We performed a comparison between CyberArk Privileged Access Manager and Zscaler Internet Access based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."It is a robust product."
"We are utilizing CyberArk to secure applications, credentials, and endpoints."
"Increased our insight into how privileged accounts are being used and distributed within our footprint."
"On the EBB user side, we were able to secure all the server root passwords and admin for Windows. This was a big win for us."
"All access to our servers by both staff and vendors is monitored and recorded."
"AIM has been a great help in automating password retrieval which removes the need for hard-coded credentials."
"Within the solution, I love the fact that everything is recorded. The configuration capabilities are great, too."
"It improves security in our company. We have more than 10,000 accounts that we manage in CyberArk. We use these accounts for SQLs, Windows Server, and Unix. Therefore, keeping these passwords up-to-date in another solution or software would be impossible. Now, we have some sort of a platform to manage passwords, distribute the inflow, and manage IT teams as well as making regular changes to it according to the internal security policies in our bank."
"The users are at different locations, and Zscaler helps us to put the organization's central security controls on these roaming users."
"The most valuable feature of the solution is SWG traffic."
"One on the main benefits is protection all time from anywhere."
"We enjoy all of the proxy capabilities and the capability to integrate into the SIEM/SOC solution."
"Zscaler covers all the features needed to replace a VPN or proxy solution. They are good. They've been on the market for 15 years now, so they are mature enough."
"Zscaler Internet Access's roaming user feature is most valuable and is much better compared to other secure web gateways."
"Zscaler Web Security protects our users in remote locations from internet threats - even if they are not connected to our network."
"The most valuable features I found in Zscaler Internet Access are the restriction of users for a particular URL, the security feature related to stopping DDoS, and the VPN."
"The authentication port is available in CyberArk Alero but not Fortinet products."
"There is a learning curve when it comes to planning out the deployment strategy, but once it is defined, it runs itself."
"The PTA could be improved. Currently, companies often have multiple domains and sometimes it's difficult to implement CyberArk in this kind of infrastructure. For example, you can add CPM (Central Policy Manager) and PSM (Privileged Session Manager and PVWA (Password Vault Web Access) for access, but if you want to add PTA (Privileged Threat Analysis) to scan Vault logs, it is difficult because this component may be adding multiple domain environments."
"There is some stuff that we still have not fully integrated, which is our AIM solution. We are having all types of issues with it. I have been working with Level 3 support on it, but otherwise, from a functionality perspective, everything has been working except for the AIM solution."
"Make it easier to deploy."
"We'd like to see the creation of some kind of memo field for each device account, which could be used, in our network at least, to leave a note about the device for either the security or network engineering team members."
"It can be made user-friendly, in the sense of the console is pretty outdated."
"It is web-based, but other competitors have apps. We need to get there. It is just smoother to have an app. You don't have all the bugs from having a browser, and people like them better, since you can get to them via mobile."
"The performance needs improvement. Some areas create performance issues and, depending on the use cases, require reconfiguration to perform again."
"Technical support could be better."
"In every cloud service in the world, you have multiple upstream internet providers to create diversity so that if one of your providers fails, your network just continues. In South Africa, there is only one upstream provider, and that's not right. That that's a problem."
"Zscaler Internet Access could improve by adding a VPN feature."
"Zscaler needs to add client-to-client communication. It's always client-to-server communication. The cloud and branch connectors could be improved because we're still dependent on traditional firewalls. They should eliminate this. They should also provide WAN devices should to compete with the SD-WAN solutions also."
"It also needs better integration with other applications as well. There are some restrictions."
"We'd like for them to include some sort of antivirus tool."
"The interface for administration could be better. They should upgrade the management portal."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 144 reviews while Zscaler Internet Access is ranked 2nd in Secure Web Gateways (SWG) with 46 reviews. CyberArk Privileged Access Manager is rated 8.8, while Zscaler Internet Access is rated 8.2. The top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". On the other hand, the top reviewer of Zscaler Internet Access writes "Provides integrated CASB and file sandboxing but could be less expensive ". CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and Saviynt, whereas Zscaler Internet Access is most compared with Cisco Umbrella, Microsoft Defender for Cloud Apps, Netskope , Prisma Access by Palo Alto Networks and Skyhigh Security.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.