I worked with these organizations for implementing Secure Service Edge and SASE solutions, including Cloud Access Security Brokers, such as Netskope and Zscaler.
Zscaler and Netskope are the main solutions I work with for various use cases.
Based on my experience, I have worked at the enterprise level only, for large companies such as banks and financial institutions that are transitioning from traditional solutions to new secure service edge solutions.
Zscaler has three components. Specifically, Zscaler Internet Access for secure web access, Zscaler Private Access (ZPA) that is a replacement of traditional VPN solution for securely accessing internal private applications without giving access to the whole network. It works by giving access to the particular application the user wants to access, and it checks numerous factors before granting access to the particular application, including posture checks, authentication, and authorization. Zscaler Digital Experience is a monitoring tool that monitors all application performance, network performance, and more. It helps us troubleshoot issues in a very short time.
When discussing Zscaler Private Access (ZPA) mainly, it is very helpful as a replacement for traditional VPN. In traditional VPN, we used to give access to the whole network, which increased attack vectors. Zscaler Private Access (ZPA) is more secure than these particular VPN solutions. We have implemented this solution for enhanced security. As a cybersecurity professional, I approach these answers from a security perspective.
Micro-segmentation, authentication, and authorization are key features in Zscaler Private Access (ZPA). We can implement role-based access and limit user access by creating different groups. For example, if the HR department needs access to only HR applications, we can create specific groups with appropriate access levels. This segregates access and makes it more secure. They also provide features such as browser isolation, which creates a separate browser when users are accessing content, thus creating an isolated environment to prevent attacks.
They provide integrations with various other security tools. The solution utilizes AI capabilities for various detections and responses. The solution has inbuilt AI for all detection capabilities.
Sometimes the team takes more time to provide responses on certain issues, which is why I do not rate it a perfect 10 out of 10.
Overall, with Zscaler, I have worked for around five years, and particularly with Zscaler Private Access (ZPA), I have three years of experience.
The deployment took approximately six months.
Sometimes connection errors occur when users are unable to connect to the particular cloud.
These connection errors started occurring post rollout, not just during the implementation.
For small and medium enterprises, it will be too expensive.
I have worked with the Zscaler technical team.
I would rate them around eight as they were pretty good.
The traditional solutions were still in use when we migrated to the current solutions. The migration process required extensive documentation and multiple testing phases.
Prices for Zscaler Private Access (ZPA) are higher than traditional solutions, but it provides enhanced security.
Product-wise, I would give Zscaler Private Access (ZPA) a seven. The overall rating for the solution is eight out of ten.