Listing Thumbnail

    Zscaler Private Access (ZPA)

     Info
    Deployed on AWS
    Vendor Insights
    Zscaler Private Access (ZPA) applies the principles of least privilege to give users secure connectivity to private applications while eliminating unauthorized access and lateral movement. ZPA can be deployed in hours to replace legacy VPN and remote access tools with a holistic zero trust platform.
    4.4

    Overview

    Play video

    Zscaler Private Access enables businesses to achieve:

    Peerless Security, beyond legacy VPNs and firewalls Connect users directly to apps - not the network - minimizing the attack surface and eliminating lateral movement

    Unrivaled Security against compromised app or users First-of-its-kind app protection, with inline prevention, deception, and threat isolation, minimizes the risk of compromised users

    Superior productivity for today's hybrid workforce Lighting-fast access to private apps extends seamlessly across remote users, HQ, branch offices, and third party partners

    Unified ZTNA platform for users, workloads & OT/IoT Securely connect to private apps, services, and OT/IoT devices with the industry's most comprehensive ZTNA platform

    Highlights

    • Minimize the attack surface - Make apps invisible, impossible to breach
    • Eliminate lateral movement - Enforce least-privileged access without putting users on the network
    • Stop compromised users and mitigate risk - Prevent app exploitation, find, active attackers and threats, and prevent data loss

    Details

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Vendor Insights

     Info
    Skip the manual risk assessment. Get verified and regularly updated security info on this product with Vendor Insights.
    Security credentials achieved
    (4)

    Buyer guide

    Gain valuable insights from real users who purchased this product, powered by PeerSpot.
    Buyer guide

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Zscaler Private Access (ZPA)

     Info
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (1)

     Info
    Dimension
    Description
    Cost/12 months
    ZPA_TFORM_500_ED
    ZPA Transformation Edition
    $155,000.00

    Custom pricing options

    Request a private offer to receive a custom quote.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    Vendor support

    Zscaler global support is available around the clock, with dedicated customer support engineers providing personalized assistance to ensure that customers are getting the most value from our products. Our support engineers have significant experience in networking and security, working closely with operations, sales, and engineering teams to ensure rapid response and resolution. support.zscaler.com

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    25
    In Business Intelligence & Advanced Analytics
    Top
    10
    In Network Infrastructure, Infrastructure as Code
    Top
    10
    In Device Connectivity

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    5 reviews
    Insufficient data
    25 reviews
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Zero Trust Network Access
    Implements zero trust principles with direct application connectivity instead of network-level access
    Least Privilege Access Control
    Enforces granular access permissions by connecting users directly to specific applications
    Threat Prevention Mechanism
    Provides inline prevention, deception, and threat isolation capabilities to mitigate security risks
    Application Visibility Protection
    Makes private applications invisible and inaccessible to unauthorized network participants
    Multi-Environment Connectivity
    Supports secure connections across remote users, headquarters, branch offices, and third-party partner environments
    Network Protocol
    "Programmable networking software built on the WireGuard protocol for secure connectivity"
    Identity-Based Access Control
    "Network access control based on user identity, groups, services, and subnet ranges"
    Connection Management
    "Automatic network connection migration and direct device connections without manual port forwarding configuration"
    Infrastructure Compatibility
    "Cloud and hardware-agnostic overlay network deployment across multiple operating systems and platforms"
    DNS Resolution
    "Automatic hostname resolution with MagicDNS for simplified device and resource access without IP address management"
    Zero Trust Network Access
    Enforces least-privilege access based on user identity with continuous checks on device security, location, and identity
    Network Routing
    Supports application domain-based routing that efficiently routes traffic across private networks with overlapping IP address ranges
    Global Network Infrastructure
    Delivers connectivity through 30+ worldwide points of presence using full-mesh topology over high-speed internet access
    Threat Protection
    Includes built-in IDS/IPS that automatically filters and blocks malicious traffic with multi-pronged content detection and customizable DNS filtering
    Device Posture Control
    Implements device posture policies ensuring each device adheres to predefined security rules and access criteria

    Security credentials

     Info
    Validated by AWS Marketplace
    FedRAMP
    GDPR
    HIPAA
    ISO/IEC 27001
    PCI DSS
    SOC 2 Type 2
    -
    -
    -
    No security profile
    No security profile

    Contract

     Info
    Standard contract
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    4.4
    13 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    15%
    85%
    0%
    0%
    0%
    6 AWS reviews
    |
    7 external reviews
    External reviews are from PeerSpot .
    BasilJiji

    Zero trust access has secured hybrid work and now provides seamless app connectivity

    Reviewed on Jan 15, 2026
    Review from a verified AWS customer

    What is our primary use case?

