No more typing reviews! Try our Samantha, our new voice AI agent.

McAfee Total Protection for Data Loss Prevention vs Zscaler Zero Trust Exchange Platform comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Feb 8, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cloudflare One
Sponsored
Ranking in Data Loss Prevention (DLP)
20th
Average Rating
8.6
Reviews Sentiment
6.5
Number of Reviews
23
Ranking in other categories
Email Security (20th), Secure Web Gateways (SWG) (13th), Cloud Access Security Brokers (CASB) (12th), Distributed Denial-of-Service (DDoS) Protection (7th), Software Defined WAN (SD-WAN) Solutions (12th), Access Management (11th), Bot Management (3rd), ZTNA as a Service (9th), ZTNA (4th), Secure Access Service Edge (SASE) (10th), Remote Browser Isolation (RBI) (3rd)
McAfee Total Protection for...
Ranking in Data Loss Prevention (DLP)
22nd
Average Rating
7.4
Reviews Sentiment
6.3
Number of Reviews
31
Ranking in other categories
No ranking in other categories
Zscaler Zero Trust Exchange...
Ranking in Data Loss Prevention (DLP)
5th
Average Rating
8.4
Reviews Sentiment
6.9
Number of Reviews
67
Ranking in other categories
Cloud Access Security Brokers (CASB) (8th), Application Control (4th), ZTNA as a Service (1st), Secure Access Service Edge (SASE) (2nd), Remote Browser Isolation (RBI) (1st)
 

Mindshare comparison

As of May 2026, in the Data Loss Prevention (DLP) category, the mindshare of Cloudflare One is 2.1%, up from 1.4% compared to the previous year. The mindshare of McAfee Total Protection for Data Loss Prevention is 1.1%, up from 0.9% compared to the previous year. The mindshare of Zscaler Zero Trust Exchange Platform is 4.2%, down from 6.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Data Loss Prevention (DLP) Mindshare Distribution
ProductMindshare (%)
Zscaler Zero Trust Exchange Platform4.2%
Cloudflare One2.1%
McAfee Total Protection for Data Loss Prevention1.1%
Other92.6%
Data Loss Prevention (DLP)
 

