Compare Coro Cybersecurity and Zscaler Zero Trust Cloud

At a Glance
Coro Cybersecurity
Coro Cybersecurity
Star Rating
(231)4.7 out of 5
Market Segments
Mid-Market (59.3% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Starting at $9.50 1 User Per Month
Free Trial is available
Browse all 3 pricing plans
Zscaler Zero Trust Cloud
Zscaler Zero Trust Cloud
Star Rating
(42)4.6 out of 5
Market Segments
Enterprise (48.6% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Zscaler Zero Trust Cloud
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that Zscaler Zero Trust Cloud excels in providing a comprehensive security platform, integrating features like ZTNA, SSL inspection, and DLP. Users appreciate its advanced capabilities, noting that it goes beyond traditional security measures, making it a robust choice for enterprises.
  • Users say Coro Cybersecurity stands out for its intuitive interface and ease of use. Reviewers highlight how it consolidates multiple security functions into one platform, allowing for better control and insight, which is particularly beneficial for mid-market companies looking for streamlined solutions.
  • According to verified reviews, Zscaler Zero Trust Cloud has a strong reputation for its seamless integration and efficient traffic handling. Users describe it as a "game-changer," emphasizing its user-friendly interface that ensures a secure online experience, which is crucial for organizations with complex security needs.
  • Reviewers mention that Coro Cybersecurity provides excellent support, with many users appreciating the option to let Coro's agents handle issues. This feature gives users peace of mind and allows them to focus on other tasks, making it a favorable choice for those who prefer a more hands-off approach.
  • G2 reviewers highlight that while Zscaler Zero Trust Cloud has a solid performance, it may face challenges in meeting specific workflow needs for some users, particularly in configuration. This can be a consideration for organizations that require highly customized setups.
  • Users report that Coro Cybersecurity's pricing model, starting at $9.50, makes it an attractive option for mid-market businesses. This affordability, combined with its comprehensive features, positions Coro as a strong contender for organizations looking to enhance their cybersecurity without breaking the bank.
Pricing
Entry-Level Pricing
Coro Cybersecurity
Coro Essentials Suite
Starting at $9.50
1 User Per Month
Browse all 3 pricing plans
Zscaler Zero Trust Cloud
No pricing available
Free Trial
Coro Cybersecurity
Free Trial is available
Zscaler Zero Trust Cloud
No trial information available
Ratings
Meets Requirements
9.3
183
8.9
32
Ease of Use
9.5
188
8.6
32
Ease of Setup
9.7
184
8.6
20
Ease of Admin
9.5
180
8.4
19
Quality of Support
9.5
178
8.9
29
Has the product been a good partner in doing business?
9.6
180
8.6
19
Product Direction (% positive)
9.4
178
8.9
31
Features by Category
Cloud Workload Protection PlatformsHide 10 FeaturesShow 10 Features
Not enough data
Not enough data
Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Operations
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Controls
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Network Access Control (NAC)Hide 9 FeaturesShow 9 Features
8.9
12
Not enough data
Data
9.2
10
Not enough data
8.9
9
Not enough data
9.1
9
Not enough data
Network
8.3
10
Not enough data
9.5
11
Not enough data
Feature Not Available
Not enough data
Logistics
Feature Not Available
Not enough data
8.3
10
Not enough data
Feature Not Available
Not enough data
Data Loss Prevention (DLP)Hide 10 FeaturesShow 10 Features
8.9
52
Not enough data
Administration
Feature Not Available
Not enough data
8.8
47
Not enough data
8.4
47
Not enough data
Governance
8.7
41
Not enough data
9.3
45
Not enough data
9.2
48
Not enough data
Security
9.2
22
Not enough data
8.6
47
Not enough data
9.1
47
Not enough data
8.9
46
Not enough data
9.1
140
Not enough data
Administration
9.1
115
Not enough data
9.4
125
Not enough data
9.1
113
Not enough data
9.3
111
Not enough data
Maintenance
9.0
111
Not enough data
9.2
120
Not enough data
9.3
116
Not enough data
Feature Not Available
Not enough data
Security
9.1
126
Not enough data
8.7
86
Not enough data
9.1
119
Not enough data
9.1
115
Not enough data
9.4
127
Not enough data
9.0
111
Not enough data
Cloud Access Security Broker (CASB)Hide 10 FeaturesShow 10 Features
Not enough data
8.9
12
Analysis
Not enough data
9.1
11
Not enough data
8.8
11
Not enough data
8.5
11
Functionality
Not enough data
8.6
11
Not enough data
9.2
11
Not enough data
9.1
11
Security
Not enough data
9.0
10
Not enough data
8.6
11
Not enough data
8.8
11
Not enough data
8.9
11
9.1
40
Not enough data
Security
9.5
38
Not enough data
9.2
36
Not enough data
9.2
34
Not enough data
8.5
31
Not enough data
Compliance
9.0
36
Not enough data
9.3
34
Not enough data
9.5
36
Not enough data
Administration
9.2
35
Not enough data
9.0
35
Not enough data
8.5
30
Not enough data
8.9
93
8.9
17
Data Protection
Feature Not Available
8.8
14
9.0
78
8.9
14
9.0
74
9.0
13
8.9
76
8.5
13
9.3
73
9.1
13
Analysis
8.4
64
9.2
12
9.1
70
9.0
13
8.5
71
8.8
13
Administration
8.8
76
8.8
13
9.0
76
9.0
13
8.6
73
9.1
13
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
9.6
10
Not enough data
Administration
9.7
5
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
9.7
5
Not enough data
Functionality
Not enough data
