Forcepoint DLP

Forcepoint DLP

Top Rated
Top Rated
Forcepoint Data Loss Prevention

Overview

Reviews

Stop Data Leakage

7
Forcepoint Data Loss Prevention is [being] used across [the] organization to safeguard the sending of sensitive data outside the …
Read full review

Forcepoint in action

5
Forcepoint is used as a web proxy across the vast majority of the organization. The DLP product is used to monitor how and when people …

Good tool to use!

9
We use Data Loss Prevention across org and, it addresses problems like Data Loss of PII. We have deployed the agents as well on endpoints.
Read full review

Forcepoint Data Loss Prevention Review

10
My organization uses Forcepoint Data Loss Prevention across the organization to address PHI stored in the organization. The use of …
Read full review

Forcepoint DLP Review

9
It's being used across the whole organization. The main purpose is PII data loss prevention.
Read full review

Force the Point to be Secure

8
We are currently using Forcepoint as our URL filtering solution. This takes a lot of the research out of whether a site should be accessed …
Read full review

Websense Great Tool

8
Hi, I'm Bruno Lafrenier, Senior IT Datacom Specialist at the IRB. Websense was used to monitor and control some access to the Internet. It …

Reviewer Pros & Cons

View all pros & cons

Pricing

View all pricing
N/A
Unavailable

What is Forcepoint DLP?

Forcepoint DLP promises to address human-centric risk by providing visibility and control everywhere your people work and everywhere your data resides. Security teams apply user-risk scoring to focus on the events that matter most and to accelerate compliance with global data…

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting / Integration Services

Would you like us to let the vendor know that you want pricing?

7 people want pricing too

Alternatives Pricing

What is CrowdStrike Falcon?

CrowdStrike offers the Falcon Endpoint Protection suite, an antivirus and endpoint protection system emphasizing threat detection, machine learning malware detection, and signature free updating. Additionally the available Falcon Spotlight module delivers vulnerability assessment with no performance…

What is Microsoft 365 (formerly Office 365)?

Microsoft 365 (formerly Office 365) is a Microsoft Cloud subscription service that includes Microsoft Office products (Word, Excel, PowerPoint, OneNote, Outlook, Publisher, and Access). The software can be installed across multiple devices and ensures that users always have the most up-to-date…

Features Scorecard

No scorecards have been submitted for this product yet..

Product Details

What is Forcepoint DLP?

Forcepoint DLP promises to address human-centric risk by providing visibility and control everywhere your people work and everywhere your data resides. Security teams apply user-risk scoring to focus on the events that matter most and to accelerate compliance with global data regulations.

The vendor promises these benefits:
  • Accelerate compliance
  • Empower people to protect data
  • Advanced detection and controls that follow the data

RESPOND AND REMEDIATE RISK
Traditional approaches to DLP overload users with false positives while missing data at risk. Forcepoint DLP applies advanced analytics to correlate seemingly unrelated DLP events into prioritized incidents. Incident Risk Ranking (IRR) provided with Forcepoint DLP fuses disparate DLP indicators into a framework of Bayesian belief networks to assess the likelihood of data risk scenarios, such as data theft and broken business processes.

VISIBILITY EVERYWHERE YOUR PEOPLE WORK, CONTROL EVERYWHERE YOUR DATA RESIDES
Today’s enterprises are challenged with complicated environments, where data is everywhere and requires the protection of data in places that aren’t managed or owned by the enterprise. Forcepoint DLP for Cloud Applications extends analytics and DLP policies to critical cloud applications so your data is protected, wherever it resides.

Forcepoint DLP Features

  • Supported: Endpoint
  • Supported: Cloud applications
  • Supported: Discovery
  • Supported: Network

Forcepoint DLP Competitors

Forcepoint DLP Technical Details

Deployment TypesOn-premise, SaaS
Operating SystemsWindows, Linux, Mac
Mobile ApplicationNo

Alternatives

View all alternatives

Frequently Asked Questions

What is Forcepoint DLP's best feature?

Reviewers rate Support Rating highest, with a score of 5.3.

Who uses Forcepoint DLP?

The most common users of Forcepoint DLP are from Enterprises and the Financial Services industry.

