Introducing G2.ai, the future of software buying.Try now

Compare Twingate and Zscaler Zero Trust Cloud

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Twingate
Twingate
Star Rating
(74)4.7 out of 5
Market Segments
Mid-Market (50.7% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Starting at $10.00 1 user, per month
Free Trial is available
Browse all 3 pricing plans
Zscaler Zero Trust Cloud
Zscaler Zero Trust Cloud
Star Rating
(41)4.5 out of 5
Market Segments
Enterprise (50.0% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Zscaler Zero Trust Cloud

Twingate vs Zscaler Zero Trust Cloud

When assessing the two solutions, reviewers found Twingate easier to use, set up, and administer. Reviewers also preferred doing business with Twingate overall.

  • Reviewers felt that Twingate meets the needs of their business better than Zscaler Zero Trust Cloud.
  • When comparing quality of ongoing product support, reviewers felt that Twingate is the preferred option.
  • For feature updates and roadmaps, our reviewers preferred the direction of Twingate over Zscaler Zero Trust Cloud.
Pricing
Entry-Level Pricing
Twingate
Business
Starting at $10.00
1 user, per month
Browse all 3 pricing plans
Zscaler Zero Trust Cloud
No pricing available
Free Trial
Twingate
Free Trial is available
Zscaler Zero Trust Cloud
No trial information available
Ratings
Meets Requirements
9.1
51
8.8
31
Ease of Use
9.7
52
8.7
31
Ease of Setup
9.2
45
8.6
19
Ease of Admin
9.1
45
8.4
19
Quality of Support
9.1
46
8.9
28
Has the product been a good partner in doing business?
9.3
44
8.6
19
Product Direction (% positive)
9.0
49
8.8
30
Features by Category
Cloud Workload Protection PlatformsHide 10 FeaturesShow 10 Features
Not enough data
Not enough data
Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Operations
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Controls
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Network Access Control (NAC)Hide 9 FeaturesShow 9 Features
8.9
16
Not enough data
Data
9.0
16
Not enough data
9.4
16
Not enough data
9.2
16
Not enough data
Network
9.3
15
Not enough data
9.1
15
Not enough data
8.8
13
Not enough data
Logistics
8.5
10
Not enough data
8.6
11
Not enough data
8.1
8
Not enough data
7.7
32
Not enough data
Network Management
9.0
29
Not enough data
8.3
24
Not enough data
8.5
19
Not enough data
8.0
19
Not enough data
Security
8.3
22
Not enough data
8.7
22
Not enough data
8.8
23
Not enough data
8.3
22
Not enough data
Identity Management
8.8
19
Not enough data
7.7
17
Not enough data
7.5
18
Not enough data
Generative AI
4.4
6
Not enough data
3.9
6
Not enough data
Cloud Access Security Broker (CASB)Hide 10 FeaturesShow 10 Features
Not enough data
8.9
12
Analysis
Not enough data
9.1
11
Not enough data
8.8
11
Not enough data
8.5
11
Functionality
Not enough data
8.6
11
Not enough data
9.2
11
Not enough data
9.1
11
Security
Not enough data
9.0
10
Not enough data
8.6
11
Not enough data
8.8
11
Not enough data
8.9
11
Not enough data
8.9
17
Data Protection
Not enough data
8.8
14
Not enough data
8.9
14
Not enough data
9.0
13
Not enough data
8.5
13
Not enough data
9.1
13
Analysis
Not enough data
9.2
12
Not enough data
9.0
13
Not enough data
8.8
13
Administration
Not enough data
8.8
13
Not enough data
9.0
13
Not enough data
9.1
13
Not enough data
Not enough data
Functionality
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Agentic AI - Cloud Migration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Software-Defined Perimeter (SDP)Hide 11 FeaturesShow 11 Features
8.7
18
Not enough data
