
Nothing breaking all my user experience Review collected by and hosted on G2.com.
This product doesn't solve any of our problems. It's sold to us with unrealistic expectations, like high private physical ZENs for lower concurrent sessions and ZPA connectors at low utilization. It isn't a true cybersecurity product; it lacks critical features like log filters to pinpoint issues quickly. The product's deployment model is outdated, using complex API key exchanges. Also, the training provided was inadequate, leaving admins unaware of the product's benefits. Overall, it doesn't deliver a seamless or user-friendly experience, both for end users and administrators. Review collected by and hosted on G2.com.
This review contains authentic analysis and has been reviewed by our team
Organic review. This review was written entirely without invitation or incentive from G2, a seller, or an affiliate.