Not enough data
9.7
5
Not enough data
9.8
8
Not enough data
9.6
9
Not enough data
Analysis
9.0
7
Not enough data
Not enough data
Not enough data
9.7
5
Not enough data
Not enough data
Not enough data
Functionality
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Agentic AI - Cloud Migration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
8.5
57
Not enough data
Security
Feature Not Available
Not enough data
8.8
48
Not enough data
8.7
47
Not enough data
8.7
49
Not enough data
Administration
8.7
50
Not enough data
7.6
20
Not enough data
8.4
48
Not enough data
Access Control
8.5
48
Not enough data
8.1
45
Not enough data
8.2
44
Not enough data
8.8
47
Not enough data
Cloud Security Monitoring and AnalyticsHide 13 FeaturesShow 13 Features
8.9
65
Not enough data
Activity Monitoring
8.4
54
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
9.1
56
Not enough data
Security
9.1
58
Not enough data
8.7
53
Not enough data
8.7
60
Not enough data
Administration
8.9
57
Not enough data
8.9
59
Not enough data
9.0
52
Not enough data
Agentic AI - Cloud Security Monitoring and Analytics
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Malware Analysis ToolsHide 11 FeaturesShow 11 Features
9.4
59
Not enough data
Detection
9.6
56
Not enough data
9.4
49
Not enough data
9.8
53
Not enough data
Analysis
9.3
53
Not enough data
8.6
41
Not enough data
9.4
47
Not enough data
9.4
48
Not enough data
Response
9.6
53
Not enough data
9.5
53
Not enough data
9.5
50
Not enough data
Generative AI
Feature Not Available
Not enough data
Insider Threat Management (ITM)Hide 9 FeaturesShow 9 Features
9.0
19
Not enough data
Functionality
9.5
17
Not enough data
9.4
18
Not enough data
9.0
17
Not enough data
9.7
17
Not enough data
8.9
16
Not enough data
8.5
16
Not enough data
Monitoring
Feature Not Available
Not enough data
Feature Not Available
Not enough data
8.2
15
Not enough data
Not enough data
8.5
6
Management
Not enough data
8.3
5
Not enough data
8.3
5
Not enough data
8.7
5
Not enough data
8.3
5
Monitoring
Not enough data
8.7
5
Not enough data
8.7
5
Not enough data
8.7
5
Protection
Not enough data
Not enough data
Not enough data
8.3
5
Not enough data
Not enough data
Not enough data
8.7
5
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Enforcement
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Endpoint Detection & Response (EDR)Hide 1 FeatureShow 1 Feature
Not enough data
Not enough data
Services - Endpoint Detection & Response (EDR)
Not enough data
Not enough data
AI Security Posture Management (AI-SPM) ToolsHide 9 FeaturesShow 9 Features
Not enough data
Not enough data
Functionality - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Risk Assessment - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Governance & Compliance - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Compliance
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Reviews
Reviewers' Company Size
Coro Cybersecurity
Coro Cybersecurity
Small-Business(50 or fewer emp.)
37.6%
Mid-Market(51-1000 emp.)
59.3%
Enterprise(> 1000 emp.)
3.2%
Zscaler Zero Trust Cloud
Zscaler Zero Trust Cloud
Small-Business(50 or fewer emp.)
29.7%
Mid-Market(51-1000 emp.)
21.6%
Enterprise(> 1000 emp.)
48.6%
Reviewers' Industry
Coro Cybersecurity
Coro Cybersecurity
Non-Profit Organization Management
8.6%
Financial Services
8.1%
Information Technology and Services
6.8%
Primary/Secondary Education
6.3%
Hospital & Health Care
4.1%
Other
66.1%
Zscaler Zero Trust Cloud
Zscaler Zero Trust Cloud
Information Technology and Services
27.0%
Computer & Network Security
18.9%
Airlines/Aviation
5.4%
Biotechnology
5.4%
Alternative Medicine
2.7%
Other
40.5%
Alternatives
Coro Cybersecurity
Coro Cybersecurity Alternatives
Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud
Add Acronis Cyber Protect Cloud
ESET PROTECT
ESET PROTECT
Add ESET PROTECT
Sophos Endpoint
Sophos Endpoint
Add Sophos Endpoint
BetterCloud
BetterCloud
Add BetterCloud
Zscaler Zero Trust Cloud
Zscaler Zero Trust Cloud Alternatives
HubSpot Data Hub
HubSpot Data Hub
Add HubSpot Data Hub
Cisco Duo
Cisco Duo
Add Cisco Duo
Druva Data Security Cloud
Druva Data Security Cloud
Add Druva Data Security Cloud
Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud
Add Acronis Cyber Protect Cloud
Discussions
Coro Cybersecurity
Coro Cybersecurity Discussions
What is coronet software?
1 Comment
Phil B.
PB
Coro is a cybersecurity platform.Read more
What does cybersecurity software do?
1 Comment
ED
There are many things to consider with Cybersecurity software: 1. email filtering 2. user awareness training 3. EDR, XDR, NDR, etc... 4. SIEM/SOAR 5....Read more
What are the five key attributes of cybersecurity?
1 Comment
Chrystian B.
CB
-hands free email security - device security -attatchemnt protection -sensitive data protection -suspected bot attacks -login trackingRead more
Zscaler Zero Trust Cloud
Zscaler Zero Trust Cloud Discussions
What cloud does zscaler use?
1 Comment
PRAVEEN P.
PP
Zscaler having their own data centers over than 150+ data centers across all regions. For seamless SaaS application connectivity they having closest data...Read more
What is unique about zscaler?
1 Comment
PRAVEEN P.
PP
100% SSL Inspection for all TCP, UDP and ICMP Protocols with full scalability, that having no limitation or restrictions like appliance or VM based proxy or...Read more
Monty the Mongoose crying
Zscaler Zero Trust Cloud has no more discussions with answers