Find answers to key questions about Zscaler products and solutions, with concise insights into our innovative approaches to cloud security, zero trust, and more.

 

This FAQ is up to date as of July 2025.

Products

Cyberthreat Protection

Zscaler Cyberthreat Protection safeguards against advanced malware, ransomware, phishing, and zero-day attacks. It uses AI-driven threat detection, real-time traffic inspection, and sandboxing to identify and block malicious activity. Integrated threat intelligence and behavioral analysis power proactive defense to keep users, applications, and data secure across all environments.

The Zscaler platform protects against ransomware and phishing by using AI-powered threat detection, real-time traffic inspection, and advanced URL filtering to block malicious links, email-based attacks, and ransomware payloads before they reach users. It also employs sandboxing and behavioral analysis to detect and mitigate emerging threats.

Zscaler Advanced Threat Protection is a cloud-delivered solution that protects against sophisticated cyberthreats, including malware, ransomware, phishing, and zero-day attacks. It uses AI-driven threat detection, sandboxing, real-time traffic analysis, and other advanced techniques to identify and block malicious activity, ensuring holistic security across users, devices, and applications.

Zscaler ThreatLabz is a global team of security experts, researchers, and engineers dedicated to hunting threats, analyzing the global threat landscape, and developing advanced protection features. ThreatLabz safeguards thousands of organizations with ongoing threat research and behavioral analysis, research, and development of new prototype modules for advanced threat protection. The team also conducts security audits and shares research with the industry to promote a safer internet.

Zscaler Cyberthreat Protection integrates seamlessly via API and is interoperable with leading SIEM, SOAR, EDR, and identity solutions. This enables organizations to enhance their security posture without disrupting operations, ensuring consistent threat detection, streamlined workflows, and unified policy enforcement across both new and legacy security environments.

Zscaler Zero Trust Exchange (ZTE)

The Zscaler Zero Trust Exchange is a cloud native platform that delivers a zero trust architecture as a service. It acts as an intelligent switchboard to provide secure any-to-any communications, delivering zero trust for customers’ workforces, branches, and clouds. The Zero Trust Exchange governs access to IT resources based on context and risk, and enforces the principle of least-privileged access. Learn more about the Zscaler Zero Trust Exchange.

Unlike perimeter-based architectures built with VPNs and firewalls, the Zscaler Zero Trust Exchange decouples security and connectivity from the network. It extends access directly to IT resources based on business policy, without extending the network to anyone or anything. This approach minimizes the attack surface by eliminating public IPs, stops compromise through full encrypted traffic inspection at scale, prevents lateral movement through direct-to-app access, and blocks data loss across all data leakage channels. Learn more about the platform.

The Zscaler Zero Trust Exchange integrates seamlessly with security and business solutions from leading providers like CrowdStrike, Okta, AWS, and Microsoft. It supports identity federation and single sign-on to enhance access controls and user management, and it complements endpoint detection and response for end-to-end zero trust security. Zscaler also supports secure access to business-critical ERP apps such as SAP and can optimize collaboration platforms such as Zoom.

Yes, Zscaler’s cloud native Zero Trust Exchange platform can provide secure remote access without a VPN. The platform connects authorized users and other entities directly to applications based on context and risk, offering granular access controls without backhauling traffic or extending network access. This eliminates both the latency and the risk associated with VPNs and network-centric architectures. Learn more about Secure Remote Access.

The Zscaler Zero Trust Exchange reduces business risk through a zero trust architecture that overcomes the vulnerabilities of perimeter-based architectures built with firewalls and VPNs. The platform eliminates the cost and complexity of legacy networking and security point products through an easy-to-manage, cloud-delivered architecture. It enhances business agility by improving user productivity and empowering organizations to securely embrace digital transformation. Learn more about the platform.

Zscaler Internet Access (ZIA)

Zscaler Internet Access is the world’s most deployed security service edge (SSE) solution, delivering fast, secure internet access by routing all user traffic through the Zscaler Zero Trust Exchange. It inspects traffic for threats, enforces security policies, and prevents data loss, ensuring safe access to the internet and applications without traditional network appliances. Learn more about ZIA.

