Q37
Do you have a current SOC 2 Type II report?
SOC 2 Type II: claimed_with_trust_page
Before you share customer data with Zscaler, your compliance team needs documented proof they can be trusted. ThirdProof investigated Zscaler across 27 intelligence sources — here's what we found.
✓ FedRAMP Status: Authorized (Moderate) — verified against marketplace.fedramp.gov
24 sources queried. 80% confidence. Every Zscaler investigation produces both a risk report and an auto-filled security questionnaire — no vendor follow-up required.
Get Zscaler's Full Report Free →Security Questionnaire — Auto-Filled
Auto-filled from public evidence • 26% complete
Q37
SOC 2 Type II: claimed_with_trust_page
Q38
Zscaler's cloud security platform is fully compliant with the ISO 27001 security standard and has achieved ISO 27017 certification for cloud-specific information security risks.
Q41
Not found in FedRAMP marketplace
Q40
Zscaler is HIPAA compliant and will sign a Business Associate Agreement (BAA) which can be reviewed by contacting their support team.
Q42
Zscaler has updated its Data Processing Agreement (DPA) to align with GDPR and various legal requirements to assist customers in compliance.
+ 3 more compliance questions answered in the full report
Every investigation produces a full PDF report plus the complete 133-question questionnaire, mapped to SOC 2, HIPAA, PCI DSS, SIG, and more.
Get Zscaler's Full Report Free →Verified against FedRAMP Marketplace API as of March 2026
Verified against the official FedRAMP Marketplace API as of March 2026.
Zscaler authorized at Moderate impact level.
Moderate Risk
Vendor Risk Assessment
Based on data availability and source coverage
24
Sources Queried
18
Sources With Data
March 23, 2026
Last Assessed
AI-generated analysis for Zscaler
Zscaler (zscaler.com) is a publicly traded, enterprise-grade cloud security vendor specializing in zero trust network access and secure digital transformation. Based on independently sourced evidence, the vendor presents a moderate overall risk posture (Tier 3), reflecting a mature and well-established business alongside a small number of unresolved documentation and transparency gaps. Positive signals are notable and substantive. Zscaler demonstrates a long-established web presence of over 17 years, a clean Malware detection service status with no malware or phishing flags, and an exceptionally minimal infrastructure footprint — only a single open port (443) detected with zero known CVEs, which is significantly below the SaaS industry average of 8–12 open ports and represents a well-controlled external attack surface. The domain's TLS configuration is current, using TLSv1.3 with a valid DigiCert-issued certificate expiring February 2027. No sanctions matches were identified across OFAC, EU, or UN lists. SOC 2 compliance is claimed on the vendor's public compliance page (https://www.zscaler.com/privacy-compliance/compliance-and-standards), and a possible HITRUST directory match was identified at 90% confidence — both warrant manual verification. Historical and current adverse media scans produced no direct incidents or breach disclosures attributable to Zscaler's own security posture. Areas requiring attention include the following:
Independence Statement
All evidence in this report was sourced independently from public registries, threat intelligence feeds, and external data providers without vendor participation or disclosure.
4 findings identified for Zscaler
1 article(s) reference significant concerns for "Zscaler": "Zscaler: Ransomware's Momentum Looks Seemingly Unstoppable" (Dark Reading) https://news.google.com/rss/articles/CBMimgFBVV95cUxQTExQSmE1ZTdtWkxMLTZLQThzYWJXTkxkWU5PT2wyVmtyR3R1YTQ3SEIwcllUTmY1T1JEeDdIQmk3M1RSUEQ0ZkFrb3ctZ3NuVm9aTFlXc0RyYTBTTTlsREpCOTB5cS1rUVVPOE1SSVRsbTRnVkYyeU1pNmg1b3ZzelVDYlQ2N3Y1ME80Ti0wYkIyLWZhbHpmcy13?oc=5
zscaler.com is missing 2 recommended security headers: Content-Security-Policy, X-Frame-Options.
zscaler.com received a poor grade (D-) from Mozilla HTTP Observatory. Multiple security headers or configurations are missing. Note: This scan was performed on the marketing site (zscaler.com). The application endpoint (console.zscaler.com) may have different security headers. Verify the application domain separately.
zscaler.com has an AI-related policy page but does not clearly state whether customer data is used for AI model training.
