Compare Menlo Security and Zscaler Internet Access

At a Glance
Menlo Security
Menlo Security
Star Rating
(51)4.6 out of 5
Market Segments
Enterprise (59.0% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Menlo Security
Zscaler Internet Access
Zscaler Internet Access
Star Rating
(181)4.4 out of 5
Market Segments
Enterprise (52.9% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Zscaler Internet Access
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that Zscaler Internet Access excels in its cloud-native security model and zero-trust architecture, providing secure web access without relying on traditional VPNs. Users appreciate features like URL filtering and SSL inspection, which enhance security while maintaining a fast and efficient user experience.
  • Users say Menlo Security stands out for its unique approach to web safety, as it opens websites in a secure cloud environment. This method effectively prevents malware from affecting local devices, with one user noting it acts as a safety shield against risky links and websites.
  • Reviewers mention that Zscaler Internet Access has a quick and intuitive implementation process, making it easier for organizations to get started. Recent feedback highlights the fast authentication and flexibility in blocking as significant advantages during setup.
  • According to verified reviews, Menlo Security receives high marks for its browser and email threat protection, with users appreciating how it isolates web content in the cloud without heavily impacting the user experience. This feature is particularly valued in environments where security is paramount.
  • G2 reviewers report that while Zscaler Internet Access has a strong overall satisfaction score, it faces challenges in specific areas like content filtering compared to Menlo Security, which boasts a higher rating in this category. Users have noted that Menlo's content filtering capabilities are more robust and effective.
  • Users say that Menlo Security's incident logging and reporting features are highly effective, with many praising the detailed insights provided. This level of transparency helps organizations understand threats better, a feature that some Zscaler users feel could be improved.
Pricing
Entry-Level Pricing
Menlo Security
No pricing available
Zscaler Internet Access
No pricing available
Free Trial
Menlo Security
No trial information available
Zscaler Internet Access
No trial information available
Ratings
Meets Requirements
9.3
36
8.8
134
Ease of Use
9.4
37
8.7
138
Ease of Setup
9.1
32
8.5
91
Ease of Admin
9.3
26
8.9
50
Quality of Support
9.0
35
8.7
127
Has the product been a good partner in doing business?
9.5
25
8.9
47
Product Direction (% positive)
9.1
37
9.4
133
Features by Category
Not enough data
8.8
26
Sandbox
Not enough data
8.9
21
Evaluation
Not enough data
9.0
20
Not enough data
9.0
20
Not enough data
9.1
20
Not enough data
8.6
20
Data Loss Prevention (DLP)Hide 10 FeaturesShow 10 Features
Not enough data
9.1
36
Administration
Not enough data
9.1
28
9.4
6
9.0
28
9.2
6
9.0
27
Governance
Not enough data
9.3
29
Not enough data
9.2
26
Not enough data
9.2
28
Security
Not enough data
9.3
28
Not enough data
9.0
27
Not enough data
9.2
29
Not enough data
9.0
28
Not enough data
Not enough data
Network Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Generative AI
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Access Security Broker (CASB)Hide 10 FeaturesShow 10 Features
Not enough data
Not enough data
Analysis
10.0
6
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Functionality
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
9.1
51
Administration
Not enough data
8.7
43
Not enough data
9.2
42
Not enough data
9.1
43
Not enough data
9.1
42
Agentic AI - Firewall Software
Not enough data
9.7
5
Not enough data
9.7
5
Functionality
Not enough data
9.2
40
Not enough data
9.0
40
Not enough data
9.2
42
Not enough data
9.1
41
Monitoring
Not enough data
9.0
43
Not enough data
9.1
42
Not enough data
9.3
43
Not enough data
9.2
42
Generative AI
Not enough data
8.1
16
Artificial Intelligence - Firewall
Not enough data
9.7
5
Software-Defined Perimeter (SDP)Hide 11 FeaturesShow 11 Features
Not enough data
8.5
10
Administration
Not enough data
8.3
8
Not enough data
8.3
8
Not enough data
8.3
9
Protection
Not enough data
8.9
9
Not enough data
9.3
9
Not enough data
9.0
8
Not enough data
8.8
8
Monitoring
Not enough data
8.7
9
Not enough data
8.8
8
Not enough data
8.8
8
Not enough data
8.5
8
9.4
26
8.9
44
Web Content and Traffic Filtering - Secure Web Gateways
9.3
5
9.1
38
9.7
15
8.7
