My primary use case for Zscaler Private Access (ZPA) is VPN replacement and zero trust access. I use Zscaler Private Access (ZPA) to give authorized users policy-based one-to-one connectivity to specific internal applications in our data center or cloud environments. I also use Zscaler Private Access (ZPA) to secure our hybrid cloud environment. For instance, when a developer needs to access a private staging server used in AWS, they connect directly through the closest Zscaler service edge. This makes the application invisible to the private internet, ensuring only the specialist can reach it.
Zscaler Private Access (ZPA)
Zscaler, Inc.External reviews
External reviews are not included in the AWS star rating for the product.
Zero trust access has secured hybrid work and now provides seamless app connectivity
What is our primary use case?
How has it helped my organization?
Zscaler Private Access (ZPA) has significantly reduced our attack surface by making our internal apps invisible to the internet. It effectively eliminates lateral movement as users are only connected to the specific application they are authorized to use rather than the entire network segment.
Zscaler Private Access (ZPA) is highly stable. The architecture uses a global mesh of service edges with built-in fault tolerance and redundancy, providing an always-on experience that is far more reliable than our old hardware-based VPN concentrator.
Zscaler Private Access (ZPA) is elastically scalable because it is a software-defined perimeter and not an appliance-based solution. I can instantly scale to support thousands of additional users without needing to upgrade any physical hardware.
What is most valuable?
The best features are the AI-powered app segmentation that automatically discovers our applications. This saves a massive amount of manual configuration time and helps me build granular access policies much faster.
The app segmentation feature helps my team improve employee experience while giving our IT team peace of mind. It is truly a productivity tool that removes the clunkiness of a VPN. The initial discovery of legacy applications during setup can sometimes take more time to fine-tune, which is the only minor limitation.
What needs improvement?
Zscaler Private Access (ZPA) could be improved by making troubleshooting for specific mobile devices such as iPhones more intuitive, as identifying the root cause for mobile connectivity issues can sometimes be complex. The major improvement opportunity I would highlight is the troubleshooting functionality for mobile devices.
For how long have I used the solution?
I have been using Zscaler Private Access (ZPA) for about three years to provide our distributed workforce with secure, seamless access to our internal applications.
What do I think about the stability of the solution?
Zscaler Private Access (ZPA) is highly stable. The architecture uses a global mesh of service edges with built-in fault tolerance and redundancy, providing an always-on experience that is far more reliable than our old hardware-based VPN concentrator.
What do I think about the scalability of the solution?
Zscaler Private Access (ZPA) is elastically scalable because it is a software-defined perimeter and not an appliance-based solution. I can instantly scale to support thousands of additional users without needing to upgrade any physical hardware.
How are customer service and support?
The customer support team is very knowledgeable about the ZTNA architecture and Zscaler Trust Portal provides excellent transparency into the health of the global cloud infrastructure.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I previously used a traditional legacy VPN. I switched because the VPN was too slow and hard to manage at scale, and it created a major security risk by putting users directly on the network.
How was the initial setup?
Zscaler Private Access (ZPA) is an incredible enabler for modern hybrid work. The initial discovery of legacy applications during setup can sometimes take more time to fine-tune.
What was our ROI?
I have seen a significant return on investment since implementing Zscaler Private Access (ZPA). The ROI is often cited around 289% over the three years of typical enterprises. The key metrics include a 55% reduction in security breach risk and roughly 1.75 million in annual savings on infrastructure and legacy VPN licensing costs.
What's my experience with pricing, setup cost, and licensing?
Zscaler Private Access (ZPA) is priced on a per-user, per-year basis. While it is a premium investment, the short payback period of about 11 months and consolidation of multiple point products make it very cost-effective in the long run.
Which other solutions did I evaluate?
What other advice do I have?
Zscaler Private Access (ZPA) is a cloud-native service hosted on Zscaler's global cloud platform, which has over 150 points of presence. I use lightweight app connectors hosted in our own private data centers and public cloud like AWS or Azure to create secure inside-out connections to our applications. I use majorly the AWS one.