Zscaler Internet Access (ZIA) differs from traditional secure web gateways by providing AI-powered protection from the world’s largest security cloud: as a fully cloud native solution built on a zero trust architecture, ZIA provides inline inspection of all internet and SaaS traffic. Unlike legacy network appliances, ZIA scales globally to inspect all user traffic, securing access to the internet and applications without backhauling traffic through data centers. It simplifies management and provides faster, more comprehensive protection. Learn more about ZIA.

Zscaler Internet Access performs full TLS/SSL traffic inspection at scale to detect hidden threats without hindering performance. It protects data privacy with flexible policies, encryption at scale, and role-based access controls. Sensitive data is never stored, ensuring compliance with privacy regulations. ZIA’s cloud native architecture enables efficient traffic inspection without impacting the user experience. Learn more about ZIA.

Zscaler Internet Access (ZIA) prevents data loss through advanced data loss prevention (DLP) capabilities that inspect all user traffic in real time, including encrypted traffic. It identifies sensitive data, enforces compliance policies, and blocks unauthorized sharing or transfers to unauthorized destinations. Its cloud native architecture ensures seamless protection without impacting performance. Learn more about ZIA.

Zscaler Internet Access (ZIA) protects against a wide range of threats, including malware, ransomware, phishing, advanced persistent threats (APTs), and zero-day attacks. It inspects all traffic, including TLS/SSL-encrypted data, in real time to block malicious content. Its threat intelligence and sandboxing capabilities ensure proactive defense against evolving threats. Learn more about ZIA.

Zscaler Private Access (ZPA)

Zscaler Private Access (ZPA) is a zero trust network access (ZTNA) solution that securely connects users to private applications based on identity and context, without exposing the applications to the internet. ZPA eliminates the need for VPNs, reduces the attack surface, improves user experience, and simplifies networking and access management for IT teams. Learn more about ZPA.

Zscaler Private Access (ZPA) implements zero trust network access (ZTNA) by connecting users directly to private applications based on identity and business policies, without placing the users on the network. Applications are hidden behind the Zscaler Zero Trust Exchange platform, making them invisible to the internet. Inside-out connections between authenticated users and authorized apps ensures IPs are never exposed. Learn more about ZPA.

Zscaler Private Access (ZPA) replaces VPNs by securely connecting users to private applications through a unique cloud native zero trust architecture. Its identity-based zero trust approach simplifies IT management while delivering faster, more secure remote access. Learn more about ZPA.

Zscaler Private Access (ZPA) securely connects users to applications without exposing the network, making it a compelling VPN alternative. ZPA is purpose-built on zero trust principles to address the security and operational weaknesses of VPNs, providing a more secure and user-friendly solution for modern enterprises. Unlike VPNs, ZPA eliminates backhauling, reduces latency, prevents lateral movement, and scales globally. Learn more about ZPA.

The difference between Zscaler Private Access (ZPA) and Zscaler Internet Access (ZIA) is that ZPA provides secure, zero trust access to private applications without VPNs, while ZIA secures access to internet and SaaS applications by inspecting traffic for threats and enforcing policies. Together, they deliver holistic, secure zero trust access for users and applications anywhere.

Data Security

Zscaler Data Security provides comprehensive data loss prevention across inline traffic, cloud environments, and endpoints. Using advanced AI-driven classification techniques and a unified policy, it seamlessly protects against risks posed by generative AI, accidental user behaviors, and malicious data exfiltration. Learn more.

Zscaler ensures compliance with data privacy regulations like GDPR by providing real-time data security, including advanced DLP. It enforces policies to prevent unauthorized data access or transfers, offers detailed logging and reporting for audit readiness, and ensures user privacy by analyzing traffic without storing sensitive data. Learn more about GDPR compliance.

Zscaler DLP offers real-time inspection of all traffic, across all SSL, to prevent data loss. It uses content-aware policies to identify and secure sensitive data, block unauthorized sharing or transfers, and ensure compliance with regulatory requirements. Our cloud native zero trust architecture enables scalable, efficient, and seamless data security. Learn more about Zscaler DLP.

Zscaler provides advanced protection for cloud apps and generative AI through inline, real-time inspection, including TLS/SSL traffic. Granular policy controls offer complete visibility and control over shadow IT and access. For data at rest within SaaS and IaaS environments, Zscaler utilizes APIs to identify and mitigate risks such as improper sharing, data exfiltration, and misconfigurations, ensuring comprehensive posture management. Learn more.

