2026 Best Software Awards are here!See the list
Product Avatar Image

Zscaler

Show rating breakdown
431 reviews
  • 21 profiles
  • 38 categories
Average star rating
4.4
#1 in 9 categories
Grid® leader
Serving customers since
2008

Zscaler Solutions

Discover ready-made solutions that bring related products, reviews, and resources together in one place.

Zscaler | Zero Trust for Users

Profile Filters

All Products & Services

Product Avatar Image
Zscaler Internet Access

177 reviews

Zscaler Internet Access delivers the complete security stack as a service from the cloud.

Product Avatar Image
Zscaler Private Access

127 reviews

Embrace a zero trust security strategy for your internal apps

Product Avatar Image
Zscaler Data Security Posture Management (DSPM)

56 reviews

Zscaler Data Security Posture Management (DSPM) provides organizations with a comprehensive way to manage, monitor, and remediate security risks related to sensitive data in cloud environments. Designed to empower security and compliance teams, Zscaler DSPM automatically discovers sensitive data, evaluates its posture, and enforces robust protection policies to ensure compliance and reduce the risk of data breaches. Key Use Cases: • Automatically discover and classify sensitive data across cloud environments. • Identify misconfigurations and security gaps related to data storage or usage. • Enforce compliance with regulations such as GDPR, HIPAA, PCI DSS, and others. • Prevent unintentional data exposure and insider risk. Key Features: • Real-Time Data Discovery: Continuously scans cloud environments to locate and classify sensitive data. • Posture Evaluations: Detects misconfigurations and risky behaviors in handling data. • Remediation Workflows: Automates resolution workflows for security vulnerabilities affecting data protection. • Compliance Reporting: Simplifies audits and regulatory reporting by providing detailed visibility into data security posture. • Cloud Integration: Seamlessly integrates with multi-cloud environments, including AWS, Azure, and Google Cloud Platform (GCP). Key Benefits: • Reduced Risk of Data Breaches: Continuously evaluates data security to minimize exposure risks while blocking unauthorized access. • Enhanced Compliance Confidence: Supports adherence to industry regulations by identifying and resolving compliance gaps. • Streamlined Management: Eliminates complexity and operational overhead associated with managing cloud data security.

Product Avatar Image
Zscaler Zero Trust Cloud

42 reviews

Zscaler global cloud delivers the entire gateway security stack as a service. By securely connecting users to their applications, regardless of device, location, or network, Zscaler is transforming enterprise security.

Product Avatar Image
Zscaler Secure Access Service Edge (SASE)

16 reviews

Zscaler's Secure Access Service Edge is a cloud-native platform that seamlessly integrates advanced security services with wide area networking capabilities. Designed to meet the demands of modern, dynamic workforces, it ensures secure, efficient, and reliable access to applications and data, regardless of user location. By adopting a zero trust architecture, Zscaler's SASE solution minimizes business risks, simplifies IT operations, and enhances overall cybersecurity posture. Key Features and Functionality: - Zero Trust SD-WAN: Optimizes user experience by automatically selecting the best routes for traffic to cloud applications, the internet, and data centers, reducing complexity and improving performance. - Secure Web Gateway : Prevents unsecured internet traffic from entering the network, protecting users from cyber threats and malicious content. - Cloud Access Security Broker : Ensures safe use of cloud applications by preventing data leaks, enforcing compliance, and blocking malware. - Firewall as a Service : Delivers advanced firewall capabilities from the cloud, eliminating the need for physical appliances and simplifying security management. - Zero Trust Network Access : Provides secure connectivity for remote users by granting least-privileged access based on granular policies, without placing them on the network. - Digital Experience Management: Monitors performance end-to-end, offering AI-powered troubleshooting tools to maintain exceptional user experiences. Primary Value and User Solutions: Zscaler's SASE solution addresses the challenges posed by traditional network security models, which often expand the attack surface, increase ransomware risks, and add complexity. By converging networking and security into a unified, cloud-delivered service, it: - Reduces Business Risk: Implements a zero trust architecture that minimizes the attack surface and prevents lateral threat movement, enhancing overall security. - Simplifies IT Operations: Eliminates the need for multiple security point products by unifying security services, reducing complexity and operational costs. - Enhances User Experience: Delivers security services close to users, eliminating unnecessary backhauling and optimizing latency and bandwidth usage for seamless access to applications. - Supports IoT and OT Adoption: Provides secure connectivity for IoT and OT devices without widening the attack surface or complicating policy enforcement, facilitating digital transformation initiatives. By integrating these capabilities, Zscaler's SASE solution empowers organizations to securely connect their workforce, devices, and applications, enabling agility and resilience in today's cloud-first world.