Reviews

(1-25 of 56)
Companies can't remove reviews or game the system. Here's why
Olivia Jayy | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Review Source
Our entire organization depends on Forcepoint Data Loss Prevention to protect our valuable data on Cloud, server and on-premises. Powerful tool that helps to protect data at rest, data in-motion and data in use giving us the visibility and control to every abnormal activity by the user within our networked environment.
  • Cloud secure data protection.
  • Unified policy enforcement.
  • Risk-adaptive protection based on user behavior.
  • The way to discover data at risk can be improved.
  • Additional cost to professional support.
  • Improvement to reporting days per week.
Effective tool that safeguards our data with a single policy and simplifies compliance with predefined policies, and the automatic access control and usage is very convenient to our web and networked environments. Forcepoint Data Loss Prevention protects our critical intellectual property with unsurpassed accuracy and provides a secure mobile application access to data on and off network.
Score 8 out of 10
Vetted Review
Verified User
Review Source
We are using Forcepoint DLP for preventing users from intentionally or unintentionally leaking data from the organization whether they are in office premises or working from home or working from branch offices or working from elsewhere. We restrict users to upload business-critical data to a website, USB device or even through any application.
  • Data leak prevention, as it is meant to do
  • Application control, monitoring and blocking on users system
  • Device control
  • Website blocking
  • Integration with Network DLP and other tools
  • Deployment is tedious as there are multiple servers for multiple services
  • Connectivity is not secure
Forcepoint Data Loss Prevention is very well suited for organizations where [the] user count is more than 200 users. These users can be work from home users or users visiting the office premises or even branch office users. As Forcepoint is only supported on Windows and MAC operating systems, it is less likely to be suitable for such environments.
Brandon Smith | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Review Source
Forcepoint Data Loss Prevention is a data loss prevention software and due to the nature of this category, this tool is used as a web proxy all across our organization. It is used enterprise-wide in my organization. This tool has been installed on all of the PCs, laptops, and servers that we own. This software has ensured us how and when people are attempting to print, store, and even share data with potentially unauthorized teams.
  • It has predominantly protected us from unauthorized parties and has provided us with better visibility and control over our data.
  • This software has also successfully prevented us from both malicious and accidental tasks, which are quite flexible actions when it comes to the violation of data loss prevention policies.
  • This product has been successful in improving compliance and even mitigating compliance violations, which further facilitated IT security.
  • I think there is room for improvement, as the user interface is slightly rough and difficult to adopt in the beginning. The software also hangs up at a few instances, which leads to some wasting of time and annoyance, but other than that, this software is good. The technical staff should work on the complexities for a better user experience.
  • This tool would have been more effective if whitelisting was not restricted, as it should be able to adjust just so it can be read accurately.
  • Fingerprinting is a little too sensitive, which should also be further strengthened when files are found.
I find this tool to be a great product, as it comes in really very handy. This product is great when it comes to scenarios where you are just trying to block some specific types of information and data out of your company.
Flavio Pereira | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Review Source
Forcepoint Data Loss Prevention is exceptional and has pleased me and IT. So far it has only been implemented at our headquarters. And the biggest problem we had was the fear of data leakage through corporate equipment and devices. This Forcepoint DLP solution now protects critical data through encryption and prevents information theft from our devices, even in cases of theft, where we create action plans to execute in those cases. Along with other tools, it has improved our information security and we are happy with this product.
  • Effective data leakage protection
  • Email security
  • URL filter
  • It has a graphical interface for creating security rules
  • Device information theft protection
  • Good price
  • URL filter with few categories
  • Small instabilities
I would recommend Forcepoint Data Loss Prevention; it can be used in any scenario, best suited for small and medium-sized operations. It is easy to use and configure through its graphical interface, being able to create rules within rules, exceptions and add devices for specific users. It is a way to inhibit and protect the network from data theft that is now more serious than the hardware itself. Management can be done remotely and from any device. Forcepoint support is very good; we've already had an NGFW at a branch and we like the customer service.
Gabriel Silva | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Review Source
The Forcepoint Data Loss Prevention solution has been used throughout our organization's region. There are two main problems to be solved with Forcepoint Data Loss Prevention: the first is protecting critical data on employee devices, such as smartphones, pen drives, and notebooks, regardless of their location, and the second is strengthening web security with resources for endpoint protection, with web content filtering, email security, and proxy. The experience has been positive and my team and I are enjoying it; security has been improved and problems have decreased.
  • Web content filter and proxy
  • Can be expanded on demand
  • Prevents theft of corporate information
  • Fingerprint feature
  • Cryptography
  • High-level and quality Forcepoint support
  • More customization is lacking in the web content filter feature
  • Reports of some false positives
  • GUI is not so fluid
It requires a certain knowledge in information security but the solution is very good and we recommend it for any scenario. It's a way to enhance security, prevent theft of sensitive device information, and maintain an extra layer of security with URL filtering. Overall, it's easy to use and set up. Forcepoint support is a good thing and I liked it when I asked for technical support to do a configuration. The solution can be a good alternative to protect USB pen drives and prevent information theft in case of unpredictable theft.
Bhuwan Chandra | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Review Source
We are a solutions provider to our clients who are facing compliance and security issues. There are multiple modules in Forcepoint and we recommend clients start their data loss prevention journey with Forcepoint Endpoint Data Loss Prevention and later on to move to Forcepoint Network Data Loss Prevention. Forcepoint Endpoint Data Loss Prevention takes time to be established in the client environment and multiple policy fine-tunings are required to remove the false positives. We also recommended starting the data loss prevention journey with a small fraction of users--say 50 and 100 users at the initial level.
  • The Forcepoint Endpoint Data Loss Prevention Endpoint module is applied to secure data being used at endpoints, like from Microsoft Excel and other Microsoft capabilities, also other functions like email and FTP, Active Sync, etc. It secures the data in use at the endpoint.
  • The Forcepoint Endpoint Data Loss Prevention Network Module is applied for the traffic being used in network capabilities like email, FTP, and web. It also secures the data on the move in the network.
  • Forcepoint Data Discover--the capability to discover the data which is sensitive for the organization and lies across the network; with the discovery tool, we can define the data, which is important based on regulatory and compliance risk.
  • OCR (optical character recognition) capabilities also come with the Data Discover Module, by which we can see the embedded text inside the image and that helps to prevent sensitive data theft.
  • Forcepoint technical support--specially for users who go with essential support--is challenging to get support on time. You need the ticket to be raised long beforehand to get support from TAC. However, in the case of enterprise support, its is not like this technical person will come on a priority basis.
  • However it comes with higher prices, especially for SMB, it is allowed to pay that amount for support only.
Forcepoint Endpoint Data Loss Prevention suited the environment where data movement is heavily regulated and complies with compliance like PCI-DSS, HIPAA, SOC Type-2, etc. Also, if the organization wants to see a holistic view of the security posture of the organization and imports logs from endpoints and network for data movement. The best part of Forcepoint Endpoint Data Loss Prevention is the reporting part, while another OEMs in the market share logs details only, Forcepoint Endpoint Data Loss Prevention has a reporting part where you can generate reports with compliance format. Forcepoint Endpoint Data Loss Prevention also integrates with different SIEM solutions available in the market.
Tribett Requena | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Review Source
We use Forcepoint Endpoint Data Loss Prevention to avoid data leakage and protection. We carry out data monitoring and offer this solution to customers who require it.
  • Drip data loss prevention monitoring
  • Digital data printing/OCR
  • Unified data protection coverage
  • Risk-based policy enforcement and native behavioral analysis
  • Initial setup is not that simple
  • It does not have an integration API
  • Machine learning technologies and OSR technologies would be better
Forcepoint Endpoint Data Loss Prevention is perfect for information security and compliance management and the IT department, cyber security consulting services, legal business, and large companies that need to manage and control information leakage and ensure compliance with company policies.
September 13, 2021

