We are using secure remote access for internal applications, and that's why we are using Zscaler Private Access (ZPA) now. I work with Zscaler Private Access (ZPA). I use it just for the VPN functionality.
Zscaler Private Access (ZPA)
Zscaler, Inc.External reviews
External reviews are not included in the AWS star rating for the product.
A great solution for managing communication and access at administrative level
A heavy load system dimmer.
most of the times the system freezes. perhaps our systems hardware is to be blamed, as they are 4 year old, and 8 gb systems.
Best ZTNA solution to achieve digital transformation
Quick Connectivity through the Client connector and multiple data centres available in different regions, we can select the nearest based on user and Application availability.
Some features, like Source IP Anchoring(SIPA) and Nano log Streaming Services, will really help to address special use cases.
We can raise a support case from the tenant, and the response from the TAC team is timely and effective.
Secure way of connect- Application & datacenter network details are not publicly accesble/hosted, there is no direct connectivity between end device and Applications. Appications connected with App connectors, and App connectors accessble via Client connector only.
IP requirement- In some use cases, client applications only accessble via corporate public Ip, by deploying SIPA, we have access client application via our own IP not through Zscaler cloud IP.
Secure access without VPN hassles
I have used zscaler at work for the past few months.
ZPA in Action: A Deep Dive into Zscaler’s Zero Trust Solution
Ensuring seamless VPN connectivity while needing better troubleshooting support
What is our primary use case?
What is most valuable?
The best advantage of the product is that it is always on as a VPN, which gives us much more functionality. It is basically easy to use and easy to configure. The solution for Zscaler Private Access (ZPA) is seamless for this.
From a visibility perspective, they have added more content features where we can see security and other aspects through available dashboards. That's the only notable addition, plus they are implementing the overall security architecture of tenants, which gives much more information to work with.
What needs improvement?
The only room for improvement is the troubleshooting problem with iPhones as of now.
The review should be anonymous; there should not be any personal or business details given. Both should be anonymous.
For how long have I used the solution?
I have been using it for around four or five years.
What was my experience with deployment of the solution?
The installation and deployments are straightforward; it is just a two-liner process. There is something in the documentation that might need changes, but it's pretty straightforward.
The documentation has to be perfect as it has not been updated for a long time. They need to update it based on the latest version and the commands we use.
What do I think about the stability of the solution?
The solution is stable enough.
What do I think about the scalability of the solution?
We are using cloud services, but I am not sure about the scalability specifically.
Based on the limited users, this is perfectly fine since we are using only one box, and we haven't faced many issues with that.
How are customer service and support?
I am not happy with the technical support from Zscaler Private Access (ZPA), particularly in India, where reachability is an issue with salespersons. Sometimes we need to reach a salesperson to get issues resolved, especially for mobile problems we're still facing. We lack specific root causes, and it's tough to relay information to users, considering multiple contributors such as phone numbers and internet service providers. We need more visibility on what problems users are facing with reachability.
I would rate technical support six points out of ten.
Which solution did I use previously and why did I switch?
I have not used any other VPNs apart from Zscaler Private Access (ZPA).
What was our ROI?
I see some ROI in the product. Since we have a very small team, the ROI is around 20% to 30%. I would say 30%.
What other advice do I have?
I am not using AWS Backup anymore since we spoke almost two years ago. I have a backup solution managed by another team, and there's a discussion about AWS for backup. I am responsible for the IT security part only.
I do not work with popular vendors such as Palo Alto or Fortinet, as my primary domain is Check Point, and it's all about security. I use Check Point for this purpose. I do not work with the product ZoneAlarm. We use only a specific firewall from Check Point and utilize only the firewall. We are not using Check Point CloudGuard Web Application Firewall; we are using a normal firewall, the Firewall as a gateway. The name of the product is Check Point Firewall Gateway.
I am not using a web gateway. We do not use products such as Harmony or Harmony Browse. I am using a VPN from Cisco for endpoint protection. I am not using the cloud firewall from Zscaler Private Access (ZPA). I am not working with Zscaler B2B or ZTNA as a service.
From a troubleshooting perspective, we face an issue with iPhones affecting about 10% of users. Even when we provide logs, they are not able to figure out what exactly is happening. It's not possible for users to collect logs each time, and this is a peculiar problem happening with 10 to 15 users.
