53.9%
Reviewers' Industry
Check Point URL Filtering
Check Point URL Filtering
Information Technology and Services
35.2%
Computer & Network Security
24.1%
Financial Services
9.3%
Defense & Space
9.3%
Information Services
3.7%
Other
18.5%
Zscaler Internet Access
Zscaler Internet Access
Information Technology and Services
24.1%
Computer Software
9.9%
Computer & Network Security
7.8%
Financial Services
7.1%
Hospital & Health Care
4.3%
Other
46.8%
Alternatives
Check Point URL Filtering
Check Point URL Filtering Alternatives
Cisco Umbrella
Cisco Umbrella
Add Cisco Umbrella
DNSFilter
DNSFilter
Add DNSFilter
Symantec Web Security Service
Symantec Web Security.cloud
Add Symantec Web Security Service
NordLayer
NordLayer
Add NordLayer
Zscaler Internet Access
Zscaler Internet Access Alternatives
Netskope One Platform
Netskope One Platform
Add Netskope One Platform
Absolute Secure Access
Absolute Secure Access
Add Absolute Secure Access
Cisco Duo
Cisco Duo
Add Cisco Duo
Cisco Umbrella
Cisco Umbrella
Add Cisco Umbrella
Discussions
Check Point URL Filtering
Check Point URL Filtering Discussions
Monty the Mongoose crying
Check Point URL Filtering has no discussions with answers
Zscaler Internet Access
Zscaler Internet Access Discussions
What is Zscaler Internet Access used for?
1 Comment
Naveen K.
NK
Block the unwanted access of websites where organizations control it from anywhere via this tool.Read more
Monty the Mongoose crying
Zscaler Internet Access has no more discussions with answers