I purchased Zscaler Private Access (ZPA) through the AWS Marketplace, which allows me to simplify procurement, consolidate billing, and apply my Zscaler spend towards existing cloud commitments.
I would advise those looking into Zscaler Private Access (ZPA) to use the AI-powered app segmentation to automatically discover your applications. This feature saves a massive amount of manual configuration time and helps build granular access policies much faster.
My company relies on Zscaler Private Access (ZPA)'s cloud-native architecture to protect our private applications and sensitive data.
I give Zscaler Private Access (ZPA) a rating of 9 out of 10.
Zero trust access has transformed remote work and now secures every internal application session
What is our primary use case?
My primary use case for Zscaler Private Access (ZPA) is securing application-level access to internal applications without exposing the network to the public network. Previously, VPN gave users broad network access, which increased the risk capacity. With ZPA, we follow the Zero Trust principle, allowing users access only to the specific applications they are authorized for, and this dramatically improves security and compliance.
A strong example of how I use Zscaler Private Access (ZPA) for securing application-level access occurred during a company-wide shift to remote work, as VPN concentrators were overloaded, causing slow connections and outages. After moving critical apps to ZPA, users connected directly through the Zscaler cloud, and consistent performance significantly helped desk VPN ticket drops. Our remote employees can access applications more smoothly, even from different geographies and networks, especially considering the multiple issues faced during COVID-19. This example correlates all those issues where no one could access all those applications and the exposure over the internet was critical. At the time, there were many gaps, and through ZPA, it is easy to configure and provides easy access to all those internal applications with least privilege access.
What is most valuable?
Zscaler Private Access (ZPA) offers many features, including Zero Trust Network Access, which adheres to the principle of "never trust, always verify." Additionally, it provides application-level access, allowing specification of applications that significantly reduce the risk of lateral movement and eliminate network exposure. There is also the option to create identity-based policies, and since it is a cloud-native architecture, there is no dependency on on-premise or hybrid solutions. In terms of scalability, ZPA supports multi-cloud and hybrid environments while providing a seamless user experience as users connect transparently without the need to launch or manage VPN tunnels, which is a great feature.
Instead of creating VPN accounts with broad permissions, we now grant vendors access to only one application via Zscaler Private Access (ZPA). This approach makes audits easier, improves security, and gives management confidence that external access is tightly controlled and logged without additional network complexity. This is also the best solution for our audit needs since there is no firewall needed; we use remote access solutions that require and provide least privilege access to users, which helps with risk, compliance, governance, and adheres to the Zero Trust principle.
Zscaler Private Access (ZPA) positively impacts my organization through application segmentation and access policy management. On a daily basis, I review access policies, onboard new applications, and validate users based on identity and posture solutions. This method is far safer than traditional subnet-based access, aligning with the Zero Trust architecture principle.
What needs improvement?
After deploying Zscaler Private Access (ZPA), I notice a reduction in VPN-related support tickets, particularly during peak hours, and audits become smoother because access is clearly defined per application. Our incident response team reports improved visibility into user access events, making investigations faster and more accurate. While ZPA greatly improves the management process, the administrative interface could be more intuitive, particularly for troubleshooting scenarios requiring navigation across multiple dashboards and logs during real operational settings, especially in incidents. Simpler visibility into traffic flow and access decisions would significantly speed up root cause analysis.
To improve Zscaler Private Access (ZPA), we need more real-world deployment examples and technical documentation, including step-by-step guides for complex scenarios such as multi-cloud legacy app integration. These resources would help engineers implement and troubleshoot faster, especially during initial rollouts and major environmental changes.
The training costs associated with Zscaler Private Access (ZPA) are very high, and there are few resources available online. This makes understanding customer and employee needs challenging. There are many dependencies on the internet, and it is not straightforward to comprehend the entire infrastructure architecture and how ZPA operates.
