Compare Zscaler Internet Access and iboss

At a Glance
Zscaler Internet Access
Zscaler Internet Access
Star Rating
(186)4.4 out of 5
Market Segments
Enterprise (51.9% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Zscaler Internet Access
iboss
iboss
Star Rating
(16)4.0 out of 5
Market Segments
Mid-Market (46.7% of reviews)
Information
Pros & Cons
Not enough data
Entry-Level Pricing
No pricing available
Learn more about iboss
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that Zscaler Internet Access excels in its ease of setup, with many users highlighting the quick installation process as a significant advantage. In contrast, iboss users have noted challenges with configuration, which can lead to a more cumbersome onboarding experience.
  • Users say that Zscaler Internet Access offers a robust cloud-native security model and a strong zero-trust architecture, making it a preferred choice for those seeking secure web access without relying on traditional VPNs. Meanwhile, iboss is praised for its comprehensive features like advanced threat protection and data loss prevention, but it may not match the same level of flexibility in blocking.
  • Reviewers mention that Zscaler Internet Access provides a high level of user satisfaction, reflected in its strong ratings for quality of support and overall product direction. Users appreciate the responsive support team, while iboss users have expressed a desire for improvements in these areas, despite acknowledging its solid cybersecurity capabilities.
  • According to verified reviews, Zscaler Internet Access stands out for its cloud application control feature, which users find particularly valuable for managing access to various applications. In comparison, iboss users appreciate its wide range of features but may find it less intuitive in day-to-day management.
  • G2 reviewers report that Zscaler Internet Access has a higher overall rating for ease of administration, with users noting that the platform is straightforward to manage. In contrast, iboss users have indicated that administrative tasks can be more complex, which may impact daily usability.
  • Users say that iboss provides top-notch cybersecurity capabilities, giving peace of mind in an era of rising cyber threats. However, Zscaler Internet Access users also express confidence in their security, emphasizing its fast authentication and safety features, which may appeal more to enterprise-level clients.
Pricing
Entry-Level Pricing
Zscaler Internet Access
No pricing available
iboss
No pricing available
Free Trial
Zscaler Internet Access
No trial information available
iboss
No trial information available
Ratings
Meets Requirements
8.8
137
8.5
12
Ease of Use
8.7
141
7.9
13
Ease of Setup
8.5
94
6.5
8
Ease of Admin
8.9
50
6.9
7
Quality of Support
8.7
129
8.2
13
Has the product been a good partner in doing business?
8.9
47
8.1
7
Product Direction (% positive)
9.4
136
9.1
13
Features by Category
8.8
26
Not enough data
Sandbox
8.9
21
Not enough data
Evaluation
9.0
20
Not enough data
9.0
20
Not enough data
9.1
20
Not enough data
8.6
20
Not enough data
Data Loss Prevention (DLP)Hide 10 FeaturesShow 10 Features
9.1
36
Not enough data
Administration
9.1
28
Not enough data
9.0
28
Not enough data
9.0
27
Not enough data
Governance
9.3
29
Not enough data
9.2
26
Not enough data
9.2
28
Not enough data
Security
9.3
28
Not enough data
9.0
27
Not enough data
9.2
29
Not enough data
9.0
28
Not enough data
Not enough data
Not enough data
Network Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Generative AI
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Access Security Broker (CASB)Hide 10 FeaturesShow 10 Features
Not enough data
Not enough data
Analysis
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Functionality
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
9.1
51
Not enough data
Administration
8.7
43
Not enough data
9.2
42
Not enough data
9.1
43
Not enough data
9.1
42
Not enough data
Agentic AI - Firewall Software
9.7
5
Not enough data
9.7
5
Not enough data
Functionality
9.2
40
Not enough data
9.0
40
Not enough data
9.2
42
Not enough data
9.1
41
Not enough data
Monitoring
9.0
43
Not enough data
9.1
42
Not enough data
9.3
43
Not enough data
9.2
42
Not enough data
Generative AI
8.1
16
Not enough data
Artificial Intelligence - Firewall
9.7
5
Not enough data
DNS Security SolutionsHide 14 FeaturesShow 14 Features
Not enough data
Not enough data
Protection
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Functionality
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Software-Defined Perimeter (SDP)Hide 11 FeaturesShow 11 Features
8.5
10
Not enough data
Administration
8.3
8
Not enough data
8.3
8
Not enough data
8.3
9
Not enough data
Protection
8.9
9
Not enough data
9.3
9
Not enough data
9.0
8
Not enough data
8.8
8
Not enough data
Monitoring
8.7
9
Not enough data
