
Overview
Maidenhead Bridge Cloud Security Connectors Family
The Maidenhead Bridge Cloud Security Connectors family provides complete protection for Public and Private traffic.
Maidenhead Bridge Cloud Security Connectors Family
The Cloud Security Connector in High Availability
The CSC in Routing Mode using Transit Gateway
The CSC in Proxy Mode using Transit Gateway

Product video
The Cloud Security Connector (CSC) for AWS is an EC2 instance that connects internal AWS resources to Zscaler Internet Access (ZIA). The CSC for AWS lets you connect securely to Zscaler ZIA up to 3 Gbps without hassle. The primary purpose of the CSC family is simplicity. The CSC for AWS comes with all the configurations required, and it works with the Zscaler API. After launching the CSC from the AWS Marketplace using the CloudFormation template provided, the CSC will automatically select the best ZEN nodes, do the GRE tunnels and create the Location on your Zscaler console. All Zscaler ZIA functionalities are available, providing complete visibility of all Internet traffic. In addition, the CSC provides high availability, changing the default route to Zscaler when configured as a High Availability pair and an easy way to manage direct bypasses to trusted sites using your public IP. Includes Private Cloud Private Access (PriCPA) functionality that allows you to create a full mesh among the CSCs communicating your private traffic on a Zero Trust model. It is simple to install and completely manageable using Amazon Systems Manager, Rundeck (or a similar tool, like Ansible, Salt, etc.), and SSH.
Highlights
- The CSC protects your Public (ZIA) and Private (PriCPA) Traffic.
- The CSC is simple to deploy and fully compliant with Zscaler's best practices.
- The CSC provides automatic detection and configuration of the Zscaler Nodes, automatic default route selection for High Availability and easy Bypass functionality.
Details
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Financing for AWS Marketplace purchases
Pricing
Free trial
Dimension | Cost/hour |
|---|---|
r5.large | $0.18 |
m5n.large | $0.18 |
r5a.xlarge | $0.18 |
m5zn.xlarge | $0.18 |
m5.large | $0.18 |
t2.small | $0.18 |
t3.small | $0.18 |
m5a.xlarge | $0.18 |
t3a.small | $0.18 |
t3a.medium | $0.18 |
Vendor refund policy
We do not currently support refunds, but you can cancel at any time.
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Cloud Security Connector for Zscaler with PriCPA
The Cloud Security Connector (CSC) for AWS is an EC2 instance that connects internal AWS resources to Zscaler Internet Access (ZIA). The CSC for AWS lets you connect securely to Zscaler ZIA up to 3 Gbps without hassle. The primary purpose of the CSC family is simplicity. The CSC for AWS comes with all the configurations required, and it works with the Zscaler API. After launching the CSC from the AWS Marketplace using the CloudFormation template provided, the CSC will automatically select the best ZEN nodes, do the GRE tunnels and create the Location on your Zscaler console. All Zscaler ZIA functionalities are available, providing complete visibility of all Internet traffic. In addition, the CSC provides high availability, changing the default route to Zscaler when configured as a High Availability pair and an easy way to manage direct bypasses to trusted sites using your public IP. Includes Private Cloud Private Access (PriCPA) functionality that allows you to create a full mesh among the CSCs communicating your private traffic on a Zero Trust model. It is simple to install and completely manageable using Amazon Systems Manager, Rundeck (or a similar tool, like Ansible, Salt, etc.), and SSH
CloudFormation Template (CFT)
AWS CloudFormation templates are JSON or YAML-formatted text files that simplify provisioning and management on AWS. The templates describe the service or application architecture you want to deploy, and AWS CloudFormation uses those templates to provision and configure the required services (such as Amazon EC2 instances or Amazon RDS DB instances). The deployed application and associated resources are called a "stack."
Version release notes
Additional details
Usage instructions
Access the Cloud Security Connector configuration console via SSH to the first IP of the internal interface (eth1, labelled: csc-gre-single-internal-interface), using your SSH key and the user: "cscadmin". Example: ssh -i <yourkey.pem> cscadmin@<eth1 IP> . All Configuration and Monitoring tools are available via menu selection. Alternatively, if you deployed the CSC passing UserData values and registering the SSM Agent, you can check the status "Running Commands" from AWS Systems Manager.