Stop Data Leakage

Score 7 out of 10
Vetted Review
Verified User
Review Source
Forcepoint Data Loss Prevention is [being] used across [the] organization to safeguard the sending of sensitive data outside the organization. We solve problems where users should not be able to send any company information for their personal use, such as sending files [that] are not sensitive but still the company's data. Also, we have to monitor what incidents are triggered by the endpoint for us to keep track, monitoring incidents through images using OCR, and using risk score to get the details of which user tried to violate the policy more often, even if it was blocked for him.
  • Performing finger printing
  • Performing discovery tasks
  • Detecting data from images using OCR
  • Pre-defined policies
  • Agent communication with data loss prevention servers
  • Getting unwanted incidents using pre-defined policies
If any organization doesn't want to share data outside the organization. It is always recommended to use user-defined policies to avoid any false incidents and using up drive space. Using the management console is easy to understand and you get everything in a systematic manner.
February 28, 2020

Forcepoint DLP is great

Score 10 out of 10
Vetted Review
Verified User
Review Source
It is used across our whole organization. It is helping us prevent unauthorized disclosure of member data.
  • Prevents data from leaving that we want to protect
  • Ensures data leaving is encrypted if that is what we want
  • Takes some time to get it tuned
  • Requires tuning from time to time
It is easy to use and manage. Reviewing all the hits for items you are looking for requires the staff. Custom rules are easy to create.
Support is getting better. It was bad at first, but now it is a lot better.
December 31, 2019

