
Overview

Product video
Superior cyber protection Apply zero trust principles and AI-powered cyberthreat and data loss prevention services with the world's most comprehensive cyber threat protection solution to eliminate the attack surface, prevent compromise, halt lateral movement, and stop data loss.
Powerful data protection Prevent data loss from users, SaaS apps, and public cloud infrastructure due to accidental exposure, theft, or ransomware.
Great user experience Enable employees and third parties to access apps securely from anywhere with the visibility and control to optimize their digital experience from device to ISP to cloud proxy to app and back. No need for firewalls, VPNs, backhauling, or siloed management tools. A simple cloud-native solution for a modern workforce.
Lower cost and complexity Eliminate legacy security and networking technology costs, including firewalls, VPNs, and the additional overhead that comes with keeping them up to date.
Highlights
- Secure Internet & SaaS Access: Provide users with fast, secure, and reliable internet and SaaS access while protecting against advanced threats and data loss.
- Secure Private App Access: Connect users seamlessly and securely to private apps, services, and OT devices with the industry's only next-gen zero trust network access (ZTNA) platform.
- Digital User Experience: Monitor digital experiences from the end user's perspective to optimize performance and rapidly fix application, network, and device issues.
Details
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Buyer guide

Financing for AWS Marketplace purchases
Pricing
Dimension | Description | Cost/12 months |
|---|---|---|
ZS_BIZ_ED_50 | Zscaler for Users Business Edition - 50 Users | $15,750.00 |
ZS_TFORM_ED_500 | Zscaler for Users Transformation Edition - 500 Users | $312,000.00 |
Zscaler Zero Trust Platform - 50 Users | Unlock the complete SASE/SSE solution, including full internet access, private access, and data protection. | $20,000.00 |
Vendor refund policy
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Software as a Service (SaaS)
SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.
Resources
Support
Vendor support
Zscaler global support is available around the clock, with dedicated customer support engineers providing personalized assistance to ensure that customers are getting the most value from our products. Our support engineers have significant experience in networking and security, working closely with operations, sales, and engineering teams to ensure rapid response and resolution.
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.


Standard contract
Customer reviews
Zero trust access has transformed remote connectivity and now simplifies secure app usage
What is our primary use case?
Zscaler Zero Trust Exchange Platform is used to provide secure internet access and Zero Trust based application access for enterprise users, especially in the banking sector. The platform enforces security policies for outbound internet traffic, including URL filtering, SSL inspection, threat prevention, and Zscaler Private Access to provide secure, VPN-less access to internal applications. Instead of using traditional VPN, applications were segmented and published through Zscaler. Access is granted based on user identity and device posture, allowing users to access only specific applications rather than the full network.
What is most valuable?
Some of the best features of Zscaler Zero Trust Exchange Platform are centered around security, user experience, and the simplicity of deployment. One key feature is Zero Trust access, where users receive access to only specific applications instead of the full network, which significantly reduces the attack surface. Another important feature is the use of app connectors, which establish outbound connections only, so there is no need to expose internal applications to the internet, improving the overall security posture. Zscaler Private Access also provides identity-based access control where access decisions are based on user identity, device posture, and policies rather than IP address. From a user experience perspective, one of the best features is seamless access without VPN, removing the need for manual connections and improving performance. Additionally, it offers application segmentation for granular access control, scalability through cloud-native architecture, and integration with identity providers such as Active Directory and Azure AD . These features deliver secure, fast, and user-friendly access to internal applications.
A significant improvement in user experience occurred after moving from traditional VPN to Zscaler Private Access. Initially with VPN, users faced issues including slow connectivity, especially during peak hours, full network access which increased security risk, frequent VPN disconnects, and login delays. After implementing Zscaler Private Access, the feedback was largely positive. Users experienced faster and more stable access to applications since the traffic is routed directly to the application instead of the entire network, eliminating the need to manually connect to the VPN. Access became seamless in the background, improving overall security as users could access only specific applications rather than the full network. From an IT and security perspective, there was a reduced attack surface, better visibility, and controlled use based on user identity, as well as fewer support tickets related to connectivity issues. The transition improved both user experience and security posture, and adoption was smooth after initial onboarding.
