Zscaler Private Access Features
Authentication Options (6)
Authentication User experience
As reported in 30 Zscaler Private Access reviews. Process of providing credentials and logging into multiple systems is easy and intuitive for users
Supports Required Authentication systems
As reported in 29 Zscaler Private Access reviews. Supports required 3rd party Authentication Technologies. Example systems: bioMetric, passwords, key cards, token based systems, etc.
Multi-Factor Authentication
Based on 29 Zscaler Private Access reviews. Provides support for Multi-Factor authentication, so users are required to provide multiple factors to authenticate. For example, something they know, Something they have or something they are.
Supports Required Authentication Methods/Protocols
Support SSO via Web agents, proxy agents, agent-less, SAML or oAuth and WS-Federation authentication and authorization Web services depending upon the application and business use case 28 reviewers of Zscaler Private Access have provided feedback on this feature.
Federation/SAML support (idp)
Can serve as the identity provider to external service providers so that when the user logs into a service, instead of providing credentials to the service provider, the service provider trusts the identity provider to validate the credentials. 25 reviewers of Zscaler Private Access have provided feedback on this feature.
Federation/SAML support (sp)
Can serve as the Service provider from an external service so that when the user logs in externally they have seamless SSO to internal applications from a service provider. This feature was mentioned in 25 Zscaler Private Access reviews.
Access Control Types (5)
Endpoint access
Provides ability to control access to PC's, Mobile devices, and other endpoint devices. 28 reviewers of Zscaler Private Access have provided feedback on this feature.
Local Access
Controls access to legacy applications, web based applications, network resources and servers while employees are on the companies local area network. 27 reviewers of Zscaler Private Access have provided feedback on this feature.
Remote Access
Controls access to legacy applications, web based applications, networks resources while employees are outside the local area network. 29 reviewers of Zscaler Private Access have provided feedback on this feature.
Partner Access
As reported in 25 Zscaler Private Access reviews. Controls access to users that are not company employees that are either within the companies local area network or outside the network
Supports BYOD users
As reported in 26 Zscaler Private Access reviews. Enables users to use their own device to access company applications.
Administration (5)
Ease of installation on server
Installation process is easy and flexible. This feature was mentioned in 28 Zscaler Private Access reviews.
Password Policy Enforcement
Based on 29 Zscaler Private Access reviews. Options for resetting and enforcing password policies
Administration Console
As reported in 28 Zscaler Private Access reviews. Provides Administration tools/console that are easy to use and learn for routine maintenance tasks
Ease of connecting applications
Based on 28 Zscaler Private Access reviews. Easily provisions new systems, platforms or applications using configuration and not customization.
Self Service Password Administration
As reported in 28 Zscaler Private Access reviews. Users can set, change passwords without interaction from IT staff
Platform (7)
Multiple Operating system support
Based on 27 Zscaler Private Access reviews. Supports Endpoint access control to multiple operating systems
Multi-Domain Support
Allows user authentication to be honored by all the hosts in two or more domains 27 reviewers of Zscaler Private Access have provided feedback on this feature.
Cross Browser support
Based on 26 Zscaler Private Access reviews. Support access to browser based applications across required browser types
Fail over protection
Based on 25 Zscaler Private Access reviews. Provides required failover mechanisms to ensure if one server, network, etc fails users are still able able to authenticate
Reporting
Contains pre-built and custom reporting tools to required to manage business This feature was mentioned in 26 Zscaler Private Access reviews.
Auditing
As reported in 26 Zscaler Private Access reviews. Provides mechanism for auditing authentication for trouble shooting purposes.
Third Party Web Services support
As reported in 24 Zscaler Private Access reviews. Can call and pass credentials to third party web services.
Usage (7)
Multi-Device Usage
Enables the use of the VPN on multiple Devices.
Multiple Concurrent Connections
Allows use of the VPN on multiple connections at the same time.
Protocol Choices
Enables the user to choose which protocol to use such as OpenVPN or PPTP.
Unlimited Bandwidth
Provides unlimited bandwidth for the user.
No Log Storage
Does not keep logs of user activity.
