Zscaler Private Access Service Edge
Zscaler, Inc.Reviews from AWS customer
0 AWS reviews
-
5 star0
-
4 star0
-
3 star0
-
2 star0
-
1 star0
External reviews
133 reviews
from
External reviews are not included in the AWS star rating for the product.
Strong Data Security and Easy Auto-Connect
What do you like best about the product?
The product works well to secure data shared throughout the call center and in the corporate offices. The automatic connection when starting computers is a great ease of use tool.
What do you dislike about the product?
My connection to Zscaler often drops, which forces me to log in more frequently than necessary, especially when I’m on a call. As a phone agent operator, the line would constantly drop during program tech updates, creating frustration for both agents and customers in a high-stakes environment.
What problems is the product solving and how is that benefiting you?
Zscaler helps address the security risks that come with an unencrypted connection to the internet. In a world where hackers are constantly seeking financial gain, it’s vital to our company that customer information is protected. We safeguard sensitive data such as bank account details and personal identifying information, including a customer’s SSN, date of birth, and home address.
Zscaler Private Access: Stable, Secure VPN Alternative That Streamlines Daily Work
What do you like best about the product?
What I like most about Zscaler Private Access is how it completely changes the way you connect to internal systems. With traditional VPNs, I always felt like I was opening the door to the entire network, even when I only needed one application. With ZPA, I’m only connected to what I actually need, and that makes a big difference in terms of both security and peace of mind.
From a test automation perspective, it has made my daily work much smoother. I used to deal with random VPN drops right in the middle of running tests or calling internal APIs, which was frustrating. With ZPA, the connection is much more stable. Once I’m logged in, I can access staging environments and APIs without interruptions, which saves time especially during debugging and long test runs.
On the UI/UX side, I like that it’s not something I constantly have to think about. The client is simple and runs quietly in the background. From an admin perspective, the interface can feel a bit complex at first, but once you get used to it, managing access policies becomes more structured and predictable.
Another thing I appreciate is how it integrates with identity providers. Access is based on roles and context, so I don’t have to chase permissions all the time. It’s clear, controlled, and feels more secure without adding extra friction.
In terms of performance, it was actually better than I expected. Compared to VPN, latency feels lower, especially when running API-heavy automated tests. That directly impacts our efficiency.
From a pricing/ROI perspective, it makes sense if you consider the bigger picture. It’s not just about replacing VPN, but reducing downtime, improving security, and saving engineering time. Fewer connection issues alone have already paid back a lot for us.
Support has also been reliable in my experience. When we had configuration questions early on, responses were helpful and fairly quick, which made the onboarding process easier.
I haven’t deeply used any AI-driven features, but the platform’s policy-based intelligence and access control logic already feel quite advanced. It’s clear that decisions are not just static rules but based on context like user identity and device state.
Overall, it’s been a more stable, secure, and less frustrating way to access internal resources compared to traditional approaches.
From a test automation perspective, it has made my daily work much smoother. I used to deal with random VPN drops right in the middle of running tests or calling internal APIs, which was frustrating. With ZPA, the connection is much more stable. Once I’m logged in, I can access staging environments and APIs without interruptions, which saves time especially during debugging and long test runs.
On the UI/UX side, I like that it’s not something I constantly have to think about. The client is simple and runs quietly in the background. From an admin perspective, the interface can feel a bit complex at first, but once you get used to it, managing access policies becomes more structured and predictable.
Another thing I appreciate is how it integrates with identity providers. Access is based on roles and context, so I don’t have to chase permissions all the time. It’s clear, controlled, and feels more secure without adding extra friction.
In terms of performance, it was actually better than I expected. Compared to VPN, latency feels lower, especially when running API-heavy automated tests. That directly impacts our efficiency.
From a pricing/ROI perspective, it makes sense if you consider the bigger picture. It’s not just about replacing VPN, but reducing downtime, improving security, and saving engineering time. Fewer connection issues alone have already paid back a lot for us.
Support has also been reliable in my experience. When we had configuration questions early on, responses were helpful and fairly quick, which made the onboarding process easier.
I haven’t deeply used any AI-driven features, but the platform’s policy-based intelligence and access control logic already feel quite advanced. It’s clear that decisions are not just static rules but based on context like user identity and device state.
Overall, it’s been a more stable, secure, and less frustrating way to access internal resources compared to traditional approaches.
What do you dislike about the product?
One of the main challenges with Zscaler Private Access is the initial setup and configuration. The Zero Trust model is powerful, but it also comes with a learning curve. Defining policies, segmenting applications correctly, and making sure everything works as expected can take time, especially if you're coming from a traditional VPN setup.
From a day-to-day usage perspective, troubleshooting can sometimes be a bit difficult. When something doesn’t work, it’s not always immediately clear whether the issue is related to policies, identity provider integration, or network configuration. This can slow things down, especially when you're trying to quickly access an internal service during development or testing.
On the UI/UX side, while the end-user experience is simple, the admin interface can feel a bit overwhelming at first. There are many configuration layers, and it takes some time to fully understand how everything is connected.