What needs improvement?
Zscaler Zero Trust Exchange Platform, especially Zscaler Private Access, is very strong, though there are a few areas where improvements can be made. One challenge observed is around initial troubleshooting and visibility. While Zscaler Private Access provides logs, it can sometimes take time to pinpoint the exact cause of access issues, especially in complex environments with multiple policies and identity integration. Another area is the dependency on identity and connector health. Since Zscaler Private Access is heavily reliant on app connectors and identity providers, any issues with these components can impact user access, making proper monitoring critical. During the initial setup, policy configuration and application onboarding require careful planning, especially for larger environments with many applications. These challenges are manageable with proper design and monitoring. Overall, the platform delivers strong security and user experience.
I would recommend a few improvements, especially around user interface, reporting, and troubleshooting experience. From a user interface perspective, while the platform is powerful, the policy configuration and navigation can feel complex, especially for new users. A more simplified and intuitive layout for policy mapping and application access would help reduce the learning curve. In terms of reporting, Zscaler Private Access provides logs, but having more built-in customizable dashboards and analytics would be very helpful. Better visibility into user access patterns, application performance, and real-time troubleshooting insights would improve operational efficiency. From a support and troubleshooting standpoint, it would be beneficial to have more granular centralized visibility, allowing for quick end-to-end tracing of a user request from authentication to application access without switching between multiple views. These improvements would make the platform even more efficient, especially for large-scale enterprise environments.
For how long have I used the solution?
I have been working with Zscaler Zero Trust Exchange Platform for around three or more years, gaining hands-on experience with Zscaler and Zscaler Private Access, including policy creations, optimization, SSL inspection and configuration, traffic forwarding using PAC and client connectors, troubleshooting user access issues, and integrating identity providers such as Active Directory and Azure AD .
What do I think about the stability of the solution?
Zscaler Zero Trust Exchange Platform is very stable, especially in enterprise environments. Being a cloud-native platform with a globally distributed infrastructure, consistent performance and high availability are experienced for user access. In day-to-day operations, there have been no major outages impacting users, and the platform performs reliably with stable access to applications. Occasional minor issues can occur, such as connector-related or identity integration dependencies, but these are usually manageable with proper monitoring and redundancy. Deploying multiple app connectors ensures high availability, and monitoring identity providers helps avoid authentication issues. Overall, from this experience, it is a stable and production-ready platform suitable for enterprise use.
What do I think about the scalability of the solution?
Zscaler Zero Trust Exchange Platform is highly scalable, primarily because it is built on a cloud-native, globally distributed architecture. Scaling is straightforward from a user experience perspective. When more users or applications are onboarded, there is no need to provision traditional hardware as in traditional VPN setups. The Zscaler cloud automatically handles the increasing user traffic and load. For application scalability, additional app connectors are deployed as needed, with connectors placed closer to applications, whether on-premises or in cloud environments, ensuring high availability and load distribution. Adding new users is simple through identity integration, and policies can be applied centrally without infrastructure changes. Scaling has been observed from a smaller user base to larger deployments without many major architecture changes, which is a significant advantage. Overall, Zscaler Private Access provides elastic scalability, making it well-suited for growing enterprise environments.
How are customer service and support?
The experience with Zscaler customer support has been good, especially for enterprise-level support. Multiple support cases have been raised mainly around policy behavior, access issues, and initial deployment troubleshooting. In most cases, the response time has been within SLA. The support engineers are technically knowledgeable, particularly for Zscaler Private Access related issues, providing clear guidance and documentation for troubleshooting. For critical issues, the escalation process works well, and timely support is received when needed. In some complex scenarios, troubleshooting can take longer, especially when it involves multiple components such as identity providers or connectors, but overall, the support experience has been reliable.
I would rate the customer support eight out of ten. The main reason is that the support team is technically strong, responsive within SLA, and helpful during troubleshooting, particularly for Zscaler Private Access related issues. However, in some complex scenarios involving multiple integrations, the resolution time can be slightly longer, which is why the rating remains at eight rather than a full ten.
