Plans and Pricing

Simple subscription pricing. Setup in minutes.

Fast, secure, reliable access to the internet, SaaS, and private apps.

Zscaler for Users Editions

Business

Includes:

Secure SaaS and Web Access

  • Security web gateway replacement
  • Local internet breakouts (Microsoft 365)
  • DNS resolution and filtering

Secure Private Access

  • Secure access to private apps
  • VPN replacement
  • Clientless access (browser access, RDP/SSH/VNC)
  • Segmentation for remote access
  • Threat prevention with deception

Data Protection

  • Inline web protection

Optimized Digital Experiences

  • Unified monitoring: End user experience, application, device health, network performance
  • Email alerts

Transformation

Everything in Business, plus:

Secure SaaS and Web Access

  • Advanced cyberthreat protection (DNS tunnel detection, firewall, sandbox, isolation)
  • Ransomware protection

Secure Private Access

  • Clientless access (Browser Isolation)
  • Segmentation for on-site and remote access (universal ZTNA)
  • Advanced threat prevention with decoys
  • Data and threat protection for private application traffic

Data Protection

  • Security for distributed and sensitive data
  • Improved control over cloud data
  • Regulatory compliance monitoring
  • Simplified and centralized data protection operations

Optimized Digital Experiences

  • Automated, AI-powered root cause analysis
  • Zoom call quality monitoring
  • Organization-wide device model and software deployment version review

Zscaler Internet Access (ZIA) Editions

Essentials

Start your zero trust journey with best-in-class internet and SaaS security services from the industry's most comprehensive zero trust platform.

Includes:

  • Full SSL inspection
  • Secure web gateway (SWG)
  • URL filtering
  • Cloud application visibility and control
  • Inline malware prevention
  • Local internet breakouts (Microsoft 365)
  • DNS resolution and filtering
  • Nanolog™ Streaming Service (NSS)

Business

Accelerate your transformation with innovative services to improve performance, user experience, and data security.

Everything in Essentials, plus:

  • Bandwidth control
  • Data loss prevention (DLP)
  • Cloud access security broker (CASB)
  • Standard digital experience monitoring
  • SSL Private Certificates

Transformation

Minimize impact risk of new and evasive attacks with the world's best inline zero-day and advanced threat protection.

Everything in Business, plus:

  • NSS log recovery
  • Advanced firewall and intrusion prevention systems
  • Advanced sandbox with AI-based quarantine
  • Standard CASB
  • Dynamic, risk-based policy
  • Contextual alerts
  • Cloud-to-cloud log streaming for SIEMs
  • CASB retro scan
  • Encrypted VPN
  • Extended data center access
  • Standard Zscaler Deception™
  • Standard Browser Isolation
Capabilities
Essentials
Business
Transformation
Unlimited
Platform Services
Platform Services

Content Filtering, Inline AV, SSL Inspection, Nanolog streaming

(+) SSL Private Certificate

(+) Cloud NSS, NSS Log recovery, Extended DC Access IPSec Tunnel, Contextual Alerts, ZIA Virtual Pvt Service Edge (8)

(+) Source IP Anchoring,  Test Environment,  Priority categorization, ZIA Virtual Pvt Service Edge (32) Server & IoT Protection (1 GB/10u)

Platform Services

Content Filtering, Inline AV, SSL Inspection, Nanolog streaming

(+) SSL Private Certificate

(+) Cloud NSS, NSS Log recovery, Extended DC Access IPSec Tunnel, Contextual Alerts, ZIA Virtual Pvt Service Edge (8)

(+) Source IP Anchoring,  Test Environment,  Priority categorization, ZIA Virtual Pvt Service Edge (32) Server & IoT Protection (1 GB/10u)

Threat Protection
Threat Protection

Advanced Threat Protection
(incl. AI-powered phishing & C2 detection)

Protection against known and unknown threats (URL, AV, Botnet/C2, Phishing)
Threat Protection

Advanced Threat Protection
(incl. AI-powered phishing & C2 detection)

Protection against known and unknown threats (URL, AV, Botnet/C2, Phishing)

Cloud Sandbox

Zero Day Attack prevention by analyzing suspicious files with  AI-powered quarantine

Add-on

Add-on

Cloud Sandbox

Zero Day Attack prevention by analyzing suspicious files with  AI-powered quarantine

Add-on

Add-on

Isolation - Cyber Threat Protection

Zero Day Attack protection from suspicious web content. AI-powered risk-based Isolation

Add-on

Add-on

Isolation for Cyber Protection: Std (100MB/user/mo.)