Forcepoint in action

John Keenan | TrustRadius Reviewer
Score 5 out of 10
Vetted Review
Verified User
Review Source
Forcepoint is used as a web proxy across the vast majority of the organization. The DLP product is used to monitor how and when people attempt to print, store or share data with potentially unauthorized parties. The DLP product is then used to warn people about the potential impacts that such behavior has.
  • Captures email attachments in their entirety.
  • Recognizes printing.
  • Limits on sizes of files.
  • The reports require lots of clicking to get to.
As a bundled package, we've kept Forcepoint DLP around because we need the capability. Our current on-prem deployment requires a bit of management and one of the things that always seems to be problematic is inserting a proxy. Some traffic doesn't like WCCP, other traffic doesn't like proxies. It quickly becomes a technical finger pointing session in almost any troubleshooting effort. And Forcepoint tech support isn't terribly interested in solving my problems so if their software is operating as they intend it to, then they don't really care if it's impeding our business.
Because we've brought our problem of inexplicable web traffic disruption and they effectively ceased working with our troubleshooting team even though we'd eliminated other avenues as the potential source of the problem. Once they stopped helping us look for a problem, their product became less appealing as the long-term solution. They may claim to want to be "my" (or "your") partner, but partners need to stick it out beyond the "traffic looks good from my perspective" attitude. They need to help us figure out what we're doing differently that could negatively impact business.
Ted Jan | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Review Source
Forcepoint DLP is used enterprise-wide at my company. We have the agent installed on every desktop/laptop that we own. Its primary usage is to stop data loss via USB storage devices. Being a financial company, we are very concerned about data loss from internal employees. Forcepoint has been able to help us track the movement of data to USB drives and block them.
  • Audit Data Transfers to USB
  • Block Data Transfers to USB
  • Policies can be difficult to create
  • Overwhelming amount of data is collected
Forcepoint DLP is ideal for companies that have dedicated IT staff to monitor it. There is a lot of data that is collected and it requires constant monitoring in order to determine whether or not people are moving data in or out of your environment. Creating policies, even test policies can be tricky in Forcepoint. A few times, we've created policies that we thought would only affect a small subset of users and instead they impacted the whole enterprise, so it's really important that a group/team of people really understand how to use this tool. If your company is concerned about data loss via USB, this is a good tool to use.
Forcepoint support for DLP is pretty good. When we've had issues, they are usually able to help us.
Score 10 out of 10
Vetted Review
Verified User
Review Source
Forcepoint DLP is being used across the organization to identify and locate ePHI on disk and in transit via email.
  • Database Fingerprinting to match my data exactly.
  • Integration with Forcepoint Email and Endpoint Agents.
  • Some inconsistency between module interfaces. Loading approve and block lists.
  • Complicated setup.
I like the database fingerprinting for DLP. I can point it to a DB Table of my sensitive customer info and use that to look for data loss. The reporting feature has also been useful as we can setup different levels of alert for different users and different amounts of sensitive data. The alerts can be sent to the offending user, their manager, and the security officer or any combination.
Forcepoint DLP and TRITON Enterprise are fully functional and complicated products to administer. We had excellent results with their support of the Web and Email products and have not been disappointed with their support of the DLP product. Our calls are always handled very efficiently and effectively. I would recommend Forcepoint to other users just based on the quality of their tech support.
Score 8 out of 10
Vetted Review
Verified User
Review Source
Forcepoint DLP is used bankwide. It addresses problems with data loss to network storage sites.
  • Ability to identify PII
  • Ability to alert on PII violations
  • Ability to block uploads to all Personal Network Storage and Backup sites
We use an on-prem Forcepoint web protection solution. So far, the limitations found in the DLP are specifically related to the ability for the product to completely block uploads to online storage sites like drive.google.com. There are some sites that Forcepoint can handle well. But not all.
Overall, response is acceptable for a recent Severity 3 support ticket. Resolution provided by the support tech was accurate.
David Stanfield | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Review Source
Although I am not part of the original team that implemented the Websense/Forcepoint system I have made large scale changes to improve upon its efficiency and resolve performance issues due to incorrectly deployed parts of the system. My overall experience has been good. Forcepoint has come a long way with their product and the features being made available over the next couple of versions are exciting and needed. The Forcepoint team has been very good to work with and they have shown remarkable improvement in customer service and technical support.
Forcepoint is being used as our Web Security and DLP solution and that is across the whole organization.
  • It is a very complete solution that addresses a wide range of different security issues and it does it well.
  • Forcepoint's Technical Support is on the ball. They have improved greatly over the last 3 years.
  • The level of professionalism from Forcepoint really completes the picture.
  • I do have some issues with Forcepoint but they do listen to their customers. Many of our issues have been addressed.
For a complete Web Security solution this is a good choice. For a simple solution look elsewhere.
Score 8 out of 10
Vetted Review
Verified User
Review Source
We are currently using it on the Security team to track data exfiltration. We also allow Data Custodians from different departments to review incidents to point out anything suspicious.
  • Tracks Removeable media based events well
  • Provides in depth forensic analysis
  • Whitelisting is limited. It should be adjusted so multi-tiered rules can be used accurately
  • Fingerprinting can be too sensitive and when similar (not exactly the same) files are found, it can impede production
In scenarios where you are just trying to block specific types of data based on a rule, it can be used very effectively.

If you are trying to use fingerprinting to classify data, Forcepoint is not well suited for this. You would need a separate technology in order to classify data appropriately.
Support from Forcepoint has been lacking. When calling in with a high priority issue we rarely are able to work with a technician immediately. The queue waits are very long and when you get through there are no support engineers available and we need to wait for a call back for hours it seems.
December 23, 2019

Good tool to use!

Score 9 out of 10
Vetted Review
Verified User
Review Source
We use Data Loss Prevention across org and, it addresses problems like Data Loss of PII. We have deployed the agents as well on endpoints.
  • Prevents Data Loss
  • Allows us to see what files are being touched
  • Masking
  • Changing regex
Great tool that has come in handy. We send many emails and deal with PII, so it's great to have a tool that looks out for our data. Sometimes the GUI can run slow but for the most part, we have not had any issues and things run smoothly.
Support has many issues. Forcepoint is starting to use offshore support and they simply just read out of a book and do not know how to troubleshoot properly. This has presented many issues for us and we have expressed our frustrations but to no avail, and that is an issue.
Alan Matson, CCNA:S, MCP | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Review Source
We currently use Websense to protect our web and data security channels. We have a number of Websense proxies deployed world wide protecting users in both large and small offices. Using Websense allowed us to add security to our internet bound traffic while securing our IP and keeping our bandwidth costs down from users browsing non-work related sites.
  • Content Filtering
  • Real Time security
  • Caching
  • DLP
  • A more centralized UI, different components have different UIs to log into
  • Better integration with third party products, they used to support SQUID but they no longer do
I have tried many proxy solutions from BlueCoat, to TMG/ISA, to Cisco WSA and nothing has compared to the ease of use of Websense and the flexibility. Sure there are always things missing but overall Websense has the best I have found.
Score 6 out of 10
Vetted Review
Verified User
Review Source
Forcepoint Data Loss Prevention is used across the organization. As a financial institution it is imperative that we take steps to insure customer data and ensure that when sensitive data leaves the organization it is done in a secure manner for sound business purposes. Forcepoint DLP is one of the tools we use to flag attachments and messages that may contain customer PII or proprietary information. Mistakes happen, so educating users is not an adequate preventive control.
  • Provisioning canned policies such as PII, PCI and PHI data detection.
  • Ability to detect sensitive data in compressed (zipped) attachments.
  • Inability to OCR and detect PII delivered as a screenshot or image file.
  • Lacking ability to alert when compressed file is password protected.
Google Drive allows a user to browse locally using an applet that resembles Windows Explorer. In this scenario, Forcepoint Data Loss Prevention is unable to enforce restrictions. Therefore, the only preventive control is to block Google Drive entirely, which reduces access to cloud storage solutions.
Not good. We have not had a good support experience with Forcepoint overall. When we open a ticket, it is usually as a last resort because our expectations are low that a resolution will be found quickly. As an example, we had a production issue that required support escalation. The Forcepoint engineer provided a webex session to review the status then proceeded to send KB articles for us to review and implement on our own. If the recommendation is for us to read and test out solutions on our own, then we could have just used Google.
Score 10 out of 10
Vetted Review
Verified User
Review Source
My organization uses Forcepoint Data Loss Prevention across the organization to address PHI stored in the organization. The use of Forcepoint DLP has helped us discover the actual location where PHI resides and how the user shares the PHI. We are able to set a threshold on the amount of PHI to share externally and it will trigger the alarm to the administrator for further review.
  • Track location of PHI.
  • Track confidential information.
  • The implementation is tougher than we initially thought.
  • It would be great to just add the solution that requires seamless implementation.
Forcepoint Data Loss Prevention does what we intended it to do. It tracks all PHI stored in the company and track the movement of PHI. It also has the capability to block the user from sharing PHI depending on how you have it on the setting. Overall, it is a return of investment for my company because it will prevent malicious insider from sharing valuable data to external parties.
We do not have any issues when we needed support from Forcepoint. The support team always gets back to us in a timely manner.
Score 2 out of 10
Vetted Review
Verified User
Review Source
The IT department implements and manages the product, and it is deployed across the environment.
  • Notify of problems
  • Stability
  • Customer Service
Due to the lack of responsiveness on support issues I cannot say it is well suited anywhere.
Many years of experience with unresponsiveness, unresolved issues, and poor support from management when escalated
Score 8 out of 10
Vetted Review
Verified User
Review Source
We use Forcepoint DLP across the whole organization in the US and China. We are in the health insurance industry and need to be compliant with PCI, HITRUST, HIPAA, etc. Forcepoint DLP enables us to protect sensitive information.
  • Blocks sensitive data from uploading to Internet via Forcepoint proxy.
  • Blocks sensitive data transmitted between application and even clipboard by Forcepoint DLP endpoint.
  • Does not support latest medicare id format - MBI.
  • Different to make whitelist and exception
It is good if you are also using Forcepoint web content gateway or Endpoint. You need to create regex pattern for MBI if you want to catch this latest medicare ID format.
Some support engineers are helpful, while others are not so helpful. Overall, the support is acceptable.
December 10, 2019

Forcepoint DLP Review

Score 9 out of 10
Vetted Review
Verified User
Review Source
It's being used across the whole organization. The main purpose is PII data loss prevention.
  • Easy to use
  • Easy to manage
  • Technical documentation is too complicated
  • Too many products with different names. So, it can get confusing which product does what.
Well suited for smaller organizations like ours.
They have good knowledge and return calls.
Score 8 out of 10
Vetted Review
Verified User
Review Source
We are currently using Forcepoint as our URL filtering solution. This takes a lot of the research out of whether a site should be accessed or not especially with the real-time filter enabled. Most our access out to the internet is blocked before we are even aware that there is an issue with the site. and can just be rendered a non-issue.

  • Easy access to which categories would be blocked or allowed.
  • Real-time blocking of hazardous sites.
  • Expandable.
  • Remote filtering is not as advanced as we would like.
  • Support time is not as quick as needed in most cases.
  • Upgrades of appliances and software is not as easy as other solutions.
  • HTTPS inspection needs to hand a valid cert and doesnt work correctly with all vendors.
Overall usage and configuration of Forcepoint is pretty straight forward. There a few things harder then others to get working correctly, but once configured correctly things work great.
Bill Rieger | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Review Source
We are using Websense mostly for it's Malware and Spyware filtering. We do little URL filtering but the filters that have put in place have been very effective. We use Websense through out the entire enterprise of our company this includes UK and Asia. It has cut down on the time spent by PC technicians have to remove Spyware, malware and adware on our users PC. This has also cut down on time spent on reloading pc that were infected as well.
  • It does a great job at stopping users from going to "infected" sites and sites that are undesirable.
  • It has a great range of flexibility and features. We have used it to lock down a server "production" computer that need only a limited amount of access to internet sites. It allows us to also filter by user/group/domain and even IP address or range.
  • Implementation was a little rough but once the product is up and running it is very stable.
  • Websense could do some improvement in the Support group. Long wait times and long times for follow-up.
  • Working with the support center and the sales engineers has been a little rough. We ran into problems where the support group did not understand how the sales engineer set up our design.
  • It would be also helpful if that you could sort in the knowledge base on just your current version you are running.
During the setup and design make sure that they have other companies using the same model and design that you are using. We ran into a big disconnect on this issue due to our configuration and working with Websense Support.
Product is very customizable and easy to setup and change on the fly.
June 04, 2014

Websense Great Tool

Bruno Lafreniere | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Review Source
Hi, I'm Bruno Lafrenier, Senior IT Datacom Specialist at the IRB. Websense was used to monitor and control some access to the Internet. It was used across the entire organization.
  • The integration with the firewall was amazing
  • The report for senior management was awesome
  • The possibility to filter malicious sites was usefull
  • Finding a solution to better support the https blocking and security
  • Better integration with the firewall
  • Faster GUI
What is the ease of deployment in the environment? Do you require an installment or change to the setting of each client in your organization? How does it work with the signature?