Zscaler Data Security enforces flexible, content-aware policies that prioritize sensitive data protection and regulatory compliance across all data channels, in any location. Organizations can tailor policies based on user roles, data types, and business workflows. The platform’s cloud native design allows for adaptability and scalability to meet unique security requirements. Learn more.

Cloud Security & SSE (Security Service Edge)

Zscaler's security service edge (SSE) platform is a cloud native solution that provides secure access to apps and data while protecting against cyberthreats. Through a unique, scalable zero trust architecture, it delivers consistent secure internet access, private application access, and advanced data protection across users, devices, and locations. Learn more about Zscaler SSE.

Zscaler integrates SWG, CASB, and ZTNA into a cloud native SSE platform, enabling seamless security across internet, SaaS, and private application access. This unified approach simplifies management, enhances scalability, and ensures consistent policy enforcement, providing organizations with an efficient and comprehensive security solution. Learn more about Zscaler SSE.

Zscaler offers a comprehensive, cloud native SSE platform that integrates core security capabilities such as SWG, CASB, ZTNA, and FWaaS with digital experience management (DEM) to help maintain performance in the environment. With scalable architecture and unified policy enforcement, Zscaler ensures secure and seamless access to applications and data, and is consistently recognized as a leader in the security service edge market. Learn more about Zscaler SSE.

SSE, as defined by Gartner, ensures that authorized users have secure identity- and policy-driven access to approved internet, SaaS, and private applications. Zscaler takes this concept further with Zero Trust Everywhere, enabling customers to extend the benefits of SSE and unify security across users, branches, and clouds.

Zscaler protects SaaS applications and cloud workloads through the Zero Trust Exchange platform, which secures access, inspects data in real time, and prevents lateral movement. By enforcing policies to block threats and unauthorized access while safeguarding sensitive information, it delivers comprehensive security across multicloud and SaaS environments. Learn more.

Performance & Architecture

Traffic is routed through the Zscaler cloud using methods like the Zscaler Client Connector agent, PAC files, and GRE/IPsec/DTLS tunnels. These techniques ensure secure connectivity by directing user traffic through Zscaler Service Edges for security policy enforcement. Zscaler also supports bypass options for specific applications when necessary.

Zscaler Client Connector is a lightweight endpoint agent that connects devices to the Zscaler Zero Trust Exchange platform. It ensures seamless security by routing traffic through Zscaler for inspection, enforcing policies, and securing access to web and private apps. Operating across devices, it provides consistent protection without the need for VPNs or complex configurations.

Zscaler operates more than 160 data centers globally, strategically located across major regions to deliver low-latency connections and seamless scalability. These data centers form the backbone of the Zscaler Zero Trust Exchange, ensuring fast, secure access for users regardless of location and enabling consistent security enforcement around the world. See the Zscaler data center map.

Zscaler ensures low latency through its globally distributed, AI-powered platform, routing user traffic to the nearest data center for fast connections. Peering with hundreds of partners at major internet exchanges reduces the distance to applications, providing optimal performance, scalability, and reliable, high-speed access for users around the globe.

Zscaler solutions are cloud-first and available in popular public cloud and GovCloud environments. For organizations that need flexibility to deploy in local data centers for regulatory compliance or other reasons, solutions are available in suitable form factors.

Solutions

Zero Trust Users: Secure the Extended Digital Workforce

Effectively securing a hybrid or remote workforce starts with the cloud native Zscaler for Users, which provides secure, identity-based access to applications without the need for VPNs. Zscaler ensures consistent security by inspecting all traffic, blocking threats, and enforcing policies, enabling fast and seamless access for users in any location, on any device. Learn more.

The most effective protection for remote employees is Zscaler for Users, which provides secure, identity-based access to applications without relying on VPNs. By inspecting all traffic in real time, enforcing granular security policies, and blocking threats, Zscaler ensures seamless and secure experiences for remote employees anywhere. Learn more.

Zero trust helps secure remote users by ensuring identity-based access to applications, eliminating network exposure. Zscaler verifies user and device trust continuously, blocks lateral movement, and inspects all traffic for threats. This approach provides secure, direct connections to resources, enhancing security while delivering a seamless experience for remote users. Learn more.