Isolation for Cyber Protection: Std (1.5GB/user/mo.)

Isolation - Cyber Threat Protection

Zero Day Attack protection from suspicious web content. AI-powered risk-based Isolation

Add-on

Add-on

Isolation for Cyber Protection: Std (100MB/user/mo.)

Isolation for Cyber Protection: Std (1.5GB/user/mo.)

Correlated Threat Insights

Speed investigations and response time with contextual threat intelligence

-

Correlated Threat Insights

Speed investigations and response time with contextual threat intelligence

-

Dynamic Risk-Based Policy

Automatically adapts and recommends security policies based on various risk factors

-

-

Dynamic Risk-Based Policy

Automatically adapts and recommends security policies based on various risk factors

-

-

Integrated Deception

Boost your zero trust security posture by proactively luring, detecting, and intercepting active attackers

-

-

Standard1

Standard1

Integrated Deception

Boost your zero trust security posture by proactively luring, detecting, and intercepting active attackers

-

-

Standard1

Standard1

Network Transformation
Network Transformation

DNS Resolution & Filtering

Trusted DNS Resolver for geocentric and optimal DNS resolution

Up to 64 rules

Up to 64 rules

Network Transformation

DNS Resolution & Filtering

Trusted DNS Resolver for geocentric and optimal DNS resolution

Up to 64 rules

Up to 64 rules

DNS Tunnel Detection

Detect and prevent DNS-based attacks and data exfiltration through DNS tunnels

-

-

DNS Tunnel Detection

Detect and prevent DNS-based attacks and data exfiltration through DNS tunnels

-

-

Bandwidth Control

Traffic control and bandwidth prioritization, rate limiting for web traffic

-

Bandwidth Control

Traffic control and bandwidth prioritization, rate limiting for web traffic

-

Cloud Firewall

Work-from-anywhere protection for all users and traffic(both web and non-web) with infinite SSL inspection

Network, Application Services, Locations, FQDNs up to 10 rules

Network, Application Services, Locations, FQDNs up to 10 rules

(+) work-from-anywhere users + locations, deep packet application inspection

(+) work-from-anywhere users + locations, deep packet application inspection

Cloud Firewall

Work-from-anywhere protection for all users and traffic(both web and non-web) with infinite SSL inspection

Network, Application Services, Locations, FQDNs up to 10 rules

Network, Application Services, Locations, FQDNs up to 10 rules

(+) work-from-anywhere users + locations, deep packet application inspection

(+) work-from-anywhere users + locations, deep packet application inspection

Protection for unauthenticated traffic

Protect networks with fully automated carrier-grade security with limitations

0.5 GB /user/mo.

1 GB /user/mo.

1.5 GB /user/mo.

2 GB /user/mo.

Protection for unauthenticated traffic

Protect networks with fully automated carrier-grade security with limitations

0.5 GB /user/mo.

1 GB /user/mo.

1.5 GB /user/mo.

2 GB /user/mo.

Protect Data and Prevent Data Loss
Protect Data and Prevent Data Loss

Cloud App Control + Tenancy Restrictions

Find and control use of risky or unsanctioned apps (Shadow IT)
Protect Data and Prevent Data Loss

Cloud App Control + Tenancy Restrictions

Find and control use of risky or unsanctioned apps (Shadow IT)

Isolation - Data protection (SaaS)

Prevent data loss from SaaS apps to BYOD or unmanaged endpoints (clientless)

Add-on

Add-on

Add-on

Isolation for Data Protection (SaaS): Std. (100MB/user/mo.)

Isolation - Data protection (SaaS)

Prevent data loss from SaaS apps to BYOD or unmanaged endpoints (clientless)

Add-on

Add-on

Add-on

Isolation for Data Protection (SaaS): Std. (100MB/user/mo.)

