Zscaler Internet Access Features
Sandbox (1)
Sandbox
21 reviewers of Zscaler Internet Access have provided feedback on this feature.
An environment isolated from a network where threats can be safely evaluated.
Evaluation (4)
Malware Evaluation
20 reviewers of Zscaler Internet Access have provided feedback on this feature.
Tools to test an object to see whether or not it qualifies as malware.
Automatic Submission
This feature was mentioned in 20 Zscaler Internet Access reviews.
The ability for a system to evaluate objects and automatically submit them to the sandbox.
Automatic Evaluation
20 reviewers of Zscaler Internet Access have provided feedback on this feature.
The ability for a system to evaluate objects within the sandbax and assign a malware probability score.
Malware Probability Scores
Based on 20 Zscaler Internet Access reviews.
The ability to assign objects a score based on their probability of being malware.
Administration (10)
Data Management
Based on 27 Zscaler Internet Access reviews.
Administrators can access and organize data related to incidents to produce reports or make data more navigable.
Incident Logs
28 reviewers of Zscaler Internet Access have provided feedback on this feature.
Information on each incident is stored in databases for user reference and analytics.
Reporting
This feature was mentioned in 27 Zscaler Internet Access reviews.
Produces reports detailing trends and vulnerabilities related to bot management and performance.
Policy Management
Based on 43 Zscaler Internet Access reviews.
Provides network security features to customize network access rules, workflows, and compliance requirements.
Logging and Reporting
This feature was mentioned in 42 Zscaler Internet Access reviews.
Captures logs for all firewall functions, storing information, incidents, and activity for user reference and analysis.
Application Gateway
This feature was mentioned in 43 Zscaler Internet Access reviews.
Application-level proxy that applies security mechanisms to connect clients to applications while concealing client network and computers.
Concurrent Sessions
42 reviewers of Zscaler Internet Access have provided feedback on this feature.
Determines the number of connections a firewall is able to track and facilitate securely.
Network Segmentation
Allows administrative control over network components, mapping, and segmentation.
Scalability
Provides features to allow scaling for large organizations and user bases.
Global Access
Extends SDP network access to users regardless of their physical location.
Governance (3)
Access Control
As reported in 28 Zscaler Internet Access reviews.
Supports LDAP Protocol to enable access control and governance.
Compliance
This feature was mentioned in 26 Zscaler Internet Access reviews.
Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
Data Visibility
As reported in 28 Zscaler Internet Access reviews.
Similifies data identification to increase visibility and management capabilities
Security (4)
Encryption
This feature was mentioned in 27 Zscaler Internet Access reviews.
Protects data with within and as it leaves your secure or local network.
Endpoint Intelligence
27 reviewers of Zscaler Internet Access have provided feedback on this feature.
Analysis for users to examine threat intelligence data specific to their endpoint devices.
Activity Monitoring
29 reviewers of Zscaler Internet Access have provided feedback on this feature.
Documents the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point.
Breach Detection
As reported in 28 Zscaler Internet Access reviews.
Provides incident alerts for leaks or breaches and provides capabilities to inform administrators of attacks.
Monitoring (8)
Load Balancing
43 reviewers of Zscaler Internet Access have provided feedback on this feature.
Monitors traffic and distribute resources and scales infrastructure workloads to match traffic.
Continuous Analysis
Based on 42 Zscaler Internet Access reviews.
Constantly monitors traffic and activity. Detects anomalies in functionality, user accessibility, traffic flows, and tampering.
Intrusion Prevention
Based on 43 Zscaler Internet Access reviews.
Enforces security paramaters to prevent unauthorized access.
Intrusion Detection
Based on 42 Zscaler Internet Access reviews.
Detects unauthorized access and use of privileged systems.
Compliance Monitoring
Monitors data and compliance requirements. Sends alerts based on violations or misuse.
Vulnerability Monitoring
Monitors networks, applications, and systems to identify misconfigurations and access points that can be easily compromised.
Configuration Monitoring
Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance.
Observability
Generate insights across IT systems utilizing event metrics, logging, traces, and metadata.
Functionality (4)
Virtual Private Network (VPN)
This feature was mentioned in 40 Zscaler Internet Access reviews.