Featured Reviews

CV
Network Architect at IP Dimension
Cloud security has improved remote access and has reduced costs for smaller client sites
I have used Cloudflare One's Identity-Aware Proxy, and it is quite straightforward from what I have seen so far. The app registration on the Azure side integrates fully into Cloudflare, and I am very satisfied with that part because it is easy to set up. The integration of Cloudflare One's Secure Web Gateway and Zero Trust Network Access works without any issues. That part is pretty automatic, and if you complete the rest of the setup, it comes together by itself with no issues from my side. What makes it nice is that we can actually start replacing on-site firewalls at this stage for the smaller clients because it does not matter if they go to a coffee shop or work from home; they are still secured by the same connection. The hops get shorter and you get better latency. We have done testing to see if it is better. One thing that we did notice with our proof of concept with our current client is that they have people connecting from the UK. When they used their previous VPN solution, uploading CAD drawings and other files to the server took a long time. They mentioned that it is much quicker on Cloudflare One's solution. I definitely believe that is part of the improved performance, and I am satisfied with that as well. What is nice about Cloudflare One is that it makes the setup easier and also easier to train technicians to maintain it. Compared to legacy systems, we do not need to get fancy firewalls in place that are costly. That is definitely also a cost-saver with Cloudflare One.
KM
Sr. System Engineer at Zensar Technologies
Data protection has improved as we restrict uploads to third-party sites and control devices
We are using customizable policies in the product. Everything is fine regarding alerting and reporting features; we got a notification as well as we received the required events, and it is working well. McAfee Total Protection for Data Loss Prevention is different; whatever the logs are there, they are available on the ePO, so we cannot directly integrate DLP to any third-party tool. We need to actually integrate the ePO itself to enable integration. We are just restricting data to be uploaded, which is the best option that allows us to control organizational data, making it the biggest benefit for us in McAfee Total Protection for Data Loss Prevention. We are protecting data to be uploaded on third party URLs, which helps us meet our needs.
Vibin Thomas - PeerSpot reviewer
Team Lead, Technical Content Security at Valuepoint Systems
Zero trust access has transformed remote connectivity and now simplifies secure app usage
Zscaler Zero Trust Exchange Platform, especially Zscaler Private Access, is very strong, though there are a few areas where improvements can be made. One challenge observed is around initial troubleshooting and visibility. While Zscaler Private Access provides logs, it can sometimes take time to pinpoint the exact cause of access issues, especially in complex environments with multiple policies and identity integration. Another area is the dependency on identity and connector health. Since Zscaler Private Access is heavily reliant on app connectors and identity providers, any issues with these components can impact user access, making proper monitoring critical. During the initial setup, policy configuration and application onboarding require careful planning, especially for larger environments with many applications. These challenges are manageable with proper design and monitoring. Overall, the platform delivers strong security and user experience. I would recommend a few improvements, especially around user interface, reporting, and troubleshooting experience. From a user interface perspective, while the platform is powerful, the policy configuration and navigation can feel complex, especially for new users. A more simplified and intuitive layout for policy mapping and application access would help reduce the learning curve. In terms of reporting, Zscaler Private Access provides logs, but having more built-in customizable dashboards and analytics would be very helpful. Better visibility into user access patterns, application performance, and real-time troubleshooting insights would improve operational efficiency. From a support and troubleshooting standpoint, it would be beneficial to have more granular centralized visibility, allowing for quick end-to-end tracing of a user request from authentication to application access without switching between multiple views. These improvements would make the platform even more efficient, especially for large-scale enterprise environments.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Cloudflare is simple to use."
"The blocking feature is very good."
"The tool also offers good scalability, and the dashboard, along with real-time analytics, is very good."
"Cloudflare DDoS mitigates DDoS attacks."
"The simplicity of the solution is its valuable features as almost no effort was needed to learn the configurations. It is also one of the cheapest firewalls available in this category."
"Cloudflare is simple to use."
"Using Cloudflare One makes my work quite easy because for DDoS protection, all I need to do is understand the OSI model and click; it makes it easier than trying to write a command line or use a Linux command."
"It's the endpoint exposition. We don't need to expose our VPN server to the internet and need a zero-test solution. I can apply some conditional access to the endpoint that's connecting to our network to check their security policies or the security condition of their workstation. Once the workstation is trying to connect to my internal network, then I would like to check the discrete condition of these endpoints that are trying to access my internal network. We created some conditional access. We have CrowdStrike, to check if the CrowdStrike is installed, to check if it's updated, and to check for Windows updates. We created some conditional policies to check it."
"McAfee is more user friendly than Symantec."
"The interface and administration are important because the data protection capabilities are already there, and the administration and the interface make it accessible and easy to use."
"This solution has a rich set of policies."
"The initial setup process was easy."
"There are some good protection features here such as prohibiting people from taking screenshots or taking data that is copied on their external devices."
"The DLP is a very versatile product, a lot of problems get addressed, there are good patches, it is continuously updated, pretty straightforward to set up, largely stable, can scale as needed, and the pricing is good and quite competitive."
"The most valuable feature is strong data leak prevention for data protection."
"Offers some good protection features."
"It has some good data security and WIP features, providing secure Internet access."
"I find all Zscaler Private Access features valuable because each replaces flawed technologies, such as EPAs being replacements for VPN and PR as a replacement for PAM, so I can't mention only one valuable feature. Overall, Zscaler Private Access is a good solution."
"The only advantage I see is no more connection is required by the users."
"Zscaler's technical support is quite good."
"It is a stable solution."
"On DLP terms, Zscaler Cloud DLP ensures that data doesn't go outside of the organization. So on the network level, Zscaler does a pretty good job."
"The most valuable feature of Zscaler Private Access is the categorization of the dynamic URLs which keeps the customer's environment protected. The threats and the malware are correctly categorized."
"The solution is cloud-based with the latest inspection engines, which I find to be amazing."
 

Cons

"The software has automated alerts, but the automated alerts are not available in the mobile app."
"Cloudflare Zero Trust Platform needs to improve its documentation. It took time to do the implementation."
"Cloudflare DDoS has poor technical support."
"Our subscription plan for the solution has a limitation of bot signatures."
"The pricing is an area that can be improved. Pricing, as far as I recall, was the source of our problems."
"The onboarding process can be improved a little bit."
"They don't have a person to provide support for customers using the solution under their free plan."
"Lacks a VPN feature to provide a secure connection to the data center."
"The pricing seems expensive both for the license and the support."
"The product uses a lot of resources and because of this it is not always a good solution for every situation."
"The product is difficult to use. I don't like the McAfee product and have had a negative user experience."
"The interface can be improved, it's too cluttered."
"The interface can be improved, it's too cluttered."
"The product fails to offer automatic classification capabilities to its users."
"The solution needs to be a one-stop protection shop. And yet, the DLP isn't strong. Anyone can break it quite easily."
"When this solution is used it requires a lot of administration because the users can have difficulties using it and require assistance. The administrators are continuously modifying the policies for the users. Technical support will be used frequently."
"The pre-defined dictionaries could be improved."
"The only issue with Zscaler Cloud DLP is that it only gives you DLP protection from web traffic, which is flowing out, while a full-blown DLP solution such as Forcepoint or Symantec gives you DLP coverage for multiple channels."
"It's an expensive solution."
"Having a Zscaler-specific device could streamline this process and provide a more consistent user experience across diverse branches."
"Zscaler Private Access could improve by improving external access. If external parties want to access locally to my company's services, we need to onboard them into our domain, otherwise, it doesn't work. Additionally, if their company also has Zscaler Private Access, then it doesn't work. They need to log in with our domain ID, not their company ID."
"The pricing is expensive and on the higher end. Honestly, in my opinion, it is not worth the price."
"Conflicts arise if you do not have the same management teams on the product."
"There are latency issues with the solution. They are small, however, they are there when you compare it to other vendors."
 

