Compare VMware NSX and Zscaler Internet Access

At a Glance
VMware NSX
VMware NSX
Star Rating
(79)4.4 out of 5
Market Segments
Mid-Market (35.7% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about VMware NSX
Zscaler Internet Access
Zscaler Internet Access
Star Rating
(181)4.4 out of 5
Market Segments
Enterprise (52.9% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Zscaler Internet Access
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that Zscaler Internet Access excels in its cloud-native security model, providing a robust zero-trust architecture that allows for secure web access without relying heavily on traditional VPN infrastructure. Users appreciate features like URL filtering and SSL inspection, which enhance their overall security experience.
  • Users say that Zscaler Internet Access offers a fast and intuitive installation process, making it easier for organizations to get up and running quickly. Recent feedback highlights the flexibility in blocking and the cloud application control feature as significant advantages that contribute to a smooth onboarding experience.
  • According to verified reviews, VMware NSX shines in its microsegmentation capabilities, which users have found to be essential for achieving Zero Trust security. The tight integration with virtual machines is particularly praised, allowing for enhanced functionality and security across the network.
  • Reviewers mention that VMware NSX provides excellent customization and expansion options for virtual networks, enabling users to manage their infrastructure without the need for physical changes. This adaptability is a key benefit for enterprises looking to streamline their operations.
  • G2 reviewers highlight that Zscaler Internet Access has a higher overall satisfaction score compared to VMware NSX, reflecting its strong performance in areas like ease of use and quality of support. Users appreciate the responsive support team, which contributes to a positive experience when addressing issues.
  • Users note that while VMware NSX is effective in integrating with a wide range of third-party solutions, it faces challenges in ease of setup and administration compared to Zscaler Internet Access. Some users have reported that the initial configuration can be more complex, which may impact the overall user experience.
Pricing
Entry-Level Pricing
VMware NSX
No pricing available
Zscaler Internet Access
No pricing available
Free Trial
VMware NSX
Free Trial is available
Zscaler Internet Access
No trial information available
Ratings
Meets Requirements
8.6
47
8.8
134
Ease of Use
8.0
63
8.7
138
Ease of Setup
7.9
57
8.5
91
Ease of Admin
7.7
27
8.9
50
Quality of Support
8.0
44
8.7
127
Has the product been a good partner in doing business?
8.1
26
8.9
47
Product Direction (% positive)
8.5
46
9.4
133
Features by Category
Network Automation ToolsHide 17 FeaturesShow 17 Features
8.1
9
Not enough data
Configuration
8.9
9
Not enough data
7.6
9
Not enough data
8.0
9
Not enough data
Agentic AI - Network Automation Tools
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Network
8.9
9
Not enough data
7.9
8
Not enough data
8.3
9
Not enough data
7.2
9
Not enough data
Logistics
7.6
9
Not enough data
8.7
9
Not enough data
7.6
9
Not enough data
Security - Network Automation
8.1
8
Not enough data
7.9
8
Not enough data
8.3
8
Not enough data
7.7
8
Not enough data
Not enough data
8.8
26
Sandbox
Not enough data
8.9
21
Evaluation
Not enough data
9.0
20
Not enough data
9.0
20
Not enough data
9.1
20
Not enough data
8.6
20
Data Loss Prevention (DLP)Hide 10 FeaturesShow 10 Features
Not enough data
9.1
36
Administration
Not enough data
9.1
28
Not enough data
9.0
28
Not enough data
9.0
27
Governance
Not enough data
9.3
29
Not enough data
9.2
26
Not enough data
9.2
28
Security
Not enough data
9.3
28
Not enough data
9.0
27
Not enough data
9.2
29
Not enough data
9.0
28
Not enough data
9.1
51
Administration
Not enough data
8.7
43
Not enough data
9.2
42
Not enough data
9.1
43
Not enough data
9.1
42
Agentic AI - Firewall Software
Not enough data
9.7
5
Not enough data
9.7
5
Functionality
Not enough data
9.2
40
Not enough data
9.0
40
Not enough data
9.2
42
Not enough data
9.1
41
Monitoring
Not enough data
9.0
43
Not enough data
9.1
42
Not enough data
9.3
43
Not enough data
9.2
42
Generative AI
Not enough data
8.1
16
Artificial Intelligence - Firewall
Not enough data
9.7
5
Infrastructure as a Service (IaaS)Hide 12 FeaturesShow 12 Features
7.9
18
Not enough data
Infrastructure Provision
7.7
18
Not enough data
8.2
18
Not enough data
8.0
18
Not enough data
7.4
18
Not enough data
7.7
18
Not enough data
8.8
18
Not enough data
