+
+

Related Products

  • Cloudflare
    1,918 Ratings
    Visit Website
  • UTunnel VPN and ZTNA
    118 Ratings
    Visit Website
  • Kasm Workspaces
    125 Ratings
    Visit Website
  • Cloudbrink
    28 Ratings
    Visit Website
  • ThreatLocker
    501 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • SOCRadar Extended Threat Intelligence
    98 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,505 Ratings
    Visit Website
  • Airlock Digital
    35 Ratings
    Visit Website
  • Auth0
    1,003 Ratings
    Visit Website

About

Zscaler, creator of the Zero Trust Exchange platform, uses the largest security cloud on the planet to make doing business and navigating change a simpler, faster, and more productive experience. The Zscaler Zero Trust Exchange enables fast, secure connections and allows your employees to work from anywhere using the internet as the corporate network. Based on the zero trust principle of least-privileged access, it provides comprehensive security using context-based identity and policy enforcement. The Zero Trust Exchange operates across 150 data centers worldwide, ensuring that the service is close to your users, co-located with the cloud providers and applications they are accessing, such as Microsoft 365 and AWS. It guarantees the shortest path between your users and their destinations, providing comprehensive security and an amazing user experience. Use our free service, Internet Threat Exposure Analysis. It’s fast, safe, and confidential.

About

Efficient holistic SaaS Security Management. Scale your ability to control all applications with our flexible, automated workflow engine: usage justification, access requests, access reviews, security alerts,... they all become easier, faster with Zygon. Ditch the spreadsheet, Welcome collaborative SaaS Security Management. Zygon shows you every app every person in your organization is using and how they access it, at the granularity of individual accounts. Make access requests and reviews, onboarding and offboarding, simple, fast, and easy—without piling more responsibilities on IT. From Shadow IT to clear inventory: detecting each and every account in your organization. Zygon automatically builds a complete list of every app employees are using—whether they authenticate with email or SSO. Never get surprised by shadow IT again, and stop spending time maintaining a manual list of used apps.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

IT security teams in search of a solution to improve all their network operations and increase security

Audience

Teams requiring a tool to automate the control of all their SaaS applications

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

$1 per user per month
Free Version
Free Trial

Reviews/Ratings

Overall 5.0 / 5
ease 5.0 / 5
features 5.0 / 5
design 5.0 / 5
support 4.7 / 5

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Zscaler
Founded: 2008
United States
www.zscaler.com

Company Information

Zygon
France
www.zygon.tech/

Alternatives

Alternatives

Perimeter 81

Perimeter 81

Check Point Software Technologies

Categories

Categories

Cloud Security Features

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Firewall Features

Alerts / Notifications
Application Visibility / Control
Automated Testing
Intrusion Prevention
LDAP Integration
Physical / Virtual Environment
Sandbox / Threat Simulation
Threat Identification

Integrations

Arctic Wolf
Blink
Covver
Cybraics
Elastic Observability
FaPipe IPVPN
Google Workspace
IGEL
Observo AI
OverSOC
Ping Identity
Recorded Future
SIRP
SecureW2
Sendmail
Tenzir
The Respond Analyst
ThreatConnect Risk Quantifier (RQ)
ThreatStream
Trustwave DbProtect

Integrations

Arctic Wolf
Blink
Covver
Cybraics
Elastic Observability
FaPipe IPVPN
Google Workspace
IGEL
Observo AI
OverSOC
Ping Identity
Recorded Future
SIRP
SecureW2
Sendmail
Tenzir
The Respond Analyst
ThreatConnect Risk Quantifier (RQ)
ThreatStream
Trustwave DbProtect
Claim Zscaler and update features and information
Claim Zscaler and update features and information
Claim Zygon and update features and information
Claim Zygon and update features and information