DLP, CASB, Inline Web Essentials, SaaS API (1-app)

Prevent the loss of sensitive data to the internet.  Scan 1 SaaS App for risky sharing of sensitive data or malware

-

Data Protection Std (DLP and CASB Essentials)

(+) SaaS API Retro Scan 

DLP, CASB, Inline Web Essentials, SaaS API (1-app)

Prevent the loss of sensitive data to the internet.  Scan 1 SaaS App for risky sharing of sensitive data or malware

-

Data Protection Std (DLP and CASB Essentials)

(+) SaaS API Retro Scan 

SaaS API, SaaS Supply Chain Security,, Unmanaged Devices, Classification, Incident Management

Benefits of Standard Data Protection plus: Control BYOD risks by streaming data as pixels, scan multiple SaaS apps for risky sharing/malware, customize DLP with EDM, IDM, OCR, and tools for incident management and workflow automation

Add-on

Add-on

Add-on

SaaS API, SaaS Supply Chain Security,, Unmanaged Devices, Classification, Incident Management

Benefits of Standard Data Protection plus: Control BYOD risks by streaming data as pixels, scan multiple SaaS apps for risky sharing/malware, customize DLP with EDM, IDM, OCR, and tools for incident management and workflow automation

Add-on

Add-on

Add-on

Digital experience monitoring 
Digital experience monitoring 

Monitor digital experiences from the end user to optimize performance and rapidly fix offending application, network and device issues

-

Standard

Standard

Standard

Digital experience monitoring 

Monitor digital experiences from the end user to optimize performance and rapidly fix offending application, network and device issues

-

Standard

Standard

Standard

Premium Support Plus
Premium Support Plus

Add-on

Add-on

Add-on

Premium Support Plus

Add-on

Add-on

Add-on

Zscaler Private Access (ZPA) Editions

Essentials

Discover previously unknown private apps, leverage standard device posture management, and reap the benefits of application segmentation.

Includes:

  • Secure access to private apps
  • VPN replacement

Business

Perfect for on-premises and remote employees as well as third-party users, ZPA Business Edition includes all core and business capabilities.

Everything in Essentials, plus:

  • Clientless Access (Browser Access, RDP/SSH/VNC)
  • Segmentation for remote access
  • Threat prevention with deception
  • Digital Experience Monitoring 

Transformation

BEST VALUE

Robust defense-in-depth for your private apps, ideal for workforce users and B2B customers.

Everything in Business, plus:

  • Clientless Access (Browser Isolation)
  • Segmentation for on-site and remote access (Universal ZTNA)
  • Advanced threat prevention with decoys
  • AppProtection for data and threat protection for private application traffic
Capabilities
Essentials
Business
Transformation
Unlimited
Platform Services
Platform Services

Secure access to private applications in the cloud and/or data centers along with real-time visibility

Std Device Posture enforcement, Log Streaming, Source IP Anchoring, Multiple IdP, Health Monitoring

(+) Extended DC Access

(+) Test Environment, Double encryption with Customer PKI

Platform Services

Secure access to private applications in the cloud and/or data centers along with real-time visibility

Std Device Posture enforcement, Log Streaming, Source IP Anchoring, Multiple IdP, Health Monitoring

(+) Extended DC Access

(+) Test Environment, Double encryption with Customer PKI

Segmentation
Segmentation

App Segments

Granular user-to-application segments (access type, user privileges and app traffic)

10

500

Unlimited

Unlimited

Segmentation

App Segments

Granular user-to-application segments (access type, user privileges and app traffic)

10

500

Unlimited

Unlimited

AI-Powered Recommendations

AI generated recommendation for intelligent segmentation required for ZTNA

10 recs/90 days

10 recs/90 days

100 recs/2 weeks + ability to download

100 recs/2 weeks + ability to download

AI-Powered Recommendations

AI generated recommendation for intelligent segmentation required for ZTNA

10 recs/90 days

10 recs/90 days

100 recs/2 weeks + ability to download

100 recs/2 weeks + ability to download

Segmentation Insights

Provide actionable insights to improve segmentation

New insights every 90 days + limited lookback

New insights every 90 days + limited lookback

New insights daily + longer lookback

New insights daily + longer lookback

Segmentation Insights

Provide actionable insights to improve segmentation

New insights every 90 days + limited lookback

New insights every 90 days + limited lookback

New insights daily + longer lookback

New insights daily + longer lookback

App Segment Import

Import app segments for easier segmentation

-

-

checkmark

checkmark

App Segment Import

Import app segments for easier segmentation

-

-

checkmark

checkmark

App Connectors

Lightweight VMs that securely connects a customer’s servers to the Zscaler Zero Trust Exchange

