What is Zscaler?

Zscaler is a fully featured Security Management Software designed to serve SMEs, Startups. Zscaler provides end-to-end solutions designed for Windows. This online Security Management system offers Behavioral Analytics, Application Security, Threat Intelligence, Encryption, Vulnerability Management at one place.

Pricing

Zscaler Starting Price

Awards
Zscaler Award

Our Awards and Recognition

More Awards
Need a Little Help?

Talk with a software expert for free. Get a list of software that's great for you in less than 10 minutes.

Zscaler Screenshots

Key Features of Zscaler

Here are the powerful features that make Zscaler stand out from the competition. Packed with innovative tools and advanced functionalities, this software offers a range of benefits.

  • Access control
  • Activity Log
  • Activity Monitoring
  • Advanced Firewall
  • AI / Machine Learning
  • Anonymous Browsing
  • Anti Spam
  • Anti Virus
  • Application Access Control
  • Application Security
  • Archiving
  • Asset Discovery
  • Asset Tagging
  • Audit Trail
  • Audit Trails
  • Availability Testing
  • Backup Management
  • Bandwidth Monitoring
  • Baseline Manager
  • Basic Firewall
  • Behavioral Analytics
  • Billing & Invoicing
  • Biometric
  • Compliance Management
  • Compliance Reporting
  • Configuration Management
  • Connectivity Management
  • Consolidation
  • Content Routing
  • Credential Management
  • Customer Management
  • Dashboard
  • Data Export
  • Data Visualization
  • Database Security Audit
  • Defect Tracking
  • Deployment Management
  • Diagnostic Tools
  • DNS Leak Protection
  • Document Imaging
  • eDiscovery
  • Email Attachment Protection
  • Encryption
  • Endpoint Management
  • Event Logs
  • Event Tracking
  • Event-Based Notifications
  • File Access Control
  • File Integrity Monitoring
  • Financial Data Protection
  • Firewall
  • Forensic Analysis
  • FTP Monitoring
  • Full Transaction Diagnostics
  • Granular Access Controls
  • Health Monitoring
  • Incident Management
  • Internet Security
  • Internet Usage Monitoring
  • Intrusion Detection System
  • Inventory Management
  • IP Address Monitoring
  • IP Protection
  • Job Costing
  • Kill Switch
  • Lead management
  • Least Privilege
  • Log Management
  • Maintenance Scheduling
  • Mobile Access
  • Mobile Authentication
  • Multi-Language
  • Multi-Protocol
  • Multifactor Authentication
  • Network Diagnosis
  • Network Logs
  • Network Monitoring
  • Network Scanning
  • Password Management
  • Password Protection
  • Patch Management
  • PCI Assessment
  • Peer-to-Peer
  • Performance Control
  • Performance Metrics
  • Policy Management
  • Predefined Protocols
  • Prioritization
  • Quarantine
  • Quotes / Estimates
  • Real Time Monitoring
  • Real-Time Reporting & Dashboards
  • Real-time Scheduling
  • Redundancy Checking
  • Release Management
  • Remediation
  • Remote Access
  • Reporting/Analytics
  • Reverse Proxy
  • Risk Assessment
  • Risk Management
  • Role based management
  • Root-Cause Diagnosis
  • Schedulers
  • Scheduling
  • Security Event Log
  • Sensitive Data Identification
  • Server Performance
  • Signature Matching
  • Single Sign On
  • SLA Monitoring
  • Spyware Removal
  • SSL Offload
  • Subscriber Management
  • Syslogs
  • Threat Intelligence
  • Threat Protection
  • Thresholds
  • Trace individual transactions
  • Transaction Monitoring
  • Two-Factor Authentication
  • Uptime Reporting
  • User Activity Monitoring
  • User Friendly Webportal
  • User Management
  • Version Control
  • Virtual Machine Monitoring
  • Virus Definition Update
  • Vulnerability Assessment
  • Vulnerability Management
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Inspection
  • Web Logs
  • Web Scanning
  • Web Threat Management
  • Web Traffic Reporting
  • Whitelisting / Blacklisting
  • Work Order Management
Show More
  • Advanced Detection
  • Anti Virus
  • Application Security
  • Behavioral Analytics
  • Data Security
  • Data security and encryption
  • Email Protection
  • Encryption
  • Endpoint Management
  • File management
  • File Server Security
  • Firewall
  • Incident Management
  • Intrusion Detection System
  • Larger Files & More Storage
  • Network Antivirus
  • Online Protection
  • Password Protection
  • Privacy Protection
  • Remote installation
  • Remote Management
  • Security Management
  • Server roles
  • Smart Scanner