Product Avatar Image
Zscaler Zero Trust Exchange

13 reviews

Zscaler Zero Trust Exchange is the first zero trust platform that protects critical data and applications from data breach in the hybrid cloud. Edgewise delivers a new control plane that is based on software identity.

Product Avatar Image
Zscaler Unified Vulnerability Management

0 reviews

Zscaler Unified Vulnerability Management (UVM) empowers organizations to comprehensively understand and address cybersecurity risks through a single, integrated platform. Built on the Data Fabric for Security, Zscaler UVM seamlessly aggregates, deduplicates, and contextualizes data from across your security stack, correlating related findings to deliver true risk-based prioritization. UVM enables remediation strategies that reflect your unique business context and mitigating controls, while automated, customizable workflows deliver measurable improvements to your security posture. By breaking down silos and allowing fully tailored risk scoring and reporting, UVM enables security teams to focus on what matters most and respond faster than ever. Key Features and Benefits: • Unify exposure findings from every source: Aggregate and enrich exposure data with threat intelligence and business context using 200+ pre-built connectors. • Prioritize and act on the most critical risks: Identify which vulnerabilities and security gaps to address first, with contextual risk scoring based on custom factors and complete data input. • Gain real-time insight into KPIs and SLAs: Access dynamic, pre-built, and custom reports to measure security posture and team performance from any perspective. • Accelerate resolution with intelligent, flexible workflows: Speed incident response by clustering related findings, tracking ticket status and exceptions, and empowering remediation teams with AI-guided recommendations and interactive smart prompts.

Product Avatar Image
Zscaler Asset Exposure Management (CAASM)

0 reviews

Zscaler Asset Exposure Management gives organizations a complete, accurate, and context-rich inventory of all their cyber assets - across endpoints, cloud, and on-prem environments - to dramatically reduce risk. Built upon the Data Fabric for Security, Asset Exposure Management brings together data from across your security stack, deduplicates it, enriches it with additional context, and groups related entities together. This enables customers to uncover unknown or misconfigured assets, identify coverage gaps, and ensure critical controls are in place. This unified visibility streamlines compliance, supports risk mitigation workflows, and empowers security teams to quickly address coverage gaps. Ultimately, Asset Exposure Management is essential for effective cybersecurity and proactive attack surface management. Key Features and Benefits: • Unified Asset Inventory: Gain a single, accurate view of all assets by consolidating data from 200+ connectors, enabling organizations to trust their asset records and reduce blind spots. • Coverage Gap Identification: Pinpoint missing controls and misconfigurations across assets, allowing security teams to proactively close gaps and strengthen their security posture. • Automated Risk Mitigation Workflows: Initiate and track automated tasks to mitigate policy violation risk, ensure faster issue resolution, and minimize organizational risk before issues can be corrected. • Continuous CMDB Enrichment: Automatically update your CMDB with missing assets and critical details, increasing confidence in inventory accuracy and supporting compliance. • Comprehensive Reporting and Dashboards: Generate robust reports and custom dashboards, fostering cross-team collaboration and supporting audit and compliance efforts.