I do not give a perfect ten because I notice a lot of dependencies on the TAC, along with complexity in the UI. Sometimes, fully understanding the policy workflow and troubleshooting tools require improvement, especially concerning dashboard usability and diagnostics. There are many restrictions that hinder troubleshooting without a TAC engineer.
For how long have I used the solution?
I have been working with Zscaler Private Access (ZPA) for around two years, having initially deployed it during a phase when remote work demand rapidly increased. Over time, ZPA became a core part of our access strategy, replacing a large part of the VPN community footprint and supporting both permanent employee and external partners' access solutions to internal applications securely.
What do I think about the stability of the solution?
Zscaler Private Access (ZPA) is very stable in production, with extremely rare outages and minimal user complaints. Even during peak usage or mass remote access events, performance remains consistent, which is critical for an enterprise environment handling business-critical applications.
What do I think about the scalability of the solution?
Scalability is one of Zscaler Private Access (ZPA)'s strongest points, allowing us to onboard hundreds of users quickly without altering infrastructure since it is cloud-based. Scaling users or applications does not require any additional hardware or complex restructuring, presenting a significant operational advantage based on subscription counts.
How are customer service and support?
The customer support for Zscaler Private Access (ZPA) is good, responding quickly to tickets and engaging via Zoom sessions.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Previously, we used traditional VPN solutions such as IPsec and SSL VPN, which provided network-level access and posed significant security risks. We switched to ZPA to embrace the Zero Trust approach, reduce the attack surface, and enhance the remote user experience without creating traffic bottlenecks through a centralized VPN gateway.
How was the initial setup?
The biggest impact on my team from Zscaler Private Access (ZPA) is the overhead reduction in timing and monitoring all applications through one GUI base. It is easy to integrate, with no complex configurations required, unlike traditional VPNs, which depend on firewalls and a host of policies. In the current SaaS environment, ZPA offers a good comparison and overview, paired with excellent security and monitoring tools.
What was our ROI?
The cost associated with Zscaler Private Access (ZPA) depends entirely on the number of users and licenses purchased, and while I have not put an extensive focus on return on investment metrics, it is a good cost model.
What's my experience with pricing, setup cost, and licensing?
Regarding pricing, setup costs, and licensing for Zscaler Private Access (ZPA), while it is not the cheapest solution, when you factor in the reduced VPN infrastructure, hardware maintenance, and operational overhead, the cost becomes easier to justify. The simplicity of licensing also aids in scaling the users, allowing it to be viewed more favorably as a viable solution.
Which other solutions did I evaluate?
We evaluated other options from Palo Alto and Fortinet, but Zscaler Private Access (ZPA) stood out due to its cloud-native design, global scalability, and true application-level access model, which aligns better with our long-term Zero Trust strategy.
What other advice do I have?
My advice to others considering Zscaler Private Access (ZPA) is to invest time in application segmentation and identity integrations. ZPA yields the best results when applications are well-classified, and access policies are clearly defined. Additionally, training your operational team early will help them fully leverage the troubleshooting and monitoring capabilities available. The company also provides premium solutions on the TAC side, capable of responding within two to five minutes based on ticket severity levels.
Zscaler Private Access (ZPA) is a mature, enterprise-grade Zero Trust solution that delivers security and operational benefits. It is a great solution and ranks highly in Gartner reports. Recently, I have noticed some shifts in its standing on these reports and some downsides, possibly due to cost issues, so it is vital to ensure all aspects align with licensing costs. I gave this solution a rating of nine out of ten.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Have worked on strengthening zero trust initiatives and expect improved integration capabilities
What is our primary use case?
Zscaler Private Access (ZPA) is a Zero Trust Network Access solution. When replacing traditional remote access VPN technology, which is not aligned with NIST 800-207 Zero Trust principles, Zscaler Private Access (ZPA) is the solution. It serves enterprises that prefer not to manage the underlay by installing a client connector agent on end-user machines. It provides access to private applications and SaaS applications remotely when users are traveling while building secure connectivity and ensuring least privilege access to these applications rather than everything within the perimeter.
