2026 Best Software Awards are here!See the list
Zscaler Cloud Workload Segmentation

By Zscaler

Unclaimed Profile

Claim your company’s G2 profile

Claiming this profile confirms that you work at Zscaler Cloud Workload Segmentation and allows you to manage how it appears on G2.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Claim Now
0 out of 5 stars

How would you rate your experience with Zscaler Cloud Workload Segmentation?

This product hasn't been reviewed yet! Be the first to share your experience.
Leave a Review

Zscaler Cloud Workload Segmentation Reviews & Product Details

Product Avatar Image

Have you used Zscaler Cloud Workload Segmentation before?

Answer a few questions to help the Zscaler Cloud Workload Segmentation community

Zscaler Cloud Workload Segmentation Reviews (0)

G2 reviews are authentic and verified.

There are not enough reviews of Zscaler Cloud Workload Segmentation for G2 to provide buying insight. Below are some alternatives with more reviews:

1
AlgoSec Horizon Logo
AlgoSec Horizon
4.5
(220)
AlgoSec is a business-driven security management solution.
2
Check Point CloudGuard Network Security Logo
Check Point CloudGuard Network Security
4.5
(173)
Check Point CloudGuard Network Security for private and public cloud platforms is designed to protect assets in the cloud against the most sophisticated threats.
3
Faddom Logo
Faddom
4.5
(106)
With Faddom, you gain granular visibility of your entire IT environment, mapping your applications, networks and dependencies in real-time. Uniquely, Faddom works without credentials, firewalls or agents. Faddom is completely platform-agnostic and has limitless use-cases from cloud migration to cost optimization.
4
Tufin Orchestration Suite Logo
Tufin Orchestration Suite
4.4
(96)
Tufin Network Security Policy Management (NSPM) e automates and accelerates network configuration changes while maintaining security and compliance.
5
SecureW2 JoinNow Logo
SecureW2 JoinNow
4.7
(92)
The full JoinNow Suite contains everything you need to transition to secure passwordless authentication. It includes an intuitive managed PKI for certificate creation and management, as well as best-in-class certificate delivery solutions such as a dissolvable self-service configuration client for unmanaged devices and automatic enrollment gateways for managed devices. The platform also offers a Cloud RADIUS server, designed from the ground up for passwordless security and works seamlessly with Cloud Identity Providers.
6
Foxpass by Splashtop Logo
Foxpass by Splashtop
4.7
(44)
Advanced access control for servers and WiFi. Foxpass increases your organization's server and network security by ensuring employee accounts have access only to what they need.
7
Opinnate Logo
Opinnate
4.8
(34)
Opinnate offers an innovative automation technology that tackles policy management holistically. Designed by security experts that have decades long executive and hands-on experience, Opinnate platform not only addresses security policy management, policy analysis, policy optimization and policy change operations under the same roof but also handles approval processes to offer an end-to-end customer experience. Opinnate stands out by removing dependencies to external tools and costly prior work.
8
Illumio Logo
Illumio
4.6
(23)
Illumio reduces risk and increases cyber resiliency for modern organizations by providing visibility and protection of critical applications and data. As the only proven segmentation platform that is purpose-built for the Zero Trust security model, Illumio allows organizations to see their risk, isolate breaches, and better protect their data.​ The world’s leading organizations across the industries rely on Illumio's Zero Trust segmentation.
9
Cisco Identity Services Engine Logo
Cisco Identity Services Engine
4.2
(10)
Cisco Identity Services Engine is a comprehensive network access control solution that serves as the policy decision point in a zero-trust architecture. It integrates intelligence from across the security stack to authenticate users and devices, enforce policies, and automatically contain threats. By providing centralized control over network access, ISE ensures that only trusted users and devices can connect to network resources, thereby enhancing security resilience and operational flexibility. Key Features and Functionality: - Centralized Network Access Control: ISE allows administrators to define and enforce access policies from a single interface, simplifying management and ensuring consistent security across the network. - Comprehensive Visibility: The system offers detailed insights into all endpoints and users connected to the network, including device types, locations, and access methods, facilitating informed decision-making and rapid response to potential threats. - Automated Threat Containment: ISE integrates with various security solutions to detect and respond to threats in real-time, automatically isolating compromised devices to prevent the spread of malware or unauthorized access. - Device Profiling and Posture Assessment: The platform continuously monitors device compliance with security policies, ensuring that only devices meeting organizational standards are granted access. - Flexible Deployment Options: ISE supports deployment across multiple environments, including on-premises and various cloud platforms, providing organizations with the flexibility to choose the best fit for their infrastructure. Primary Value and Problem Solved: Cisco ISE addresses the critical need for secure and efficient network access control in today's complex IT environments. By implementing a zero-trust model, it ensures that access to network resources is granted based on strict identity verification and compliance with security policies. This approach mitigates risks associated with unauthorized access, insider threats, and the proliferation of unmanaged devices. Additionally, ISE's centralized management and automation capabilities reduce administrative overhead, enhance operational efficiency, and support business continuity by maintaining a robust security posture.
10
Cisco Secure Workload (Tetration) Logo
Cisco Secure Workload (Tetration)
4.7
(5)
Cisco Secure Workload, formerly known as Tetration, is a comprehensive security solution designed to protect applications and workloads across diverse environments, including on-premises data centers, public clouds, and hybrid infrastructures. By implementing zero-trust microsegmentation, it effectively reduces the attack surface, prevents lateral movement of threats, and ensures consistent security policies across all workloads. The platform offers deep visibility into application behaviors and dependencies, enabling organizations to detect anomalies, enforce compliance, and respond swiftly to potential security incidents. Key Features and Functionality: - Zero-Trust Microsegmentation: Enforces strict access controls by segmenting workloads based on application behavior, limiting unauthorized communication, and preventing the spread of threats. - Comprehensive Visibility: Provides real-time monitoring of application interactions and dependencies, offering insights into network performance and potential vulnerabilities. - Automated Policy Enforcement: Utilizes AI and machine learning to generate and enforce security policies dynamically, adapting to changes in the application environment. - Threat Detection and Anomaly Identification: Detects unusual workload behaviors and indicators of compromise, facilitating rapid threat remediation. - Compliance Monitoring: Continuously assesses workloads to ensure adherence to security policies and regulatory requirements. Primary Value and Problem Solved: Cisco Secure Workload addresses the critical challenge of securing dynamic and distributed applications in modern IT environments. By delivering zero-trust microsegmentation and comprehensive visibility, it empowers organizations to: - Reduce the Attack Surface: Minimize potential entry points for attackers by enforcing strict access controls at the workload level. - Prevent Lateral Movement: Contain threats by restricting unauthorized communication between workloads, thereby limiting the spread of malware or unauthorized access. - Ensure Compliance: Maintain continuous compliance with security policies and regulatory standards through automated monitoring and reporting. - Enhance Operational Efficiency: Automate security policy management and enforcement, reducing manual efforts and enabling faster response to security incidents. By integrating these capabilities, Cisco Secure Workload provides a robust framework for protecting critical applications and data, ensuring business continuity, and supporting secure digital transformation initiatives.
Show More

No Discussions for This Product Yet

Be the first to ask a question and get answers from real users and experts.

Start a discussion
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Zscaler Cloud Workload Segmentation