Which solution did I use previously and why did I switch?
Before implementing Zscaler Private Access, the primary solution for remote access was traditional VPN. While VPN provided connectivity, it had several limitations. Users received full network access, which increased the risk of lateral movement and security exposure. There were also issues with slow performance, frequent disconnects, and scalability challenges, especially during peak usage. The main reason for switching to Zscaler Private Access was to move toward a Zero Trust architecture where access is granted based on user identity and application-level policies rather than network-level access. With Zscaler Private Access, the need for VPN was eliminated, access was restricted to only specific applications instead of the entire network, and both security and user experience were improved. Overall, the shift was driven by the need for better security, scalability, and seamless user access, which Zscaler Private Access effectively addressed.
How was the initial setup?
One additional aspect to highlight is the ease of deployment and scalability that Zscaler Private Access provides. Since Zscaler Private Access works on the outbound connection model using app connectors, there was no need to open any inbound ports or make major changes to the existing infrastructure. This made the deployment much faster and more secure compared to traditional solutions. Another important aspect is the tight integration with identity providers such as Active Directory or Azure AD, allowing for the enforcement of consistent identity-based access policies across users. From an operational perspective, Zscaler Private Access provides good visibility and logging, which helps in quickly troubleshooting issues and understanding user access patterns. Beyond just security, it also simplified operations and reduced the complexity of managing remote access.
What was our ROI?
A positive return on investment has been realized after implementing Zscaler Private Access. One of the most noticeable improvements was in reduced support effort. A clear drop in VPN-related help desk tickets occurred, especially around connectivity and login issues, which saved significant troubleshooting time for the support team. In terms of time savings, since users no longer manually connect to the VPN, access became seamless, improving user productivity, especially for remote users. From an infrastructure perspective, the need to maintain and scale traditional VPN hardware was eliminated, which reduced both costs and operational overhead. In measurable terms, approximately thirty-five to forty-five percent reduction in connectivity-related support tickets was observed, along with faster issue resolution due to better visibility and improved user productivity due to stable and direct application access. Overall, the platform helped save time, reduce operational effort, and improve security, all contributing to a strong return on investment.
What's my experience with pricing, setup cost, and licensing?
Zscaler Zero Trust Exchange Platform follows a subscription-based licensing model, typically based on the number of users and the modules enabled, such as Zscaler Private Access or Zscaler Internet Access . In terms of pricing, it may appear on the higher side initially compared to traditional VPN solutions, but when the overall value is considered, it justifies the cost. There is minimal setup cost since it is a cloud-delivered platform, eliminating the need to invest in additional hardware such as VPN gateways or maintain infrastructure. From a business perspective, benefits are observed including reduced infrastructure and maintenance costs, lower support overhead due to fewer VPN-related issues, and improved security posture, which is critical for enterprise environments. Overall, while licensing is subscription-based, the platform provides a strong return on investment in terms of security, scalability, and operational efficiency.
Which other solutions did I evaluate?
Before choosing Zscaler, a few other options in the market were evaluated. Some of the key solutions reviewed included Palo Alto Prisma Access and Netskope Private Access , in addition to some traditional VPN-based solutions. During the evaluation, factors were focused on including ease of deployment and scalability, user experience, granularity of access control, and overall Zero Trust capabilities. Zscaler stood out mainly because of its cloud-native architecture and maturity in Zscaler Zero Trust implementation, especially for Zscaler Private Access. It provided true application-level segmentation, which offered a seamless user experience without a VPN, had strong integration with identity providers, and was relatively simpler to deploy and manage at scale. While other solutions were strong, Zscaler provided a better balance of security, performance, and operational simplicity, making it the preferred choice.
What other advice do I have?
The recommendation would be to start with a clear understanding of the existing application architecture and user access patterns before implementing Zscaler Zero Trust Exchange Platform, especially Zscaler Private Access. A phased rollout is strongly recommended, starting with a few critical applications and a small group of users, monitoring the behavior, and then gradually expanding. This helps identify any policy gaps or access issues early on. Proper integrations with identity providers such as Azure AD or Okta are very important, as Zscaler Private Access relies heavily on identity-based access. Another key point is to invest time in policy design. Defining application segments and access policies correctly will make a huge difference in long-term stability and user experience. Continuous monitoring and tuning based on logs and user feedback are essential to fully optimize the solution.