What is most valuable?
The base bundle of Zscaler Private Access (ZPA) comes with essential features that depend on client requirements. For secure private access, configuration of client connectors and app connectors on-premises or in the cloud is necessary. Additional features include remote browser isolation capability and secure browser access, which can replace existing Privileged Access Management solutions. DLP capabilities and double encryption ensure the underlying provider cannot strip packets and examine contents.
I would assess the security level achieved with Zscaler Private Access (ZPA)'s Zero Trust architecture as inherent to the system. The security policies focus on users and applications rather than network-based constructs. It offers configuration levers for ingesting risk from identity and application standpoints, generating a cumulative score that can trigger connection drops when breaching thresholds. These features align with NIST 800-207 principles. The Risk360 view helps assess security policies and rule sets, providing recommendations for policy tightening.
What needs improvement?
Zscaler Private Access (ZPA) can be improved by expanding integrations. While they integrate with standard vendors such as CrowdStrike, deeper integrations with other vendors are needed. They should harmonize risk scores between different vendors, as each might score things differently, requiring a robust handshake for meaningful integration.
There is room for having a complete on-premises option. While Zscaler Private Access (ZPA) wants users to utilize their infrastructure for scale benefits, regulated environments such as government and investment banks need on-premises processing for regulations and low latency requirements. High-frequency trading firms require processing traffic internally rather than through internet channels.
In the future, I expect expansion of integrations because architects need flexibility in vendor selection based on use cases. The solution needs better handshake capabilities between vendors for risk scores and other metrics. Support-wise, they have a strong presence globally, including challenging markets such as China, though very remote offshore areas remain uncovered.
For how long have I used the solution?
I have worked with Akamai since 2019, when I first gained exposure to it.
What other advice do I have?
I have worked with Zscaler Private Access (ZPA) and Palo Alto as an enterprise security architect across multiple client engagements as part of network security implementations. I have also worked with competitors including Cloudflare. As we were partners, we received preferential access to support. I rate this solution 9 out of 10.
Ensuring seamless VPN connectivity while needing better troubleshooting support
What is our primary use case?
We are using secure remote access for internal applications, and that's why we are using Zscaler Private Access (ZPA) now. I work with Zscaler Private Access (ZPA). I use it just for the VPN functionality.
What is most valuable?
The best advantage of the product is that it is always on as a VPN, which gives us much more functionality. It is basically easy to use and easy to configure. The solution for Zscaler Private Access (ZPA) is seamless for this.
From a visibility perspective, they have added more content features where we can see security and other aspects through available dashboards. That's the only notable addition, plus they are implementing the overall security architecture of tenants, which gives much more information to work with.
What needs improvement?
The only room for improvement is the troubleshooting problem with iPhones as of now.
The review should be anonymous; there should not be any personal or business details given. Both should be anonymous.
For how long have I used the solution?
I have been using it for around four or five years.
What was my experience with deployment of the solution?
The installation and deployments are straightforward; it is just a two-liner process. There is something in the documentation that might need changes, but it's pretty straightforward.
The documentation has to be perfect as it has not been updated for a long time. They need to update it based on the latest version and the commands we use.
What do I think about the stability of the solution?
The solution is stable enough.
What do I think about the scalability of the solution?
We are using cloud services, but I am not sure about the scalability specifically.
Based on the limited users, this is perfectly fine since we are using only one box, and we haven't faced many issues with that.
How are customer service and support?
I am not happy with the technical support from Zscaler Private Access (ZPA), particularly in India, where reachability is an issue with salespersons. Sometimes we need to reach a salesperson to get issues resolved, especially for mobile problems we're still facing. We lack specific root causes, and it's tough to relay information to users, considering multiple contributors such as phone numbers and internet service providers. We need more visibility on what problems users are facing with reachability.