Pricing and Cost Advice

"The solution's pricing lacks transparency."
"The pricing is somewhere in the middle. I would rate the pricing a seven out of ten."
"The solution is not that expensive."
"My company has to make yearly payments towards the licensing costs attached to the solution. There are no hidden charges apart from the licensing costs of the solution."
"The prices are slightly expensive."
"Cloudflare Zero Trust Platform's pricing is good."
"The price tag is no longer $200,000, but rather $300,000 to $400,000. It's twice."
"The pricing of the solution is cheap. The licensing cost is also very low. I rate the cost and pricing a three out of ten."
"The price of the solution could improve, it is expensive. We typically sell one and three-year licenses."
"The price of the solution could improve."
"I'm paying the license for McAfee Total Protection yearly. It could be cheaper, but it's fine."
"McAfee Total Protection for Data Loss Prevention is expensive."
"McAfee Total Protection for Data Loss Prevention is an expensive solution."
"The price of McAfee Total Protection for Data Loss Prevention is expensive. It is not the most expensive solution but it is typically 15 to 20 percent higher than other solutions. There is no additional cost to using McAfee Total Protection for Data Loss Prevention."
"The price is high for this type of product."
"I would rate the solution's pricing a six out of ten."
"In the long run, cloud services are not inherently costly."
"It has been relatively reasonable for what it does. Some of the additional license costs based on the advanced next-generation firewall functions are quite high, and they should have certain features ready and available as a baseline rather than having to purchase additional licenses for it. Overall, the cost seems reasonable."
"Zscaler DLP solution is expensive, with a fixed pricing structure that is billed annually and monthly. There are no additional costs for licenses."
"In terms of market positioning, I would describe Zscaler Private Access as offering optimal pricing. Based on our experience, Cato Networks tends to be slightly more expensive."
"Zscaler Private Access can be an expensive solution, depending on the license type you will purchase."
"Zscaler SASE software is quite expensive compared to other solutions"
"The product has reasonable pricing."
"The pricing is quite high, especially when it comes to the gateway."
report
Use our free recommendation engine to learn which Data Loss Prevention (DLP) solutions are best for your needs.
893,311 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Construction Company
20%
Comms Service Provider
11%
Financial Services Firm
8%
Manufacturing Company
6%
Construction Company
10%
Financial Services Firm
9%
Comms Service Provider
9%
Manufacturing Company
8%
Financial Services Firm
12%
Manufacturing Company
10%
Computer Software Company
9%
Insurance Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business10
Midsize Enterprise1
Large Enterprise12
By reviewers
Company SizeCount
Small Business18
Midsize Enterprise3
Large Enterprise9
By reviewers
Company SizeCount
Small Business16
Midsize Enterprise12
Large Enterprise45
 

Questions from the Community

What needs improvement with Cloudflare Access?
Cloudflare Access has strong integration with Microsoft, among other platforms. However, when it comes to Kaspersky, ...
What is your primary use case for Cloudflare Access?
Cloudflare Access provides secure access to internal applications for employees, external members of the organization...
What advice do you have for others considering Cloudflare Access?
Cloudflare Access is one of the best integrations available. While about two hundred vendors offer similar services, ...
What is your experience regarding pricing and costs for McAfee Total Protection for Data Loss Prevention?
I rate the pricing for McAfee as competitive compared to other companies; they are in the same range, not a cheap pro...
What needs improvement with McAfee Total Protection for Data Loss Prevention?
Sometimes there are some issues in the product itself; whenever they release a new version, vulnerabilities come into...
What is your primary use case for McAfee Total Protection for Data Loss Prevention?
We are working with McAfee Total Protection for Data Loss Prevention and Trellix products in our environment, but not...
What is the better solution - Prisma Access or Zscaler Private Access?
We looked into Prisma Access before choosing Zscaler Private Access (ZPA). Palo Alto’s Prisma Access is a secure ac...
What needs improvement with Zscaler SASE?
The solution needs to improve a lot of aspects.
What is your primary use case for Zscaler SASE?
We are using Zscaler Zero Trust Exchange for its Zscaler Internet Access service. It provides web security, DLP, data...
 

Also Known As

Cloudflare Area 1 Email Security, Cloudflare Bot Management, Cloudflare Gateway, Cloudflare Zero Trust Platform, Cloudflare DDoS, Cloudflare SASE & SSE Platform
McAfee Total Protection for Data, McAfee Total Protection for DLP, Total Protection for Data, Intel Security Total Protection for Data
Zscaler SASE, Zscaler DLP, Zscaler CASB, Zscaler CSPM, Zscaler Browser Isolation, Zscaler Posture Control
 

Overview

 

Sample Customers

23andMe
Kleberg Bank
Siemens, AutoNation, GE, NOV
Find out what your peers are saying about McAfee Total Protection for Data Loss Prevention vs. Zscaler Zero Trust Exchange Platform and other solutions. Updated: April 2026.
893,311 professionals have used our research since 2012.