Overall, Zscaler Zero Trust Exchange Platform, especially Zscaler Private Access, has been a strong and reliable solution for enabling secure access without any need for traditional VPNs. It has significantly improved both security posture and user experience in deployments. The platform is scalable, easy to manage once properly configured, and aligns well with modern Zero Trust principles. From this experience, with proper planning and policy design, it delivers great value to an organization. There is still room for improvement in areas such as user interface simplicity and faster resolution for complex cases, but overall, it is a very solid and mature solution. I would rate this review nine out of ten.
Secure access has improved remote work and has reduced vulnerabilities across our workforce
What is our primary use case?
If we speak about the use cases for Zscaler Zero Trust Exchange Platform , I can use the product for various purposes, not just one. There are multiple use cases because it is basically the HCM product. We have a huge database of customers, and it has a different case-to-case basis. Our model for deployment was huge with multiple use cases. In this case, it is very difficult for me to specify or identify one particular use case. I just log in with SSO and make sure that Zscaler Zero Trust Exchange Platform is able to protect it appropriately. It is not one use case; it is multiple business models we have deployed.
What is most valuable?
The deployment is already progressing. We completed deployment last month.
What needs improvement?
In terms of responses, Zscaler Zero Trust Exchange Platform is good. In terms of controlling vulnerability, it is good. The only cons I have noticed is that it is a bit slower, and sometimes it is unable to identify the source. These are the key areas for improvement.
For how long have I used the solution?
What do I think about the stability of the solution?
What do I think about the scalability of the solution?
How are customer service and support?
Which solution did I use previously and why did I switch?
I used Trend Micro sometime in 2022. We were using CrowdStrike until 2024. We replaced it with Prisma. The reason we made the replacement from Prisma to Wiz is because of the cost. I can tell that it is a saving of about half a million dollars a year.
How was the initial setup?
What about the implementation team?
What was our ROI?
What's my experience with pricing, setup cost, and licensing?
Which other solutions did I evaluate?
I used Trend Micro sometime in 2022. We were using CrowdStrike until 2024. We replaced it with Prisma. The reason we made the replacement from Prisma to Wiz is because of the cost. I can tell that it is a saving of about half a million dollars a year.
What other advice do I have?
It helps for the remote workforce. Ours is 100 percent remote. All the accesses have definitely improved because we are also using an SSO platform. Subsequently, what we have been noticing with this feature is the security. My job is to ensure that security is scanned from across the cloud region, across application security, and across on-premises. With this deployment, I have seen the security being in absolute control. We have not seen any incident being reported for the past one year.
We are not getting into too many details internally for metrics, except for the scanning and the results that we have been monitoring. I would rate this review eight out of ten.
Improved security risk management has supported remote access while performance still needs work
What is our primary use case?
Our main use case for Zscaler Zero Trust Exchange Platform is our information security risk management.
What is most valuable?
I would say we have excellent account management, smooth marketplace engagement, and processing in how my team or organization uses Zscaler Zero Trust Exchange Platform , even from a procurement or high-level perspective.
From a cost perspective, I would say fair market value, and then from an efficiency perspective, I notice a very good user experience, which is easy to use with Zscaler Zero Trust Exchange Platform.
When I say very good user experience, I have received feedback from my internal stakeholders that makes it easy to use, just very simple and intuitive.
What needs improvement?
I believe Zscaler Zero Trust Exchange Platform can be improved, but I have no specific feedback based on my procurement experience. There is nothing I would change at this time regarding needed improvements.
For how long have I used the solution?
I have actually not known how long I have been using Zscaler Zero Trust Exchange Platform. I did a renewal in mid-year.
What do I think about the stability of the solution?
I rate it a seven because I am still working through some kinks from a performance and a support perspective.
How are customer service and support?
I cannot comment on the best features Zscaler Zero Trust Exchange Platform offers, as I am in procurement.
What other advice do I have?