Administration
9.0
14
Not enough data
9.0
12
Not enough data
8.9
14
Not enough data
Protection
9.1
11
Not enough data
8.6
11
Not enough data
9.4
13
Not enough data
9.6
14
Not enough data
Monitoring
8.1
12
Not enough data
Feature Not Available
Not enough data
7.9
11
Not enough data
7.8
12
Not enough data
8.5
11
8.5
6
Management
8.8
7
8.3
5
Feature Not Available
8.3
5
8.3
8
8.7
5
9.1
9
8.3
5
Monitoring
Feature Not Available
8.7
5
8.8
7
8.7
5
7.1
7
8.7
5
Protection
Feature Not Available
Not enough data
Feature Not Available
8.3
5
9.1
9
Not enough data
8.2
10
8.7
5
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Enforcement
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
AI Security Posture Management (AI-SPM) ToolsHide 9 FeaturesShow 9 Features
Not enough data
Not enough data
Functionality - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Risk Assessment - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Governance & Compliance - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
8.3
30
Not enough data
Usage
9.3
28
Not enough data
8.8
27
Not enough data
Feature Not Available
Not enough data
8.8
28
Not enough data
Feature Not Available
Not enough data
8.8
26
Not enough data
Feature Not Available
Not enough data
Miscellaneous
6.9
22
Not enough data
Feature Not Available
Not enough data
7.4
19
Not enough data
Categories
Categories
Shared Categories
Twingate
Twingate
Zscaler Zero Trust Cloud
Zscaler Zero Trust Cloud
Twingate and Zscaler Zero Trust Cloud are categorized as Cloud Edge Security
Reviews
Reviewers' Company Size
Twingate
Twingate
Small-Business(50 or fewer emp.)
43.7%
Mid-Market(51-1000 emp.)
50.7%
Enterprise(> 1000 emp.)
5.6%
Zscaler Zero Trust Cloud
Zscaler Zero Trust Cloud
Small-Business(50 or fewer emp.)
27.8%
Mid-Market(51-1000 emp.)
22.2%
Enterprise(> 1000 emp.)
50.0%
Reviewers' Industry
Twingate
Twingate
Information Technology and Services
18.3%
Computer Software
14.1%
Computer & Network Security
14.1%
Financial Services
11.3%
Marketing and Advertising
5.6%
Other
36.6%
Zscaler Zero Trust Cloud
Zscaler Zero Trust Cloud
Information Technology and Services
27.8%
Computer & Network Security
16.7%
Biotechnology
5.6%
Airlines/Aviation
5.6%
Consulting
2.8%
Other
41.7%
Alternatives
Twingate
Twingate Alternatives
Check Point Harmony SASE
Check Point Harmony SASE
Add Check Point Harmony SASE
Zscaler Private Access
Zscaler Private Access
Add Zscaler Private Access
NordLayer
NordLayer
Add NordLayer
Okta
Okta
Add Okta
Zscaler Zero Trust Cloud
Zscaler Zero Trust Cloud Alternatives
HubSpot Data Hub
HubSpot Data Hub
Add HubSpot Data Hub
Cisco Duo
Cisco Duo
Add Cisco Duo
Druva Data Security Cloud
Druva Data Security Cloud
Add Druva Data Security Cloud
Check Point Harmony Email & Collaboration
Check Point Harmony Email & Collaboration
Add Check Point Harmony Email & Collaboration
Discussions
Twingate
Twingate Discussions
Monty the Mongoose crying
Twingate has no discussions with answers
Zscaler Zero Trust Cloud
Zscaler Zero Trust Cloud Discussions
What cloud does zscaler use?
1 Comment
PRAVEEN P.
PP
Zscaler having their own data centers over than 150+ data centers across all regions. For seamless SaaS application connectivity they having closest data...Read more
What is unique about zscaler?
1 Comment
PRAVEEN P.
PP
100% SSL Inspection for all TCP, UDP and ICMP Protocols with full scalability, that having no limitation or restrictions like appliance or VM based proxy or...Read more
Monty the Mongoose crying
Zscaler Zero Trust Cloud has no more discussions with answers