    My primary use case for Zscaler Private Access (ZPA)  is VPN replacement and zero trust access. I use Zscaler Private Access (ZPA)  to give authorized users policy-based one-to-one connectivity to specific internal applications in our data center or cloud environments. I also use Zscaler Private Access (ZPA) to secure our hybrid cloud environment. For instance, when a developer needs to access a private staging server used in AWS , they connect directly through the closest Zscaler service edge. This makes the application invisible to the private internet, ensuring only the specialist can reach it.

    How has it helped my organization?

    Zscaler Private Access (ZPA) has significantly reduced our attack surface by making our internal apps invisible to the internet. It effectively eliminates lateral movement as users are only connected to the specific application they are authorized to use rather than the entire network segment.

    Zscaler Private Access (ZPA) is highly stable. The architecture uses a global mesh of service edges with built-in fault tolerance and redundancy, providing an always-on experience that is far more reliable than our old hardware-based VPN concentrator.

    Zscaler Private Access (ZPA) is elastically scalable because it is a software-defined perimeter and not an appliance-based solution. I can instantly scale to support thousands of additional users without needing to upgrade any physical hardware.

    What is most valuable?

    The best features are the AI-powered app segmentation that automatically discovers our applications. This saves a massive amount of manual configuration time and helps me build granular access policies much faster.

    The app segmentation feature helps my team improve employee experience while giving our IT team peace of mind. It is truly a productivity tool that removes the clunkiness of a VPN. The initial discovery of legacy applications during setup can sometimes take more time to fine-tune, which is the only minor limitation.

    What needs improvement?

    Zscaler Private Access (ZPA) could be improved by making troubleshooting for specific mobile devices such as iPhones more intuitive, as identifying the root cause for mobile connectivity issues can sometimes be complex. The major improvement opportunity I would highlight is the troubleshooting functionality for mobile devices.

    For how long have I used the solution?

    I have been using Zscaler Private Access (ZPA) for about three years to provide our distributed workforce with secure, seamless access to our internal applications.

    What do I think about the stability of the solution?

    Zscaler Private Access (ZPA) is highly stable. The architecture uses a global mesh of service edges with built-in fault tolerance and redundancy, providing an always-on experience that is far more reliable than our old hardware-based VPN concentrator.

    What do I think about the scalability of the solution?

    Zscaler Private Access (ZPA) is elastically scalable because it is a software-defined perimeter and not an appliance-based solution. I can instantly scale to support thousands of additional users without needing to upgrade any physical hardware.

    How are customer service and support?

    The customer support team is very knowledgeable about the ZTNA  architecture and Zscaler Trust Portal provides excellent transparency into the health of the global cloud infrastructure.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    I previously used a traditional legacy VPN. I switched because the VPN was too slow and hard to manage at scale, and it created a major security risk by putting users directly on the network.

    How was the initial setup?

    Zscaler Private Access (ZPA) is an incredible enabler for modern hybrid work. The initial discovery of legacy applications during setup can sometimes take more time to fine-tune.

    What was our ROI?

    I have seen a significant return on investment since implementing Zscaler Private Access (ZPA). The ROI is often cited around 289% over the three years of typical enterprises. The key metrics include a 55% reduction in security breach risk and roughly 1.75 million in annual savings on infrastructure and legacy VPN licensing costs.

    What's my experience with pricing, setup cost, and licensing?

    Zscaler Private Access (ZPA) is priced on a per-user, per-year basis. While it is a premium investment, the short payback period of about 11 months and consolidation of multiple point products make it very cost-effective in the long run.

    Which other solutions did I evaluate?

    I evaluated Cisco AnyConnect, Palo Alto, and Twingate . I finally  chose Zscaler Private Access (ZPA) because it is the most deployed solution and offers the most mature AI-powered application segmentation.

    What other advice do I have?

    Zscaler Private Access (ZPA) is a cloud-native service hosted on Zscaler's global cloud platform, which has over 150 points of presence. I use lightweight app connectors hosted in our own private data centers and public cloud like AWS  or Azure  to create secure inside-out connections to our applications. I use majorly the AWS one.