24 positive signals verified
Legal Entity Actively Registered
Business Registration →[Filtered] Recently Registered Entity
Business Registration →No Sanctions Matches Found
Sanctions & Watchlist Screening →No Adverse Media Signals
Adverse Media Scan (Fallback) →Firmographic Data Available
Company Intelligence →Valid SSL Certificate
Domain Analysis →1 Open Port Detected
Infrastructure Exposure →Domain Registration Unavailable
Domain Registration →Threat Intelligence Partially Available
Threat Intelligence →Tech Community Discussion: security
Tech Community Sentiment →Minimal Tech Community Discussion
Tech Community Sentiment →Certificate Data from TLS Handshake
Certificate Transparency →Established Web Presence (17+ years)
Web Archive History →Threat Intelligence (OTX) Unavailable
Threat Intelligence (OTX) →IP Reputation Unavailable
IP Reputation →Clean Safe Browsing Status
Malware & Phishing Check →Website Security Scan Unavailable
Website Security Scan →Trust Page Found, No Certifications Detected
Trust & Compliance Page Scan →Subprocessor Page Found, No Entries Parsed
Supply Chain & Subprocessor Discovery →Not Found as FDIC-Insured Institution
FDIC Institution Check →No SEC Enforcement Filings Found
SEC Filing Search →HITRUST Directory Match — Manual Verification Required
Certification Registry Verification →SOC 2 Compliance Claimed on Trust Page
Certification Registry Verification →AI Data Retention Policy Not Specified
AI Data Usage Policy →Steps to address findings for Zscaler
Request Zscaler's current SOC 2 Type II report and bridge letter — contact their security team or check https://www.zscaler.com/privacy-compliance/compliance-and-standards where the report may be available under NDA. Verify the audit period covers the last 12 months.
Manually review https://zscaler.com/legal/subprocessors to enumerate all subprocessors; if the page is dynamically rendered, request a static copy from Zscaler's privacy or legal team and document each subprocessor in your vendor risk register.
Request clarification on Zscaler's AI data handling practices — specifically whether customer data is used to train AI models, what retention periods apply to AI-processed data, and whether Copilot can be disabled or data-isolated for your tenant. Ask for this in writing or as an addendum to your DPA.
Verify the HITRUST certification status by searching https://directory.hitrustalliance.net/search?q=Zscaler directly and confirming the listed entity matches the Zscaler entity you are contracting with; if confirmed, document this as a positive compliance signal.
Request an independent security header assessment for the application console domain (console.zscaler.com) rather than relying on the marketing site scan; many enterprise SaaS vendors maintain different header configurations on their application endpoints.
Document the May 2024 breach claim in your vendor risk register and request Zscaler's post-incident review or disclosure statement confirming scope, affected customers, and remediation status.
Re-assess this vendor in 12 months or sooner if Zscaler completes FedRAMP authorization (currently not listed) or if new adverse media signals emerge.
24 sources in this assessment
Some data sources may have had limited availability during this assessment. This does not reflect negatively on the vendor.
Are you Zscaler? Claim this profile to complete your security record. Buyers are reviewing this profile now.
Claim this profile →Is Zscaler on any OFAC, EU, or UN sanctions list? Are any officers or affiliates flagged?
What is Zscaler's security posture? Threat intelligence scanning, known vulnerabilities, and security header analysis.
Is Zscaler a legitimately registered business entity? Corporate status, jurisdiction, and officer verification.
Has Zscaler appeared in negative news coverage? Data breaches, lawsuits, regulatory actions, and complaints.
Is Zscaler's website secure? TLS configuration, DNS hygiene, security headers, and domain age analysis.
What are Zscaler's firmographics? Employee count, industry classification, technology stack, and corporate structure.
Does Zscaler claim SOC 2, ISO 27001, HITRUST, or FedRAMP? ThirdProof scans trust pages for certification claims and cross-references the FedRAMP public registry for independent verification.
Who does Zscaler depend on? ThirdProof discovers subprocessors from vendor-published pages and runs sanctions screening and safe browsing checks against each one.
Has Zscaler appeared in SEC enforcement filings? Is it associated with any FDIC bank failures? ThirdProof searches regulatory databases with entity verification to confirm attribution.
Full methodology, rule engine, and AI disclosure: /methodology
Seeing this in an audit? ThirdProof lets you investigate Zscaler and every other vendor in your stack — average report time: 7 minutes. Get Zscaler's Full Report Free →
SOC 2 CC9.2, HIPAA, PCI-DSS, and CMMC all require documented vendor due diligence — not just knowing the answer, but having audit-ready evidence you verified it. Most compliance teams can't produce that documentation on demand.
ThirdProof investigates Zscaler across 27 intelligence sources in an average of 7 minutes — sanctions screening, cyber posture, SOC 2 verification, FedRAMP status, and more. Every investigation produces two deliverables: an audit-ready risk report and an auto-filled security questionnaire your prospects and auditors expect to see.
Replaces $600–$900 in manual compliance consulting time per vendor assessed.