Product Avatar Image
Zscaler Data Loss Prevention (DLP)

0 reviews

Zscaler Data Loss Prevention (DLP) is a powerful, cloud-delivered solution designed to prevent the accidental or intentional loss of sensitive data across endpoints, email, and network traffic, ensuring comprehensive protection wherever data resides or moves. Built on the Zscaler Zero Trust Exchange platform, Zscaler DLP safeguards enterprises by continuously monitoring and controlling data flows, applying real-time policies to block unauthorized sharing, extraction, or exposure of critical business information. Key Use Cases: • Endpoint DLP: Monitors and protects sensitive data at the device level, ensuring that data does not leave corporate environments or get shared with unauthorized external parties. • Email DLP: Inspects outbound email messages and attachments for sensitive content, enforcing policies to prevent data leaks via email and ensuring compliance with security and regulatory standards. • Network DLP: Scans and secures data traveling across cloud, SaaS applications, and internet channels to identify and block unauthorized transmissions, ensuring data stays within approved boundaries.

Profile Name

Star Rating

303
105
17
3
3

Zscaler Reviews

Review Filters
Profile Name
Star Rating
303
105
17
3
3
Islam F.
IF
Islam F.
Admin Assistant of Technology and digital services
03/12/2026
Validated Reviewer
Review source: G2 invite
Incentivized Review

Secure Browsing Made Easy

I like that Zscaler Internet Access makes me feel secure and safe when browsing the internet. I appreciate that it helps defeat hacker programs and secures my data. I value the feature that stops unfaithful pages and programs because they can cause a lot of trouble like stealing personal data. Also, the initial setup was easy.
mostafa s.
MS
mostafa s.
Network Engineer || CCNP Encore certified || CCNP ENARSI certified || SD-WAN || JNCIA-junos certified
03/05/2026
Validated Reviewer
Review source: G2 invite
Incentivized Review

AI-Powered Security, But With Troubleshooting Hiccups

I like Zscaler Internet Access for its direct to cloud access, eliminating VPN lag and providing centralized management, global policy control, and real-time analytics. I appreciate its AI-powered SSL inspection, as it effectively scans and detects zero-day threats, transitioning smoothly where traditional filters might miss. The feature that stands out the most for me is the AI-powered SSL inspection, which has turned our biggest security blind spot into our strongest layer of defense. Zscaler's solution allows us to inspect all encrypted traffic without slowing down our bandwidth or forcing hardware upgrades. I also love the scalability since it's cloud-native, and it doesn't require worrying about CPU cycles, whether you have a small or large number of users streaming or downloading heavy data. It makes the VPN experience actually feel faster than being in the office and provides anti-virus engines without the latency that multiple appliances would introduce.
Mario M.
MM
Mario M.
Application Engineer @Siemens EDA | Former ASIC Physical Desing Engineer @Si-Vision @ Synopsys
03/03/2026
Validated Reviewer
Review source: G2 invite
Incentivized Review

Convenient, Always-On Access with Room for Speed Improvement

I really like that Zscaler Private Access is automated. It's turned on by default, which is a very interesting feature because when I'm using different software, I usually have to connect and disconnect, which can be a hassle. But with Zscaler Private Access, it's automatically opened and it never turns off for any reason. So it's always turned on automatically, which is great. I don't have to do anything.

About

Contact

HQ Location:
San Jose, California

Social

@zscaler

What is Zscaler?

Zscaler enables the world’s leading organizations to securely transform their networks and applications for a mobile and cloud first world. Its flagship services, Zscaler Internet Access and Zscaler Private Access, create fast, secure connections between users and applications, regardless of device, location, or network. Zscaler services are 100% cloud-delivered and offer the simplicity, enhanced security, and improved user experience that traditional appliances or hybrid solutions are unable to match. Used in more than 185 countries, Zscaler operates the world’s largest cloud security platform, protecting thousands of enterprises and government agencies from cyberattacks and data loss.

Details

Year Founded
2008
Ownership
NASDAQ:ZS