  • Spam Protection
  • Threat Intelligence
  • Two-Factor Authentication
  • Upload Portal
  • Vulnerability Management
Show More
  • Advanced persistent threat (APT) protection
  • Antivirus and malware protection
  • Application control and whitelisting
  • Data backup and recovery
  • Data encryption at rest and in transit
  • Data loss prevention (DLP)
  • Endpoint protection and device control
  • Firewall protection
  • Identity and access management (IAM)
  • Incident response and threat intelligence
  • Intrusion detection and prevention system (IDS/IPS)
  • Log management and auditing
  • Network anomaly detection
  • Network encryption (SSL/TLS)
  • Network forensics and packet analysis
  • Network load balancing and failover
  • Network segmentation and isolation
  • Network traffic monitoring and analysis
  • Secure email and messaging
  • Secure file transfer protocols (SFTP)
  • Secure remote access
  • Security assessment and compliance
  • Security incident response automation
  • Security information and event management (SIEM)
  • Security policy management
  • Two-factor authentication (2FA)
  • User behavior analytics (UBA)
  • Virtual private network (VPN) support
  • Vulnerability scanning and assessment
  • Web filtering and content control
  • Wireless network security
Show More
  • Access control and identity management
  • API Security
  • API security and management
  • Application security and firewalling
  • Attack Surface Management
  • Cloud access governance
  • Cloud Compliance
  • Cloud compliance management
  • Cloud Detection and Response (CDR)
  • Cloud Infrastructure Entitlement Management (CIEM)
  • Cloud security
  • Cloud Security Posture Management (CSPM)
  • Cloud workload protection
  • Cloud-Native Application Protection Platforms (CNAPP)
  • Computer Security
  • Container security
  • Continuous security monitoring
  • Cybersecurity
  • Data backup and disaster recovery
  • Data Governance
  • Data loss prevention
  • Data Security Posture Management (DSPM)
  • Encryption and data protection
  • Endpoint Detection and Response (EDR)
  • Endpoint protection
  • Entitlement Management
  • Exposure Management
  • GDPR Compliance
  • Identity Management
  • Incident response and forensics
  • Intrusion detection and prevention
  • IT Security
  • Malware detection and prevention
  • MSP
  • Multi-factor authentication
  • Network security
  • Network security and segmentation
  • Patch Management
  • Secure Access Service Edge (SASE)
  • Secure email and messaging
  • Secure file storage and sharing
  • Secure remote access and VPN
  • Security analytics and threat intelligence
  • Security awareness training
  • Security Compliance
  • Security compliance and reporting
  • Security configuration management
  • Security incident response
  • Security information and event management (SIEM)
  • Security policy enforcement
  • Security risk assessment and mitigation
  • Software Asset Management (SAM)
  • Software-Defined Perimeter (SDP)
  • Threat detection and prevention
  • User activity monitoring and auditing
  • Vulnerability assessment and management
  • Vulnerability Management
  • Vulnerability Scanners
  • Web application scanning and protection
  • Zero Trust Security
Show More
  • Action Alerts
  • Activity Dashboard
  • Activity Statistics And Reports
  • Advanced Threat Protection
  • Anti-Spam and Anti-Phishing
  • Application Control
  • Bandwidth Management and QoS
  • Centralized Management and Administration
  • Cloud Application Security
  • Complete API with WebHooks
  • Content Categorization and Filtering
  • Dashboard
  • Data loss prevention
  • Endpoint protection
  • File Sandboxing and Analysis
  • Help And Support
  • Help Desk
  • Incident response and forensics
  • Malware and Phishing Protection
  • Mobile Access
  • Mobile Device Support
  • Multi-factor authentication
  • Network traffic analysis
  • Policy Enforcement and Compliance
  • Real-time reporting and analytics
  • Secure Web Gateway as a Service
  • Shadow IT Discovery and Control
  • SSL Decryption and Inspection
  • SSL Inspection
  • SSL/TLS certificate management
  • Threat Intelligence Integration
  • URL Filtering
  • URL Reputation Filtering
  • User authentication and access control
  • User Behavior Analytics
  • Web application firewall
  • Web Content Filtering
  • Web Filtering Bypass Detection
  • Web Proxy and Reverse Proxy
Show More