    I purchased Zscaler Private Access (ZPA) through the AWS Marketplace , which allows me to simplify procurement, consolidate billing, and apply my Zscaler spend towards existing cloud commitments.

    I would advise those looking into Zscaler Private Access (ZPA) to use the AI-powered app segmentation to automatically discover your applications. This feature saves a massive amount of manual configuration time and helps build granular access policies much faster.

    My company relies on Zscaler Private Access (ZPA)'s cloud-native architecture to protect our private applications and sensitive data.

    I give Zscaler Private Access (ZPA) a rating of 9 out of 10.

    VikasTiwari

    Zero trust access has transformed remote work and now secures every internal application session

    Reviewed on Jan 07, 2026
    Review from a verified AWS customer

    What is our primary use case?

    My primary use case for Zscaler Private Access (ZPA)  is securing application-level access to internal applications without exposing the network to the public network. Previously, VPN gave users broad network access, which increased the risk capacity. With ZPA, we follow the Zero Trust principle, allowing users access only to the specific applications they are authorized for, and this dramatically improves security and compliance.

    A strong example of how I use Zscaler Private Access (ZPA)  for securing application-level access occurred during a company-wide shift to remote work, as VPN concentrators were overloaded, causing slow connections and outages. After moving critical apps to ZPA, users connected directly through the Zscaler cloud, and consistent performance significantly helped desk VPN ticket drops. Our remote employees can access applications more smoothly, even from different geographies and networks, especially considering the multiple issues faced during COVID-19. This example correlates all those issues where no one could access all those applications and the exposure over the internet was critical. At the time, there were many gaps, and through ZPA, it is easy to configure and provides easy access to all those internal applications with least privilege access.

    What is most valuable?

    Zscaler Private Access (ZPA) offers many features, including Zero Trust Network Access , which adheres to the principle of "never trust, always verify." Additionally, it provides application-level access, allowing specification of applications that significantly reduce the risk of lateral movement and eliminate network exposure. There is also the option to create identity-based policies, and since it is a cloud-native architecture, there is no dependency on on-premise or hybrid solutions. In terms of scalability, ZPA supports multi-cloud and hybrid environments while providing a seamless user experience as users connect transparently without the need to launch or manage VPN tunnels, which is a great feature.

    Instead of creating VPN accounts with broad permissions, we now grant vendors access to only one application via Zscaler Private Access (ZPA). This approach makes audits easier, improves security, and gives management confidence that external access is tightly controlled and logged without additional network complexity. This is also the best solution for our audit needs since there is no firewall needed; we use remote access solutions that require and provide least privilege access to users, which helps with risk, compliance, governance, and adheres to the Zero Trust principle.

    Zscaler Private Access (ZPA) positively impacts my organization through application segmentation and access policy management. On a daily basis, I review access policies, onboard new applications, and validate users based on identity and posture solutions. This method is far safer than traditional subnet-based access, aligning with the Zero Trust architecture principle.

    What needs improvement?

    After deploying Zscaler Private Access (ZPA), I notice a reduction in VPN-related support tickets, particularly during peak hours, and audits become smoother because access is clearly defined per application. Our incident response team reports improved visibility into user access events, making investigations faster and more accurate. While ZPA greatly improves the management process, the administrative interface could be more intuitive, particularly for troubleshooting scenarios requiring navigation across multiple dashboards and logs during real operational settings, especially in incidents. Simpler visibility into traffic flow and access decisions would significantly speed up root cause analysis.

    To improve Zscaler Private Access (ZPA), we need more real-world deployment examples and technical documentation, including step-by-step guides for complex scenarios such as multi-cloud legacy app integration. These resources would help engineers implement and troubleshoot faster, especially during initial rollouts and major environmental changes.

    The training costs associated with Zscaler Private Access (ZPA) are very high, and there are few resources available online. This makes understanding customer and employee needs challenging. There are many dependencies on the internet, and it is not straightforward to comprehend the entire infrastructure architecture and how ZPA operates.

    I do not give a perfect ten because I notice a lot of dependencies on the TAC, along with complexity in the UI. Sometimes, fully understanding the policy workflow and troubleshooting tools require improvement, especially concerning dashboard usability and diagnostics. There are many restrictions that hinder troubleshooting without a TAC engineer.

    For how long have I used the solution?