Resources
Vendor resources
Support
Vendor support
We provide support for all our customers via Support Portal. Our response time is usually less than 24 hrs. Support Portal page: http://support.maidenheadbridge.com , Support Email: support@maidenheadbridge.com
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.


Standard contract
Customer reviews
Unified cloud policies have improved zero-trust controls and simplified workload monitoring
What is our primary use case?
Cloud Security Connector for Zscaler securely routes traffic from cloud workloads, such as applications running in AWS or Azure , through the Zscaler cloud for inspection and policy enforcement. In a traditional setup, Zscaler is primarily used for user traffic, but with Cloud Security Connector for Zscaler , the same security controls extend to server-side or workload traffic inside the cloud environment. For example, if application servers in an AWS VPC require internet access, instead of allowing direct outbound access, that traffic routes through Cloud Security Connector for Zscaler into Zscaler. This ensures that all traffic is inspected for threats, URL filtering policies are applied, and data protection controls are enforced. Another important use case is for east-west and server-to-internet communication, where visibility and control over workload behavior is desired, especially for compliance in industries such as banking or finance. Cloud Security Connector for Zscaler also helps maintain a consistent security posture across users and workloads since both are governed by Zscaler policies. Overall, Cloud Security Connector for Zscaler enables a zero-trust approach for cloud workloads by eliminating direct internet exposure and ensuring all traffic is inspected through Zscaler.
A specific example from a banking client involved application servers hosted in AWS that required outbound internet access for updates and API communication. Initially, these servers had direct internet access through the NAT gateway, which created a visibility and security gap since the traffic was not being inspected or controlled centrally. To address this, Cloud Security Connector for Zscaler was implemented in the AWS environment. Routing was configured so that all outbound traffic from the application subnet was redirected through Cloud Security Connector for Zscaler into the Zscaler cloud. Once integrated, Zscaler policies such as URL filtering, SSL inspection, and threat protection were applied to the workload traffic. This ensured that even server-to-internet communication was fully inspected, similar to user traffic. As a result, centralized visibility and control were achieved, the risk of malicious outbound connections was reduced, and the environment was aligned with compliance requirements such as PCI DSS. Additionally, the architecture was simplified by removing the need for additional proxy or firewall appliances in the cloud.
Apart from outbound workload protection, Cloud Security Connector for Zscaler adds value in controlling traffic in microservices architecture, where applications often communicate with external APIs or third-party services. Using Cloud Security Connector for Zscaler, this traffic is routed through Zscaler for inspection, which helps detect any malicious behavior or potential data exfiltration attempts. Another important use case is enforcing consistent security policies across both users and workloads. Instead of having separate security controls for endpoints and cloud servers, Cloud Security Connector for Zscaler allows unified policies to be applied through Zscaler, which improves visibility and simplifies management. Cloud Security Connector for Zscaler also plays a key role in compliance-driven environments, especially in banking and finance, where monitoring and logging all outbound traffic is mandatory for audit purposes. Overall, Cloud Security Connector for Zscaler extends zero-trust principles beyond users to cloud workloads, ensuring that no traffic is trusted by default and everything is verified and inspected.
What is most valuable?
The most valuable features of Cloud Security Connector for Zscaler include centralized visibility and control. It allows routing of all cloud workload traffic through Zscaler, which means full visibility into what applications and servers access externally. This is very critical in banking environments where audit and monitoring are mandatory. The second key feature is unified policy management. Instead of managing separate security controls for users and cloud workloads, the same Zscaler policies such as URL filtering, SSL inspection, and threat protection can be applied across both. This simplifies operations and ensures a consistent security posture. Another important aspect is the ease of integration with cloud security environments such as AWS and Azure , without needing traditional firewall appliances, which reduces complexity and improves scalability.
