


Zscaler Private Access and CyberArk Secure Cloud Access are both key players in secure cloud access solutions. ZPA is preferred for its cost-effectiveness and support, while CyberArk is highlighted for its comprehensive security features, making it a substantial investment for those focused on security.
Features: Zscaler Private Access offers seamless integration, excellent scalability, and focuses on secure remote access without the need for traditional VPNs. ZPA excels through its Zero Trust Network Access, application-level access, and identity-based policies that minimize lateral movement. CyberArk Secure Cloud Access shines in advanced threat detection and identity management, providing high security compliance. It includes Just-in-Time privileged access, dynamic role-based access controls, and comprehensive audit trails for robust security.
Room for Improvement: Zscaler Private Access could benefit from reducing initial technical assistance needs and enhancing support documentation for easier deployments. It should also focus on refining application discovery for better integration and offer more comprehensive troubleshooting tools. CyberArk Secure Cloud Access may improve in better integration with existing IT ecosystems, particularly on cloud-native platforms. It could also enhance its SIEM integration capabilities and refine the telemetry ecosystem for more seamless log and event management.
Ease of Deployment and Customer Service: CyberArk Secure Cloud Access provides streamlined deployment with extensive documentation, facilitating smoother integration. Its customer service is known for being responsive and comprehensive. Zscaler Private Access tends to have quicker deployments with straightforward cloud-based solutions but may initially require more technical support.
Pricing and ROI: Zscaler Private Access is generally more cost-effective with flexible pricing and lower setup costs, offering quicker ROI for budget-conscious organizations. CyberArk Secure Cloud Access, despite higher upfront costs, delivers significant long-term ROI through its extensive security capabilities and robust features, justifying its investment for security-oriented organizations.
With iboss, whenever you turn on your laptop, the iboss agent automatically connects to the iboss cloud, enforcing all security policies. So with respect to the security side, it strengthens measures.
I have seen some cost effectiveness from iboss; it has reduced certain support requirements, making it a more hands-off solution.
Additionally, we have money saved in the long run on infrastructure costs.
The ROI is often cited around 289% over the three years of typical enterprises.
I have found Zscaler Private Access (ZPA) to be very effective at providing operational flexibility during my organization's transition to cloud environments.
Since we have a very small team, the ROI is around 20% to 30%.
They are very fast, responsive, and knowledgeable.
The quality of the support is fantastic.
We had promising discussions about resolving these issues, but no real action followed.
They adhere to SLAs, and most issues are resolved effectively.
As long as you have a license from them, the support is available during deployment.
They are helpful and provide enterprise-level support with knowledgeable engineers and ample documentation, especially during setup and critical issue handling.
The technical support for ZPA is excellent, rated ten out of ten.
We had regular calls, and the team was open and willing to assist us whenever required.
We lack specific root causes, and it's tough to relay information to users, considering multiple contributors such as phone numbers and internet service providers.
They are also able to meet on-demand requirements based on your contract with them, and can easily provide adequate resources and scalability.
I would rate it a nine out of ten for scalability.
If I start seeing sluggishness or anything like that, I just reach out to my rep, and they connect with their dev team, typically resolving it the same day.
If you have a small to medium-sized enterprise, you can typically complete your deployment in roughly a week.
When it comes to performance, I am definitely satisfied with CyberArk Secure Cloud Access on the IT estate.
The scalability of CyberArk Secure Cloud Access is commendable, as most enterprises use it.
Zscaler ZPA has excellent scalability.
I rate the scalability of ZPA as ten out of ten because it's a cloud service and can scale as needed.
We need to deploy it and ensure it will be available in two different Availability Zones, but it's not something that can be done with automation, such as auto-scaling.
It's been pretty solid; I've never had an outage with them, and if I ever had, it's only been once out of the seven years.
We've experienced zero downtime.
Our biggest problem with their service was it did not recognize the device despite our ClearPass sending information to the iboss box.
If CyberArk Secure Cloud Access is down, you cannot access anything, which is a double-edged sword.
The stability from a security perspective is quite good.
CyberArk Secure Cloud Access ensures high availability with its cloud infrastructure, minimizing downtime.
Even during peak usage or mass remote access events, performance remains consistent, which is critical for an enterprise environment handling business-critical applications.
The architecture uses a global mesh of service edges with built-in fault tolerance and redundancy, providing an always-on experience.
We implemented a resilient solution with load balance to ensure stability, which has proven effective thus far.
It is not as intuitive as the rest of the platform.
We also had a problem with a transition when we upgraded from one appliance of theirs to another, but their engineer lost a good deal of our data.
Our iboss subscription access should be more secure with an OTP or VPN etc.
It is important for critical support to respond within fifteen to twenty minutes to minimize business impact.
You need to understand every component because the least mistake results in being completely locked out of the system.
The configurations done to CyberArk are excellent and up to the mark.
It complicates whitelisting, as we cannot determine which IP will be used, posing a challenge when needing to integrate with third parties.
I would appreciate seeing dynamic scaling implemented because it would be beneficial if an instance goes down to automatically start another one.
While Zscaler Private Access (ZPA) wants users to utilize their infrastructure for scale benefits, regulated environments such as government and investment banks need on-premises processing for regulations and low latency requirements.
It offers the same features you would get from a vendor that charges 250,000 British pounds for a fraction of the price.
The following year, the cost of just licensing was similar to what was paid the previous year for a new appliance along with the implementation and licensing costs.