The operational flexibility is very effective; there are no problems, and I did not have any issues with that. The solution is affordable, but there are other parts that could add much more information, which may not be useful for us at the moment, making it a bit expensive. There is also a China-specific solution, which is really expensive.
I agree to share my details with the Zscaler vendor. I do not want to be a reference for Zscaler Private Access (ZPA).
On a scale of 1-10, I rate this solution a 9.
its one of the Best VPN i have worked
Ease of Use & Scalability
No Hardware Dependency
Reduces time spent on redundant access mapping and troubleshooting.
Enhances performance by routing traffic through Zscaler’s cloud.
Boosts business productivity by simplifying secure access
Users report slow loading times, latency, and connection delays, especially under poor network conditions or when accessing high-bandwidth internal apps.
The subscription model can become expensive over time, especially for smaller organizations.
Mapping user access to applications is time-consuming and error-prone.
Public-facing IPs and open ports are vulnerable to exploitation.
Benefits:
ZPA enforces least-privilege access: users connect only to specific applications, not the network
Cloud-native and easy to deploy across global sites.
Supports hybrid workforces and IoT/OT device access
Seamless and Secure Zero Trust Access for Remote Users
Enables secure and seamless connectivity for distributed teams
What is our primary use case?
For our main use cases for Zscaler Private Access (ZPA), it’s providing us a VPN solution for our clients, connecting to data build resources, and providing them security.
What is most valuable?
It's challenging to explain which features of Zscaler Private Access (ZPA) are most valuable because the main client is the IT department in our company, and we, as DevOps, are deploying this solution as infrastructure for them. From our case, and as I'm familiar with this tool, the most value is the VPN connection because it provides access for all company members to data builds in a secure way.
Zscaler Private Access (ZPA) does an excellent job offering secure remote access to internal applications for our distributed workforce because it provides a granular way to grant access for specific people with specific applications.
Zscaler Private Access (ZPA) has been very effective in providing operational flexibility during our company's transition to cloud environments, as it helped us significantly, and it was deployed even before we migrated to the cloud itself.
What needs improvement?
Concerning improvements for Zscaler Private Access (ZPA), we have occasional issues, but I don't think they are related to the product itself; they may be related more to infrastructure problems or something else related to the network because it's a network application.
The current pain points we sometimes experience relate to the additional security applications we have on the laptops, and sometimes I don't know if I didn't get any notification from the application because it's an agent problem or something security-wise blocking this.
For how long have I used the solution?
I have been using Zscaler Private Access (ZPA) for more than three years.
What was my experience with deployment of the solution?
I would describe my experience deploying Zscaler Private Access (ZPA) as very straightforward, but I think it could allow more automatic ways to deploy and configure instead of having to connect to each new instance manually and configure it.
What do I think about the stability of the solution?
We didn’t have any issues with Zscaler Private Access (ZPA)’s stability, availability, or reliability.
What do I think about the scalability of the solution?
I don’t know how Zscaler Private Access (ZPA)’s cloud-native architecture is used for scaling within my company, but we do use something deployed in the cloud, and from my perspective, we only deploy the agent, exactly what we took from the marketplace.
How are customer service and support?
As for support from Zscaler Private Access (ZPA), I might have used it, but it’s primarily handled by the IT team.
Which solution did I use previously and why did I switch?
I know we had something before Zscaler Private Access (ZPA) to address similar needs, but I don’t remember the application name. The decision to move to Zscaler Private Access (ZPA) was possibly because it’s more native in the cloud environment and provides us an easier way to get or configure this.
Which other solutions did I evaluate?
In regard to other solutions I considered before implementing Zscaler Private Access (ZPA), I don’t know because the decision on what to use and what to install came from management.
What other advice do I have?
Regarding the micro-segmentation feature of Zscaler Private Access (ZPA), I can explain less, and I think the IT team who are managing it can explain better.
I don't know how Zscaler Private Access (ZPA) has helped minimize lateral movement within our network because I don't know how to measure this reduction.
Since implementing Zscaler Private Access (ZPA), I've not noticed any changes in the visibility or monitoring of user access patterns because it's not part of our responsibility. We deploy it, and the IT team is configuring and monitoring it, fixing issues if it's working or not.
I'm not familiar with all benefits from using Zscaler Private Access (ZPA) that I haven't discussed, as I am only familiar with the VPN-related functionality and the segmentation which provides granular security access for the clients.
I rate Zscaler Private Access (ZPA) eight out of ten.