    I have been working with Zscaler Private Access (ZPA) for around two years, having initially deployed it during a phase when remote work demand rapidly increased. Over time, ZPA became a core part of our access strategy, replacing a large part of the VPN community footprint and supporting both permanent employee and external partners' access solutions to internal applications securely.

    What do I think about the stability of the solution?

    Zscaler Private Access (ZPA) is very stable in production, with extremely rare outages and minimal user complaints. Even during peak usage or mass remote access events, performance remains consistent, which is critical for an enterprise environment handling business-critical applications.

    What do I think about the scalability of the solution?

    Scalability is one of Zscaler Private Access (ZPA)'s strongest points, allowing us to onboard hundreds of users quickly without altering infrastructure since it is cloud-based. Scaling users or applications does not require any additional hardware or complex restructuring, presenting a significant operational advantage based on subscription counts.

    How are customer service and support?

    The customer support for Zscaler Private Access (ZPA) is good, responding quickly to tickets and engaging via Zoom sessions.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    Previously, we used traditional VPN solutions such as IPsec and SSL VPN , which provided network-level access and posed significant security risks. We switched to ZPA to embrace the Zero Trust approach, reduce the attack surface, and enhance the remote user experience without creating traffic bottlenecks through a centralized VPN gateway.

    How was the initial setup?

    The biggest impact on my team from Zscaler Private Access (ZPA) is the overhead reduction in timing and monitoring all applications through one GUI base. It is easy to integrate, with no complex configurations required, unlike traditional VPNs, which depend on firewalls and a host of policies. In the current SaaS environment, ZPA offers a good comparison and overview, paired with excellent security and monitoring tools.

    What was our ROI?

    The cost associated with Zscaler Private Access (ZPA) depends entirely on the number of users and licenses purchased, and while I have not put an extensive focus on return on investment metrics, it is a good cost model.

    What's my experience with pricing, setup cost, and licensing?

    Regarding pricing, setup costs, and licensing for Zscaler Private Access (ZPA), while it is not the cheapest solution, when you factor in the reduced VPN infrastructure, hardware maintenance, and operational overhead, the cost becomes easier to justify. The simplicity of licensing also aids in scaling the users, allowing it to be viewed more favorably as a viable solution.

    Which other solutions did I evaluate?

    We evaluated other options from Palo Alto and Fortinet, but Zscaler Private Access (ZPA) stood out due to its cloud-native design, global scalability, and true application-level access model, which aligns better with our long-term Zero Trust strategy.

    What other advice do I have?

    My advice to others considering Zscaler Private Access (ZPA) is to invest time in application segmentation and identity integrations. ZPA yields the best results when applications are well-classified, and access policies are clearly defined. Additionally, training your operational team early will help them fully leverage the troubleshooting and monitoring capabilities available. The company also provides premium solutions on the TAC side, capable of responding within two to five minutes based on ticket severity levels.

    Zscaler Private Access (ZPA) is a mature, enterprise-grade Zero Trust solution that delivers security and operational benefits. It is a great solution and ranks highly in Gartner reports. Recently, I have noticed some shifts in its standing on these reports and some downsides, possibly due to cost issues, so it is vital to ensure all aspects align with licensing costs. I gave this solution a rating of nine out of ten.

    Which deployment model are you using for this solution?

    Public Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Reviewer921606

    Have worked on strengthening zero trust initiatives and expect improved integration capabilities

    Reviewed on Oct 27, 2025
    Review provided by PeerSpot

    What is our primary use case?

    Zscaler Private Access (ZPA)  is a Zero Trust Network Access  solution. When replacing traditional remote access VPN technology, which is not aligned with NIST 800-207 Zero Trust principles, Zscaler Private Access (ZPA)  is the solution. It serves enterprises that prefer not to manage the underlay by installing a client connector agent on end-user machines. It provides access to private applications and SaaS applications remotely when users are traveling while building secure connectivity and ensuring least privilege access to these applications rather than everything within the perimeter.

    What is most valuable?

    The base bundle of Zscaler Private Access (ZPA) comes with essential features that depend on client requirements. For secure private access, configuration of client connectors and app connectors on-premises or in the cloud is necessary. Additional features include remote browser isolation capability and secure browser access, which can replace existing Privileged Access Management  solutions. DLP  capabilities and double encryption ensure the underlying provider cannot strip packets and examine contents.

