Zscaler Zero Trust Cloud Features
Management (11)
Dashboards and Reports
Access pre-built and custom reports and dashboards.
Workflow Management
Creates new or streamlines existing workflows to better handle IT support tickets and service.
Administration Console
Provides Administration tools/console that are easy to use and learn for routine maintenance tasks
Backup and Recovery
Offer backup and/or recovery options for data being migrated to the cloud.
Integration Variety
Integrates with a variety of sources and/or migration targets.
Access and Security
Maintain user access and security features associated with pre-migrated data in the post-migration environment.
Real time Monitoring
Real-time view and status of every component in the cloud environment.
Multicloud Management
Allows users to track and control cloud spend across cloud services and providers.
DLP Configuration
Offers data loss prevention tools to protect data from leaving the environments it is allowed to.
Dynamic Scaling
Scale resources automatically, adjusting for usage demands.
Policy Enforcement
Enables administrators to create access policies and applies policy controls throughout request and provisioning processes
Operations (3)
Governance
Allows users to create, edit, and relinquish user access privileges.
Logging and Reporting
Provides required reports to manage business. Provides adequate logging to troubleshoot and support auditing.
API / Integrations
Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.
Security Controls (4)
Anomaly Detection
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.
Data Loss Prevention
Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.
Security Auditing
Analyzes data associated with security configurations and infrastructure to provide vulnerability insights and best practices.
Cloud Gap Analytics
Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.
Analysis (6)
User Analytics
Allows for reporting and documentation of individual user behavior and privileges. 11 reviewers of Zscaler Zero Trust Cloud have provided feedback on this feature.
Cloud Gap Analytics
Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols. 11 reviewers of Zscaler Zero Trust Cloud have provided feedback on this feature.
Anomoly Detection
Monitors acivity related to user behavior and compares activity to benchmarked patterns. 11 reviewers of Zscaler Zero Trust Cloud have provided feedback on this feature.
Cloud Gap Analytics
Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols. 12 reviewers of Zscaler Zero Trust Cloud have provided feedback on this feature.
Compliance Monitoring
Monitors data quality and send alerts based on violations or misuse. This feature was mentioned in 13 Zscaler Zero Trust Cloud reviews.
User Analytics
Based on 13 Zscaler Zero Trust Cloud reviews. Allows for reporting and documentation of individual user behavior and privileges.
Functionality (7)
SSO
Based on 11 Zscaler Zero Trust Cloud reviews. Provides a single access point for users to access multiple cloud products without multiple logins.
Cloud Registry
Details SaaS products the cloud security product can integrate with and provide security for. This feature was mentioned in 11 Zscaler Zero Trust Cloud reviews.
Mobile Device Mangement
Offers the ability to set standards for types of mobile devices and networks capable of accessing data. This feature was mentioned in 11 Zscaler Zero Trust Cloud reviews.
Data Migration
Migrate data from on-premises or cloud solutions to a separate cloud environment or solution.
Data Variety
Be compatible with a variety of data types for migration.
Alerts and Logging
Send alerts for migration failures, and log migration processes to show possible root causes for failures.
Data Replication
Copy and store the same data in multiple locations.
Security (5)
Governance
Allows users to create, edit, and relinquish user access privileges. This feature was mentioned in 10 Zscaler Zero Trust Cloud reviews.
Data loss Prevention
Based on 11 Zscaler Zero Trust Cloud reviews. Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.
Data Encryption/Security
Based on 11 Zscaler Zero Trust Cloud reviews. Manages policies for user data access and data encryption.
Access Control
As reported in 11 Zscaler Zero Trust Cloud reviews. Supports LDAP Protocol to enable access control and governance.
Data Protection
Transform or encode data before being moved to the cloud.
Administration (6)
Auditing
Based on 13 Zscaler Zero Trust Cloud reviews. Documents access and alterations of the database for analytics and reporting.
Data Discovery
Unveils data connected to infrastructure and applications used to help manage and maintain compliance within complex IT systems. 13 reviewers of Zscaler Zero Trust Cloud have provided feedback on this feature.