20 pairs

50 pairs

Unlimited

Unlimited

App Connectors

Lightweight VMs that securely connects a customer’s servers to the Zscaler Zero Trust Exchange

20 pairs

50 pairs

Unlimited

Unlimited

Private Service Edge

Service edges deployed locally in customer environment for Universal ZTNA and business continuity

1 pair (Virtual)

1 pair / 5,000 users

1 pair / 2,000 users

1 pair / 1,000 users

Private Service Edge

Service edges deployed locally in customer environment for Universal ZTNA and business continuity

1 pair (Virtual)

1 pair / 5,000 users

1 pair / 2,000 users

1 pair / 1,000 users

Compromised User Protection
Compromised User Protection

Integrated deception

Integrated decoys to detect compromised users, stop lateral movement

Add-on

Standard1

Advanced

Advanced Plus

Compromised User Protection

Integrated deception

Integrated decoys to detect compromised users, stop lateral movement

Add-on

Standard1

Advanced

Advanced Plus

AppProtection

Prevent inline exploits of known vulnerabilities like log4j for private application traffic

Add-on

Add-on

AppProtection

Prevent inline exploits of known vulnerabilities like log4j for private application traffic

Add-on

Add-on

Secure Clientless Access 
(3rd party users)
Secure Clientless Access 
(3rd party users)

Browser-based access

Browser Access for BYOD and unmanaged endpoints

Add-on

Secure Clientless Access 
(3rd party users)

Browser-based access

Browser Access for BYOD and unmanaged endpoints

Add-on

Privileged Remote Access

Secure privileged remote access to OT systems (RDP/SSH/VNC) without a client

Add-on

PRA Essentials2

PRA Advanced2

PRA Advanced2

Privileged Remote Access

Secure privileged remote access to OT systems (RDP/SSH/VNC) without a client

Add-on

PRA Essentials2

PRA Advanced2

PRA Advanced2

Isolation data protection for Private Apps

Prevent data loss to BYOD/unmanaged devices accessing private apps 

Add-on

Add-on

Isolation for Data Protection: Standard (100MB/user/mo.)

Isolation for Data Protection: Advanced Plus (1.5GB/user/mo.)

Isolation data protection for Private Apps

Prevent data loss to BYOD/unmanaged devices accessing private apps 

Add-on

Add-on

Isolation for Data Protection: Standard (100MB/user/mo.)

Isolation for Data Protection: Advanced Plus (1.5GB/user/mo.)

Protect Data
Protect Data

Pvt apps, Classification, Incident Management

Data loss prevention for private apps, advanced incident response and data classification

Add-on

Add-on

Add-on

Protect Data

Pvt apps, Classification, Incident Management

Data loss prevention for private apps, advanced incident response and data classification

Add-on

Add-on

Add-on

Digital experience monitoring 
Digital experience monitoring 

Visibility into user, connectivity and application telemetry to help resolve user experience issues

-

Standard

Standard

Standard

Digital experience monitoring 

Visibility into user, connectivity and application telemetry to help resolve user experience issues

-

Standard

Standard

Standard

Premium Support Plus
Premium Support Plus

TAM support + 15min P1 response

Add-on

Add-on

Add-on

Premium Support Plus

TAM support + 15min P1 response

Add-on

Add-on

Add-on

1. Min 1000 licenses of ZPA required. 
2. Up to 10 systems/consoles.

1. Min 1000 licenses of ZPA required. 
2. Up to 10 systems/consoles.

Zscaler Digital Experience (ZDX) Plans

Standard

Perfect for business that are starting out to monitor digital experiences of users and performance monitoring of applications.