These features make a significant impact on day-to-day operations, especially in terms of visibility, troubleshooting, and policy management. With centralized visibility, instead of checking multiple tools or cloud logs, all cloud workload traffic can be directly viewed in Zscaler logs. This makes troubleshooting much faster when users or applications report issues because it is possible to quickly identify whether traffic is being blocked, allowed, or flagged as suspicious. Unified policy management also simplifies operations since the same policies apply across users and cloud workloads. There is no need to maintain separate rule sets, which reduces configuration errors and makes policy changes much faster and more consistent across the environment. From an operational standpoint, it reduces the dependency on traditional firewalls or proxies in cloud environments, which means less infrastructure to manage, fewer points of failure, and easier scalability. Overall, Cloud Security Connector for Zscaler helps the team be more efficient by reducing troubleshooting time, simplifying policy management, and giving better control and visibility from a single platform.
What needs improvement?
A challenge faced during the initial implementation involved routing and application dependency. After routing cloud workload traffic through Cloud Security Connector for Zscaler, a few applications started failing because they depended on specific external services that were getting blocked due to strict policies or SSL inspection. To resolve this, traffic was analyzed using Zscaler logs, the exact domains and services being impacted were identified, and a controlled policy exception was created while maintaining overall security. This helped strike the right balance between security and application availability, which is very important in production environments. A key learning from this was that while Cloud Security Connector for Zscaler provides strong security control, proper policy tuning and understanding application behavior is critical for smooth deployment.
Cloud Security Connector for Zscaler has had a very positive impact, especially in terms of security and operational efficiency. Before implementation, cloud workloads had direct internet access through the NAT gateway, which limited visibility and control over outbound traffic. After adopting Cloud Security Connector for Zscaler, all traffic was routed through Zscaler, giving centralized visibility and full policy enforcement. One improvement observed was a significant increase in threat detection. The ability to identify and block suspicious outbound connections that were previously not visible improved the overall security posture. From an operational perspective, troubleshooting became much faster. Instead of checking multiple cloud logs, Zscaler logs could be directly used to analyze traffic behavior, which reduced incident resolution time. The dependency on traditional firewall appliances in cloud environments was reduced, which simplified the architecture and lowered operational overhead. Additionally, for compliance-driven clients in banking, it helped meet audit requirements by providing detailed logs and consistent policy enforcement across both users and workloads.
Measurable improvements were observed after implementing Cloud Security Connector for Zscaler. In terms of visibility and threat detection, a 25 to 35 percent increase in identifying suspicious outbound connections was seen that were previously not visible when traffic was going through NAT. From an operational standpoint, troubleshooting time reduced by 45 to 55 percent because Zscaler logs could be directly analyzed instead of checking multiple cloud logs. Dependence on additional security appliances in the cloud was also reduced, which helped lower operational overhead and simplified the architecture. In terms of compliance, better audit readiness was achieved with centralized logging and consistent policy enforcement across workloads and users.
While Cloud Security Connector for Zscaler is a strong solution, one area that could be improved, especially for teams that are new, is configuring route tables, ensuring proper traffic flow, and avoiding asymmetric routing, which can be challenging, particularly in large or multi-VPC environments. More automated deployment options or guided configurations, especially for AWS or Azure, would simplify the onboarding process. Another area for improvement is better visibility at the cloud-native level, such as tighter integration with cloud logs or more context-aware insight for workload behavior, which would make troubleshooting even faster. Once properly implemented, it works efficiently and provides strong security and visibility.
In addition to deployment simplicity, improvements around policy tuning and documentation would add significant value. From a policy perspective, when Zscaler policy is extended to cloud workloads, it sometimes requires careful fine-tuning to avoid impacting application dependency. More predefined templates or workload-specific policy recommendations would help teams implement it faster with fewer disruptions. In terms of documentation, while the existing guides are helpful, more step-by-step real-world deployment examples, especially for multi-VPC or hybrid environments, would make onboarding smoother for teams. Tighter integration guidance with cloud-native tools such as AWS logging or monitoring services would further improve troubleshooting and visibility. From a support standpoint, faster access to best practice recommendations or reference architecture would help teams avoid common misconfigurations during the initial setup.
For how long have I used the solution?