    I would assess the security level achieved with Zscaler Private Access (ZPA)'s Zero Trust architecture as inherent to the system. The security policies focus on users and applications rather than network-based constructs. It offers configuration levers for ingesting risk from identity and application standpoints, generating a cumulative score that can trigger connection drops when breaching thresholds. These features align with NIST 800-207 principles. The Risk360 view helps assess security policies and rule sets, providing recommendations for policy tightening.

    What needs improvement?

    Zscaler Private Access (ZPA) can be improved by expanding integrations. While they integrate with standard vendors such as CrowdStrike, deeper integrations with other vendors are needed. They should harmonize risk scores between different vendors, as each might score things differently, requiring a robust handshake for meaningful integration.

    There is room for having a complete on-premises option. While Zscaler Private Access (ZPA) wants users to utilize their infrastructure for scale benefits, regulated environments such as government and investment banks need on-premises processing for regulations and low latency requirements. High-frequency trading firms require processing traffic internally rather than through internet channels.

    In the future, I expect expansion of integrations because architects need flexibility in vendor selection based on use cases. The solution needs better handshake capabilities between vendors for risk scores and other metrics. Support-wise, they have a strong presence globally, including challenging markets such as China, though very remote offshore areas remain uncovered.

    For how long have I used the solution?

    I have worked with Akamai  since 2019, when I first gained exposure to it.

    What other advice do I have?

    I have worked with Zscaler Private Access (ZPA) and Palo Alto as an enterprise security architect across multiple client engagements as part of network security implementations. I have also worked with competitors including Cloudflare . As we were partners, we received preferential access to support. I rate this solution 9 out of 10.

    reviewer1492392

    Ensuring seamless VPN connectivity while needing better troubleshooting support

    Reviewed on Jun 18, 2025
    Review provided by PeerSpot

    What is our primary use case?

    We are using secure remote access for internal applications, and that's why we are using Zscaler Private Access (ZPA)  now. I work with Zscaler Private Access (ZPA) . I use it just for the VPN functionality.

    What is most valuable?

    The best advantage of the product is that it is always on as a VPN, which gives us much more functionality. It is basically easy to use and easy to configure. The solution for Zscaler Private Access (ZPA) is seamless for this.

    From a visibility perspective, they have added more content features where we can see security and other aspects through available dashboards. That's the only notable addition, plus they are implementing the overall security architecture of tenants, which gives much more information to work with.

    What needs improvement?

    The only room for improvement is the troubleshooting problem with iPhones as of now.

    The review should be anonymous; there should not be any personal or business details given. Both should be anonymous.

    For how long have I used the solution?

    I have been using it for around four or five years.

    What was my experience with deployment of the solution?

    The installation and deployments are straightforward; it is just a two-liner process. There is something in the documentation that might need changes, but it's pretty straightforward.

    The documentation has to be perfect as it has not been updated for a long time. They need to update it based on the latest version and the commands we use.

    What do I think about the stability of the solution?

    The solution is stable enough.

    What do I think about the scalability of the solution?

    We are using cloud services, but I am not sure about the scalability specifically.

    Based on the limited users, this is perfectly fine since we are using only one box, and we haven't faced many issues with that.

    How are customer service and support?

    I am not happy with the technical support from Zscaler Private Access (ZPA), particularly in India, where reachability is an issue with salespersons. Sometimes we need to reach a salesperson to get issues resolved, especially for mobile problems we're still facing. We lack specific root causes, and it's tough to relay information to users, considering multiple contributors such as phone numbers and internet service providers. We need more visibility on what problems users are facing with reachability.

    I would rate technical support six points out of ten.

    How would you rate customer service and support?

    Neutral

    Which solution did I use previously and why did I switch?

    I have not used any other VPNs apart from Zscaler Private Access (ZPA).

    What was our ROI?

    I see some ROI in the product. Since we have a very small team, the ROI is around 20% to 30%. I would say 30%.

    What other advice do I have?

    I am not using AWS Backup  anymore since we spoke almost two years ago. I have a backup solution managed by another team, and there's a discussion about AWS  for backup. I am responsible for the IT security part only.

    I do not work with popular vendors such as Palo Alto or Fortinet, as my primary domain is Check Point, and it's all about security. I use Check Point for this purpose. I do not work with the product ZoneAlarm . We use only a specific firewall from Check Point and utilize only the firewall. We are not using Check Point CloudGuard  Web Application Firewall ; we are using a normal firewall, the Firewall as a gateway. The name of the product is Check Point Firewall Gateway.