Zscaler Specifications

Get a closer look at the technical specifications and system requirements for Zscaler. Find out if it's compatible with your operating system and other software.

Deployment :
Cloud Based
Subscription Plan :
Monthly, Yearly
Accessibility :
API
Customization
Mobile Support
Desktop Platforms :
MacOs
Windows
Mobile Platforms :
Language Support :
English
Business :
StartUps
SMBs
Enterprises
Available Support :
Email
Phone
Live Support
Training
Tickets
Company Details :
Company Name : Zscaler
Headquarter : San Jose
Website : Visit Website
Full Address : 110 Rose Orchard Way San Jose, CA 95134 USA

Zscaler Comparisons

Compare Zscaler with other similar options available in Security Management Software. Explore the key differences to see why it's the top choice for businesses and individuals.

Zscaler logo
Do you work for Zscaler?
Claim This Profile

Zscaler Videos

Overall Zscaler Reviews

Thinking about using Zscaler? Check out verified user reviews & ratings based on Zscaler's features, user-friendliness, customer support, and other factors that contribute to its overall appeal.

4.5/5

Based on 4 Reviews

Write a Review Or
Ask a question
Feature Feature 4.5

Feature

Out of 5

Ease of use Ease of use 4.8

Ease of use

Out of 5

Value for money Value for money 4.5

Value for money

Out of 5

Customer support Customer support 4.5

Customer support

Out of 5

Likelihood to recommend Likelihood to recommend 0%

Likelihood to recommend

Out of 100%

Zscaler Pros and Cons

"Zscaler is too fast. It takes fraction of time to get enabled. The accuracy of blocking the sites is also good."

"The inspection capabilities of zscaler"

"Notification and sign in Super fast connection and no disruption after ensuring stronger security"

"While connecting, it asks for SSO information twice. It can be reduced to one."

"The Public ip that it uses are shared between costumer. It would be good to know back-end customer during investigation"

"atleast include training websites under internet security options"

4 Zscaler Reviews

Hear directly from customers who have used Zscaler. Read their experiences, feedback, and ratings to gain valuable insights into how this software has benefited their businesses.

Deepaank

Used the software for : 2+ years

Company Size :51-200 employee

4.0

Jan 04, 2021

Zscaler internet security and vpn

Zscaler has 2 functionalities, one is internet security which blocks the suspicious websites and two can be ised as a vpn service to connect to an internal network.

Feature Feature 4

Feature

Out of 5

Ease of use Ease of use 5

Ease of use

Out of 5

Value for money Value for money 4

Value for money

Out of 5

Customer support Customer support 4

Customer support

Out of 5

Zscaler Mobile App Experience

1 2 3 4 5 6 7 8 9 10

Zscaler After Sales Service Rating

1 2 3 4 5 6 7 8 9 10

What do you like best about Zscaler?

Zscaler is too fast. It takes fraction of time to get enabled. The accuracy of blocking the sites is also good.

What do you dislike about Zscaler?

While connecting, it asks for SSO information twice. It can be reduced to one.