Provides a virtualized network for client network to mask identity, location, and other sensitive information.
Antivirus
Based on 40 Zscaler Internet Access reviews.
Provides malware protection capabilities in addition to traditional firewall barrier technology.
URL Filtering
As reported in 42 Zscaler Internet Access reviews.
Provides access control tools to categorize and block traffic and match traffic to firewall policies.
Availability
This feature was mentioned in 41 Zscaler Internet Access reviews.
Deploys firewall(s) configured in sync to prevent network failure and provide business continuity.
Protection (4)
Policy Enforcement
Allows administrators to set policies for security and governance.
Security Audit
Allows for deep examination into network-connected devices, policies, and protocols.
Access Control
Supports LDAP Protocol to enable access control and governance.
User Authentication
Authenticates users prior to granting access to networks, applciations, and systems.
Generative AI (1)
AI Text Summarization
As reported in 16 Zscaler Internet Access reviews.
Condenses long documents or text into a brief summary.
Web Content and Traffic Filtering - Secure Web Gateways (5)
SSL/TLS Inspection
This feature was mentioned in 37 Zscaler Internet Access reviews.
Decrypts and inspects encrypted web traffic to detect and block threats hidden within encrypted connections.
Content Filtering
33 reviewers of Zscaler Internet Access have provided feedback on this feature.
Analyzes web content to filter out malicious code, malware, and inappropriate material.
URL Filtering
As reported in 35 Zscaler Internet Access reviews.
Blocks access to known malicious or unauthorized websites based on predefined policies.
Real-Time Traffic Inspection
Based on 36 Zscaler Internet Access reviews.
Inspects and analyzes inbound and outbound web traffic in real-time for threats and compliance.
Ad and Tracker Blocking
Based on 33 Zscaler Internet Access reviews.
Blocks ads and trackers to enhance user privacy and reduce exposure to potential threats.
Data Protection and Loss Prevention - Secure Web Gateways (4)
Data Loss Prevention (DLP)
34 reviewers of Zscaler Internet Access have provided feedback on this feature.
Monitors outgoing web traffic to prevent sensitive data from being leaked or exfiltrated.
Phishing Protection
33 reviewers of Zscaler Internet Access have provided feedback on this feature.
Detects and blocks phishing attempts to protect users from fraudulent websites and email links.
Malware Protection
Based on 32 Zscaler Internet Access reviews.
Uses signature-based scanning, heuristic analysis, and sandboxing to detect and block malware threats.
Cloud Access Security
31 reviewers of Zscaler Internet Access have provided feedback on this feature.
Monitors and controls access to cloud applications and services to prevent unauthorized use and data leakage.
Access Control and Authentication - Secure Web Gateways (3)
Application Control
32 reviewers of Zscaler Internet Access have provided feedback on this feature.
Regulates access to web-based applications and services as per organizational policies.
Authentication and Access Control
32 reviewers of Zscaler Internet Access have provided feedback on this feature.
Verifies users' identities and enforces access control policies to ensure only authorized users can access permitted web resources.
User and Group Policies
Based on 34 Zscaler Internet Access reviews.
Supports the creation of policies based on user roles, groups, or other attributes for more granular control.
Performance and Management - Secure Web Gateways (5)
Customizable Policy Enforcement
As reported in 39 Zscaler Internet Access reviews.
Allows organizations to create and enforce custom web usage policies tailored to their specific needs.
Bandwidth Management
As reported in 31 Zscaler Internet Access reviews.
Prioritizes and allocates network resources based on predefined policies to optimize performance.
Integration Capabilities
Based on 33 Zscaler Internet Access reviews.
Integrates with other security tools and systems, such as firewalls, SIEMs, and endpoint security solutions.
Reporting and Logging
37 reviewers of Zscaler Internet Access have provided feedback on this feature.
Provides comprehensive reports and logs of web activity, including sites visited, user activity, security events, and policy violations.
Threat Intelligence Integration
32 reviewers of Zscaler Internet Access have provided feedback on this feature.
Leverages threat intelligence feeds to stay updated on the latest threats and enhance protection.