Access Control
As reported in 13 Zscaler Zero Trust Cloud reviews. Supports LDAP Protocol to enable access control and governance.
Policy Enforcement
Allows administrators to set policies for security and governance.
Dependency Mapping
Facilitates the discovery, allocation, and mapping of application dependencies across servers, networks, and cloud environments.
Network Mapping
Allows visual display of networks segmented components and their connected resources.
Data Protection (5)
Data Masking
Based on 14 Zscaler Zero Trust Cloud reviews. Protects sensitive data by disguising or encrypting data, keeping it usable by the organization and approved parties.
Data Encryption/Security
As reported in 14 Zscaler Zero Trust Cloud reviews. Manages policies for user data access and data encryption.
Data loss Prevention
Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest. 13 reviewers of Zscaler Zero Trust Cloud have provided feedback on this feature.
Anomoly Detection
Based on 13 Zscaler Zero Trust Cloud reviews. Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.
Sensitive Data Compliance
As reported in 13 Zscaler Zero Trust Cloud reviews. Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
Monitoring (3)
Data Center Networking
Provides advanced data center network services to deliver multiple high-speed IP.
Multicloud Visibility
Allows users to track and control activity across cloud services and providers.
Anomaly Detection
Constantly monitors system to detect anomalies in real time.
Protection (4)
Firewall-as-a-Service
Managed, cloud-delivered firewall that protects devices, assets, networks, and other cloud services from web-based threats.
Cloud Application Brokerage
Provides a single access point for users to access multiple cloud applications, services, and products through a central gateway
Web Gateway
Provides a private web gateway for secure internet browsing.
Adaptive Access Control
Provides a risk-based approach to determining trust within the network.
Enforcement (5)
Identity-Based Policy Management
Accelerates policy change workflows using identity attributes to manage microsegmentation policies.
Workflow Automation
Completely automates end-to-end policy enforcement workflows across hybrid- and multi-cloud environments.
Network Segmentation
Allows administrative control over network components, mapping, and segmentation.
Intelligent Segmentation
Automates segmentation and provides AI-based improvement suggestions.
Workload Protection
Protects computing resources across a network. Prompts additional authentication for suspicious users.
Visibility (3)
Breach Detection
Provides incident alerts for leaks or breaches and provides capabilities to inform administrators of attacks.
Observability
Generate insights across IT systems utilizing event metrics, logging, traces, and metadata.
Application Discovery
Detect new assets and applications as they enter a cloud environments and networks to add to asset inventory.
Agentic AI - Cloud Migration (3)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Decision Making
Makes informed choices based on available data and objectives
Functionality - AI Security Posture Management (AI-SPM) Tools (5)
Security Ecosystem Integration
Integrate with existing security infrastructure (SIEM, CASB, IAM, DSPM/CSPM/SSPM) to bring AI‑SPM into the wider security ecosystem.
AI Asset Discovery
Discover AI applications, agents, chatbots and integrations across SaaS, APIs and other environments.
Adaptive Policy Updates
Support continuous updates to policies and controls as AI‑tool usage evolves and new threats emerge.
Access and Permissions Monitoring
Monitor data flows, permissions and resource access associated with AI integrations and tools.
Policy Enforcement
Enforce AI‑specific security policies in real time, such as limiting agent permissions and blocking unauthorized AI activity.
Risk Assessment - AI Security Posture Management (AI-SPM) Tools (2)
AI Risk Assessment
Continuously assess AI integration risks including misconfigurations, policy violations and exposure to external AI services.
AI Asset Posture Scoring
Provide dashboards, risk scores and prioritisation for remediation across the AI‑asset estate.
Governance & Compliance - AI Security Posture Management (AI-SPM) Tools (2)
AI‑Generated Content Controls
Monitor AI‑generated content for sensitive/regulated information and apply remediation or blocking controls.
Audit Trails
Maintain audit logs, governance controls and reporting tied specifically to AI assets, agent behaviours and integrations.