VPNs are insufficient for remote work security because they grant overly broad network access, increasing risk from cyberattacks and lateral movement. They backhaul traffic, causing latency and a poor user experience. Unlike modern zero trust solutions like Zscaler, VPNs lack granular controls and fail to protect against advanced threats in hybrid work environments. Learn more.

Private applications are the heart of your operations, but granting inherent trust to local users increases risk due to overprivileged access. To limit risk, it's crucial to enforce least-privileged access for all users, including those in the office or on-premises. The most secure, scalable option for a distributed enterprise is a cloud-based zero trust network access (ZTNA) solution.

Zero Trust Branch: Modernize Branches and Factories

Securely modernize branch office connectivity with the Zscaler Zero Trust Exchange platform, replacing legacy MPLS, SD-WAN, and VPN solutions with direct, secure internet and cloud app access. Zscaler delivers integrated security, optimized performance, and policy enforcement from the cloud, ensuring seamless connectivity while reducing costs and lateral movement risk for branch locations.

The difference between SD-WAN and MPLS for factory networks lies in flexibility and cost efficiency. SD-WAN enables direct internet access, optimized cloud connectivity, and centralized management, reducing costs and complexity. MPLS, meanwhile, is expensive and less adaptable. SD-WAN is better suited for modern factories needing scalable, secure, and agile connectivity.

Secure IoT and OT devices in smart factories with a zero trust approach. Zscaler OT/IoT Segmentation isolates devices, prevents lateral movement, and enforces granular policies. Built on a cloud native platform, it continuously monitors traffic for threats and delivers secure access to apps, protecting critical systems while reducing risk and ensuring operational continuity.

The most effective security model for distributed branch networks is a zero trust approach with the Zscaler Zero Trust Exchange. It replaces legacy hub-and-spoke architectures by securing direct internet and cloud access with integrated threat protection and policy enforcement. The Zscaler platform reduces costs, simplifies operations, and enhances performance across branch locations. Learn more.

The secure access service edge (SASE) framework is important for modern factories as it integrates networking and security into a cloud-delivered model, enabling secure and efficient connectivity for IoT and OT devices. SASE enables factories and distributed environments to reduce their attack surfaces, enforce consistent zero trust policies, and ensure operational resilience.

Zero Trust Cloud: Accelerate Multi-Cloud Adoption

The safest way to adopt a multi-cloud strategy is to implement a zero trust architecture that controls access and protects workloads across all environments. Using a solution such as Zscaler to enforce workload identity-based policies, isolate applications, and inspect traffic in real time ensures secure communication and consistent policy enforcement across multi-cloud deployments.

Traditional firewalls establish broad network-level trust, which inherently facilitates lateral movement of threats. A zero trust architecture eliminates this risk by never exposing workload IP addresses, rendering them undiscoverable and effectively isolating them from unauthorized access.

Secure traffic between AWS, Azure, and GCP by implementing zero trust workload segmentation. The Zscaler platform isolates workloads, enforces identity-based policies, and inspects all inter-cloud traffic to prevent unauthorized access and lateral movement. This ensures secure communication across multicloud environments while maintaining application performance and scalability.

Workload segmentation is important in the cloud because isolation prevents lateral movement and reduces the “blast radius” of threats. Zscaler microsegmentation enforces identity-based policies that restrict workload communication to only what’s necessary. This reduces attack surfaces, strengthens security, and ensures compliance, all while simplifying management in dynamic, distributed clouds.

The safest way to simplify multi-cloud security management is with a unified platform that enforces consistent policies, monitors traffic, and secures workloads across all cloud environments. Solutions such as Zscaler Zero Trust Cloud integrate zero trust principles, providing centralized visibility and control while reducing complexity and ensuring robust security for multi-cloud strategies.

Zero Trust AI Security: Securely Embrace AI

Enterprises can secure the adoption of public AI tools like ChatGPT and Microsoft Copilot with Zscaler GenAI Security for full visibility, granular control, and robust data protection for sanctioned and shadow AI tools. With Zscaler, enterprises reduce compliance risks, prevent AI data breaches, and focus on realizing the full potential of AI productivity.

Generative AI introduces multiple security risks at work, including shadow AI (use of unsanctioned tools), and creates compliance and security risks due to unclear data-handling practices. Without proper controls, sensitive or proprietary data shared with AI tools is often irretrievable, exposing organizations to permanent data leaks and regulatory breaches. These risks highlight the critical need for stronger safeguards to protect data and ensure compliance. Learn more.