36
9.9
20
8.8
36
8.7
10
9.0
37
10.0
6
8.4
33
Data Protection and Loss Prevention - Secure Web Gateways
Not enough data
9.3
35
9.4
9
9.0
33
10.0
8
9.2
33
9.3
5
9.0
31
Access Control and Authentication - Secure Web Gateways
Not enough data
9.1
34
Not enough data
9.2
34
Not enough data
9.3
36
Performance and Management - Secure Web Gateways
Not enough data
8.8
40
Not enough data
8.9
32
9.2
6
8.6
34
9.8
8
8.6
39
Not enough data
8.9
32
Secure Enterprise BrowserHide 12 FeaturesShow 12 Features
9.4
13
Not enough data
Advanced Security - Secure Enterprise Browser
9.6
8
Not enough data
9.5
10
Not enough data
Not enough data
Not enough data
9.6
8
Not enough data
Data Protection and Governance - Secure Enterprise Browser
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Controlled Access - Secure Enterprise Browser
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Secure Enterprise Browser
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
9.2
9
Identity and Access Management - Zero Trust Platforms
Not enough data
9.2
6
Not enough data
9.2
6
Not enough data
9.4
6
Not enough data
9.2
6
Security - Zero Trust Platforms
Not enough data
10.0
6
Not enough data
8.9
6
Not enough data
9.4
6
Not enough data
9.2
6
Not enough data
9.7
6
Data Security - Zero Trust Platforms
Not enough data
10.0
7
Not enough data
9.7
6
Application Visibility - Zero Trust Platforms
Not enough data
8.6
6
Not enough data
9.2
6
Not enough data
9.4
6
Not enough data
8.6
6
Not enough data
9.2
6
Reporting and Policies - Zero Trust Platforms
Not enough data
9.2
6
Not enough data
9.7
6
Not enough data
9.8
7
Not enough data
9.0
7
Not enough data
8.9
6
Agentic AI - Zero Trust Platforms
Not enough data
8.6
6
Not enough data
8.1
6
Not enough data
9.2
6
Not enough data
9.2
6
Secure Service Edge (SSE) SolutionsHide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Components - Secure Service Edge (SSE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Artificial Intelligence -Secure Service Edge (SSE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Secure Service Edge (SSE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Model Protection - AI Security Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Runtime Monitoring - AI Security Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Policy Enforcement and Compliance - AI Security Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Compliance
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
Menlo Security
Menlo Security
Zscaler Internet Access
Zscaler Internet Access
Menlo Security and Zscaler Internet Access are categorized as Secure Web Gateways and Data Loss Prevention (DLP)
Reviews
Reviewers' Company Size
Menlo Security
Menlo Security
Small-Business(50 or fewer emp.)
10.3%
Mid-Market(51-1000 emp.)
30.8%
Enterprise(> 1000 emp.)
59.0%
Zscaler Internet Access
Zscaler Internet Access
Small-Business(50 or fewer emp.)
18.5%
Mid-Market(51-1000 emp.)
28.7%
Enterprise(> 1000 emp.)
52.9%
Reviewers' Industry
Menlo Security
Menlo Security
Banking
25.7%
Financial Services
22.9%
Information Technology and Services
11.4%
Real Estate
5.7%
Computer & Network Security
5.7%
Other
28.6%
Zscaler Internet Access
Zscaler Internet Access
Information Technology and Services
23.5%
Computer Software
9.8%
Computer & Network Security
7.8%
Financial Services
6.5%
Hospital & Health Care
3.9%
Other
48.4%
Alternatives
Menlo Security
Menlo Security Alternatives
Check Point Next Generation Firewalls (NGFWs)
Check Point Next Generation...
Add Check Point Next Generation Firewalls (NGFWs)
Check Point Harmony Email & Collaboration
Check Point Harmony Email &...
Add Check Point Harmony Email & Collaboration
BetterCloud
BetterCloud
Add BetterCloud
Chrome Enterprise
Chrome Enterprise
Add Chrome Enterprise
Zscaler Internet Access
Zscaler Internet Access Alternatives
Check Point SASE
Check Point SASE
Add Check Point SASE
Netskope One Platform
Netskope One Platform
Add Netskope One Platform
Absolute Secure Access
Absolute Secure Access
Add Absolute Secure Access
Check Point Next Generation Firewalls (NGFWs)
Check Point Next Generation...
Add Check Point Next Generation Firewalls (NGFWs)
Discussions
Menlo Security
Menlo Security Discussions
Monty the Mongoose crying
Menlo Security has no discussions with answers
Zscaler Internet Access
Zscaler Internet Access Discussions
What is Zscaler Internet Access used for?
1 Comment
Naveen K.
NK
Block the unwanted access of websites where organizations control it from anywhere via this tool.Read more
Monty the Mongoose crying
Zscaler Internet Access has no more discussions with answers