Pricing could also be a consideration for smaller teams. While it delivers value in terms of security and stability, the cost might feel high if you're not fully utilizing all of its capabilities.
In terms of support, while generally helpful, response times can vary depending on the issue, and more complex cases may require some back-and-forth before getting fully resolved.
Lastly, while the platform has strong policy-based logic, I haven’t seen very visible or impactful AI-driven features in everyday use yet. Most of the intelligence still feels rule-based rather than adaptive.
Overall, none of these are deal-breakers, but they are things to consider, especially during the onboarding and early adoption phase.
From a day-to-day usage perspective, troubleshooting can sometimes be a bit difficult. When something doesn’t work, it’s not always immediately clear whether the issue is related to policies, identity provider integration, or network configuration. This can slow things down, especially when you're trying to quickly access an internal service during development or testing.
On the UI/UX side, while the end-user experience is simple, the admin interface can feel a bit overwhelming at first. There are many configuration layers, and it takes some time to fully understand how everything is connected.
Pricing could also be a consideration for smaller teams. While it delivers value in terms of security and stability, the cost might feel high if you're not fully utilizing all of its capabilities.
In terms of support, while generally helpful, response times can vary depending on the issue, and more complex cases may require some back-and-forth before getting fully resolved.
Lastly, while the platform has strong policy-based logic, I haven’t seen very visible or impactful AI-driven features in everyday use yet. Most of the intelligence still feels rule-based rather than adaptive.
Overall, none of these are deal-breakers, but they are things to consider, especially during the onboarding and early adoption phase.
What problems is the product solving and how is that benefiting you?
Before using Zscaler Private Access, our biggest issue was dealing with traditional VPN limitations. Connections were often unstable, especially during long test runs, and it was frustrating to lose access in the middle of hitting internal APIs or working in staging environments. It also felt a bit risky knowing that once connected, you were technically inside the whole network, even if you only needed one service.
ZPA solved this by removing the dependency on VPN and switching to a more targeted access model. Now, instead of connecting to the entire network, I can securely access only the specific applications I need. This has made a noticeable difference in both stability and security.
For my daily work in test automation, the biggest benefit has been consistency. I can run API tests, access internal tools, and debug issues without worrying about random disconnects. It’s especially helpful when running longer automation suites, where even a small interruption used to cause failures and waste time.
Another benefit is around access control. Permissions are clearly defined, so I don’t have to constantly request access or deal with unnecessary privileges. Everything feels more streamlined and controlled.
Overall, it has reduced a lot of the friction we used to have with remote access. Less time spent dealing with connection issues means more time actually focusing on testing and development, which has been a big win for productivity.
ZPA solved this by removing the dependency on VPN and switching to a more targeted access model. Now, instead of connecting to the entire network, I can securely access only the specific applications I need. This has made a noticeable difference in both stability and security.
For my daily work in test automation, the biggest benefit has been consistency. I can run API tests, access internal tools, and debug issues without worrying about random disconnects. It’s especially helpful when running longer automation suites, where even a small interruption used to cause failures and waste time.
Another benefit is around access control. Permissions are clearly defined, so I don’t have to constantly request access or deal with unnecessary privileges. Everything feels more streamlined and controlled.
Overall, it has reduced a lot of the friction we used to have with remote access. Less time spent dealing with connection issues means more time actually focusing on testing and development, which has been a big win for productivity.
Seamless Always-On Zero Trust Access with Strong Global Performance
What do you like best about the product?
I like how Zscaler Private Access removes the need for traditional VPNs and delivers a seamless, always-on experience. Users don’t have to think about connecting; access just works quietly in the background. The Zero Trust model also helps ensure applications are never exposed to the internet, which significantly reduces the attack surface. Performance remains consistently strong thanks to Zscaler’s global cloud, and once the structure is set up, policy management becomes much more straightforward. Overall, it strengthens security while improving the user experience at the same time. It's among my potential future options, and its pricing and integration could make it a deciding factor, but I haven't evaluated it thoroughly yet.
What do you dislike about the product?
The biggest challenge with ZPA is the initial setup and policy design. Zero Trust requires very granular segmentation, so if the application inventory or access flows aren’t well‑mapped, the rollout can feel complex. Troubleshooting can also be tricky because traffic doesn’t behave like a traditional VPN, and logs sometimes require deeper analysis. Additionally, the Client Connector agent occasionally needs user intervention after OS updates, and some legacy applications don’t behave perfectly without extra tuning.
What problems is the product solving and how is that benefiting you?
Zscaler Private Access eliminates the operational and security issues of traditional VPNs. Instead of exposing the network, it provides application‑level access based on identity and device posture. This solves problems like VPN bottlenecks, lateral movement risk, and complex firewall rules. For us, the biggest benefit is that users get seamless, always‑on access without needing to manually connect to anything. Security teams gain tighter control and visibility, and the attack surface is dramatically reduced because internal apps are never exposed to the internet. Overall, it improves both productivity and security at the same time.
Secure Per‑App Access, But Less Control and Harder Troubleshooting
What do you like best about the product?
