Listing Thumbnail

    Zscaler Private Access Service Edge

     Info
    The ZPA Private Service Edges are brokers that are a single-tenant instance that provide the functionality of a ZPA Public Service Edge in an organization's environment. Your organization hosts them either within your site or on a cloud service, but Zscaler manages them. On the other hand, ZPA Public Service Edges are deployed in Zscaler data centers around the world. As with a ZPA Public Service Edge, a ZPA Private Service Edge manages the connections between Zscaler Client Connector and App Connectors. It registers with the ZPA Cloud. This allows a ZPA Private Service Edge to download the relevant policies and configurations so it can enforce all ZPA policies. It also caches path selection decisions. ZPA Private Service Edges can be deployed in several forms. Zscaler distributes images for deployment in enterprise data centers and local private cloud environments such as VMware.
    Listing Thumbnail

    Zscaler Private Access Service Edge

     Info

    Overview

    Play video

    A key component of the Zscaler cloud, Service Edges are full-featured secure internet gateways that provide integrated internet security.

    ZPA Private Service Edges provide the following benefits and enable you to:

    Implement Zero Trust Network Access (ZTNA) for on-premises users. Securely access applications when ZPA Public Service Edges in data centers are not conveniently located between users and the applications they need to reach.

    Ensure business continuity and continued access to critical apps during disaster events.

    Keep application data traffic local to help meet compliance and regulatory requirements.

    Service Edges can be public or private. ZPA Public Service Edges, addressed here, are deployed in Zscaler data centers around the world and can handle hundreds of thousands of concurrent users with millions of concurrent sessions. So, regardless of where your users are physically located, they can access their internal applications from any device. ZPA Public Service Edges enforce access and reauthentication policies based on your organization's corporate best practices. For any given Microtunnel (M-Tunnel), the Control Service Edge is the ZPA Public Service Edge that handles cloud-level system messages to establish the M-Tunnel. ZPA Private Service Edges are fully functional single-tenant brokers that reside within your site or other locations, like cloud services.

    Both Zscaler Internet Access (ZIA) and ZPA have Service Edges. The fundamental difference between a Service Edge used for ZIA and one used for ZPA is that:

    In ZIA, the Service Edge inspects the data as traffic flows through it. In ZPA, the Service Edge does not inspect the data as traffic flows through it. All Service Edges have significant fault tolerance capabilities. They are deployed in active-active mode to ensure availability and redundancy, and Zscaler monitors and maintains its Service Edges to ensure continuous availability.

    User traffic is not passed to any other component within the Zscaler infrastructure, and Service Edges never store any data to disk. Packet data is held in memory for inspection, and is either forwarded or dropped based on policy. Log data generated for every transaction is compressed, tokenized, and exported over secure TLS connections to log routers.

    For ZPA Public Service Edges, the log routers direct the information to the Log Streaming Service (LSS), hosted in the appropriate geographical region for each organization.

    Highlights

    • The ZPA Central Authority (CA) can be thought of as the "brain and nervous system" of the ZPA cloud. It monitors the cloud and provides a central location for software and database updates, as well as policy and configuration settings.
    • The ZPA Admin Portal is the central point of control for the entire system. This interface enables organizations to configure system elements, including applications, servers, and policies, and provides analytics dashboards for visibility into the system as a whole.
    • All Service Edges have significant fault tolerance capabilities. They are deployed in active-active mode to ensure availability and redundancy, and Zscaler monitors and maintains its Service Edges to ensure continuous availability.

    Details

    Delivery method

    Delivery option
    64-bit (x86) Amazon Machine Image (AMI)

    Latest version

    Operating system
    Rhel 9

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Zscaler Private Access Service Edge

     Info
    Pricing and entitlements for this product are managed outside of AWS Marketplace through an external billing relationship between you and the vendor. You activate the product by supplying an existing license purchased outside of AWS Marketplace, while AWS provides the infrastructure required to launch the product. Subscriptions have no end date and may be cancelled any time. However, the cancellation won't affect the status of an active license if it was purchased outside of AWS Marketplace.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    Additional AWS infrastructure costs

    Type
    Cost
    EBS General Purpose SSD (gp3) volumes
    $0.08/per GB/month of provisioned storage

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    64-bit (x86) Amazon Machine Image (AMI)

    Amazon Machine Image (AMI)

    An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.

    Version release notes

    Additional details

    Usage instructions

    In order to acquire a license key for this product, please contact us via our web form here: https://www.zscaler.com/company/contact .