Do you think Zscaler delivers value for the money spent?

Yes

Are you satisfied with Zscaler features?

Yes

Did implimentation of Zscaler was easy?

Not Sure

What features is Zscaler currently missing?

No

What other products like Zscaler have you used or evaluated?

I have used Open vpn which is very bad as compared to Zscaler

How Zscaler is better/different from its competitors?

Zscaler os reliable and fast in connectivity. UI is simple. No password os needed everytime while connecting.

Rahul

Used the software for : 2+ years

Company Size :51-200 employee

4.0

Nov 18, 2020

Perfect software for Proxy solution

Zscaler have made the traffic inspection and analysis of the outbound and inbound traffic very easy.

Feature Feature 4

Feature

Out of 5

Ease of use Ease of use 4

Ease of use

Out of 5

Value for money Value for money 4

Value for money

Out of 5

Customer support Customer support 4

Customer support

Out of 5

Zscaler Mobile App Experience

1 2 3 4 5 6 7 8 9 10

Zscaler After Sales Service Rating

1 2 3 4 5 6 7 8 9 10

What do you like best about Zscaler?

The inspection capabilities of zscaler

What do you dislike about Zscaler?

The Public ip that it uses are shared between costumer. It would be good to know back-end customer during investigation

Do you think Zscaler delivers value for the money spent?

Yes

Are you satisfied with Zscaler features?

Yes

Did implimentation of Zscaler was easy?

Yes

What features is Zscaler currently missing?

AI capabilities for identifying suspicious traffic and anomaly

What other products like Zscaler have you used or evaluated?

Forcepoint

How Zscaler is better/different from its competitors?

It is easy to use and much better management capabilities

GaneshA.

Used the software for : 2+ years

Company Size :51-200 employee

5.0

Sep 30, 2020

Consultant. 6+ years experience

Creative and robust vpn Internet security options available to open or off. Secure sign in and authentication method.quick sign and ease of access Notification available Setting for daily reauthentication

Feature Feature 5

Feature

Out of 5

Ease of use Ease of use 5

Ease of use

Out of 5

Value for money Value for money 5

Value for money

Out of 5

Customer support Customer support 5

Customer support

Out of 5

Zscaler IOS App Experience

1 2 3 4 5 6 7 8 9 10

Zscaler After Sales Service Rating

1 2 3 4 5 6 7 8 9 10

What do you like best about Zscaler?

Notification and sign in Super fast connection and no disruption after ensuring stronger security

What do you dislike about Zscaler?

atleast include training websites under internet security options

Do you think Zscaler delivers value for the money spent?

Yes

Are you satisfied with Zscaler features?

Yes

Did implimentation of Zscaler was easy?

Yes

What features is Zscaler currently missing?

Training website allowed under internet security

What other products like Zscaler have you used or evaluated?

Global Protect and forticlient

How Zscaler is better/different from its competitors?

Ease of access configuring with microsoft application

Ahsk

Used the software for : 2+ years

Company Size :51-200 employee

5.0

Jun 28, 2020

Feature Feature 5

Feature

Out of 5

Ease of use Ease of use 5

Ease of use

Out of 5

Value for money Value for money 5

Value for money

Out of 5

Customer support Customer support 5

Customer support

Out of 5

Alternatives of Zscaler

Explore alternative software options that can fulfill similar requirements as Zscaler. Evaluate their features, pricing, and user feedback to find the perfect fit for your needs.

Zscaler FAQs

What are the top 5 features for Zscaler?

The top 5 features for Zscaler are:

  • Application Security
  • Anti Virus
  • Intrusion Detection System
  • Encryption
  • Behavioral Analytics

What type of customer support is available from Zscaler?

The available support which Zscaler provides is:

  • Phone
  • Email
  • Live support
  • Tickets
  • Training

Where is the headquarters/company of Zscaler located?

The headquarters/company of Zscaler is located at San Jose.

Free Demo Get Pricing
Free Demo