I would rate technical support six points out of ten.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I have not used any other VPNs apart from Zscaler Private Access (ZPA).
What was our ROI?
I see some ROI in the product. Since we have a very small team, the ROI is around 20% to 30%. I would say 30%.
What other advice do I have?
I am not using AWS Backup anymore since we spoke almost two years ago. I have a backup solution managed by another team, and there's a discussion about AWS for backup. I am responsible for the IT security part only.
I do not work with popular vendors such as Palo Alto or Fortinet, as my primary domain is Check Point, and it's all about security. I use Check Point for this purpose. I do not work with the product ZoneAlarm. We use only a specific firewall from Check Point and utilize only the firewall. We are not using Check Point CloudGuard Web Application Firewall; we are using a normal firewall, the Firewall as a gateway. The name of the product is Check Point Firewall Gateway.
I am not using a web gateway. We do not use products such as Harmony or Harmony Browse. I am using a VPN from Cisco for endpoint protection. I am not using the cloud firewall from Zscaler Private Access (ZPA). I am not working with Zscaler B2B or ZTNA as a service.
From a troubleshooting perspective, we face an issue with iPhones affecting about 10% of users. Even when we provide logs, they are not able to figure out what exactly is happening. It's not possible for users to collect logs each time, and this is a peculiar problem happening with 10 to 15 users.
The operational flexibility is very effective; there are no problems, and I did not have any issues with that. The solution is affordable, but there are other parts that could add much more information, which may not be useful for us at the moment, making it a bit expensive. There is also a China-specific solution, which is really expensive.
I agree to share my details with the Zscaler vendor. I do not want to be a reference for Zscaler Private Access (ZPA).
On a scale of 1-10, I rate this solution a 9.
Enables seamless management and secure access to internal networks
What is our primary use case?
Our use case for Zscaler Private Access (ZPA) is that it provides Private Access.
Zscaler Private Access (ZPA) means allowing users access to the internal network in AWS in a secure way.
I use Zscaler Private Access (ZPA) to secure remote access to internal applications.
What is most valuable?
The most valuable feature of Zscaler Private Access (ZPA) is the ability to manage access with policies, all in one, which provides our security team the ability to provide the required permission for each team, and also visibility. If something goes wrong, I have a very friendly UI to see what's going wrong, why the user is blocked, or what the issue might be.
Zscaler has allowed an easy, secure way for us to access our internal resources from outside.
Its effectiveness for my organization is mainly security, as users can access those applications only if they have the permission to go through Zscaler.
Zscaler has helped with operational flexibility because when a new employee starts, it's very easy to give them the required permissions. Everything is managed in an Active Directory or Okta in our case, and it's very easy to have the user ready to start working with just a few clicks.
What needs improvement?
Zscaler Private Access (ZPA) is a very good product, though there are some areas for improvement.
The solution is not scalable; we deploy it in a high-availability environment, but it's not automated. We need to deploy it and ensure it will be available in two different Availability Zones, but it's not something that can be done with automation, such as auto-scaling.
I would appreciate seeing dynamic scaling implemented because it would be beneficial if an instance goes down to automatically start another one.
For how long have I used the solution?
I have used Zscaler Private Access (ZPA) for a minimum of two to three years.
What was my experience with deployment of the solution?
When we tried to deploy it, the first thing it indicated was that we were not subscribed, so we subscribed, and then the product was available for us.
What do I think about the scalability of the solution?
The solution is not scalable; we deploy it in a high-availability environment, but it's not automated. We need to deploy it and ensure it will be available in two different Availability Zones, but it's not something that can be done with automation, such as auto-scaling.
Regarding auto-scaling or dynamically scaling, I am not familiar with this capability if it exists as a new feature.
How are customer service and support?
I have not worked with customer support, as our IT department takes care of anything that isn't working and requires support.
How would you rate customer service and support?
Positive
How was the initial setup?
The deployment process is actually very easy; we manage it with Terraform, so we are deploying the instance, activating it, and it's ready to go.