All three features—secure remote access, user authentication, and data protection—stand out to me from my experience in procurement. I advise others looking into using Zscaler Zero Trust Exchange Platform to give it a try. I provided this review with an overall rating of seven.
Elevating security with cost-effective features and robust integration
What is our primary use case?
In terms of our main use cases, the Zscaler Zero Trust Exchange Platform was typically introduced to replace our traditional VPN methods, and Zscaler Internet Access was used for secure internet access for all users.
What is most valuable?
The platform offers advanced threat protection features and embedded AI/ML capabilities, making it more proactive in blocking threats. We can create different types of controls such as access controls, file type controls, and cloud app controls to manage user access.
The solution is beneficial for remote work environments by providing extra security features that VDI cannot provide.
Data loss prevention features are available, particularly network data loss prevention. We can create various regex and other rules in Zscaler DLP .
The platform saves workforce hours and integrates with various tools and technologies, which has increased our security posture. We can integrate with SIEM , our AV platform, XDR , and EDR.
What needs improvement?
There are connection errors sometimes when users move from one location to another location, which can cause latency issues.
Regarding the initial setup and deployment, there should be an export option from older tools to the Zscaler Zero Trust Exchange Platform. This export function would eliminate the need to start from basics. Some rules should be exportable and directly importable to the platform. Additionally, more automation efforts could be included.
For how long have I used the solution?
I have been working with the Zscaler Zero Trust Exchange Platform for more than four years.
What was my experience with deployment of the solution?
The implementation process is moderate but overall manageable.
Which solution did I use previously and why did I switch?
Netskope is a similar tool to the Zscaler Zero Trust Exchange Platform. Both are similar tools, but the Zscaler Zero Trust Exchange Platform proved to be better. The Zscaler Zero Trust Exchange Platform has global coverage and low latency regarding support, and it provides a robust Zero Trust architecture. Netskope provides flexible pricing and has granular visibility, and it surpasses the Zscaler Zero Trust Exchange Platform in cloud security capabilities.
What about the implementation team?
The implementation takes approximately six months to complete.
What was our ROI?
The platform is cost-effective regarding overall benefits. We don't have to purchase many components such as load balancers and proxy servers that were necessary in traditional setups. Being a cloud platform, many aspects are managed by the cloud, making it more beneficial.
What other advice do I have?
The Zscaler Zero Trust Exchange Platform is the industry's first zero-trust SaaS built on an AI platform. The platform deserves a rating of 9 out of 10 due to its extensive features and ease of administration.
Cloud-based platform simplifies device and data center management
What is our primary use case?
We are not resellers. We are utilizing it. We come from consulting firms, providing it to customers along with services, operational support, implementation support, and more. It involves various users in our organization.
What is most valuable?
I find it to be good. The solution is cloud-based with the latest inspection engines, which I find to be amazing. We are less dependent on data centers and device management, which reduces our efforts significantly.
It improves our device management, data center management, and updating devices. We need fewer engineers for this management, and it reduces time and efforts for data center management, device upgrades, and IT support.
What needs improvement?
There is not much room for improvement. We are users and operational engineers, so we might not have the insight that solution providers have when they compare different solutions. They might be able to identify if something is missing with Zscaler.
For how long have I used the solution?
I have been using it for three years now.
What do I think about the stability of the solution?
I would rate its stability as a ten out of ten. It is very high, and it is good.
What do I think about the scalability of the solution?
It is instant and very flexible according to requirements.
How are customer service and support?
Customer service is good, you could say. I would rate it a nine out of ten. Sometimes, support takes time since the solution has some bugs that need fixing.
Which solution did I use previously and why did I switch?
We did not evaluate other options before choosing Zscaler. It was proposed, and we used it.
How was the initial setup?
The initial setup is easy and user-friendly, engineer-friendly, and environment-friendly.
What about the implementation team?
There is nothing announced. It is a third-party issue.
What was our ROI?
The ROI is good.
Which other solutions did I evaluate?
We did not evaluate other options; this was proposed, and we used it.
What other advice do I have?
I recommend the solution. It's amazing. I would rate it a nine out of ten.