    I am not using a web gateway. We do not use products such as Harmony  or Harmony  Browse. I am using a VPN from Cisco for endpoint protection. I am not using the cloud firewall from Zscaler Private Access (ZPA). I am not working with Zscaler B2B  or ZTNA  as a service.

    From a troubleshooting perspective, we face an issue with iPhones affecting about 10% of users. Even when we provide logs, they are not able to figure out what exactly is happening. It's not possible for users to collect logs each time, and this is a peculiar problem happening with 10 to 15 users.

    The operational flexibility is very effective; there are no problems, and I did not have any issues with that. The solution is affordable, but there are other parts that could add much more information, which may not be useful for us at the moment, making it a bit expensive. There is also a China-specific solution, which is really expensive.

    I agree to share my details with the Zscaler vendor. I do not want to be a reference for Zscaler Private Access (ZPA).

    On a scale of 1-10, I rate this solution a 9.

    Eli Grosman

    Enables secure and seamless connectivity for distributed teams

    Reviewed on Jun 05, 2025
    Review from a verified AWS customer

    What is our primary use case?

    For our main use cases for Zscaler Private Access (ZPA) , it’s providing us a VPN solution for our clients, connecting to data build resources, and providing them security.

    What is most valuable?

    It's challenging to explain which features of Zscaler Private Access (ZPA)  are most valuable because the main client is the IT department in our company, and we, as DevOps, are deploying this solution as infrastructure for them. From our case, and as I'm familiar with this tool, the most value is the VPN connection because it provides access for all company members to data builds in a secure way.

    Zscaler Private Access (ZPA) does an excellent job offering secure remote access to internal applications for our distributed workforce because it provides a granular way to grant access for specific people with specific applications.

    Zscaler Private Access (ZPA) has been very effective in providing operational flexibility during our company's transition to cloud environments, as it helped us significantly, and it was deployed even before we migrated to the cloud itself.

    What needs improvement?

    Concerning improvements for Zscaler Private Access (ZPA), we have occasional issues, but I don't think they are related to the product itself; they may be related more to infrastructure problems or something else related to the network because it's a network application.

    The current pain points we sometimes experience relate to the additional security applications we have on the laptops, and sometimes I don't know if I didn't get any notification from the application because it's an agent problem or something security-wise blocking this.

    For how long have I used the solution?

    I have been using Zscaler Private Access (ZPA) for more than three years.

    What was my experience with deployment of the solution?

    I would describe my experience deploying Zscaler Private Access (ZPA) as very straightforward, but I think it could allow more automatic ways to deploy and configure instead of having to connect to each new instance manually and configure it.

    What do I think about the stability of the solution?

    We didn’t have any issues with Zscaler Private Access (ZPA)’s stability, availability, or reliability.

    What do I think about the scalability of the solution?

    I don’t know how Zscaler Private Access (ZPA)’s cloud-native architecture is used for scaling within my company, but we do use something deployed in the cloud, and from my perspective, we only deploy the agent, exactly what we took from the marketplace.

    How are customer service and support?

    As for support from Zscaler Private Access (ZPA), I might have used it, but it’s primarily handled by the IT team.

    Which solution did I use previously and why did I switch?

    I know we had something before Zscaler Private Access (ZPA) to address similar needs, but I don’t remember the application name. The decision to move to Zscaler Private Access (ZPA) was possibly because it’s more native in the cloud environment and provides us an easier way to get or configure this.

    Which other solutions did I evaluate?

    In regard to other solutions I considered before implementing Zscaler Private Access (ZPA), I don’t know because the decision on what to use and what to install came from management.

    What other advice do I have?

    Regarding the micro-segmentation feature of Zscaler Private Access (ZPA), I can explain less, and I think the IT team who are managing it can explain better.

    I don't know how Zscaler Private Access (ZPA) has helped minimize lateral movement within our network because I don't know how to measure this reduction.

    Since implementing Zscaler Private Access (ZPA), I've not noticed any changes in the visibility or monitoring of user access patterns because it's not part of our responsibility. We deploy it, and the IT team is configuring and monitoring it, fixing issues if it's working or not.

    I'm not familiar with all benefits from using Zscaler Private Access (ZPA) that I haven't discussed, as I am only familiar with the VPN-related functionality and the segmentation which provides granular security access for the clients.

    I rate Zscaler Private Access (ZPA) eight out of ten.

    View all reviews