After we have the Terraform set up, it takes just minutes to deploy.
What other advice do I have?
I do not use the micro-segmentation feature.
I'm not exposed to the pricing, so I cannot give feedback on that as I'm just a technical DevOps person deploying it.
Zscaler has helped to manage complexity and cost compared to traditional network architecture.
On a scale of 1-10, I rate Zscaler Private Access (ZPA) a 9.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Security features improve while response time needs attention
What is our primary use case?
I worked with these organizations for implementing Secure Service Edge and SASE solutions, including Cloud Access Security Brokers, such as Netskope and Zscaler.
Zscaler and Netskope are the main solutions I work with for various use cases.
Based on my experience, I have worked at the enterprise level only, for large companies such as banks and financial institutions that are transitioning from traditional solutions to new secure service edge solutions.
What is most valuable?
Zscaler has three components. Specifically, Zscaler Internet Access for secure web access, Zscaler Private Access (ZPA) that is a replacement of traditional VPN solution for securely accessing internal private applications without giving access to the whole network. It works by giving access to the particular application the user wants to access, and it checks numerous factors before granting access to the particular application, including posture checks, authentication, and authorization. Zscaler Digital Experience is a monitoring tool that monitors all application performance, network performance, and more. It helps us troubleshoot issues in a very short time.
When discussing Zscaler Private Access (ZPA) mainly, it is very helpful as a replacement for traditional VPN. In traditional VPN, we used to give access to the whole network, which increased attack vectors. Zscaler Private Access (ZPA) is more secure than these particular VPN solutions. We have implemented this solution for enhanced security. As a cybersecurity professional, I approach these answers from a security perspective.
Micro-segmentation, authentication, and authorization are key features in Zscaler Private Access (ZPA). We can implement role-based access and limit user access by creating different groups. For example, if the HR department needs access to only HR applications, we can create specific groups with appropriate access levels. This segregates access and makes it more secure. They also provide features such as browser isolation, which creates a separate browser when users are accessing content, thus creating an isolated environment to prevent attacks.
They provide integrations with various other security tools. The solution utilizes AI capabilities for various detections and responses. The solution has inbuilt AI for all detection capabilities.
What needs improvement?
Sometimes the team takes more time to provide responses on certain issues, which is why I do not rate it a perfect 10 out of 10.
For how long have I used the solution?
Overall, with Zscaler, I have worked for around five years, and particularly with Zscaler Private Access (ZPA), I have three years of experience.
What was my experience with deployment of the solution?
The deployment took approximately six months.
What do I think about the stability of the solution?
Sometimes connection errors occur when users are unable to connect to the particular cloud.
These connection errors started occurring post rollout, not just during the implementation.
What do I think about the scalability of the solution?
For small and medium enterprises, it will be too expensive.
How are customer service and support?
I have worked with the Zscaler technical team.
I would rate them around eight as they were pretty good.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
The traditional solutions were still in use when we migrated to the current solutions. The migration process required extensive documentation and multiple testing phases.
What's my experience with pricing, setup cost, and licensing?
Prices for Zscaler Private Access (ZPA) are higher than traditional solutions, but it provides enhanced security.
What other advice do I have?
Product-wise, I would give Zscaler Private Access (ZPA) a seven. The overall rating for the solution is eight out of ten.
Enables secure and reliable network access while offering a wealth of features
What is our primary use case?
What is most valuable?
What needs improvement?
For how long have I used the solution?
What was my experience with deployment of the solution?
What do I think about the stability of the solution?
What do I think about the scalability of the solution?
How are customer service and support?
How would you rate customer service and support?
Neutral
How was the initial setup?
What's my experience with pricing, setup cost, and licensing?
Which other solutions did I evaluate?
What other advice do I have?
Ensures secure and seamless remote access to applications and resources
What is our primary use case?
