Skip to main content
TrustRadius
Forcepoint Insider Threat

Forcepoint Insider Threat

Overview

What is Forcepoint Insider Threat?

Forcepoint Insider Threat is a security analytics tool for, searching, detecting and mitigating malicious or policy-violating employee behavior.

Read more
Recent Reviews
Read all reviews
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Forcepoint Insider Threat?

Forcepoint Insider Threat is a security analytics tool for, searching, detecting and mitigating malicious or policy-violating employee behavior.

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

3 people also want pricing

Alternatives Pricing

What is Teramind?

Teramind helps organizations track user behaviors to detect insider threats and prevent data leaks. The software lets users monitor and record the activities of employees, remote users, external contractors both onsite and offsite in real-time. Teramind’s monitoring features can track…

Return to navigation

Product Details

What is Forcepoint Insider Threat?

Forcepoint Insider Threat Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(3)

Reviews

(1-2 of 2)
Companies can't remove reviews or game the system. Here's why
Stacey Arjen | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Forcepoint Insider Threat gives us visibility into computer users' early behavior and helps to stop data theft and loss by detecting suspicious activity whether intentional or accidental and preventing either the hijacked system, the rogue insider or just the user who makes mistakes and ensuring that valuable data is not compromised.
  • Establishment of normal user behavior and early indication of a potential risk when a user starts to stray from normal activity.
  • Automatically identify the riskiest user.
  • Provides context as a prove to investigation.
  • Forcepoint Insider Threat functionality meets our needs.
  • No room for improvement.
Forcepoint Insider Threat is the best insider threat solution that protects our sensitive data by giving us the incredible visibility into our users computer early activity and gives us protection against theft and loss by hijacked system, rogue insider or negligence by the end user.
  • Offers video recording and playbacks.
  • An intuitive way to identify the riskiest user.
  • Fully integration with Forcepoint DLP for smarter decision making.
  • Saves time and effort to automatic identification of riskiest user.
  • Integrated enterprise-wide system and no need to buy a number of independent software.
  • Helps free our employee to focus on high priority task and improve efficiency.
Powerful tool with smart data collection that helps us to automatically detect when a user strays into abnormal behavior and the integration with Forcepoint DLP which has helped us to quickly drive to smarter decision after detecting risky user behavior and the video collection and playbacks helps a lot during investigation.
WAQAS ASGHAR SIPRA | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We need to stop employees from sharing critical data within and outside the organization [especially] by email and USBs. And restrict them to print [sensitive] information like employee info, bank details, and any other details which relate to personal category. On [the] IT side we [don't] people to share keys and codes outside the organization.
  • Loss of data through Email
  • Copy of sensitive data
  • Sharing of data at all means
  • Printscreen restrictions
  • Printing restrictions
  • Visualization of data
  • Options are hard to find
  • Integration with Active directory
Email protection, you can see and restrict every kind of email having confidential data for which it provides a catalog building with data classification. Each and every department need to classify its data to see better results through Forcepoint. Because all it [needs] a deep down analysis of each and every information shared through email and other means of sharing.
  • Email monitoring including corporate and others like hotmail, gmail etc.
  • Data classification
  • Rule based protection
  • Licenses are bundle up.
  • User based licensing.
  • Renewal cost is almost same as purchasing cost.
We chose Forcepoint because it provides [the] following benefits as [compared] to others; Modifying or stealing confidential or sensitive information for personal gain. Theft of trade secrets or customer information to be used for business advantage or to give to a foreign government or organization. Sabotage of an organization's data, systems, or network.
Return to navigation