    Once complete, you may access the User Interface of the Zscaler Cloud Portal by accessing this link here: https://admin.zscaler.net/ . If not completed prior, you will be promoted to create an Admin account for your Zscaler Cloud Portal.

    Utilizing the login you created, you may now utilize the Zscaler Cloud Portal to access your Zscaler management console where you will be able to manage and deploy new products on AWS, or other locations.

    For ZPA Private Serive Edge AWS Deployment see the below:

    Update the Security Group associated to the App Connector to temporarily allow inbound access on port 22, then complete the following steps to connect to the instance.

    SSH access is required in order to configure the provisioning key for the App Connector. See instructions: https://help.zscaler.com/zpa/private-service-edge-deployment-guide-amazon-web-services 

    Log in to the App Connector console using your AWS Private Key (i.e., a .pem file).

    SSH access is enabled by default on AWS App Connectors, so there is no need to enable the service manually.

    Using a standard SSH client, enter the following command to connect to the AWS instance: ssh -i <AWS Private Key> admin@<App Connector Public Hostname or IP Address>

    For example, the private key for the AWS instance is AWS.pem and the ZPA Private Service Edge IP address is 35.160.130.25: ssh -i AWS.pem admin@35.160.130.25

    Support

    Vendor support

    Zscaler global support is available around the clock, with dedicated customer support engineers providing personalized assistance to ensure that customers are getting the most value from our products. Our support engineers have significant experience in networking and security, working closely with operations, sales, and engineering teams to ensure rapid response and resolution.

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Similar products

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 AWS reviews
    |
    48 external reviews
    External reviews are sourced from G2  and are not included in the star rating for this product.
    Sohail T.

    Great network security product

    Reviewed on Aug 21, 2024
    Review provided by G2
    What do you like best about the product?
    Its easy to use for end user and scalable solution than other VPNs.
    What do you dislike about the product?
    Its little difficult to troubleshout as reuquired to check diffirent aspects in diffirent enciornments.
    What problems is the product solving and how is that benefiting you?
    With cisco anyconnect it was required more administration and time to check the issues with user but with ZPA its less administration and quicly scalable.
    Athimoolam A.

    I have been working with ZPA almost one year, we are migrating Cisco Any connect VPN to ZPA services

    Reviewed on Aug 20, 2024
    Review provided by G2
    What do you like best about the product?
    zero trust priciples and it provides application level access not network level access like other legacy vpn solution
    What do you dislike about the product?
    cisco Jabber support is really requird via ZPA and we need more changes via ZPA CLI
    What problems is the product solving and how is that benefiting you?
    its providing access based on user not network level access
    Joris K.

    Zscaler is a very good tool, but has a learning curf

    Reviewed on May 13, 2024
    Review provided by G2
    What do you like best about the product?
    I like the possibilties Zscaler has to offer. Whenever you are used to the portal and know your way around you can configure literelly anything you can think of.
    What do you dislike about the product?
    The Zscaler support is bad. We had to contact them for multiple cases, but they never came with a good solution and till now we always figured it out ourselves.
    What problems is the product solving and how is that benefiting you?
    It allows us set posture checks for devices and if they are compliant and an authorized user is signed in the user can get acces to internal resources.
    Financial Services

    Great security tool

    Reviewed on Mar 20, 2024
    Review provided by G2
    What do you like best about the product?
    Provides security to the internal tools of the organisation. Bars unauthorised access of individuals or organization. It has many authentication features which helps in protection of data and tools.
    What do you dislike about the product?
    It is a bit time taking , apart from that it requires a good connection. Apart from that it works fine.
    What problems is the product solving and how is that benefiting you?
    It helps in providing security to the network connections and other data. It helps in replacing VPN and barring unauthorised access to the organization's data making the data secure and safe from threats and malware.
    Bhanu Pratap S.

    My remarkable experience with Zscaler Private Access.

    Reviewed on Feb 01, 2024
    Review provided by G2
    What do you like best about the product?
    It enables fast and secure access and control to private applications.It protects our organization sensitive data from security threats.It ensures that only authenticated user's can have access to authorized applications.
    What do you dislike about the product?
    I got no disregards for this tool as it suits all my needs.
    What problems is the product solving and how is that benefiting you?
    It helps to improve or rather elevate our organization security posture.It helps to streamline and simplify all our IT operations.It is reliable tool for threat protection.
    View all reviews