I have around 4.5 years of experience in the cybersecurity domain, primarily working with enterprise customers in the banking and financial sector, and in my current role, I handle end-to-end security operations. Overall, this experience has helped develop strong technical skills and a customer-focused mindset, where I act as a trusted advisor rather than providing support. Over these 4.5 years, strong hands-on experience in cloud security was built, especially with Cloud Security Connector for Zscaler, and work has been done on SSL inspection, traffic forwarding using pack files, policy creation and optimization, troubleshooting user access issues, and improving overall security posture while minimizing false positives.
What do I think about the stability of the solution?
Cloud Security Connector for Zscaler has been quite stable and reliable once properly deployed. There have not been any major downtime or critical issues. Most of the challenges encountered were during the initial setup and routing configuration, but after stabilization, it has been performing consistently, handling workload traffic effectively.
What do I think about the scalability of the solution?
Cloud Security Connector for Zscaler performs very in terms of scalability since it is deployed within the cloud environment. Horizontal scaling is easily achieved by adding more connector instances based on traffic requirements. As workloads grow, routing can be updated and traffic can be distributed across multiple connectors without major architecture changes. Since inspection happens in the Zscaler cloud, there is no need to worry about scaling the security infrastructure separately.
How are customer service and support?
The experience with Zscaler support has been generally positive. For most issues, especially those related to configuration or troubleshooting, timely responses and useful guidance were received. In more complex scenarios such as routing or policy tuning, support provided best practices and recommendations, which made the implementation smoother.
Which solution did I use previously and why did I switch?
Before adopting Cloud Security Connector for Zscaler, the primary approach involved traditional cloud security methods, mainly NAT gateway combined with firewall-based controls for managing outbound traffic from cloud workloads. While this setup worked, it had limitations. Visibility on the outbound traffic was limited and policy enforcement was not centralized. Troubleshooting also required checking multiple tools such as cloud logs and firewall logs, which made operations more complex. Cloud Security Connector for Zscaler was adopted to achieve centralized visibility and consistent policy enforcement through Zscaler. This allowed the same security controls such as URL filtering, SSL inspection, and threat protection to be applied to both users and cloud workloads. The switch was primarily driven by the need for a zero-trust approach, better visibility, and reduced dependency on traditional firewall infrastructure in the cloud.
How was the initial setup?
The primary factor regarding initial setup is deployment and routing complexity, especially in larger or multi-VPC environments where ensuring correct traffic flow and avoiding asymmetric routing can take considerable effort. Another aspect is policy tuning for cloud workloads. Since application servers may have specific dependencies, it requires careful fine-tuning of policies and SSL inspection to avoid impacting functionality during the initial rollout. Additionally, while the platform provides good visibility, having more cloud-native context and tighter integration with services such as AWS monitoring tools would further enhance troubleshooting and insights. These challenges are mainly around initial setup and optimization. Once implemented properly, the solution works effectively and delivers strong security and visibility.
What about the implementation team?
Before finalizing Cloud Security Connector for Zscaler, a few other approaches were evaluated, mainly traditional firewall-based solutions in the cloud and native cloud controls such as AWS security services. While those options provide basic security, they lack centralized visibility and unified policy enforcement across both users and workloads. Managing multiple tools can also increase operational complexity. Cloud Security Connector for Zscaler stood out because it allowed the same security policies to be extended to cloud workloads, giving a more consistent and scalable zero-trust approach. In terms of stability, Cloud Security Connector for Zscaler has been quite stable and reliable once properly deployed. There have not been any major downtime or critical issues. Most of the challenges encountered were during the initial setup and routing configuration, but after stabilization, it has been performing consistently, handling workload traffic effectively.
What was our ROI?
A return on investment has been observed, especially in terms of time savings, operational efficiency, and improved security visibility. For example, incident troubleshooting time reduced by 35 to 45 percent because Zscaler logs could be directly used instead of correlating multiple cloud and firewall logs. The need for managing additional firewall or proxy infrastructure in the cloud was also reduced, which helped lower operational overhead and reduce support burden on the team. From a security standpoint, around 25 to 30 percent improvement was seen in detecting and blocking suspicious outbound traffic, which reduced potential risk and manual investigation efforts. Overall, while it did not necessarily reduce headcount, it significantly improved team efficiency, allowing more workloads to be handled with the same team and enabling faster incident response.