Varied Server Locations
Provides servers in many different locations.
Unlimited Server Switches
Enables you to switch between servers an unlimited number of times.
Miscellaneous (3)
Live Customer Support
Provides live customer support.
Open Source Code
Enables the user to view the code used by the VPN.
Multiple Payment Methods
Allows multiple payment methods such as credit card or cryptocurrency.
Network Management (4)
Network Segmentation
As reported in 61 Zscaler Private Access reviews. Allows administrative control over network components, mapping, and segmentation.
Network Mapping
As reported in 64 Zscaler Private Access reviews. Allows visual display of networks segmented components and their connected resources.
Security Analytics
Utilizes behavioral analysis to improve security procedures and documentation. This feature was mentioned in 62 Zscaler Private Access reviews.
API/Integrations
As reported in 60 Zscaler Private Access reviews. Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.
Security (4)
Security Automation
Allows administrative control over automated security tasks. 64 reviewers of Zscaler Private Access have provided feedback on this feature.
Application Security
Protects application access and data. Prompts additional authentication for suspicious users. 66 reviewers of Zscaler Private Access have provided feedback on this feature.
Workload Protection
Based on 61 Zscaler Private Access reviews. Protects computing resources across a network. Prompts additional authentication for suspicious users.
Data Protection
Based on 64 Zscaler Private Access reviews. Protects informatin stored on premises and in the cloud. Prompts additional authentication for suspicious users.
Identity Management (3)
Adaptive Access Control
Based on 62 Zscaler Private Access reviews. Provides a risk-based approcach to determining trust within the network.
Identity Scoring
Calculates risk based on user behavior, permissions, and requests. This feature was mentioned in 61 Zscaler Private Access reviews.
User Monitoring
As reported in 63 Zscaler Private Access reviews. Monitors users attempting unauthorized access to databases, applicaitons, and othe network components.
Management (4)
Multicloud Management
Allows users to track and control cloud spend across cloud services and providers.
DLP Configuration
Offers data loss prevention tools to protect data from leaving the environments it is allowed to.
Dynamic Scaling
Scale resources automatically, adjusting for usage demands.
Policy Enforcement
Enables administrators to create access policies and applies policy controls throughout request and provisioning processes
Monitoring (3)
Data Center Networking
Provides advanced data center network services to deliver multiple high-speed IP.
Multicloud Visibility
Allows users to track and control activity across cloud services and providers.
Anomaly Detection
Constantly monitors system to detect anomalies in real time.
Protection (4)
Firewall-as-a-Service
Managed, cloud-delivered firewall that protects devices, assets, networks, and other cloud services from web-based threats.
Cloud Application Brokerage
Provides a single access point for users to access multiple cloud applications, services, and products through a central gateway
Web Gateway
Provides a private web gateway for secure internet browsing.
Adaptive Access Control
Provides a risk-based approach to determining trust within the network.
Generative AI (2)
AI Text Summarization
Based on 39 Zscaler Private Access reviews. Condenses long documents or text into a brief summary.
AI Text Generation
Based on 39 Zscaler Private Access reviews. Allows users to generate text based on a text prompt.
Components - Secure Access Service Edge (SASE) (5)
Zero Trust Network Access (ZTNA)
Enforces zero trust access rules.
Wide Area Network (WAN)
Integrates wide area network (WAN) capabilities, such as SD-WAN.
Cloud Access Security Broker (CASB)
Enforces security requirements and secures connections with cloud resources.
Secure Web Gateway (SWG)
Prevents unauthorized web domains from entering a network and protects against web-based threats.
Firewall as a Service
Provides cloud-based firewall protection.
Artificial Intelligence - Secure Access Service Edge (SASE) (3)
Predictive Capabilities
Uses predictive analytics to anticipate emerging threats.
Real-Time Threat Detection
Utilizes AI algorithms to identify anomolies and block access to malicious sites.
Automation
Automates common workflows and remediation tasks.
Agentic AI - Secure Access Service Edge (SASE) Platforms (4)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Cross-system Integration
Works across multiple software systems or databases
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives





