Skip to main content
Skip to main content

Zscaler Vendor Risk Assessment — Full Report

Before you share customer data with Zscaler, your compliance team needs documented proof they can be trusted. ThirdProof investigated Zscaler across 27 intelligence sources — here's what we found.

✓ FedRAMP Status: Authorized (Moderate) — verified against marketplace.fedramp.gov

Risk Tier
Tier 2High Risk
SOC 2
— Not Found
FedRAMP
✓ Authorized
Last Assessed
Mar 4, 2026
🟡SSL/TLS: TLSv1.3🟢Infrastructure: 1 open port, 0 CVEs🟢Sanctions: Clear — No matches found🟢Malware: Clean
FedRAMP Status
Zscaler is listed on the FedRAMP Marketplace as Authorized (Moderate) as of March 2026.
SOC 2 Status
Zscaler has not had a SOC 2 claim detected on their trust page.
Sanctions Screening
Zscaler returned no matches in OFAC SDN, EU Consolidated, and UN sanctions screening.
Risk Tier
ThirdProof assigned Zscaler a Moderate Risk tier with 80% confidence across 27 intelligence sources.

22 sources queried. 88% confidence. Every Zscaler investigation produces both a risk report and an auto-filled security questionnaire — no vendor follow-up required.

Get Zscaler's Full Report Free →
5 free investigations|Risk report + auto-filled questionnaire|Avg. 7 minutes

Certification & Compliance Status

Need a complete vendor security questionnaire?

Run a full ThirdProof investigation to get 133 security questions auto-filled with source evidence — ready for your next audit or vendor onboarding review.

Get Zscaler's Full Report Free →
FedRAMP Authorized (Moderate)

Verified against FedRAMP Marketplace API as of March 2026

Verified against the official FedRAMP Marketplace API as of March 2026.

Zscaler authorized at Moderate impact level.

27 data sources queried per assessment
Reports generated in an average of 7 minutes
SHA-256 verified for audit integrity
Deterministic risk scoring — no AI guesswork
2Tier

High Risk

Zscaler

Vendor Risk Assessment

Confidence Score88%

Based on data availability and source coverage

22

Sources Queried

21

Sources With Data

March 4, 2026

Last Assessed

Executive Summary

AI-generated analysis for Zscaler

Zscaler (zscaler.com) is a publicly traded, enterprise-grade cybersecurity vendor with a 17-year established domain history and a clean technical security posture across threat intelligence, IP reputation, and malware detection sources.

Area Requiring Attention

The rule engine has assigned a Tier 2 (High Risk) rating, driven primarily by adverse media findings associating the vendor with ransomware-related coverage and a legacy breach disclosure. Notably, the media findings reflect Zscaler's own published threat research and a limited-impact 2024 security incident rather than evidence of systemic compromise or ongoing operational failure. However, the incomplete sanctions screening data and missing HTTP security headers on the primary domain introduce residual uncertainty that must be resolved before onboarding. Retail organizations deploying Zscaler in or adjacent to the cardholder data environment (CDE) should ensure formal TPSP documentation and shared responsibility mapping are completed in accordance with PCI-DSS 4.0 Requirement 12.8.

Independence Statement

All evidence underpinning this assessment was independently sourced from external data repositories, public registries, and open-source intelligence feeds without vendor participation or input.

Investigation Findings

6 findings identified for Zscaler

2 high4 medium
high

HTTP Security Grade: D-

zscaler.com received a poor grade (D-) from Mozilla HTTP Observatory. Multiple security headers or configurations are missing.

high

Adverse Media: ransomware

2 article(s) reference significant concerns for "Zscaler": "Zscaler: Ransomware's Momentum Looks Seemingly Unstoppable" (Dark Reading | Security); "Zero-trust framework powers Zscaler’s ransomware defense" (SiliconANGLE)

medium

Recently Registered Entity

זיסקיילר ישראל בע"מ was first registered in the LEI system less than 1 year ago (2025-09-10T14:19:54Z).

medium

Sanctions Screening Unavailable

A critical data source was unavailable during this investigation. Manual verification is recommended.

medium

Missing Security Headers

zscaler.com is missing 2 recommended security headers: Content-Security-Policy, X-Frame-Options.

medium

Multiple Certificate Issuers (15)

zscaler.com has certificates from 15 different Certificate Authorities. This may indicate inconsistent certificate management practices.

Security Strengths

21 positive signals verified

Large Certificate Footprint (1130 subdomains)

Certificate Transparency

Legal Entity Actively Registered

Business Registration

No Adverse Media Signals

Adverse Media Scan (Fallback)

Firmographic Data Available

Company Intelligence

Valid SSL Certificate

Domain Analysis

1 Open Port Detected

Infrastructure Exposure

Established Domain (17+ years)

Domain Registration

Clean Domain Reputation

Threat Intelligence

Well-Known Domain

Threat Intelligence

Tech Community Discussion: security

Tech Community Sentiment

Minimal Tech Community Discussion

Tech Community Sentiment

SSL/TLS Grade: A+

SSL/TLS Analysis

Established Web Presence (17+ years)

Web Archive History

No Threat Intelligence Pulses

Threat Intelligence (OTX)

Clean IP Reputation

IP Reputation

Clean Safe Browsing Status

Malware & Phishing Check

Clean Website Scan

Website Security Scan

Trust Page Found, No Certifications Detected

Trust & Compliance Page Scan

Not Found as FDIC-Insured Institution

FDIC Institution Check

No SEC Enforcement Filings Found

SEC Filing Search

Recommended Actions

Steps to address findings for Zscaler

  1. 1

    Conduct manual sanctions screening: Cross-reference Zscaler, Inc. and its known subsidiaries against the OFAC SDN list (home.treasury.gov/policy-issues/financial-sanctions/sdn-list), the EU consolidated sanctions list (eeas.europa.eu/topics/sanctions), and the UN consolidated list. Document results and retain for your TPSP file.

  2. 2

    Obtain and review the vendor's current SOC 2 Type II report: Contact Zscaler's security team directly or check trust.zscaler.com — many enterprise vendors publish reports under an NDA request. Confirm the audit period covers the last 12 months and that the scope includes systems relevant to your deployment.

  3. 3

    Verify PCI-DSS compliance status: Request Zscaler's current Attestation of Compliance (AOC) or confirmation of their PCI-DSS certification scope from their compliance team. This is required under PCI-DSS 4.0 Requirement 12.8.4 to confirm the vendor undergoes annual PCI assessments.

  4. 4

    Review and remediate HTTP security header gaps: Zscaler's primary domain (zscaler.com) received a D- from HTTP security scanner (25/100), with missing Content-Security-Policy and X-Frame-Options headers. While this may reflect intentional CDN/redirect architecture, raise it formally with the vendor's security team and request their explanation or remediation timeline within 60 days.

  5. 5

    Manually review the subprocessor list: Visit zscaler.com/legal/subprocessors directly to identify all named third-party subprocessors. Cross-reference each against your organization's approved vendor list and conduct spot-check sanctions screening on any subprocessors that handle data relevant to your deployment.

  6. 6

    Complete PCI-DSS shared responsibility documentation: Work with Zscaler's team to produce a completed Responsibility Matrix (per PCI-DSS 4.0 Requirement 12.8.5) that clearly delineates which PCI controls Zscaler manages versus your organization's responsibility. Retain this document with your TPSP agreement for QSA review.

  7. 7

    Execute a GDPR Data Processing Agreement (DPA) and CCPA Service Provider Addendum: Confirm that any EU consumer data processed through Zscaler is covered by a signed DPA with appropriate Standard Contractual Clauses (SCCs). For CCPA compliance, ensure the agreement prohibits Zscaler from selling or sharing your consumers' personal information.

Intelligence Sources Queried

22 sources in this assessment

21of 22 sources returned data
IP Reputation
Threat Intelligence (OTX)
Certificate Transparency
Domain Analysis
FDIC Institution Check
Business Registration
Historical Media Search
Tech Community Sentiment
Company Intelligence
Adverse Media Scan (Fallback)
HTTP Security Scan
Malware & Phishing Check
SEC Filing Search
Infrastructure Exposure
SSL/TLS Analysis
Supply Chain & Subprocessor Discovery
Trust & Compliance Page Scan
Website Security Scan
Threat Intelligence
Web Archive History
Domain Registration
Sanctions & Watchlist Screening

Data Coverage Notes

Some data sources may have had limited availability during this assessment. This does not reflect negatively on the vendor.

  • Sanctions and watchlist screening was unavailable during this investigation due to a data source outage. Manual sanctions verification against OFAC, EU, and UN consolidated lists is recommended before contract execution.
  • The trust page scan detected Zscaler's trust portal (trust.zscaler.com) but did not return structured certification data for SOC 2, ISO 27001, PCI-DSS, or FedRAMP. This may reflect page structure or content parsing limitations rather than absence of certifications — direct verification is required.
  • The subprocessor data parsed from Zscaler's published subprocessor page (zscaler.com/legal/subprocessors) returned malformed entity names, suggesting the page structure could not be cleanly parsed. The 6 entries identified do not appear to represent named third-party entities. Manual review of the subprocessor page is recommended.
  • External cyber risk scoring data was not available during this assessment, representing a gap in corroborating infrastructure risk quantification.
183+
Vendors assessed
98%
Average confidence
<2 min
Time to report
What a ThirdProof assessment covers

Sanctions Screening

Is Zscaler on any OFAC, EU, or UN sanctions list? Are any officers or affiliates flagged?

Cyber Risk Assessment

What is Zscaler's security posture? Threat intelligence scanning, known vulnerabilities, and security header analysis.

Business Registration

Is Zscaler a legitimately registered business entity? Corporate status, jurisdiction, and officer verification.

Adverse Media Analysis

Has Zscaler appeared in negative news coverage? Data breaches, lawsuits, regulatory actions, and complaints.

Domain & Infrastructure

Is Zscaler's website secure? TLS configuration, DNS hygiene, security headers, and domain age analysis.

Company Intelligence

What are Zscaler's firmographics? Employee count, industry classification, technology stack, and corporate structure.

Trust & Compliance Verification

Does Zscaler claim SOC 2, ISO 27001, HITRUST, or FedRAMP? ThirdProof scans trust pages for certification claims and cross-references the FedRAMP public registry for independent verification.

Supply Chain & Subprocessor Discovery

Who does Zscaler depend on? ThirdProof discovers subprocessors from vendor-published pages and runs sanctions screening and safe browsing checks against each one.

Regulatory & Financial Filings

Has Zscaler appeared in SEC enforcement filings? Is it associated with any FDIC bank failures? ThirdProof searches regulatory databases with entity verification to confirm attribution.

Full methodology, rule engine, and AI disclosure: /methodology

Seeing this in an audit? ThirdProof lets you investigate Zscaler and every other vendor in your stack — average report time: 7 minutes. Get Zscaler's Full Report Free →