The main use case is to access the local network or the customer network, the servers, and applications. This is the primary use case for Zscaler Private Access (ZPA) as we use it. Additionally, we use it to access cloud resources such as Microsoft Azure, as it's the easiest and most secure way to access these servers.
What is most valuable?
Zscaler Private Access (ZPA) is much more secure than VPN because users are only allowed to access specific applications rather than the whole network. The seamless operation ensures users don't experience any issues or the need to sign in separately. It's very comfortable to use, especially with remote work, as there is no difference whether users are in the office or working from home.
What needs improvement?
The rollout process could be much easier, and the configuration of identity providers like Azure is more complicated than with other zero trust network providers. This can be a pain point. Additionally, the software rollout process needs improvement as it requires knowledge of Linux command lines.
For how long have I used the solution?
We have been working with ZPA for about four to five years.
What do I think about the stability of the solution?
Zscaler Private Access (ZPA) is highly stable, and I rate it ten out of ten.
What do I think about the scalability of the solution?
I rate the scalability of ZPA as ten out of ten because it's a cloud service and can scale as needed.
How are customer service and support?
The technical support for ZPA is excellent, rated ten out of ten. We have a perfect support system, and they are always helpful.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We started using ZPA because it was the leading solution on the market, although we reviewed other options.
How was the initial setup?
The initial setup is rated as three out of ten because it involves Linux and command lines, making it relatively difficult.
What about the implementation team?
One person is usually enough for deployment, depending on the time slot available. We conduct onboarding workshops to define use cases and server access needs.
What's my experience with pricing, setup cost, and licensing?
The pricing of ZPA is rated five out of ten, which I consider to be in the middle. I believe it is justified for the capabilities provided.
Which other solutions did I evaluate?
We reviewed other solutions, but Zscaler offered much more features and configuration options tailored to customer needs.
What other advice do I have?
ZPA is rated eight out of ten due to deployment complexity, but it's a very good solution overall.
User access is simplified and secured through central core functionalities
What is our primary use case?
What is most valuable?
What needs improvement?
For how long have I used the solution?
What was my experience with deployment of the solution?
What do I think about the stability of the solution?
What do I think about the scalability of the solution?
How are customer service and support?
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
How was the initial setup?
What about the implementation team?
What was our ROI?
What's my experience with pricing, setup cost, and licensing?
Which other solutions did I evaluate?
What other advice do I have?
Passwordless access and network issue resolution improve vendor connection
What is our primary use case?
We do not manage the vendor machines. We provide them with a passwordless solution. Multiple tenants are enabled on the vendor's machines from their organizations. Accordingly, they connect to both Zscaler and their own environment. We provide limited access to servers and use privileged remote access or browser access when needed.
What is most valuable?
Zscaler Private Access helps by resolving network choke issues, allowing application access from public networks without needing to integrate with internal networks. We provide browser and privileged remote access for vendors without managing their machines. The deployment of app connectors through MLA eliminates duplicate rules and policies.
What needs improvement?
One area for improvement is setting posture profiles for vendor machines. It's not yet enabled by Zscaler, however, it is in the pipeline.
For how long have I used the solution?
I have been working with Zscaler Private Access for more than six or seven years.
What do I think about the stability of the solution?
Due to posture setting issues, I rate the stability as eight out of ten.
What do I think about the scalability of the solution?
Scalability is ten out of ten as it's effective and expansive.
How are customer service and support?
Customer service and support are rated seven or eight out of ten, needing improvement in quality and response time.
How would you rate customer service and support?
Positive
How was the initial setup?
The setup process is simple if approached appropriately. It involves understanding use cases, reviewing customer feedback, and planning project execution geolocation-wise.
What's my experience with pricing, setup cost, and licensing?
Although the solution is costly, its features justify the price for securing the organization from various access types. Competitors with lower pricing exist.
Which other solutions did I evaluate?
Netskope is a competitor product to Zscaler.
What other advice do I have?
Overall, I rate Zscaler Private Access as nine out of ten.
The solution is more suitable for enterprise-level companies because of its cost.