Includes:

  • Unify monitoring silos
  • End user experience
  • Application monitoring
  • Device health monitoring
  • Network performance monitoring
  • Email alerts
  • 3 applications
  • Poll at 15-minute intervals
  • 3 alert rules
  • Data retention: 2 days

M365

Best for businesses with significant investments in Microsoft 365. Get continuous monitoring and advanced troubleshooting of performance issues with Outlook Online, SharePoint Online, OneDrive for Business, and Microsoft Teams.

Everything in Standard, plus:

  • Identify Microsoft performance issues
  • Monitor Microsoft Teams call quality
  • Integrate with ITSM tools via API and Webhooks
  • Troubleshoot user complaints with fine-grained diagnostics
  • M365 and 1 application
  • Poll at 5-minute intervals
  • 10 alert rules
  • Data retention: 14 days

Advanced

Comprehensive digital experience monitoring solution for businesses with advanced IT support needs. Monitor at scale and meet the needs of network, security, and service desk teams.

Everything in Standard and M365, plus:

  • Automate root cause analysis using Al
  • Monitor Zoom and WebEx call quality
  • Create read-only shareable URLs and user detail snapshots
  • Review device models and deployed software versions organization-wide
  • Pull trend reports across applications, locations, devices, and networks
  • View performance impact by analyzing specific app or user data
  • 15 applications
  • Poll at 5-minute intervals
  • 25 alert rules
  • Data retention: 14 days

RECOMMENDED

Advanced Plus

BEST VALUE

The ultimate digital experience monitoring solution with maximum visibility, alerting, and troubleshooting capabilities.

Everything in Advanced, plus:

  • Troubleshoot device issues caused by active processes
  • List incidents across applications, Zscaler data centers, last mile ISPs, and Wi-Fi
  • Proactively notify end users of Wi-Fi and ISP issues
  • Copilot AI Assistant for instant troubleshooting, and insights.
  • Web and network performance analysis from Zscaler hosted locations.
  • 50 applications
  • Poll at 5-minute intervals
  • 100 alert rules
  • Data retention: 14 days
Capabilities
Standard
M365
Advanced
Advanced Plus
Application Monitoring
Application Monitoring

Internet-based SaaS apps

Monitor internet-based SaaS applications (Box, Salesforce, etc.)
(M365)
Application Monitoring

Internet-based SaaS apps

Monitor internet-based SaaS applications (Box, Salesforce, etc.)
(M365)

Internet-based websites/custom apps

Monitor custom internet-based destinations (e.g., websites, web-based apps, 3rd-party proxy, NDR support)

Internet-based websites/custom apps

Monitor custom internet-based destinations (e.g., websites, web-based apps, 3rd-party proxy, NDR support)

Private apps (through ZPA)

Monitor private apps in your data center and IaaS/PaaS accessed over ZPA or VPN

Private apps (through ZPA)

Monitor private apps in your data center and IaaS/PaaS accessed over ZPA or VPN
Device Monitoring
Device Monitoring

Basic device monitoring

Monitor end user device health (CPU, memory, etc.) and device events
Device Monitoring

Basic device monitoring

Monitor end user device health (CPU, memory, etc.) and device events

Device and software inventory

Understand all software and versions deployed across your org and on each device

Device and software inventory

Understand all software and versions deployed across your org and on each device

Software process level monitoring

Monitor top processes over time

Software process level monitoring

Monitor top processes over time

Software process analytics

Top process analytics over time

Software process analytics

Top process analytics over time
Network Monitoring
Network Monitoring

CloudPath and web probes

Number of active network or web monitoring probes configured to monitor applications | *Additional probes available for purchase

6

M365 + 2 probes

30 + N probes*

100

Network Monitoring

CloudPath and web probes

Number of active network or web monitoring probes configured to monitor applications | *Additional probes available for purchase

6

M365 + 2 probes

30 + N probes*

100

Basic CloudPath probes

Network path tracing for User Gateway, Zscaler Cloud/Direct App

Basic CloudPath probes

Network path tracing for User Gateway, Zscaler Cloud/Direct App

Advanced CloudPath probes

Network path tracing with hop-by-hop analysis, ISP/AS number, and geolocation details of all internal and external hops on every probe