What's my experience with pricing, setup cost, and licensing?
In terms of additional improvements, one small enhancement would be having more predefined policy templates for common cloud workload use cases, which would make initial policy tuning faster and reduce dependency on manual configuration. Regarding pricing and licensing, Cloud Security Connector for Zscaler was part of the overall Zscaler enterprise licensing, so it was more of a bundled approach rather than a separate purchase. From a setup perspective, there was not a significant additional cost beyond the cloud infrastructure itself, such as compute resources in AWS. The value comes from the security capabilities it adds rather than from the licensing component. Overall, while pricing depends on the enterprise agreement, the solution delivers good value considering the visibility, control, and security it provides.
Which other solutions did I evaluate?
Before finalizing Cloud Security Connector for Zscaler, a few other approaches were evaluated, mainly traditional firewall-based solutions in the cloud and native cloud controls such as AWS security services. While those options provide basic security, they lack centralized visibility and unified policy enforcement across both users and workloads. Managing multiple tools can also increase operational complexity. Cloud Security Connector for Zscaler stood out because it allowed the same security policies to be extended to cloud workloads, giving a more consistent and scalable zero-trust approach.
What other advice do I have?
Organizations should plan the deployment carefully, especially around routing and network design. Understanding the traffic flow and dependencies upfront helps avoid issues later. It is important to start with a phased rollout and proper policy tuning rather than enabling stricter policies immediately. This ensures minimal impact on applications while maintaining security. This review has been given an overall rating of 8.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Addressed complex learning curve yet has improved automated routing and cloud security visibility
What is our primary use case?
In our current organization, we have been using Cloud Security Connector for Zscaler by Maiden Edge, Maidenhead Bridge for almost two and a half years. They are providing us specialized virtual appliances to simplify and secure connectivity between cloud environments. For our case, this involves AWS and Zscaler Internet Access , with a focus on zero trust and high availability, and it also helps with performance enhancement.
Our main use case for Cloud Security Connector for Zscaler is that we have been using it as a pre-configured virtual machine that we deploy on our AWS system with minimal networking requirements. This connector helps us automate Zscaler node detection and route selection, which reduces the manual configuration and operational burden for our organization's administrators. Management is quite straightforward through it being available with SSH and AWS System Manager. The appliance also includes built-in utilities for traffic monitoring and troubleshooting and log export to syslog. Our day-to-day use case is primarily that it helps us automate Zscaler node detection and route selection.
Automating node detection and route selection has helped us reduce the number of errors we were getting and made Zscaler more reliable and less dependent on Zscaler directly. Before using this solution with Zscaler, the Zscaler used to malfunction frequently, impacting our productivity. After implementing Cloud Security Connector for Zscaler along with Zscaler, we have seen positive effects, saving time as well as resources, which has left a very good impression on us.
How has it helped my organization?
Cloud Security Connector for Zscaler has positively impacted our organization by helping us in our cloud environment to connect our resources to Zscaler, ensuring that security policies are consistent with zero-trust access and increasing reliability by 28%. It has also helped us with site-to-cloud networking at high performance, optimizing performance and reducing the bottlenecks of cloud connectivity, saving resources and time by at least 78%. Additionally, it has automated workloads using Cloud Security Connector for Zscaler's high availability and ensured that connectivity is uninterrupted to Zscaler, even during network outages or maintenance.
What is most valuable?
Cloud Security Connector for Zscaler offers multiple features, but the major feature I love specifically is automated Zscaler node detection, which helps detect any kind of problem first. Additionally, it is available all the time, providing high availability routing for seamless failover, which is one of my favorite features. It also provides Layer 4 routed bypass for TCP, UDP, and ICMP traffic, enabling granular traffic control that streamlines our services working with Zscaler. It has provided complete visibility of internal IPs on the Zscaler console, allowing us to monitor and troubleshoot whenever there is a problem, making things transparent and easy for us to monitor. The integration with SIEM or syslog enhances centralized log management for our organization.
What needs improvement?