Regarding pricing, setup costs, and licensing, iboss is not cheap, and that's my only concern.
I am not directly involved in pricing aspects, but I am aware that CyberArk is considered costly compared to other products.
The setup cost initially will be higher as it needs to be integrated with different applications that the organization has.
The pricing for CyberArk Secure Cloud Access is reasonable.
It is expensive.
Although the solution is costly, its features justify the price for securing the organization from various access types.
While it is a premium investment, the short payback period of about 11 months and consolidation of multiple point products make it very cost-effective in the long run.
The solution's mental health function can detect if someone needs help.
It's given us a lot more visibility into our computer assets that may be infected with viruses and also shows us people who have unusually large uploads or might be engaging in high-risk activities, such as searches or going to sites not categorized by their web crawler.
iboss was the best solution for us because, no matter what domain you were in, everything is under a single pane of glass, which is exactly what we wanted.
The solution provides robust security features essential for financial and banking sectors to avoid network and connectivity issues or security breaches.
Dynamic role-based access helps you identify which user is accessing what, with what device, at what time, and the level of access the person has for doing what they are doing.
This new approach is particularly effective for dynamic environments where traditional PAM requires significant effort to detect accounts, onboard accounts, and provide access rights.
Zscaler pre-tests websites and authorizes safe access, giving us a layer of security that we rely on.
Zscaler Private Access (ZPA) is much more secure than VPN because users are only allowed to access specific applications rather than the whole network.
Zscaler has allowed an easy, secure way for us to access our internal resources from outside.
| Product | Mindshare (%) |
|---|---|
| iboss | 4.0% |
| Zscaler Private Access (ZPA) | 2.2% |
| CyberArk Secure Cloud Access | 0.6% |
| Other | 93.2% |



| Company Size | Count |
|---|---|
| Small Business | 6 |
| Midsize Enterprise | 7 |
| Large Enterprise | 8 |
| Company Size | Count |
|---|---|
| Small Business | 6 |
| Large Enterprise | 4 |
| Company Size | Count |
|---|---|
| Small Business | 2 |
| Midsize Enterprise | 4 |
| Large Enterprise | 7 |
Iboss offers a comprehensive cloud-based security platform valued for its scalability and autonomous features, ensuring robust security with easy deployment and management capabilities.
Renowned for its robust security architecture, Iboss integrates seamlessly within diverse networks, delivering efficient granular filtering and advanced content categorization. Its single pane of glass console provides ease of management, allowing rapid scalability suitable for rapidly deploying environments. Operates in BYOD setups due to inline filtering without device installation. Integration with cloud-based applications enhances user control, and features like SASE, SSL inspection, and ChatGPT risk protection stand as highlights. Despite its strengths, users have pointed out areas for enhancement like direct navigation in reports, SSL decryption, and better cloud integration while having room to improve data loss prevention.
What are the most important features of Iboss?The usage of Iboss spans educational institutions, specifically K-12, to enforce internet policies, protect data, and support remote work environments. It provides web filtering and security frameworks to ensure safe browsing. Its platform-as-a-service model offers flexibility for both cloud-based and on-premises requirements, integrating seamlessly to deliver enhanced security features suitable for various deployment needs including zero trust, CASB, and network security for work-from-home setups.
CyberArk Secure Cloud Access improves security with its dynamic role-based access and efficient management of private keys, minimizing security risks and enhancing user experience in demanding cloud environments.
CyberArk Secure Cloud Access is designed for lightweight deployment, offering high availability and robust security features. Its seamless integration with SIEM enhances user experience, while private key management reduces manual entry dependency. Comprehensive audit trails and visibility facilitate monitoring and risk reduction in CI/CD environments. Despite its robust capabilities, on-premises deployments can be complex, requiring improvements in customization and real-time monitoring features. Expanding availability across various clouds, especially in compliance-focused regions like India, is necessary to address AI challenges and hybrid multicloud needs.
What are the Key Features of CyberArk Secure Cloud Access?CyberArk Secure Cloud Access is widely implemented in industries requiring robust privileged access management, governance, and auditing. It provides valuable insights into access details and actions, aiding organizations in managing access within secure environments. With extensive use in identity management across major cloud platforms, it supports tracking changes and permissions, crucial for cybersecurity operations in complex network and cloud infrastructures.
Zscaler Private Access enhances security by enabling access to specific applications without exposing entire networks. It is designed for scalability and flexibility, making it particularly suitable for cloud transitions and remote work environments.
Zscaler Private Access offers a comprehensive solution for modern security needs by ensuring secure remote application access. This is achieved through its advanced features such as micro-segmentation and AI capabilities. Organizations can integrate ZPA with existing security infrastructure, providing seamless operation during cloud transitions. Users benefit from policy-based access management and dashboards that enhance visibility and control. However, ZPA faces some challenges, including bugs, configuration difficulties with identity providers, and a limited rule customization capacity. Delayed support responses and annual price increases are also concerns that need addressing.
What are the key features of Zscaler Private Access?Zscaler Private Access is widely adopted across industries transitioning from traditional VPNs to more secure remote access solutions. Companies leverage it for secure network communication, accessing cloud resources like AWS and Azure, and integrating with internal systems. Local, customer, and cloud networks extensively use ZPA for secure internet access and as a modern replacement for older proxy technologies.
We monitor all Cloud Access Security Brokers (CASB) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.