Advanced CloudPath probes

Network path tracing with hop-by-hop analysis, ISP/AS number, and geolocation details of all internal and external hops on every probe

Hosted Monitoring

Web and network performance analysis from Zscaler hosted locations

1 probe per 1K users, 1 location*

Hosted Monitoring

Web and network performance analysis from Zscaler hosted locations

1 probe per 1K users, 1 location*

UCaaS
UCaaS

UCaaS monitoring

Voice monitoring for Microsoft Teams, Zoom, and WebEx calls

Teams only

UCaaS

UCaaS monitoring

Voice monitoring for Microsoft Teams, Zoom, and WebEx calls

Teams only

Polling Time Interval
Polling Time Interval

CloudPath

Polling time granularity for network (CloudPath)

15 mins

5 mins

5 mins

5 mins

Polling Time Interval

CloudPath

Polling time granularity for network (CloudPath)

15 mins

5 mins

5 mins

5 mins

Web monitoring

Polling time granularity for web monitoring

15 mins

5 mins

5 mins

5 mins

Web monitoring

Polling time granularity for web monitoring

15 mins

5 mins

5 mins

5 mins

Device health

Polling time granularity for device stats collection

15 mins

5 mins

5 mins

5 mins

Device health

Polling time granularity for device stats collection

15 mins

5 mins

5 mins

5 mins

Integrations and Data Retention
Integrations and Data Retention

Data retention

Number of days data is retained for search and analysis

2 days

14 days

14 days

14 days

Integrations and Data Retention

Data retention

Number of days data is retained for search and analysis

2 days

14 days

14 days

14 days

Webhook integrations

Active webhook integrations configurable for real-time alerting

10

10

10

Webhook integrations

Active webhook integrations configurable for real-time alerting

10

10

10

APIs

ZDX public API provides programmatic access to ZDX data
(M365 events)

APIs

ZDX public API provides programmatic access to ZDX data
(M365 events)
Troubleshooting
Troubleshooting

Deep tracing

Number of active end user device troubleshooting sessions to collect web, path, device health metrics | OS process-level data at 60-second intervals

25

25

100

Troubleshooting

Deep tracing

Number of active end user device troubleshooting sessions to collect web, path, device health metrics | OS process-level data at 60-second intervals

25

25

100

Automated root cause analysis

Automatically isolate root causes of performance issues (analyze, compare)

Automated root cause analysis

Automatically isolate root causes of performance issues (analyze, compare)

Incident dashboard

List incidents across applications, Zscaler data centers, last mile ISP, and Wi-Fi

Incident dashboard

List incidents across applications, Zscaler data centers, last mile ISP, and Wi-Fi

Alert rules

Number of active rules configured for real-time alerting via email or webhooks

Up to 3

10

25

100

Alert rules

Number of active rules configured for real-time alerting via email or webhooks

Up to 3

10

25

100

Dynamic alerts

Set intelligent alerts based on deviations in observed metrics

Dynamic alerts

Set intelligent alerts based on deviations in observed metrics

Snapshots

Create a read-only shareable URL snapshot

Snapshots

Create a read-only shareable URL snapshot

Self Service

Proactively notify end users of Wi-Fi and ISP issues

Self Service

Proactively notify end users of Wi-Fi and ISP issues
Analytics
Analytics

Copilot

AI engine using natural language to identify performance impact across devices, networks, and applications
Analytics

Copilot

AI engine using natural language to identify performance impact across devices, networks, and applications

Data Explorer

View performance impact by analyzing specific app or user data

1 app, 1 metric

4 apps, 4 metrics

Data Explorer

View performance impact by analyzing specific app or user data

1 app, 1 metric

4 apps, 4 metrics

Quarterly Business Review (QBR) report

Summarized user experience and performance insights, disruptive incidents review

Quarterly Business Review (QBR) report

Summarized user experience and performance insights, disruptive incidents review

System generated reports

Trends across applications, locations, devices, and network metrics

System generated reports

Trends across applications, locations, devices, and network metrics

*Additional probes available in a separate SKU 

*Additional probes available in a separate SKU 

Schedule a custom demo

Understand your threat exposure and how the Zscaler Zero Trust Exchange platform can securely and quickly transform the way you do business.