I feel that they are doing great with Cloud Security Connector for Zscaler. If I need to suggest an improvement, it would be to simplify the steep learning curve, as it can be complex for newcomers without prior experience. Apart from that, I did not face any challenges with them in these two and a half years.
For how long have I used the solution?
I have been working in my current field for almost 10 years.
What do I think about the scalability of the solution?
Cloud Security Connector for Zscaler's scalability is definitely impressive, as it has handled growth and changes in our organization well. Whenever we have increased our employees and the number of users, it has contributed positively to our growth without any scalability issues.
How are customer service and support?
We reached out to customer support three weeks back due to an issue where Zscaler got stuck, and they identified and solved the problem within 45 minutes, which is exceptional. I give them a 10 out of 10 for customer support.
How would you rate customer service and support?
Positive
How was the initial setup?
The deployment of Cloud Security Connector for Zscaler in our environment is very straightforward with the option to pass configuration parameters via user data during initial setup. The connector integrates seamlessly with cloud-native services, in our case AWS, and it also works with load balancers, firewalls, and monitoring solutions, making the deployment straightforward and easy, with no challenges I remember in our organization.
The configuration process for Cloud Security Connector for Zscaler is excellent. We did not encounter any challenges, and it was very smooth. Even if it is complex, the team is always there to help, and customer service is excellent—always there to assist with deployment or configuration challenges.
What was our ROI?
We have definitely seen a return on investment with Cloud Security Connector for Zscaler, saving us money by at least 20 to 25%. In terms of time, we have saved at least 22 to 25% related to security and automation. The employees have become more productive and focused on the right direction.
What's my experience with pricing, setup cost, and licensing?
The experience with pricing, setup cost, and licensing for Cloud Security Connector for Zscaler is definitely competitive. They provide us a good cost, and since we obtained it through AWS Marketplace , we are well supported in this area.
Which other solutions did I evaluate?
We did not use a different solution, but we have evaluated some alternatives, including Fortinet SASE , Cisco Umbrella , Netskope Security Cloud, and Palo Alto Networks Prisma Access .
Before choosing Cloud Security Connector for Zscaler, we definitely evaluated other options and looked at several solutions. We chose Cloud Security Connector for Zscaler because it is a scalable solution. Increasing the number of seats or users did not show any signs of crashing or lagging.
What other advice do I have?
One more thing I want to mention is the built-in tools for testing and troubleshooting, which include traffic logs, TCP dump, speed test, and MTR.
Everything else is good. The user interface is very attractive and does not require any change.
If you are looking into using Cloud Security Connector for Zscaler, I recommend it highly if you are committed to Zscaler and want a very simple automated GRE and IP routing from Azure , AWS, or GCP, without having to manage tunnels or custom NVA designs yourself.
Cloud Security Connector for Zscaler is a good solution that can help your Zscaler work better and secure your environment more effectively. It can also integrate with multiple cloud platforms like Azure , AWS, and GCP, making it a must-have solution for organizations based on my observation. I provide this review with an overall rating of 4 out of 5.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Prevents the end-user system from being compromised and good integration capabilities
What is our primary use case?
This solution is for hybrid users who work from anywhere. It's like an end-user firewall. We can have restrictions on the end-user. If they come to the office, we have the infrastructure set up, and we can restrict access.
But if they are connecting to the office from a personal network, like when working from home, we don't have any visibility. That is where Zscaler will help us get control over the end user. Wherever they are, on any network, the organization policy will be pushed to the end-user.
What is most valuable?
It is very beneficial in preventing the end-user system from being compromised. It can give visibility on the end user's internet access. If the user is accessing any malicious content, suspicious things, or phishing attacks, those things can be mitigated by using Zscaler. Those kinds of traffic will be blocked. That is one of the advantages.
What needs improvement?
If there are any issues at the network level, such as users working from home, then it is very hard to catch up with them and resolve issues on the end-user machine.
If the user doesn't have internet access because of Zscaler... Sometimes, it might be a rare case, but it is very challenging for us to take action because they don't have internet. It can be difficult for us to troubleshoot.