The best thing about ZPA is that it removes the concept of being on the network entirely and replaces it with secure, direct, per app access. “invisible infrastructure” idea is a major shift
What do you dislike about the product?
You gain strong security and simplicity but give up some control, performance consistency, and ease of troubleshooting. Some users even report occasional connection drops or outages impacting access.
What problems is the product solving and how is that benefiting you?
ZPA is solving this core problem:
Old security assumes users inside the network are trusted. Modern reality proves that’s dangerous. Benefit to me for this reason:
Safer access
Simpler experience
More flexibility
Less risk of major breaches
Old security assumes users inside the network are trusted. Modern reality proves that’s dangerous. Benefit to me for this reason:
Safer access
Simpler experience
More flexibility
Less risk of major breaches
Seamless Security Without VPN Hassle
What do you like best about the product?
I like how simple and seamless Zscaler Private Access is. There's no VPN hassle for users, and from our side, it's easy to control access. It just works without getting in the way. The app-level access control is the most valuable for us, as being able to define exactly who can access which application keeps things really clean and secure. We also rely a lot on the client connector, as it makes the whole experience seamless. The initial setup of Zscaler Private Access was very easy, which is a big plus.
What do you dislike about the product?
Troubleshooting can be a bit tricky, and the initial setup isn’t the most intuitive. Occasionally, we also run into small connectivity issues with some apps. Clearer error messages and a simpler troubleshooting dashboard would help, plus more consistent app connectivity.
What problems is the product solving and how is that benefiting you?
I use Zscaler Private Access to give remote users secure access to apps without a traditional VPN, solving issues with broad network access and performance. It’s simple, seamless, and easy to control, letting us define who can access each app, making it secure and clean.
Easy to Install and Manage Overall
What do you like best about the product?
The installation process of Zscaler is quite simple, and its integration for both Windows and MacOs is perfect. User interface is also quite easy to navigate and manage.
What do you dislike about the product?
The number of features that are available for the end user to change the behavior of Zscaler is quite limited. And customer support is not always fast when having connectivity issues.
What problems is the product solving and how is that benefiting you?
The main problem it is solving is the secure connectivity to corporate network and cloud resources as well as access to labs remotely. It enables me to work from anywhere
Reliable Remote Access with a Learning Curve
What do you like best about the product?
I used Zscaler Private Access for remote access to internal applications and it works well for daily use. The best part for me is not needing to use a VPN anymore, as the connection feels more stable and faster, especially when changing networks. I like the zero trust approach because it only gives access to specific applications instead of the entire network. It has been much more reliable compared to traditional VPN setups. I also appreciate being able to access internal environments from anywhere without complicated configurations each time. The connection is mostly stable and I didn't face many random disconnections, which is important for testing.
What do you dislike about the product?
The first setup was not very easy, it takes time to understand how the system works and fixing issues is not always simple.
What problems is the product solving and how is that benefiting you?
I use Zscaler Private Access for remote access to internal apps. It offers stable, faster connections compared to VPN, ensuring consistency during testing. The zero trust approach enhances security by accessing specific applications. Initial setup is tricky but resolves complex configurations.
Convenient, Always-On Access with Room for Speed Improvement
What do you like best about the product?
I really like that Zscaler Private Access is automated. It's turned on by default, which is a very interesting feature because when I'm using different software, I usually have to connect and disconnect, which can be a hassle. But with Zscaler Private Access, it's automatically opened and it never turns off for any reason. So it's always turned on automatically, which is great. I don't have to do anything.
What do you dislike about the product?
One thing I don't like about Zscaler Private Access is how much it affects my Internet speed. Normally my speed is about 30 to 35 megabits per second, but when using this, it drops to about 5 megabits per second. So, the speed is downgraded significantly.
What problems is the product solving and how is that benefiting you?
Zscaler Private Access solves the problem of having to physically visit the site every day. With this VPN, I can access the required websites from home, and the connection is set up automatically.
Easy to Use, Quick Updates with Minor Sync Delays
What do you like best about the product?
I like that Zscaler Private Access is easy to use and understood. Once I assign the profile for the user, it's updated and responds quickly. The initial setup was simple for my team.
What do you dislike about the product?
Sometimes it takes a lot of time to sync the profile rules.
What problems is the product solving and how is that benefiting you?
Zscaler Private Access resolves many company issues, is easy to use, and allows for quick profile updates, improving response speed.
Fast Whitelisting with Room for Improvement
What do you like best about the product?
I like the fast reflection in whitelisting and blacklisting and controlling user URLs access. It helps solve the issue of controlling what end-users can access, making them more productive. The setup was pretty easy to initiate too.
What do you dislike about the product?
In whitelisting, sometimes it requires whitelisting another sub links to work, which I think needs to be improved. Applying sub categories or suggestions when whitelisting URLs to make things work would be helpful.
What problems is the product solving and how is that benefiting you?
I use Zscaler Private Access for controlling end-user traffic and logging for incident analysis. It solves controlling what end-users can access, making them more productive.
showing 1 - 10