7.8
18
Not enough data
8.7
18
Not enough data
Management
8.1
18
Not enough data
7.6
18
Not enough data
7.9
18
Not enough data
Functionality
7.3
18
Not enough data
Software-Defined Perimeter (SDP)Hide 11 FeaturesShow 11 Features
Not enough data
8.5
10
Administration
Not enough data
8.3
8
Not enough data
8.3
8
Not enough data
8.3
9
Protection
Not enough data
8.9
9
Not enough data
9.3
9
Not enough data
9.0
8
Not enough data
8.8
8
Monitoring
Not enough data
8.7
9
Not enough data
8.8
8
Not enough data
8.8
8
Not enough data
8.5
8
Not enough data
8.9
44
Web Content and Traffic Filtering - Secure Web Gateways
Not enough data
9.1
38
Not enough data
8.7
36
Not enough data
8.8
36
Not enough data
9.0
37
Not enough data
8.4
33
Data Protection and Loss Prevention - Secure Web Gateways
Not enough data
9.3
35
Not enough data
9.0
33
Not enough data
9.2
33
Not enough data
9.0
31
Access Control and Authentication - Secure Web Gateways
Not enough data
9.1
34
Not enough data
9.2
34
Not enough data
9.3
36
Performance and Management - Secure Web Gateways
Not enough data
8.8
40
Not enough data
8.9
32
Not enough data
8.6
34
Not enough data
8.6
39
Not enough data
8.9
32
Not enough data
9.2
9
Identity and Access Management - Zero Trust Platforms
Not enough data
9.2
6
Not enough data
9.2
6
Not enough data
9.4
6
Not enough data
9.2
6
Security - Zero Trust Platforms
Not enough data
10.0
6
Not enough data
8.9
6
Not enough data
9.4
6
Not enough data
9.2
6
Not enough data
9.7
6
Data Security - Zero Trust Platforms
Not enough data
10.0
7
Not enough data
9.7
6
Application Visibility - Zero Trust Platforms
Not enough data
8.6
6
Not enough data
9.2
6
Not enough data
9.4
6
Not enough data
8.6
6
Not enough data
9.2
6
Reporting and Policies - Zero Trust Platforms
Not enough data
9.2
6
Not enough data
9.7
6
Not enough data
9.8
7
Not enough data
9.0
7
Not enough data
8.9
6
Agentic AI - Zero Trust Platforms
Not enough data
8.6
6
Not enough data
8.1
6
Not enough data
9.2
6
Not enough data
9.2
6
Secure Service Edge (SSE) SolutionsHide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Components - Secure Service Edge (SSE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Artificial Intelligence -Secure Service Edge (SSE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Secure Service Edge (SSE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Model Protection - AI Security Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Runtime Monitoring - AI Security Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Policy Enforcement and Compliance - AI Security Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Compliance
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
VMware NSX
VMware NSX
Zscaler Internet Access
Zscaler Internet Access
VMware NSX and Zscaler Internet Access are categorized as Zero Trust Platforms
Reviews
Reviewers' Company Size
VMware NSX
VMware NSX
Small-Business(50 or fewer emp.)
31.4%
Mid-Market(51-1000 emp.)
35.7%
Enterprise(> 1000 emp.)
32.9%
Zscaler Internet Access
Zscaler Internet Access
Small-Business(50 or fewer emp.)
18.5%
Mid-Market(51-1000 emp.)
28.7%
Enterprise(> 1000 emp.)
52.9%
Reviewers' Industry
VMware NSX
VMware NSX
Computer & Network Security
15.7%
Information Technology and Services
11.4%
Telecommunications
7.1%
Financial Services
7.1%
Computer Software
5.7%
Other
52.9%
Zscaler Internet Access
Zscaler Internet Access
Information Technology and Services
23.5%
Computer Software
9.8%
Computer & Network Security
7.8%
Financial Services
6.5%
Hospital & Health Care
3.9%
Other
48.4%
Alternatives
VMware NSX
VMware NSX Alternatives
HAProxy
HAProxy
Add HAProxy
Amazon EC2
Amazon EC2
Add Amazon EC2
Red Hat Ansible Automation Platform
Red Hat Ansible Automation...
Add Red Hat Ansible Automation Platform
Google Compute Engine
Google Compute Engine
Add Google Compute Engine
Zscaler Internet Access
Zscaler Internet Access Alternatives
Check Point SASE
Check Point SASE
Add Check Point SASE
Netskope One Platform
Netskope One Platform
Add Netskope One Platform
Absolute Secure Access
Absolute Secure Access
Add Absolute Secure Access
Check Point Next Generation Firewalls (NGFWs)
Check Point Next Generation...
Add Check Point Next Generation Firewalls (NGFWs)
Discussions
VMware NSX
VMware NSX Discussions
Monty the Mongoose crying
VMware NSX has no discussions with answers
Zscaler Internet Access
Zscaler Internet Access Discussions
What is Zscaler Internet Access used for?
1 Comment
Naveen K.
NK
Block the unwanted access of websites where organizations control it from anywhere via this tool.Read more
Monty the Mongoose crying
Zscaler Internet Access has no more discussions with answers