The user accessibility; it is better to improve that for control accessing and configuring. It's very complicated to do the configuration. The IT job is a little bit complicated. Those who have the experience can do that. It's not easy or handy to use this tool.
What do I think about the stability of the solution?
It has good stability, and it is very secure in terms of security.
What do I think about the scalability of the solution?
Scalability is complicated. I would rate it an eight out of ten. It can support more than 10,000 end users.
How are customer service and support?
We have used tech support to solve some kind of issues, network issues, or any product-level issues. We used to connect with the tech support of Zscaler.
Sometimes we used to get faster support. If it's an issue with the product level, then it will take some time. That's also fast only. The support is good from their end.
Which solution did I use previously and why did I switch?
We used to use FortiSASE from Fortinet. It follows the same zero-trust security access concept. It is also in the same picture. But if you compare it to Zscaler, Zscaler is better compared to FortiGate.
Zscaler is very secure, and it has more features, like application segmentation, where only trusted users can access limited resources within the private environment.
How was the initial setup?
The deployment time depends on the environment and how many users are there. For example, for a hundred users, we can complete the deployment within two weeks.
It can integrate with multiple third-party solutions like Microsoft for authentication purposes, and Splunk, QRadar, and any antivirus solutions if they have them. It is feasible to integrate with third parties so that we can get access together to protect the end-users and the environment.
What about the implementation team?
It requires around ten people, dedicated engineers, to manage this.
What was our ROI?
From the security perspective, it has a layered approach for the connector. But with FortiGate, it's like simply connecting to the network, and it doesn't have that much security.
What's my experience with pricing, setup cost, and licensing?
It is a little bit too costly because of the maintenance and the product scalability. It is a little bit costly compared to other products, and it has more features compared to them. That is where the pricing seems more.
What other advice do I have?
I would rate it a nine out of ten. It is recommended for hybrid users, where the work-from-anywhere concept is followed. It is very useful for them to get complete visibility on the end-user and to secure their environment by bridging from outside.
A fast and scalable solution that is secure and can be modified according to the customers’ requirements
What is our primary use case?
We use the solution to connect private applications in the data center or the SaaS applications on the cloud.
What is most valuable?
The solution is secure.
What needs improvement?
The connectivity could be faster. Sometimes, the issue is internal.
For how long have I used the solution?
I have been using the solution for two years.
What do I think about the stability of the solution?
The product is pretty stable. It has a set of compliance that it follows. It is flexible. We can modify it according to our requirements. I rate the stability a nine out of ten. Sometimes, there are issues with the internet and cloud connectivity.
What do I think about the scalability of the solution?
We have 500 users in our organization. The product is completely scalable. We can scale it up to 20,000 easily.
How are customer service and support?
We contact the support team two or three times a year if we need to change some configuration. The technical team is good. The team works on our requests according to the priority levels assigned. The team calls us quickly if we raise a P1 request.
How was the initial setup?
The tool is easy to deploy. We have to deploy the agent on the user’s machine. The agent takes 20 minutes to be installed. The tool is deployed in the data center. If the prerequisites are set up already, the product can be deployed in two or three hours.
It is a cloud-based solution. We need two support engineers and one senior resource with more than seven years of experience in networking to deploy and maintain the tool. We need one product manager for coordination.
What about the implementation team?
The deployment can be done in-house.
What was our ROI?
The solution provides security. The users can access the application securely. The user experience is also good. The solution improves the latency and connectivity. When we connect through our legacy solution or VPN, we face delays. Zscaler is a fast solution.
What's my experience with pricing, setup cost, and licensing?
Price is not a problem. We prefer Zscaler because it is a secure product.
Which other solutions did I evaluate?
We also evaluated Forcepoint. We did a POC and demo of the solutions. We evaluated the products based on the use cases and their performance. Then, we chose Zscaler.
What other advice do I have?
Once the sales activity and upgrades were complete, we requested some licenses and started utilizing them. I will recommend the solution to others. Organizations must remove the bottlenecks and latency issues before converting from the legacy VPN connectivity to Zscaler. Otherwise, we will face some connectivity issues. Overall, I rate the tool a nine out of ten.