Monitor and control AI app usage with cloud security controls that show all AI applications in use, prompts, and AI usage trends. Zscaler tracks hundreds of key AI applications and adds dozens more each month, ensuring comprehensive and up-to-date coverage—all delivered out of the box for seamless AI visibility.

AI governance ensures AI systems are used securely and ethically across an enterprise. It is critical to prevent data mishandling, comply with regulatory requirements, and mitigate security risks. Effective AI governance protects sensitive information and avoids penalties while enabling responsible AI adoption across systems where AI operates.

Protect sensitive data from AI misuse by implementing robust access controls, real-time traffic inspection, and advanced data loss prevention (DLP) measures. Monitoring AI interactions for unauthorized data sharing, malicious/sensitive prompts, and toxic content ensures compliance, mitigates risks, and safeguards sensitive information when adopting and using AI solutions. Learn more.

Unified Data Security

The difference between DLP and CASB is in their focus areas. DLP prevents unauthorized sharing of sensitive data across devices and networks, while CASB secures cloud application usage with access controls and threat protection. Integrated platforms such as Zscaler combine both to offer comprehensive data security and cloud security.

Prevent data loss across cloud apps and devices with advanced data loss prevention (DLP) technologies that inspect traffic, monitor user activity, and enforce granular security policies. These tools identify and block unauthorized sharing of sensitive information. Solutions such as Zscaler provide real-time protection to secure data and ensure regulatory compliance

Protect sensitive data in SaaS applications with advanced data loss prevention (DLP), real-time traffic inspection, and granular access controls. Solutions such as Zscaler SaaS Security Posture Management (SSPM) monitor data flows, detect unauthorized sharing, and enforce compliance policies, ensuring the secure adoption and use of enterprise SaaS platforms.

Detect shadow IT and unsanctioned apps by using tools that offer deep visibility into network traffic, application usage, and web activity. These solutions identify unauthorized applications and assess associated risks in real time. Platforms such as Zscaler can help enforce policies, block risky apps, and ensure compliance across your organization. Learn more about managing shadow IT.

Consistently enforce data protection policies with a centralized security platform that monitors traffic, applies uniform rules across users, devices, and locations, and blocks unauthorized data sharing. A solution like the Zscaler platform integrates real-time traffic inspection with policy enforcement, enabling organizations to protect sensitive data and stay compliant across diverse environments.

Modernized Security Operations

Zscaler helps reduce SecOps workload by pulling together data from all of an organization’s security tools, grouping related issues, prioritizing those that need to be fixed first, and enabling real-time responses through its AI-driven platform. It consolidates key security functions, streamlines workflows, and reduces manual intervention, allowing teams to focus on critical tasks. With centralized visibility and reporting, Zscaler simplifies security operations in complex environments.

By deduplicating and unifying asset data from all sources, Zscaler helps organizations create a comprehensive, accurate “golden record” asset inventory. This visibility makes it possible to quickly identify insecure assets, enforce consistent security and compliance policies, and proactively close security gaps until all assets meet required standards.

By consolidating exposures from all security tools and prioritizing them based on business context, active exploitability, and existing security controls, the Zscaler Security Operations portfolio helps organizations gain clarity on real risks. Automated workflows enable efficient remediation, reducing critical findings by up to 80% while significantly accelerating remediation of genuine business risks.

The Zscaler Data Fabric for Security connects disparate tools to uncover threats other solutions miss. By aggregating and correlating data from Zscaler and 150+ third-party sources, it helps organizations harmonize information across their entire environment and reduce the “noise” of isolated tools. Asset exposure, vulnerability insights, and real-time risk data are automatically combined into a comprehensive view, giving teams immediate, actionable, context-rich insights to act fast, close security gaps, and stay protected without relying on manually updated BI tools or homegrown data lakes.

Traditional security operations (SecOps) approaches fall short due to fragmented data, lack of contextual insights, and ineffective prioritization of critical vulnerabilities. Combining proactive vulnerability management with real-time threat response delivers a unified, risk-based approach that reduces cyber risk and increases ROI. According to Gartner, “By 2028, organizations enriching SOC data with exposure information will enhance threat evaluation and accelerate incident response, reducing the frequency and impact of cyberattacks by 50%.”