Artificial Intelligence - Firewall (1)
AI Firewall
Utilizes AI to monitor network traffic, identify anomalies, and block attacks.
Identity and Access Management - Zero Trust Platforms (4)
Single sign-on (SSO)
Simplifies user authentication across multiple services while maintaining security.
Multi-factor authentication (MFA)
Ensures that users are verified through multiple credentials before access is granted, reducing the risk of compromised accounts.
Role-based access control (RBAC)
Grants access based on the user’s role within the organization, adhering to the principle of least privilege.
Identity federation
Integrates with external identity providers to manage user identities across different platforms and services.
Security - Zero Trust Platforms (5)
Encryption
Mandatory encryption of data both at rest and in transit protects against unauthorized access.
Endpoint detection and response (EDR)
Continuous monitoring and real-time response capabilities with EDR help detect and mitigate threats on endpoint devices.
Device posture assessment
Verifies the security status of a device before granting access to network resources, ensuring that only compliant devices can connect.
Micro-segmentation
Divides the network into isolated segments to prevent lateral movement by attackers, ensuring that if one segment is compromised, others remain secure.
Zero trust network access (ZTNA)
Replaces traditional VPNs by enforcing granular, context-aware access to applications based on user identity, device, and other factors.
Data Security - Zero Trust Platforms (2)
Data loss prevention (DLP)
Detect and prevent unauthorized access or transfer of sensitive data.
Data classification
Data classification automatically categorizes data based on its sensitivity, allowing for appropriate security measures to be applied
Application Visibility - Zero Trust Platforms (5)
API support
API support ensures that the zero trust platform can integrate seamlessly with other security tools and existing infrastructure
Application-level controls
Provides the ability to enforce security policies at the application layer, ensuring that access to specific applications is tightly controlled.
Secure application access
ensures that only authorized users can access critical applications, protecting against unauthorized entry points
User and entity behavior analytics (UEBA)
UEBA identifies unusual behavior that may indicate a security threat, enabling proactive threat managemen
Continuous monitoring
Provides real-time visibility into all network traffic, user activities, and data flows to detect anomalies
Reporting and Policies - Zero Trust Platforms (5)
Policy automation
allows for automatic application of security policies based on predefined criteria, reducing the risk of human error and ensuring consistent enforcement
Regulatory compliance
Regulatory compliance assists organizations in adhering to industry-specific regulations, such as the General Data Protection Regulation (GDPR), the Health Insurance Portability and Accountability Act (HIPAA), or the California Consumer Privacy Act (CCPA)
Cross-platform compatibility
This works across different environments, including on-premises, cloud, and hybrid setups, ensuring comprehensive security coverage
Policy enforcement
This ensures that security policies are consistently applied across all users, devices, and application
Comprehensive reporting
Detailed reports that provide insights into security events help organizations maintain compliance and optimize their security posture
Agentic AI - Firewall Software (2)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Adaptive Learning
Improves performance based on feedback and experience
Agentic AI - Zero Trust Platforms (4)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Cross-system Integration
Works across multiple software systems or databases
Adaptive Learning
Improves performance based on feedback and experience
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Components - Secure Service Edge (SSE) (4)
Secure Web Gateway (SWG)
Prevents unauthorized web domains from entering a network and protects against web-based threats.
Firewall as a Service
Provides cloud-based firewall protection.
Zero Trust Network Access (ZTNA)
Enforces zero trust access rules.
Cloud Access Security Broker (CASB)
Enforces security requirements and secures connections with cloud resources.
Artificial Intelligence -Secure Service Edge (SSE) (3)
Automation
Automates common workflows and remediation tasks.
Predictive Capabilities
Uses predictive analytics to anticipate emerging threats.
Real-Time Threat Detection
Utilizes AI algorithms to identify anomolies and block access to malicious sites.
Agentic AI - Secure Service Edge (SSE) (4)
Decision Making
Makes informed choices based on available data and objectives.
Autonomous Task Execution
Capability to perform complex tasks without constant human input.
Cross-system Integration
Works across multiple software systems or databases.
Proactive Assistance
Anticipates needs and offers suggestions without prompting.
Top-Rated Alternatives