Frequently asked about Zscaler

Is Zscaler FedRAMP authorized?+
Yes, Zscaler holds FedRAMP Moderate authorization as of March 2026.
Does Zscaler have SOC 2 Type II?+
No SOC 2 found. Zscaler rated Moderate Risk — significant adverse media. See all 3 findings →
Is Zscaler on the OFAC sanctions list?+
Zscaler returned no matches in ThirdProof's OFAC SDN, EU Consolidated, and UN sanctions screening as of March 2026.
What is Zscaler's vendor risk tier?+
ThirdProof assigned Zscaler a risk tier of Moderate Risk with 80% confidence based on assessment across 27 intelligence sources as of March 2026.
Can I get an auto-filled security questionnaire for Zscaler?+
Yes. Every ThirdProof investigation of Zscaler produces two deliverables: an audit-ready risk report and a 133-question security questionnaire pre-filled with evidence from 27 independent sources. The questionnaire is mapped to SIG, SOC 2, HIPAA, PCI DSS and 9 other frameworks — answered without sending Zscaler a single email or waiting for a vendor response.
Is Zscaler safe to use as a vendor?+
Zscaler is a cloud security vendor that handles organizational data. Safety depends on their current security posture, certification status, and how they handle your specific data. ThirdProof automates this evaluation across 27 intelligence sources — sanctions databases (OFAC, EU, UN), business registration verification, adverse media scanning, and cyber risk assessment — producing a deterministic risk tier with confidence score plus an auto-filled security questionnaire. Run a free investigation to see Zscaler's full risk profile.
Does Zscaler have SOC 2 certification?+
No SOC 2 found. Zscaler rated Moderate Risk — significant adverse media. See all 3 findings →
Has Zscaler had any data breaches?+
Data breach history is an important signal for any vendor, particularly cloud security platforms like Zscaler that handle organizational data. ThirdProof's adverse media analysis searches multiple news APIs and public records for data breaches, security incidents, lawsuits, regulatory enforcement actions, and financial distress signals. Each finding is linked to its original source with severity classification.
Is Zscaler on any sanctions lists?+
Sanctions screening is standard due diligence for cloud security vendors. ThirdProof screens Zscaler against OFAC SDN, consolidated international sanctions lists, and PEP databases. The screening uses entity name verification to reduce false positives. If Zscaler or any associated officers appear on a sanctions list, this triggers automatic escalation to the highest risk tier.
How do I assess Zscaler for vendor risk?+
Assessing Zscaler as a cloud security vendor involves verifying SOC 2 Type II and applicable industry standards compliance, reviewing their subprocessor chain, and checking sanctions exposure. ThirdProof automates this across 27 intelligence sources in an average of 7 minutes — no questionnaires or vendor participation required. Your first 5 investigations are free.
How long does a ThirdProof assessment take?+
A ThirdProof assessment completes in an average of 7 minutes. 27 intelligence sources are queried in parallel — sanctions databases, business registries, threat intelligence feeds, certificate transparency logs, and more. The result is a deterministic risk tier with confidence score and audit-ready PDF report.
Is ThirdProof free?+
ThirdProof offers 5 free vendor assessments with no credit card required. Each assessment includes the full report — risk tier, confidence score, individual findings, executive summary, and PDF export. Paid plans start at $399/month for teams that need ongoing vendor monitoring.
Can I use a ThirdProof report as SOC 2 audit evidence?+
Yes. ThirdProof reports are designed to satisfy SOC 2 CC9.2 (vendor risk management) requirements. Each report includes SHA-256 integrity verification, methodology disclosure, source attribution for every finding, and AI content labeling. Auditors can independently verify the report's authenticity and trace each finding to its original source.
How is ThirdProof different from a security questionnaire?+
Security questionnaires require vendor participation, take weeks, and produce self-reported answers. ThirdProof queries 27 independent intelligence sources — no vendor involvement needed. Risk tiers are assigned by a deterministic rules engine (not AI opinion), and every finding links to its original source. You get an audit-ready report in an average of 7 minutes instead of waiting weeks for a questionnaire response.

Zscaler is in your vendor stack. Can you prove you assessed them?

SOC 2 CC9.2, HIPAA, PCI-DSS, and CMMC all require documented vendor due diligence — not just knowing the answer, but having audit-ready evidence you verified it. Most compliance teams can't produce that documentation on demand.

ThirdProof investigates Zscaler across 27 intelligence sources in an average of 7 minutes — sanctions screening, cyber posture, SOC 2 verification, FedRAMP status, and more. Every investigation produces two deliverables: an audit-ready risk report and an auto-filled security questionnaire your prospects and auditors expect to see.

✓ 5 free investigations✓ Risk report + auto-filled questionnaire✓ No credit card required✓ Average report time: 7 minutes

Replaces $600–$900 in manual compliance consulting time per vendor assessed.