8.8
8
Not enough data
8.8
8
Not enough data
8.5
8
Not enough data
Not enough data
Not enough data
Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Monitoring
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Protection
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
8.9
47
Not enough data
Web Content and Traffic Filtering - Secure Web Gateways
9.1
38
Not enough data
8.7
36
Not enough data
8.8
36
Not enough data
9.0
37
Not enough data
8.4
33
Not enough data
Data Protection and Loss Prevention - Secure Web Gateways
9.3
36
Not enough data
9.1
34
Not enough data
9.3
34
Not enough data
9.0
33
Not enough data
Access Control and Authentication - Secure Web Gateways
9.1
34
Not enough data
9.2
35
Not enough data
9.3
36
Not enough data
Performance and Management - Secure Web Gateways
8.7
41
Not enough data
8.8
33
Not enough data
8.6
34
Not enough data
8.6
39
Not enough data
8.9
32
Not enough data
Secure Access Service Edge (SASE) PlatformsHide 12 FeaturesShow 12 Features
Not enough data
Not enough data
Components - Secure Access Service Edge (SASE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Artificial Intelligence - Secure Access Service Edge (SASE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Secure Access Service Edge (SASE) Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
9.2
9
Not enough data
Identity and Access Management - Zero Trust Platforms
9.2
6
Not enough data
9.2
6
Not enough data
9.4
6
Not enough data
9.2
6
Not enough data
Security - Zero Trust Platforms
10.0
6
Not enough data
8.9
6
Not enough data
9.4
6
Not enough data
9.2
6
Not enough data
9.7
6
Not enough data
Data Security - Zero Trust Platforms
10.0
7
Not enough data
9.7
6
Not enough data
Application Visibility - Zero Trust Platforms
8.6
6
Not enough data
9.2
6
Not enough data
9.4
6
Not enough data
8.6
6
Not enough data
9.2
6
Not enough data
Reporting and Policies - Zero Trust Platforms
9.2
6
Not enough data
9.7
6
Not enough data
9.8
7
Not enough data
9.0
7
Not enough data
8.9
6
Not enough data
Agentic AI - Zero Trust Platforms
8.6
6
Not enough data
8.1
6
Not enough data
9.2
6
Not enough data
9.2
6
Not enough data
Secure Service Edge (SSE) SolutionsHide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Components - Secure Service Edge (SSE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Artificial Intelligence -Secure Service Edge (SSE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Secure Service Edge (SSE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Model Protection - AI Security Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Runtime Monitoring - AI Security Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Policy Enforcement and Compliance - AI Security Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Compliance
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Reviews
Reviewers' Company Size
Zscaler Internet Access
Zscaler Internet Access
Small-Business(50 or fewer emp.)
17.9%
Mid-Market(51-1000 emp.)
30.2%
Enterprise(> 1000 emp.)
51.9%
iboss
iboss
Small-Business(50 or fewer emp.)
33.3%
Mid-Market(51-1000 emp.)
46.7%
Enterprise(> 1000 emp.)
20.0%
Reviewers' Industry
Zscaler Internet Access
Zscaler Internet Access
Information Technology and Services
23.1%
Computer Software
10.3%
Computer & Network Security
7.7%
Financial Services
6.4%
Hospital & Health Care
3.8%
Other
48.7%
iboss
iboss
Information Technology and Services
33.3%
Education Management
20.0%
Retail
6.7%
Real Estate
6.7%
Primary/Secondary Education
6.7%
Other
26.7%
Alternatives
Zscaler Internet Access
Zscaler Internet Access Alternatives
Check Point SASE
Check Point SASE
Add Check Point SASE
Netskope One Platform
Netskope One Platform
Add Netskope One Platform
Absolute Secure Access
Absolute Secure Access
Add Absolute Secure Access
Check Point Next Generation Firewalls (NGFWs)
Check Point Next Generation...
Add Check Point Next Generation Firewalls (NGFWs)
iboss
iboss Alternatives
Cisco Umbrella
Cisco Umbrella
Add Cisco Umbrella
Netskope One Platform
Netskope One Platform
Add Netskope One Platform
Okta
Okta
Add Okta
Cisco Duo
Cisco Duo
Add Cisco Duo
Discussions
Zscaler Internet Access
Zscaler Internet Access Discussions
What is Zscaler Internet Access used for?
1 Comment
Naveen K.
NK
Block the unwanted access of websites where organizations control it from anywhere via this tool.Read more
Monty the Mongoose crying
Zscaler Internet Access has no more discussions with answers
iboss
iboss Discussions
Could the scripted installs also have more of an Automated option?
2 Comments
Official Response from iboss
iboss Cloud Connectors are setup to silently install and can be pushed out dynamically to end user devices using tools such as SCCM, MDM, GPO, etc. We have...Read more
How do I bypass iboss on a school computer?
1 Comment
Jason G.
JG
Monty the Mongoose crying
iboss has no more discussions with answers